Forthcoming Networks and Sustainability in the IoT Era: Second International Conference, FoNeS-IoT 2021, Volume 2 (Lecture Notes on Data Engineering and Communications Technologies) 3030995801, 9783030995805

This book aims to provide a platform to the researchers and practitioners from both academia and industry to meet and sh

110 14 21MB

English Pages 396 [394] Year 2022

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Contents
Remote Patient Monitoring During the COVID-19 Pandemic in the Framework of Home Device Manufacturing for IoT-Based BPM and SPO2 Measurements
1 Introduction
2 Related Works
3 Materials and Methods
4 Framework
5 Conclusion
References
Smart Gardening Automation System Using IoT with Power Saver
1 Introduction
2 Literature Review
3 Methodology
3.1 Hardware Design
4 Implementation
5 Discussion and Result
6 Conclusion
References
Wi-Fi Attendance System in the IoT Era
1 Introduction
2 Literature Review
3 Methodology
3.1 Hardware Configuration
3.2 Software Configuration
4 Result and Discussion
5 Conclusion
5.1 Future Work
References
Position Estimation and Tracking with a Fuzzy-Logic-Based Adaptive Strong Tracking Kalman Filter for Capacitive Touch Panels
1 Introduction
2 Literature Review
3 Solving Methods
4 Methodology
5 Results
6 Conclusion
7 Future Work
References
A Hybrid Metaheuristic Algorithm for the Localization Mobile Sensor Nodes
1 Introduction
1.1 WOA Algorithm
1.2 GOA Algorithm
2 Proposed Method
2.1 Case Study
3 Simulation and Discussion
4 Conclusions
References
The Application of Big Data in Aerobics Teaching in Higher Vocational Colleges
1 Introduction
2 Overview of Big Data Technology
3 The Significance of Introducing Aerobics into Higher Vocational Colleges
3.1 An Overview of Aerobics
3.2 Conform to the Development Trend of College Physical Education Curriculum Reform
3.3 Can Meet the Requirements of the New Curriculum Standards
4 Big Data and the Purpose and Direction of Aerobics Education Innovation in Higher Vocational Colleges
5 Application of Big Data in Aerobics Teaching in Higher Vocational Colleges
5.1 It Needs Professionals to Analyze Data and High-Quality Physical Education Teachers
5.2 We Need to Improve the Physical Education Infrastructure and the Cooperation of Various Industries
5.3 Breaking the Limitations of Big Data in the Application Process
6 Conclusion
References
Design of Data Standardization Cleaning System Under Multi-source Data Access
1 Introduction
2 Design of Data Standardization Cleaning System Under Multi-source Data Access
3 Preliminary Data Clustering
4 System Test
4.1 System Test Platform Design
4.2 System Test Index
4.3 Analysis of Test Results
5 Conclusion
References
Research and Analysis of Computer Multimedia Technology in Basketball Tactics Teaching
1 Introduction
2 The Significance of Computer Multimedia Technology in Basketball Tactics Teaching
3 Computer Multimedia Technology-Assisted Basketball Tactical Teaching Design
3.1 Analysis of Learner Characteristics
3.2 Teaching Objective Design
3.3 Teaching Content Design
4 Teaching Strategy Design
4.1 Organizing Teaching Strategies First
4.2 Copying Teaching Strategies
4.3 Situational Edification Strategy
References
Computer Simulation Analysis Based on Reinforced Concrete High Rise Structure Design
1 Introduction
2 Common Problems and Countermeasures of High Rise Building Structure Selection
2.1 Problems Related to Structure Selection
2.2 Structural Height Related Issues
2.3 Setting of Embedded End
3 Structural Calculation and Analysis
3.1 Selection of Software for Overall Structural Calculation
3.2 Influence of Building Partition Wall on Natural Vibration Period
3.3 Is the Number of Vibration Modes Sufficient
3.4 Is it Necessary to Calculate the Mutual Interference of Each Seismic Period Between Multiple Towers Separately
3.5 Calculation and Design of Non Structural Members
4 Computer Simulation of Reinforced Concrete High Rise Structure Design
4.1 Main Mathematical Models of Reinforced Concrete
4.2 Computer Simulation Analysis of Reinforced Concrete Structure
4.3 Material Failure Envelope
5 Conclusion
References
Design of High Availability Server System Management Software for Autonomic Computing
1 Introduction
2 Computing the Architecture of Highly Available Server System to the Independent
2.1 High Availability Server System for Autonomous Computing
2.2 System Image Under Management Software
3 Requirement Analysis and Outline Design of System Management Software
3.1 Demand Analysis
3.2 Virtual Network Management
4 Detailed Design and Implementation of System Management Software
5 Conclusion
References
Application of Decision Tree Algorithm in Teaching Quality of Higher Vocational Colleges
1 Introduction
2 Decision Tree Algorithm
2.1 Decision Tree Model Theory
2.2 Application of Decision Tree
3 Construction of Teaching Quality Evaluation Index System
4 Evaluation of Teaching Quality Model
5 Conclusion
References
Application and Research of Artificial Intelligence Technology in Civil Architecture Teaching
1 Introduction
2 Teaching Research of Civil Architecture
2.1 Characteristics of Civil Engineering
2.2 Status of Civil Engineering Professionals
3 The Support of Artificial Intelligence Technology to the Teaching Reform of Civil Construction
3.1 AR/VR Technology
3.2 Computer Vision
4 Research on the Transformation of Teaching and Learning Methods by Artificial Intelligence Technology
4.1 The Transformation of Artificial Intelligence to Teaching
4.2 The Transformation of Artificial Intelligence to Learning
5 Research on the Transformation of Teaching and Learning Methods of Civil Architecture by Artificial Intelligence Technology
5.1 The Transformation of Artificial Intelligence to Civil Architecture Teaching
5.2 The Transformation of Artificial Intelligence to Civil Architecture Learning
5.3 Real Case Simulation Teaching Method
6 Conclusion
References
Application of Random Simulation Algorithm in Physical Education Teaching Evaluation
1 Introduction
2 The Composition of Cloud Computing Network Teaching in College Physical Education
3 The Application of Collaborative Filtering Algorithm in Recommendation Network Course Platform
4 The Implementation of Network Course Platform Based on Cloud Computing in Physical Education Teaching
5 Conclusions
References
Contribution of Block Link to Issues in SME Financing
1 Introduction
2 Financing Problems of Small and Medium-Sized Enterprises
3 Analysis of the Contribution of 2. Block Link to SME Financing
3.1 Block Link Perfectly Meets the Financing Requirements of SMEs
3.2 Block Link Can Realize the Multi-level Circulation of Enterprise Credit
3.3 Block Link is the Key to Reduce Financing Costs and Improve Financing Feasibility
4 Application Countermeasures of SME Financing in 3. Block Link Technology
4.1 Government-Level Support
4.2 Financial Institution Strategy
4.3 Enterprise-Level Countermeasures
References
Application of Genetic Algorithm in Evolutionary Music
1 Introduction
2 Genetic Algorithm
2.1 Principle of Genetic Algorithm
2.2 Convergence Analysis of Genetic Algorithm
3 Music Creation and Music Evolution
3.1 Music Creation
3.2 Evolution Music
4 Evolutionary Music Synthesis Coding and Genetic Mutation Operator
4.1 Music Code
4.2 Genetic Operators and Genetic Operations
5 Evolutionary Music Algorithm Based on Genetic Algorithm
5.1 Steps of Genetic Algorithm
5.2 Steps of Genetic Algorithm Composition
6 Conclusion
References
Research and Design of Automatic Piano Accompaniment System Based on Sound Database
1 Introduction
2 Formal Description of the Basic Concept of System
2.1 Overview of Theoretical Model of Automatic Accompaniment System
2.2 Formal Description of Notes and Clusters
2.3 An Overview of the Structure of Phoneme
3 Two HMMs in Automatic Accompaniment System
4 System Design Objectives and Components
5 Conclusion
References
Discussion on Curriculum Reform of Chemical Engineering Drawing and CAD Based on Big Data Era
1 Introduction
2 The Impact of Big Data Era on University Teaching
2.1 The Influence on Teaching Decision
2.2 The Influence on Teaching Methods
2.3 The Influence on Teaching Design
2.4 The Influence on Teaching Evaluation
2.5 Significant Changes in Learning Time and Space
3 Teaching Status of Chemical Engineering Drawing and CAD
3.1 Backward Traditional Teaching Methods
3.2 Single Assessment Method
4 Content of Chemical Engineering Drawing and CAD Curriculum Reform Based on Big Data Era
4.1 Combination of Multimedia Teaching and Computer Operation
4.2 Interaction Between Students and Teachers
4.3 Diversification of Assessment Methods
5 Conclusion
References
The Design and Implementation of the Data Statistics Method in the Quality Development Network Certification System for College Students
1 Introduction
2 Related Work
3 General Design and Detailed Design
4 Conclusion
References
Application of Data Mining Technology and Association Programming Algorithm in Marketing Strategy
1 Introduction
2 Data Mining Technology
2.1 Statistical Analysis
2.2 Knowledge Discovery
2.3 Other Data Mining Technologies
3 Analysis of Association Rules
3.1 Association Rules and Algorithm Selection
3.2 Apriori Algorithm
4 Mechanism of Big Data
4.1 Big Data Credit System Strengthens Credit Evaluation of Scientific and Technological Innovation Enterprises
4.2 Big Data Technology Strengthens Credit Risk Control of Scientific and Technological Innovation Enterprises
5 Conclusion
References
Simulation and Analysis of Influencing Factors of Water Drive in High Water-Cut Stage of Computer Technology
1 Introduction
2 Study on Water Drive Development Law in High Water Cut Stage
2.1 Analysis of Mining Characteristics
2.2 Study on the Law of Water Drive Development
3 Production Capacity Change Law
4 Remaining Oil Potential Tapping Measures
5 Study on Evaluation System of Water Drive Condition
5.1 Analysis on Evaluation Index of Water Drive Condition
5.2 Comprehensive Evaluation Method of Water Drive Condition
6 Conclusion
References
Design of the Evaluation Index System of Human Resources Ecosystem in Emerging Industries Based on Big Data
1 Introduction
2 The Structure and Evaluation Framework of Human Resource Ecosystem in Emerging Industries
2.1 Structure Analysis of Human Resource Ecosystem in Emerging Industries
2.2 Overall Framework Analysis of Human Resource Ecosystem Evaluation of Emerging Industries
3 Evaluation Index of Human Resource Ecosystem in Emerging Industries
3.1 Evaluation Index of Human Resource Viability in Emerging Industries
3.2 Evaluation Index of Human Resource Competitiveness of Emerging Industries in District and City
4 Evaluation Index of Human Resource Development in Emerging Industries
4.1 Evaluation Index System of Industry Internal Environment Layer
4.2 Evaluation Index System of Industrial External Environment Layer
5 Conclusion
References
Study on the Role of Big Data Age in Making Fitness Programs for Individual Science
1 Introduction
2 Basic Introduction of Big Data
2.1 Overview of Big Data
2.2 ID3 Algorithm
3 Research on Big Data Technology and the Development of Personal Fitness Program Under Its Background
3.1 Application Status of Big Data
3.2 Advantages of Big Data Application
4 The Premise of Scientific Fitness Under the Background of Big Data
4.1 Have a General Assessment of Your Physical Condition
4.2 Strengthen the Combination of Aerobic Training and Strength Training
5 Summary and Exhibition
References
Construction of Performance Evaluation System for Intelligent Simulation of University Research Under Big Data
1 Introduction
2 Construction of Performance Evaluation Index System and Evaluation Method
3 BP Neural Network Model
3.1 Determine the Structure of BP Neural Network
3.2 Principle of BP Neural Network
4 Conclusion
References
Analysis of 3D Modeling and Detection of Wrong Action in Sports Training
1 Related Concepts of Personalized Recommendation System
2 Analysis of Wrong Action Recognition in Sports Training
3 Method of Judging Wrong Actions in Sports Training Based on 3D Modeling Detection
3.1 Image Acquisition and Processing
3.2 Image Decomposition and Reconstruction
3.3 Motion Modeling Detection
3.4 Feature Dimension Reduction Analysis
3.5 Method Simulation Analysis
4 Conclusion
References
Government Environmental Accounting Information Disclosure System Under the Background of Big Data
1 Introduction
2 Conceptual Framework of Financial Accounting
3 Accounting Information Disclosure System
4 Improving the Government Accounting Information Disclosure System by Means of Big Data
5 Conclusion
References
The Influence of MOOC on College Physical Education in the Era of Big Data
1 Introduction
2 The Origin of MOCC
3 MOOC Teaching Supported by Big Data
4 The Influence of MOOC on the Development of College Physical Education
4.1 Realize the Integration of Physical Education and Happy Sports
4.2 Strengthen the Cultivation of Lifelong Sports Consciousness
4.3 Big Data Driving, Online and Offline Combination to Improve Learning Effect
5 Conclusion
References
Measurement of Tax Paying Ability and Design of Tax Expenditure for Real Estate Tax of Urban Families in China
1 Introduction
2 The Explanation of the Principle of Quantifying Tax and its Application in Tax Legislation
2.1 Concept of the Principle of Taxation
2.2 The Status of the Principle of Quantifying Tax in Tax Legislation
3 The Measurement and Evaluation of the Tax Paying Capacity of Urban Residents’ Real Estate
3.1 Tax Capacity Index of Income Standard
3.2 The Tax Capacity Index of Net Income Standard
3.3 Tax Capacity Index Considering the Net Income Standard of Savings
4 Design Suggestions of Tax Expenditure of Real Estate in China
4.1 Summary of the Characteristics of Families without Tax Paying Ability
4.2 Design of Tax Expenditure Project
4.3 Cost and Benefit Assessment of Tax Expenditure
5 Conclusion
References
Design and Research of Big Data Multimedia Technology in College Physical Education Teaching System
1 Introduction
2 Problems in College Physical Education Under the Background of Big Data
2.1 Data Resources are Scattered
2.2 The Phenomenon of “Information Island” Exists
2.3 Low Utilization Efficiency of Data Resources
3 The Application of Multimedia Teaching in Physical Education
3.1 Development and Application of Sports Multimedia Courseware
3.2 Application in Physical Education Teaching Management
4 The Causes of the Problems in College Physical Education Under the Background of Big Data
4.1 Lack of Scientific Understanding of the Use of Big Data
4.2 Not Familiar with the Application of Big Data
5 Suggestions on the Application of Big Data in College Physical Education
5.1 Enrich Teaching Content and Promote Teaching Quality
5.2 Improve the Awareness of Using Big Data
5.3 Training Professional Big Data Talents
6 Conclusion
References
A System of English Spoken Pronunciation Learning Based on Speech Recognition and Mobile Phone Platform
1 Introduction
2 Extraction of Speech Signal Eigenvalue
2.1 Mel Frequency Cepstrum Coefficient (MFCC)
2.2 LPCC
3 System Implementation
3.1 User Voice Input
3.2 Model Establishment
3.3 Sound Feature Extraction
3.4 Improved Viterbi Alignment Algorithm
4 Pronunciation Score
5 Conclusion
References
Material System Technology Based on Oracle Database and Java Language
1 Introduction
2 Key Technologies Based on Network
2.1 Introduction to Java Technology
2.2 Oracle Features
2.3 Three Tier Architecture Based on Java
3 Basic Research on Manufacturing of Multi Material Parts
4 Encryption of Oracle Database
5 Conclusion
References
Analysis of Three-Dimensional Multi-motion Simulation of Intelligent Snake Robot Based on Reconfigurable Modularity
1 Introduction
2 System Principle and Module Analysis
2.1 System Principles
2.2 Module Subsystem
2.3 Power Drive Module
3 Structure Design of Intelligent Snake Robot
3.1 Motion Patterns of Serpentine Robots
3.2 Drive Unit Design
3.3 Modular Structure Design
4 Research on 3D Multi-motion Simulation of Intelligent Snake Robot Based on Reconfigurable Modularization
5 Conclusion
References
New Media Art and Ant Colony Algorithm in the Construction of Art Curriculum Platform
1 Introduction
2 Ant Colony Algorithm
3 The Content of New Media Art Curriculum Resources
4 Construction of Art Curriculum Platform
5 Conclusion
References
Design and Implementation of Internet Plus Sports Health Management System
1 Introduction
2 Demand Analysis of Regional Health Management Platform
3 Design and Implementation of Health Management Platform
3.1 Platform Design Principles
3.2 Architecture Design of Mobile Internet of Things Platform
4 Testing of Health Management System
5 Conclusion
References
Elastic Plastic CPPM Algorithm of Pore Water Pressure and Inversion of Mechanical Parameters of Tunnel Surrounding Rock
1 Introduction
2 Nearest Point Projection Algorithm of Pore Water Pressure
3 The Programming and Numerical Simulation of Elastoplastic Considering Pore Water Pressure
3.1 Elastoplastic Programming Considering Pore Water Pressure
3.2 Self Programming Verification and Numerical Simulation
4 Intelligent Back Analysis Program and Back Analysis of Surrounding Rock Mechanical Parameters
5 Conclusion
References
A New Way to Cultivate Innovative and Employable Talents Based on Computer
1 Introduction
2 An Analysis of the Current Situation and Causes of Employment
3 The Problems Existing in the Traditional Talent Training Mode and the New Perspective of the Employment Oriented Talents Training
3.1 Problems in Traditional Talent Training Mode
3.2 New Perspective on the Cultivation of Employment Talents
4 The New Way of Talent Training
4.1 Cultivate Students’ Practical Ability through Well-Designed Experimental Scheme
4.2 Take the Employment as the Guidance, Actively Carry out the Education of “Double Certificate System”.
5 Conclusion
References
Application of UAV Intelligent Management and Control Platform on Overhead Transmission Lines Inspection
1 Introduction
2 The UAV Intelligent Management and Control Platform
2.1 The Basic Resource Library
3 Intelligent Management and Control of the UAV Inspection in Total Process
3.1 The Task Planning and Management Module
3.2 The Intelligent Command and Control Module
3.3 Control of Inspection Results
4 Conclusion
References
Application of MATLAB Software in Higher Mathematics Teaching
1 Introduction
2 Introduction to Matlab
3 Introducing Matlab into Higher Mathematics Teaching
4 Drawing graphics with MATLAB
4.1 Research on Function Characteristics with MATLAB Drawing Function
4.2 Application of MATLAB in Space Analytic Geometry
4.3 Animation Drawing of Space Moving Point Trajectory
4.4 Drawing Special Graphics with MATLAB
5 Conclusion
References
Hybrid Clustering Algorithm for Cloud Server Information Management
1 Introduction
2 Hybrid Clustering Algorithm
2.1 Background of Mixed Attribute Clustering
2.2 Research Status of Mixed Attribute Clustering
2.3 Introduction to Algorithm
3 Cloud Service Technology
3.1 Overview of Cloud Services
3.2 Advantages of Cloud Service
3.3 Several Main Types of Cloud Services
4 Cloud Service Information Management
4.1 Network Monitoring System
4.2 System Functions
5 Conclusion
References
Factors Affecting Construction Workers’ Fatigue Based on Statistical Analysis
1 Introduction
2 Analysis on Influencing Factors of Fatigue of Construction Workers
2.1 Questionnaire Data Analysis of Influencing Factors of Construction Workers
2.2 Index System of Influencing Factors of Fatigue of Construction Workers
3 Structural Equation Model Analysis of Fatigue Influencing Factors for Construction Workers
3.1 First-Order Confirmatory Factor Analysis
3.2 Second-Order Confirmatory Factor Analysis
3.3 Analysis of Empirical Results
4 Countermeasure Measures for Work Fatigue of Construction Workers
References
An Empirical Study on the Cultivation of College Students’ Core Competence of Innovation and Entrepreneurship Based on Multidimensional Dynamic Innovation Model Under Genetic Algorithm
1 Introduction
2 Multi Bit Dynamic Innovation Model Based on Genetic Algorithm
3 The Construction and Operation Mechanism Analysis of the New Type of University Students’ Innovation and Innovation Mechanism
3.1 Entrepreneurship Model for College Students – Multi Dimension Dynamic Innovation Model (mdmi)
3.2 Operation Mechanism of mdmi
4 Analysis of the Promotion Strategy of the Entrepreneurship and Innovation Activities of College Students
5 Conclusion
References
The Exploration and Practice of Computer Aided Design in the Course Construction of Art Education
1 Introduction
2 The Significance and Teaching Status of Computer Aided Art Design
2.1 The Significance of Computer Aided Art Design Course
2.2 Teaching Status of Computer Aided Art Design Course
3 Application of Computer in Art Design
4 Construction of Art Education Course
4.1 The Construction Ideas of the Course
4.2 Contents of Course Construction
5 Conclusion
References
VR Simulation Technology in Basketball Referee Teaching
1 Introduction
2 The Current Situation of Basketball Referee Teaching
2.1 Single Teaching Method
2.2 More Content Knowledge
2.3 The Students’ Theoretical Foundation is Weak
3 Practice of Integrating VR Into Basketball Referee Teaching
3.1 Promoting Quality Resource Sharing Across Time and Space
3.2 Combination With Experimental Courses
3.3 Promoting the Innovation of Network Teaching Mode
4 Conclusion
References
Handwritten Note Recognition Based on Digital Music Classroom Teaching
1 Introduction
2 Related Technology of Handwriting Recognition
2.1 Statistical Pattern Recognition Method
2.2 Neural Network Recognition Technology
2.3 Handwriting Recognition Process
3 Design and Recognition of Handwritten Notes
3.1 Types of Handwritten Notes
3.2 Data Acquisition
3.3 Pretreatment
3.4 Feature Extraction of Note Stroke
3.5 Recognition of Note Strokes
4 Conclusion
References
Design of Color Music System Based on Feature Classification
1 Introduction
2 Modeling Music Emotion
2.1 Hevner Emotional Model
2.2 Classification Method of Music Emotion
2.3 The Corresponding Relationship between Emotion and Color
3 Music Feature Extraction
4 Overall Design and Process
5 Conclusion
References
Design and Implementation of Statistics and Analysis System for Volleyball Match
1 Introduction
2 Data Mining Theory
2.1 Data Mining Concept
2.2 Algorithm Design of Association Rules Mining
3 Design of Data Acquisition Scheme
3.1 Script Design Idea
3.2 Example of Script Parser Analysis Process
4 The Design of Statistics and Analysis System of Volleyball Match on the Spot
4.1 System Design Objectives
4.2 System Architecture Design
4.3 System Function Structure Design
5 Conclusion
References
The Teaching Practice of Art Courses in Digital Media Major
1 Introduction
2 Thoughts on Curriculum Design of Digital Media Art Major
3 The Content of the Course Optimization Design of Digital Media art Major
4 Implementation of the Optimization Design Scheme of Digital Media Art Course
5 Conclusion
References
English Translation Skills of Food Packaging Based on Computer
1 Introduction
2 Composition and Language Characteristics of Food Packaging
3 Common Translation Errors in Food Packaging
3.1 The Phenomenon of Dead Translation is Serious
3.2 Grammatical Errors
3.3 The Terms are not Standardized and Unified
3.4 Replacing English with Chinese
3.5 Insufficient Cultural Care
4 Computer Based English Translation Skills
4.1 Computer Intelligent Proofreading of English Translation
4.2 Interactive Relationship Handling Skills in Translation
4.3 Translation Skills of Interpretation and Free Translation
4.4 Flexible and Informative Translation Skills
5 Conclusion
References
The Construction Mode of Virtual Experiment System Based on Modern Educational Technology
1 Introduction
2 Establishment of Virtual Experiment Teaching Process Model
2.1 User Interface Rendering
2.2 Setting up the Experimental Scene
2.3 Simulation and Simulation of Experiment Process
3 Construction of System Simulation Virtual Experiment System
4 Construction of Real Measurement Virtual Experiment System
4.1 Key Technologies of System Development
4.2 System Development Ideas
4.3 Analysis of Application Situation and Application Status of the System
5 Workflow of Virtual System
6 Conclusion
References
Module Construction of New Artificial Intelligence System Based on Visual Communication
1 Introduction
2 Visual Communication Design and Artificial Intelligence Design
2.1 General
2.2 Change of Design Carrier
3 Analysis of New Artificial Intelligence System
4 Design of New Artificial Intelligence System Based on Visual Communication
4.1 Idea of Man Machine Cooperation Mode
4.2 Lens Design
4.3 Image Acquisition Card
5 Conclusion
References
On the New Mode of University Enterprise Cooperation in Undergraduate Education in the Information Age
1 Introduction
2 The Concept of Undergraduate Education and School Enterprise Cooperation
2.1 Undergraduate Education
2.2 School Enterprise Cooperation is a Mode of Cooperative Education
3 Analysis on the Characteristics of Undergraduate Education in the Information Age
3.1 Continuing Education is Characterized by Digitization, Networking, Intelligence, Multimedia, Personalization and Virtualization
3.2 In the Information Age, Continuing Education is Characterized by Openness, Sharing, Interaction and Cooperation
4 Analysis on the Problems and Causes of School Enterprise Cooperation in Application Oriented Universities
4.1 The Existing Practice Training can not Meet the Training Requirements of Applied Talents
4.2 The Combination of Graduation Project and Enterprise Practice is not Close Enough
4.3 The Awareness of Service Enterprises Should be Strengthened
5 The Key Measures of University Enterprise Cooperation in Undergraduate Education in the Information Age
6 Conclusion
References
Construction of Risk Warning Model in Financial Market Based on Artificial Intelligence Technology
1 Introduction
2 Research on Financial Risk Early Warning
2.1 Financial Risk Early Warning
2.2 Financial Technology Promoting the Change in Traditional Risk Management
3 Prevention Mechanism of the Model Construction
3.1 Penetrable Risk Control
3.2 Increase in Foul Costs
4 MS-VAR Model Construction and Analysis
4.1 Model Design
4.2 Empical Research
4.3 Risk Index Construction
4.4 Data Analysis
References
Application of Virtual Network Technology in Computer Network Security
1 Introduction
2 Characteristics and Application Status of Virtual Network Technology
3 Influencing Factors of Virtual Network Technology in Computer Network Security
3.1 Influencing Factors of Unauthorized Access
3.2 Natural Factors of Influencing Factors
3.3 Influencing Factors of Computer Virus
3.4 Influencing Factors of Trojan and Backdoor
4 Application of Virtual Network Technology in Computer Network Security
4.1 Application of Virtual Network Technology Between Enterprise Cooperative Customers and Enterprises
4.2 Application of Virtual Network Technology Between Remote Branch Departments and Enterprise Departments
4.3 Application of Virtual Network Technology Between Remote Employees and Enterprise Network
4.4 Application of Virtual Network Technology in Computer Network Information
5 Application Effect and Development Prospect of Virtual Network Technology
6 Conclusion
References
Music Teaching Practice of Preschool Major in Normal Universities Based on Mixed Teaching Mode
1 Introduction
2 The Status and Teaching Status of Music Course in Preschool Education
2.1 The Status of Music Curriculum in Preschool Education
2.2 The Current Situation of Music Teaching in Preschool Education
3 A Summary of Hybrid Learning
4 Research on Music Teaching Practice of Preschool Major in Normal Universities Based on Mixed Teaching Mode
4.1 The Mixture of the Leading Role of Teachers and the Main Position of Students
4.2 The Mixture of Classroom Teaching and Network Learning
4.3 The Mixture of Autonomous Learning and Cooperative Learning
4.4 Mixing Process Assessment and Summary Evaluation
5 Conclusion
References
Optimal Trajectory of Manipulator Torque Based on Two Population Cuckoo Algorithm
1 Introduction
2 Traditional Cuckoo Algorithm and Improved Algorithm
2.1 Traditional Cuckoo Algorithm
2.2 Two Population Cuckoo Algorithm
3 Algorithm Simulation
3.1 Simulation Object
3.2 Simulation Results
4 Conclusion
References
Evaluation of Government Emergency Management Capability Based on Internet of Things Under BP Neural Network
1 Introduction
2 BP Neural Network
3 Construction of Evaluation Index System of Government Emergency Management Ability
3.1 Design Idea of Index System
3.2 First Level Index Design Idea
3.3 Secondary Index Design Ideas
3.4 Evaluation Index System of Government Emergency Management Capability
4 Construction of Emergency Management Capability Evaluation Model Based on the Application of Internet of Things Under BP Neural Network
4.1 Model Construction
4.2 Network Training
4.3 Model Validation
5 Conclusion
References
Author Index
Recommend Papers

Forthcoming Networks and Sustainability in the IoT Era: Second International Conference, FoNeS-IoT 2021, Volume 2 (Lecture Notes on Data Engineering and Communications Technologies)
 3030995801, 9783030995805

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

Lecture Notes on Data Engineering and Communications Technologies 130

Fadi Al-Turjman Jawad Rasheed   Editors

Forthcoming Networks and Sustainability in the IoT Era Second International Conference, FoNeS-IoT 2021, Volume 2

Lecture Notes on Data Engineering and Communications Technologies Volume 130

Series Editor Fatos Xhafa, Technical University of Catalonia, Barcelona, Spain

The aim of the book series is to present cutting edge engineering approaches to data technologies and communications. It will publish latest advances on the engineering task of building and deploying distributed, scalable and reliable data infrastructures and communication systems. The series will have a prominent applied focus on data technologies and communications with aim to promote the bridging from fundamental research on data science and networking to data engineering and communications that lead to industry products, business knowledge and standardisation. Indexed by SCOPUS, INSPEC, EI Compendex. All books published in the series are submitted for consideration in Web of Science.

More information about this series at https://link.springer.com/bookseries/15362

Fadi Al-Turjman Jawad Rasheed •

Editors

Forthcoming Networks and Sustainability in the IoT Era Second International Conference, FoNeS-IoT 2021, Volume 2

123

Editors Fadi Al-Turjman Innovation and Information Technologies Center Near East University Mersin, Turkey

Jawad Rasheed Department of Computer Engineering Istanbul Aydin University Besyol Mah, Istanbul, Turkey

ISSN 2367-4512 ISSN 2367-4520 (electronic) Lecture Notes on Data Engineering and Communications Technologies ISBN 978-3-030-99580-5 ISBN 978-3-030-99581-2 (eBook) https://doi.org/10.1007/978-3-030-99581-2 © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Contents

Remote Patient Monitoring During the COVID-19 Pandemic in the Framework of Home Device Manufacturing for IoT-Based BPM and SPO2 Measurements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hamit Altıparmak and Şerife Kaba

1

Smart Gardening Automation System Using IoT with Power Saver . . . Mohamed Ahmed Geedi, Saciid Ahmed Aadan, Bashiir Ahmed Cilmi, Suleiman Abdullahi Ali, and Mohamed Khalif Warsame

11

Wi-Fi Attendance System in the IoT Era . . . . . . . . . . . . . . . . . . . . . . . . Sarumi Usman Abidemi, Omoraka Gershion Oghenetega, Sekyere-Asiedu Daniel, and Fadi Al-Turjman

19

Position Estimation and Tracking with a Fuzzy-Logic-Based Adaptive Strong Tracking Kalman Filter for Capacitive Touch Panels . . . . . . . . . Abdelrahman Almomani and Fadi Al-Turjman

30

A Hybrid Metaheuristic Algorithm for the Localization Mobile Sensor Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hasan Sencer Kirtil and Amir Seyyedabbasi

40

The Application of Big Data in Aerobics Teaching in Higher Vocational Colleges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xin Feng

53

Design of Data Standardization Cleaning System Under Multi-source Data Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bo Li, Ruifeng Zhao, Fengchao Chen, Bo Zhang, Lide Zhou, Yipeng He, and Chengbo Lu Research and Analysis of Computer Multimedia Technology in Basketball Tactics Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Qingtian Zeng

59

68

v

vi

Contents

Computer Simulation Analysis Based on Reinforced Concrete High Rise Structure Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lingyan Duan and Rong Tang

73

Design of High Availability Server System Management Software for Autonomic Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Weipeng Liang and Xiaoqiong Qiu

81

Application of Decision Tree Algorithm in Teaching Quality of Higher Vocational Colleges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fang Mei

89

Application and Research of Artificial Intelligence Technology in Civil Architecture Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ya Qin

96

Application of Random Simulation Algorithm in Physical Education Teaching Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Jianan Li Contribution of Block Link to Issues in SME Financing . . . . . . . . . . . . 109 Bai Yan Application of Genetic Algorithm in Evolutionary Music . . . . . . . . . . . . 114 Lingqiong Zeng Research and Design of Automatic Piano Accompaniment System Based on Sound Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Ning Ding Discussion on Curriculum Reform of Chemical Engineering Drawing and CAD Based on Big Data Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 Yi Fang and Jinxin Liu The Design and Implementation of the Data Statistics Method in the Quality Development Network Certification System for College Students . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Shasha Gao Application of Data Mining Technology and Association Programming Algorithm in Marketing Strategy . . . . . . . . . . . . . . . . . . 142 Jianhao He Simulation and Analysis of Influencing Factors of Water Drive in High Water-Cut Stage of Computer Technology . . . . . . . . . . . . . . . . . . . . . . . 149 Dongsheng Hu Design of the Evaluation Index System of Human Resources Ecosystem in Emerging Industries Based on Big Data . . . . . . . . . . . . . . 154 Wei Hu

Contents

vii

Study on the Role of Big Data Age in Making Fitness Programs for Individual Science . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Chenqi Xiang Construction of Performance Evaluation System for Intelligent Simulation of University Research Under Big Data . . . . . . . . . . . . . . . . 167 JiZhi Lin and Minghai Xin Analysis of 3D Modeling and Detection of Wrong Action in Sports Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 Yi Shao and Ye Wu Government Environmental Accounting Information Disclosure System Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . 180 Ying Song and Xiaoping Chen The Influence of MOOC on College Physical Education in the Era of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Dongsheng Wang Measurement of Tax Paying Ability and Design of Tax Expenditure for Real Estate Tax of Urban Families in China . . . . . . . . . . . . . . . . . . 194 Haishu Wang Design and Research of Big Data Multimedia Technology in College Physical Education Teaching System . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Lin Wang and Tao Tang A System of English Spoken Pronunciation Learning Based on Speech Recognition and Mobile Phone Platform . . . . . . . . . . . . . . . . . . . . . . . . 207 Lin Wang Material System Technology Based on Oracle Database and Java Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 Tong Wang and Zhibo Wang Analysis of Three-Dimensional Multi-motion Simulation of Intelligent Snake Robot Based on Reconfigurable Modularity . . . . . . . . . . . . . . . . 220 Zhenmin Yang, Hongbo Li, Yuying Feng, and Xiaodong Wang New Media Art and Ant Colony Algorithm in the Construction of Art Curriculum Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 Na Wei Design and Implementation of Internet Plus Sports Health Management System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Yonggang Wu Elastic Plastic CPPM Algorithm of Pore Water Pressure and Inversion of Mechanical Parameters of Tunnel Surrounding Rock . . . . 238 Miao Yu, Xuesheng Yu, Xiaolei Zhong, Shuang Lu, and Ye Wu

viii

Contents

A New Way to Cultivate Innovative and Employable Talents Based on Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 Xinyin Zhang Application of UAV Intelligent Management and Control Platform on Overhead Transmission Lines Inspection . . . . . . . . . . . . . . . . . . . . . . . . 251 An Chang, Yanhong Liang, Mingxi Jiang, Xuegang Li, Zhenhui Chen, and Ruiying Liu Application of MATLAB Software in Higher Mathematics Teaching . . . . Xiaomin Zha

261

Hybrid Clustering Algorithm for Cloud Server Information Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 Wei Chen Factors Affecting Construction Workers’ Fatigue Based on Statistical Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Xin-gang Yang, Xiao-yun He, and Qi-quan Wang An Empirical Study on the Cultivation of College Students’ Core Competence of Innovation and Entrepreneurship Based on Multidimensional Dynamic Innovation Model Under Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280 Yanfang Deng The Exploration and Practice of Computer Aided Design in the Course Construction of Art Education . . . . . . . . . . . . . . . . . . . . . . . . . . 287 Xingyu Feng VR Simulation Technology in Basketball Referee Teaching . . . . . . . . . . 294 Yingna Feng Handwritten Note Recognition Based on Digital Music Classroom Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Yunchen Hou Design of Color Music System Based on Feature Classification . . . . . . . 307 Yiwen Hu Design and Implementation of Statistics and Analysis System for Volleyball Match . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 Linna Hua The Teaching Practice of Art Courses in Digital Media Major . . . . . . . 319 Haipeng Jiang English Translation Skills of Food Packaging Based on Computer . . . . 325 Li Ju

Contents

ix

The Construction Mode of Virtual Experiment System Based on Modern Educational Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 Yanxia Kang Module Construction of New Artificial Intelligence System Based on Visual Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Yingtian Mei On the New Mode of University Enterprise Cooperation in Undergraduate Education in the Information Age . . . . . . . . . . . . . . . . . 343 Kai Wei Construction of Risk Warning Model in Financial Market Based on Artificial Intelligence Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 Han Yu Application of Virtual Network Technology in Computer Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356 Jianjun Zhang Music Teaching Practice of Preschool Major in Normal Universities Based on Mixed Teaching Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362 Yuan Zhang Optimal Trajectory of Manipulator Torque Based on Two Population Cuckoo Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 Duoxing Zhao Evaluation of Government Emergency Management Capability Based on Internet of Things Under BP Neural Network . . . . . . . . . . . . . . . . . 376 Hang Zhao Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383

Remote Patient Monitoring During the COVID-19 Pandemic in the Framework of Home Device Manufacturing for IoT-Based BPM and SPO2 Measurements Hamit Altıparmak1(B)

and Serife ¸ Kaba2

1 Department of Computer Engineering, Near East University, Near East Boulevard, P.O. Box:

99138, Nicosia, TRNC, Mersin 10, Turkey [email protected] 2 Department of Biomedical Engineering, Near East University, Near East Boulevard, P.O. Box: 99138, Nicosia, TRNC, Mersin 10, Turkey [email protected]

Abstract. One of the most important issues of the period we are in is the COVID19 virus. Corona disease has been officially named SARS-CoV-2 by the world health organization. Since March 2002, this disease has been declared as a global epidemic. The COVID-19 virus has killed more than 4 million people. Like many other diseases, early detection of this virus increases the chances of survival. It was observed that the oxygen level in the blood decreased in people who were infected with this virus. The oxygen level in the blood is measured in hospitals using special devices. Measuring the SPO2 value is time consuming and costly. The easiest and cheapest way to solve this problem is to measure the SPO2 value at home. The main purpose of this study is to present a device design that can measure SPO2 and BPM (blood pressure) at home using IoT peripherals in a low-cost way. In this presented design, the algorithm and the devices used are explained in detail. Keywords: IoT · COVID-19 · SPO2 · Medical applications · e-Health

1 Introduction Arduino platform has been used in many projects from the past to the present, from everyday objects to complex scientific instruments. Arduino is a software-based open source and easy-to-use open-source platform. This electronic platform can activate a light on a sensor or a motor. You can tell your board what to do by sending instructions to the microcontroller on it. It is necessary to use the Arduino programming language and Arduino software (IDE) to give these instructions. It is a technological tool for many health problems. And day by day such devices are needed more and more. The Arduino platform is also used in many devices in the biomedical field and provides convenience in developing and transferring information. For example, the pulse oximeter is a very small device, and it is a very important and practical device in terms of controlling human health. It is a noninvasive method used to monitor the patient’s oxygen © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 1–10, 2022. https://doi.org/10.1007/978-3-030-99581-2_1

2

H. Altıparmak and S. ¸ Kaba

saturation. The sensor contained in this device works by the Arduino platform through microcontrollers. In a study conducted in 2020, Arduino IDE written in Java was used. Microcontroller processor is integrated using this software. The software provided the coding of the necessary commands and the compilation of the source code. Arduino kit was used to collect temperature and GPS data and later the information was shared with sequential microcontrollers to provide interpretation of COVID-19. Shortness of breath is a very common symptom in the current epidemic of COVID-19 virus. And the use of an extremely widely used platform such as Arduino for pulse oximeter application and its ability to be developed easily shows that it is of great importance in terms of reliability in home treatments. With this device, the software of which can be accessed very easily, it gives hope as a solution to device deficiencies in the field of health [1]. The human body needs the oxygen level in the blood to be at a specific value. SpO2, which is called oxygen saturation, gives the measurement value of the oxygen-carrying hemoglobin in the blood according to the amount of hemoglobin that does not carry oxygen [2]. For healthy children and adults, 95 to 100 percent oxygen saturation is considered the normal value. Very low SpO2 levels can cause serious symptoms [3]. This condition is called hypoxemia. It is known as skin cyanosis because of its blue hue. This is due to the low oxygen level in the tissue [2]. Pulse oximetry devices can prevent serious complications and aid in faster treatment of hypoxia by alerting clinical staff to the presence of hypoxia [4]. The device that measures the oxygen saturation of hemoglobin in arterial blood, known as SPO2, is called a pulse oximeter. The pulse oximeter device consists of batteries and a monitor with a display and a probe that detects the pulse. Oxygen saturation level can be seen on the Monitor. It can be used to detect hypoxia, which is defined as severely low oxygen levels in the body. Some pulse oximetry monitors can display the pulse rate in BPM (Beats per Minute) or a pulse waveform that displays the detected pulse [5]. The pulse is the heartbeat or the number of beats per minute. Pulse rates differ from person to person in some cases. For example, when you are rested, your heart rate will be lower. This value increases because the body needs more oxygen while exercising. Normal heart rate values in adults range from 60 to 100 beats per minute [6]. Nowadays, pulse oximetry devices are also needed to control the oxygen levels of many people during the COVID-19 pandemic [7]. The findings seen in many people with COVID-19 include low oxygen levels, a serious life-threatening condition. However, not every person with low oxygen level may have breathing difficulties, so the oxygen level of COVID-19 patients should be constantly monitored [3]. It is not determined by using pulse oximetry as a way to tell if a patient has COVID-19, but pulse oximetry can help them monitor their health and know if they need medical care [8]. The pulse oximeter device is useful in evaluating the severity of the disease in patients with acute respiratory tract infections, including Covid-19. In addition, this device can assist in monitoring the oxygen level in the homes of patients diagnosed with Covid-19 infection and discharged from the hospital [9]. This paper introduces a device design that can cost-effectively measure SPO2 and BPM (blood pressure) at home using IoT peripherals. Thus, these values can be easily measured in the home environment during the COVID-19 pandemic process.

Remote Patient Monitoring During the COVID-19 Pandemic

3

2 Related Works Author in [10] presented a new real-time sleep apnea scheme based on the Internet of Medical Things (IoMT) cloud using the SpO2 estimation provided by heart rate variability. The main concept of the study is to test different combinations between HRV (Heart rate variability) and SpO2 properties to validate and obtain the best and most suitable properties. The accuracy, sensitivity, and specificity achieved for 98.54%, 97.05%, and 98.95%, respectively, when using Support vector machine (SVM) as the classifier, demonstrate the robustness and reliability of the system, making it ready for common users in hospitals and homes. Author in [11] presented an automated method to accurately detect sleep apnea in patients with acute cerebrovascular disease using neural network analysis. The basic concept is the development of a deep learning algorithm that can be used as a sleep apnea screening tool for patients with cerebrovascular disease. As a result, CNN accurately predicted the respiratory event index (REI) and oxygen desaturation index (ODI) of suspected sleep apnea patients with nocturnal SpO2 signal. Author in [12] proposed to achieve high accuracy using the artificial neural network (ANN) method to measure SPO2 used in clinical management systems. The methods used to calculate the oxygen saturation in the blood in the study include ANN, fuzzy logic, and linear regression methods. As a result, it was observed that the capture ability was weak in the linear regression method. While ANN and Fuzzy-based methods showed very consistent values, ANN gave more accurate values than Fuzzy logic-based methods. Author in [13] aimed to evaluate the accuracy of SpO2 induced by pulse oximetry in hospital room air determined for mechanical ventilator assistance in patients diagnosed with Coronavirus Disease-2019. As a result, the SpO2 value measured in room air in patients with detected COVID-19 is considered a reliable tool to predict the outcome of patients when compared with CT scan. Author in [14] presented an IoT-based wearable device design to remotely monitor COVID-19 quarantined patients. In addition, the system monitors real-time GPS data for potentially infected patients and automatically alerts the medical board in case of any quarantine violation. In the integrated system created to predict the situation and give an alarm, the Application Peripheral Interface (API) and the mobile application are synchronized with each other. This system has been tried and validated in a real-time scenario at the hospital. The author in [15] presented an IoT design model study to enable remote monitoring of pulse oximetry via oxygen partial saturation (SpO2) and heart rate (HR) using low energy consumption. Network performance evaluation was performed to show the usability of the values and signals obtained from SpO2 and HR variables. As a result, it has been observed that 20% lower energy consumption is achieved than the devices on the market. The Internet of Things is used in all areas of our lives. Agricultural areas are one of the areas where the internet of things is frequently used. With the internet of things in agricultural areas, a lot of data about plants and trees can be easily transferred to the computer. With IoT devices integrated into unmanned aerial vehicles, health problems in plants can be detected before it is too late. Detected unhealthy plants are collected beforehand, preventing damage to other plants [16].

4

H. Altıparmak and S. ¸ Kaba

Another area where the internet of things is used is large industries. IoT devices are used in industries that require high labor force, such as food production factories, packaging factories, car manufacturing factories in large industries. In large facilities where solid wastes are separated and classified into classes, business processes can be carried out and monitored over the Internet of Things [17].

3 Materials and Methods SPO2 and BPM values are some of the important values that we should keep track of in our daily lives. Studies show that the early precursor of deaths caused by the Corona virus is the decrease in the oxygen level in the blood. It is very important to measure the oxygen level in the blood early. In this study, we present an IoT-based framework with which we can measure SPO2 and BPM values easily and inexpensively in a home environment. In an Arduino electronic circuit, there are features in which we can use a peripheral that can meet many of our needs. We need to combine the Arduino circuit with the sensors we want to measure and then code it so that these peripherals communicate with each other. No expert knowledge is required for Arduino programming. We can remotely control many different components such as motors and sensors by connecting them to the Arduino circuit. Arduino circuits have 14 output pins. 14 different output pins allow 14 different sensors and outputs to be controlled. Although it is a small circuit, it is sufficient for the creation of large circuits. Robotic projects and electronic circuit projects can be easily controlled with Arduino. Sound sensors, brightness levels of lights, stepper motors, temperature sensors, humidity sensors and motion sensors can be easily controlled via this circuit. In the uno version of Arduino, there are 6 inputs so that we can receive analog input signals. Arduino Uno can communicate in many ways. Serial communication is possible with RX and TX pins. The Atmega16u2 USB-serial converter also opens a virtual serial port on the computer, allowing communication between the Atmega328 and the computer. It allows sending and receiving text-based information between the serial monitor in the Arduino IDE and the Arduino and the computer. When there is a communication between the Arduino and the computer via USB, the RX and TX LEDs on the Arduino light up. Arduino Uno is programmed with Arduino IDE just like any other Arduino. The resettable fuse on the Arduino Uno protects your computer’s USB port from short circuits or excessive current consumption. When the card draws more than 500 mA current through the USB port, it automatically cuts off the power it receives from the USB for protection. When the overcurrent condition or short circuit is eliminated, the fuse returns to its normal position and reconnects. The Arduino Uno is approximately 69 mm long, 53 mm wide, and weighs 26 g. It has a clock frequency of 16 MHz, 1 kilobyte of EEPROM, 2 kilobytes of SRAM, and 32 kilobytes of ATmega328 flash memory. There is an ATmega328 microcontroller on the circuit. The ATmega328 has an operating voltage of 5 V, an input voltage of 7 to 12 V, and 6 analog pins. There are many different ways to run an Arduino circuit. Electric power can be provided to the Arduino circuit with computer usb connection, power bank and 5 V batteries.

Remote Patient Monitoring During the COVID-19 Pandemic

5

Arduino uno circuits have 14 digital input/output pins and 6 analog input/output pins. All these pins work with 5 V power and 40 mA current. In addition, there are 1 RX (input) and 1 TX (output) pins specially. These special pins are used for communication between Arduino and computer (Fig. 1).

Fig. 1. Arduino UNO.

Oled 128 × 32 OLED LCD Screen is used to reflect the measurement results. The technical specifications of this screen are given below (Fig. 2). • • • • • • • •

0.91-in. OLED Resolution: 128 * 32 Drive IC: SSD1306 IIC interface definition: 1.GND (power supply) 2.VCC (positive) 3.SCL (Shi Zhongxian) 4.SDA (data line)

6

H. Altıparmak and S. ¸ Kaba

Fig. 2. Oled 128 × 32 screen.

With the MAX30102 arduino module, it measures heart rate and pulse oximetry with high accuracy. The working principle of this module reflects red and infrared LED light and measures the reflection of this light. The signal reflected from the LEDs on the module is processed by the microprocessor and sent to the microcontroller. There is a 3.3 V 12C INT pin on the module (Fig. 3).

Fig. 3. Max30102 module.

Arduino Buzzer is an equipment used to produce sound in Arduino circuits. We can see the buzzer in many places that give us warning in daily life. For example, parking systems in vehicles, alarms, etc. We have a chance to see them in the fields. It is a very useful equipment as it is very easy to use (Fig. 4).

Remote Patient Monitoring During the COVID-19 Pandemic

7

Fig. 4. Buzzer.

Breadboard is the tool on which circuits are tested. It allows the installed circuits to be easily tested without soldering to each other. Since it can install the circuits as plug-in, it allows to reuse the electronic components used in other projects (Fig. 5).

Fig. 5. Breadboard.

4 Framework Materials of the circuit that measures the low cost SPO2 and BPM value at home (Figs. 6 and 7). • • • • • •

1 Arduino Uno 1 OLED_i2c 128 × 32 1 MAX30102 1 Buzzer 11 Jumper Cable 1 Breadboard

The purpose of this framework is to make this medical device cheaper in poor countries. The biggest advantage is that people can use it very easily, measure heart and oxygen saturation, and this does not harm the body. The MAX30102 sensor, which is

8

H. Altıparmak and S. ¸ Kaba

Fig. 6. Max30102 circuit diagram.

Fig. 7. MAX30102 application diagram.

active in our project, controls our heartbeat and starts to flash on the OLED during each heartbeat, and our heart rate appears on the screen. In this way, we can measure our heart rate. The stages of assembling hardware components are listed below. Step 1: The plus and minus line of the breadboard is connected to the Arduino, • The red cable from the 5 V pin on the Arduino is connected to the plus line of the breadboard, • The black cable from the GND pin on the Arduino is connected to the minus line of the breadboard. Step 2: Connect the MAX30102 Sensor with Arduino, • SCL pin on MAX30102 is connected to A4 pin, • SDA pin on MAX30102 is connected to A5 pin.

Remote Patient Monitoring During the COVID-19 Pandemic

9

Step 3: OLED 128 × 32 is connected to Arduino, • OLED’s SCL pin is connected to A4 pin on the Arduino, • The SDA pin of the OLED is connected to the A5 pin on the Arduino. Step 4: Buzzer is connected to Arduino, • The middle end of the buzzer is connected to the 3rd Pin of the Arduino. For the Arduino codes of the study, the corresponding author can be contacted via e-mail.

5 Conclusion Severe fatigue, malaise, muscle pain, high fever can be seen in the patient whose oxygen decreases. The body cannot withstand a lack of oxygen for a long time. Vital organs such as the heart and brain can only last for a maximum of 6 s. Low oxygen is very dangerous and requires immediate intervention. It is very important to detect the oxygen level early. One of the first signs of low oxygen in the blood is shortness of breath. In this study, a framework in which we can measure the oxygen level and blood pressure in the blood with the Max30102 module integrated into the Arduino uno circuit is presented. In the material and method part of the study, all the necessary peripherals and the necessary diagram are presented. With the framework, the details of which are presented in the study, we can measure blood pressure and oxygen level in the blood in the home environment. It is a great advantage that the presented framework is low cost, easy to use by the user, cheap materials used, easy coding environment and portable. The accuracy of measuring the oxygen in the blood of the circuit used in the study is 98% compatible with the oxygen measurement with the blood test. In the circuit presented, it is sufficient to press the sensor with your finger to measure the oxygen level and blood pressure in the blood. If the oxygen level in the blood is low, a doctor should be consulted immediately. At the end of 2021, around 2.4 million people worldwide died from Corona virus (Covid19). It has been observed that the oxygen level in the blood decreases rapidly in patients infected and deteriorated by the Corona virus (Covid-19).

References 1. Mohammed, M.N., Syamsudin, H., Al-Zubaidi, S., Sairah, A.K., Ramli, R., Yusuf, E.: Novel COVID-19 detection and diagnosis system using IOT based smart helmet. Int. J. Psychosoc. Rehabil. 24(7), 2296–2303 (2020) 2. Homecare. https://www.homecaremag.com/understanding-spo2-and-normal-oxygen-levels. Accessed 7 Oct 2021

10

H. Altıparmak and S. ¸ Kaba

3. Centers for Disease Control and Prevention (CDC). https://www.cdc.gov/coronavirus/2019ncov/videos/oxygen-therapy/Basics_of_Oxygen_Monitoring_and_Oxygen_Therapy_Tran script.pdf. Accessed 12 Oct 2021 4. Jubran, A.: Pulse oximetry: review. Crit. Care 19, 272 (2015) 5. World Health Organization (WHO). https://www.afro.who.int/sites/default/files/Covid-19/ Techinical%20documents/GUIDELINES%20FOR%20THE%20USE%20OF%20PULSE% 20OXIMETRY%20IN%20MONITORING%20COVID-19%20PATIENTS%20IN%20H BIC-%20English.pdf. Accessed 15 Oct 2021 6. Cleveland Clinic. https://my.clevelandclinic.org/health/diagnostics/17402-pulse--heart-rate. Accessed 15 Oct 2021 7. American Thoracic Society. https://www.thoracic.org/patients/patient-resources/resources/ pulse-oximetry.pdf. Accessed 17 Oct 2021 8. Minnesota Department of Health. https://www.health.state.mn.us/diseases/coronavirus/pul seoximeter.html. Accessed 16 Oct 2021 9. Londonwide LMC. https://www.lmc.org.uk/visageimages/Covid-19/Guide%20to%20u sing%20pulse%20oximeters%20during%20Covid-19%20pandemic.pdf. Accessed 16 Oct 2021 10. Haoyu, L., Jianxing, L., Arunkumar, N., Hussein, A.F., Jaber, M.M.: An IoMT cloud-based real time sleep apnea detection scheme by using the SpO2 estimation supported by heart rate variability. Futur. Gener. Comput. Syst. 98, 69–77 (2019). https://doi.org/10.1016/j.future. 2018.12.001 11. Leino, A., et al.: Neural network analysis of nocturnal SpO2 signal enables easy screening of sleep apnea in patients with acute cerebrovascular disease. Sleep Med. 79, 71–78 (2021). https://doi.org/10.1016/j.sleep.2020.12.032 12. Gupta, G.P., Nair, R.R., Jeyanthi, R.: An ANN based SpO2 measurement for clinical management systems. Energy Procedia 117, 393–400 (2017) 13. Mukhtar, A., et al.: Admission SpO2 and ROX index predict outcome in patients with COVID19. Am. J. Emerg. Med. 50, 106–110 (2021). https://doi.org/10.1016/j.ajem.2021.08.055 14. Al Bassam, N., Hussain, S.A., Al Qaraghuli, A., Khan, J., Sumesh, E.P., Lavanya, V.: IoT based wearable device to monitor the signs of quarantined remote patients of COVID-19. Inf. Med. Unlocked 24, 100588 (2021) 15. Lopez, L.J.R., Aponte, G.P., Garcia, A.R.: Internet of things applied in healthcare based on open hardware with low-energy consumption. Healthc. Inf. Res. 25(3), 230–235 (2019). https://doi.org/10.4258/hir.2019.25.3.230 16. Al-Turjman, F., Altiparmak, H.: Smart agriculture framework using UAVs in the Internet of Things era. In: Drones in Smart-Cities, pp. 107–122. Elsevier (2020) 17. Al-Turjman, F., Abiyev, R.H., Altıparmak, H., Yuvalı, M., Kaba, S.: ¸ Classification of solid wastes using CNN method in IoT Het-Net Era. In: Al-Turjman, F. (ed.) Real-Time Intelligence for Heterogeneous Networks, pp. 117–127. Springer, Cham (2021). https://doi.org/10.1007/ 978-3-030-75614-7_8

Smart Gardening Automation System Using IoT with Power Saver Mohamed Ahmed Geedi1 , Saciid Ahmed Aadan1 , Bashiir Ahmed Cilmi1 , Suleiman Abdullahi Ali2(B) , and Mohamed Khalif Warsame1 1 Department of Electrical Engineering, Faculty of Engineering, Jamhuriya University of

Science and Technology, Mogadishu, Somalia [email protected] 2 Center for Research and Development, Jamhuriya University of Science and Technology, Mogadishu, Somalia [email protected]

Abstract. Rising international population, limited agricultural lands, and the loss of land and water resources necessitate the need to increase farm yields, according to the Food and Agriculture Organization. Natural resources such as fresh water and arable land, as well as declining yield trend in some main crops, have exacerbated the problem. The use of Internet of Things (IoT) technology solutions in farming allows farmers and producers to minimize wastage, boost production and utilize the resources. We have designed a system that is a substitute to traditional farming techniques. The proposed system allow the farmers knowing the current condition of their fields whether at home or in another part of the world, control the water motor automatically, not only would the system gives convenience but it also minimizes operational cost, electricity usage, enhances the performance, saves time and monitors the crop filed. IOT enable technologies like sensors. Arduino microcontroller and wireless connectivity are the heart of the system. Keywords: IoT · Arduino · WiFi · GSM · Sensors

1 Introduction The Internet of Things is influencing every part of our lives, including manufacturing. Farming is no exception, and both sectors are making tremendous progress in their use in the Internet of Things era [1]. Wireless sensor networks make use of devices to detect changes in the surrounding environment and transmit the observed data to remote users via routing protocols. Use IoT in a variety of functional applications, including smart environments and smart agriculture, among others [2]. Farming is the economic center of Somalia. In modern environment, as the global population continues to rise at a breakneck pace, agriculture has become increasingly critical to meeting the needs of the human race. Agriculture, on the other hand, requires irrigation, and when water usage exceeds rainfall each year, it becomes vital for producers to develop strategies to conserve water while still attaining the best output possible. By and large, today’s drip irrigation © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 11–18, 2022. https://doi.org/10.1007/978-3-030-99581-2_2

12

M. A. Geedi et al.

is manually controlled. These methods are being phased out in favor of automated and semi-automatic solutions, which imply an automated irrigation idea for more efficient and effective water usage. Sensor-based autonomous irrigation system is based on a soil moisture sensor that detects the amount of moisture in the soil and transmits the reading to the Arduino, which then irrigates the crops appropriately. Lawns are the greatest irrigated crop in south Somalia by surface area, requiring nearly 9 billion gallons of fresh water every day. Despite recent advancements in irrigation management and sprinkler technology, advanced irrigation systems are incapable of compensating for regions of turf with disparate water requirements. We circumvent the physical restrictions of the standard irrigation system in this study by developing a sprinkler node that can monitor local soil moisture, communicate wirelessly, and trigger its own sprinkler according to a schedule determined centrally. Following that, a model is created to calculate moisture flow by runoff, absorption, and diffusion [3].

2 Literature Review Through the use of IoT in the smart irrigation systems, water resources and plant productivity will be maximized. Additionally, the user may monitor the system remotely without physically being there in that place. The basic IoT entails the collecting and processing of data over the Internet and the ability to immediately respond to emerging challenges and changes in the environment. Smart Farming for IoT-enabled agricultural systems emerges as the Third Green Revolution, leveraging data-driven analytical applications based on technologies such as precise and accurate sensor and other device networks. The integration of IoT results in a resource-efficient method that results in increased overall production efficiency and sustainability [4]. Automation of agricultural operations has the potential to convert agriculture from a manual and static to an intelligent and dynamic system, resulting in increased productivity with reduced human monitoring. This article presents an automated irrigation system that automatically detects and maintains the required soil moisture content. The control unit is implemented using a micro controller ATMEGA328P on an Arduino Uno platform. The arrangement makes use of soil moisture sensors to determine the precise moisture content in the soil. This number helps the system to use the correct amount of water, avoiding over- or under-irrigation. The Internet of Things is utilized to keep farmers informed about the status of sprinklers [5]. The capacitive soil moisture sensor monitors and detects the soil moisture level in order to determine if the plants want additional water. In comparison to other moisture sensors, it is a corrosion-resistant substance. It runs at 3.3 V–5 V and has a high degree of sensitivity and precision [6].

3 Methodology This article presents an automated irrigation system that automatically detects and maintains the required soil moisture content. The control unit is implemented using a microcontroller Esp8266 on the Arduino NANO platform. The arrangement makes use of soil moisture sensors to determine the precise moisture content in the soil. This number

Smart Gardening Automation System Using IoT with Power Saver

13

helps the system to use the correct amount of water, avoiding over- or under- irrigation. The Internet of Things is utilized to keep farmers informed about the status of sprinklers. The sensors’ data is frequently updated on a webpage through ESP8266 Wi-Fi, allowing a farmer to determine if the water sprinklers are on or off at any particular time. Additionally, the sensor for the autonomous plant watering system is designed to send interrupt signals to the motor through the motor driver module. The soil sensor is attached to the Arduino board’s A0 pin and measures the moisture content of the soil. When the soil moisture content values decrease, the sensor detects the change in humidity and signals the microcontroller to operate the pump (motor). The temperature sensor monitors and controls the microcontroller’s response to harsh temperatures. This notion might be applied to a system for automated plant watering. The circuit is composed of an Arduino NANO board, a soil moisture sensor, a 5 V motor pump, and a motor driver L293D (IC1). The motor driver IC is used to power the water pump. The Arduino board may be powered by a 5 V to 9 V wall wart, plug-in converter, or solar panel. A separate 5 V to 9 V battery is required for the pump motor. We can monitor the garden state in the suggested system as Fig. 1 shows by utilizing data stored in IoT devices and external sensors to determine the actual status of the plants. It is capable of being operated autonomously. Automation enables the execution of additional operations. It possesses intelligence in order to avoid flooding the field. The threshold value will be determined based on the crop requirements; if environmental conditions such as temperature, light intensity, soil moisture, and humidity change below or above the threshold value, the IoT will sense the changes in the parameters and will monitor them simultaneously, transmitting the data to the farmers. Knowing when to water and how much to water are two critical components of the watering process.

Fig. 1. Proposed system

3.1 Hardware Design The LCD 16 × 2 Liquid Crystal Display with Alphanumerical Display. As seen in Fig. 2, the LCD display is critical in a large number of embedded systems. The LCD module that is most frequently used is the 16 × 2 LCD module. This module features sixteen

14

M. A. Geedi et al.

rows and two columns of a 5 × 7 LCD dot matrix display. It is computer-adjustable for contrast and backlight. With the use of simple command and connection files, this LCD module may simply interact with the Liquid crystal library built specifically for the Arduino board.

Fig. 2. Figure 3: LCD 16 × 2

DC Water Pump Motor the Micro DC 3–6 V Micro Submersible Pump Mini water pump For Fountain Garden Mini water circulation System DIY system shown in Fig. 4 is a micro DC 3–6 V Micro Submersible Pump Mini water pump For Fountain Garden Mini water circulation System. This is a low-cost, small-size submersible pump motor that can be powered by a 3- to 6-V power source. It can process up to 120 L per hour while drawing only 220 mA of electricity. Simply attach the tube pipe to the motor outlet, immerse it in water, and turn it on. Maintain a water level that is constantly higher than the motor. Dry running the motor may cause damage to the motor owing to the heat generated, and it will also generate noise.

Fig. 3. Water pump.

MCU. Esp8266 Microcontrollers make advantage of network interfaces to communicate with other devices on the local network and to send data to the IoT application for analysis. Additionally, they are intended to handle a single or many network protocols such as Wi-Fi, Bluetooth, and cellular networks such as 2G/3G. IoT devices can be

Smart Gardening Automation System Using IoT with Power Saver

15

linked via a cable connection, such as those found in smart buildings and residences, or via a wireless connection. When soil moisture is absorbed into the sand. The sensor detects that the soil is dry, it sends a signal or massage to the microcontroller. The microprocessor.

Fig. 4. Esp8266

Soil Moisture When soil moisture is absorbed into the sand. The sensor detects that the soil is dry, it sends a signal or massage to the microcontroller. The microprocessor then instructed the water pump to start (ON) or stop. To multiply the value obtained by the microcontroller’s detection of an item.

4 Implementation This Section will detail the work procedures, data analysis, and conclusions, as well as provide explanations for the connections. The Arduino Integrated Development Environment (IDE) consists of a text editor for writing code, a message area, a text terminal, a toolbar with buttons for common operations, and a series of menus. It communicates with the Arduino and hardware in order to upload programs and communicate with them professionally, as we stated previously when used for electronic system modeling. LCD for database management, data analysis, and feedback through SMS. Additionally, the outputs may be examined through LCD. The entire system is solar powered. The primary objective of this system is to monitor and evaluate plant development through the use of an automated garden maintenance system. Additionally, the system is solar powered. In recent years, more sophisticated approaches have been used to advance agriculture by delivering health goods. The embedded system is controlled using (IDE) software, which is widely used in a variety of disciplines. The photos of the plant are taken and processed using digital image processing in this idea. The leaf’s dryness or disease status is determined, and the data is delivered to the hardware. Additionally, the hardware may accept data from temperature and humidity sensors, as well as water level and soil moisture sensors. The collected data is transferred to the cloud through Wi-Fi for database maintenance, analysis, and feedback via SMS. An autonomous plant watering system based on the Arduino Soil sensor, which detects the soil’s moisture level. When

16

M. A. Geedi et al.

the soil moisture content values decrease, the sensor detects the change in humidity and sends a signal to the microcontroller to start the pump (water pump). The temperature sensor monitors and controls the microcontroller’s response to harsh temperatures. This approach might be applied to a system for automatically watering plants (Fig. 5).

Fig. 5. System hardware implementation

5 Discussion and Result One of the most serious issues confronting paddy producers. The suggested system places a premium on drip irrigation, which has been shown to increase yield by up to 50%, save up to 70% of water, and also save energy, as this system is powered by solar energy. Additionally, it has demonstrated that by combining drip irrigation with sensors and iot, yields may be increased even further, particularly in the case of subsurface drip irrigation, which requires a monitoring system. Additionally, the suggested approach is beneficial as the field’s area grows huge as irrigating and monitoring large fields often requires a significant amount of time and energy. This approach can assist farmers in resolving their time, money, energy, and water challenges. Essentially, data from a plantation will be collected, including temperature and humidity of the air and soil. The arduino farm both 2 will determine the appropriate quantity (and timing) of heat and water to apply to the plantation based on this facts. Additionally, the system should allow for user interaction to regulate a water pump and an electric bulb used to create heat for the plantation. Manual intervention must be performed on-site as well as remotely over the internet (Fig. 6, 7 and 8).

Smart Gardening Automation System Using IoT with Power Saver

Fig. 6. System in operation

Fig. 7. Liquid crystal display (LCD)

Fig. 8. Working system

17

18

M. A. Geedi et al.

6 Conclusion The system has been designed and tested successfully. It has been developed by integrated features of all the hardware components used. The system has been tested to function automatically. The moisture sensors measure the moisture level (water content) of the different plants. If the moisture level goes below the desired and limited level, the moisture sensor sends the signal to the Arduino board which triggers the Water Pump to turn ON and supply the water to respective plant. When the desired moisture level is reached, the system halts on its own and the water Pump is turned OFF. Thus, the functionality of the entire system has been tested thoroughly and it is said to function successfully. The system is completely automatic and reliable. There is no need of manual labour as the system is automatic. Water can be conserved and saved using this system. The crops can be maintained properly with its suitable threshold values of water and temperature. The system can be implemented over a larger area using solar power with comparatively minor investment as solar power is used for implementation. The IoT based solar powered automatic garden maintenance system can be used for agriculture in future.

References 1. Alabady, A., Al-Turjman, F., Din, S.: A novel security model for cooperative virtual networks in the IoT era. Int. J. Parallel Prog. 48(2), 280–295 (2020) 2. Al-Turjman, F., Radwan, A.: Data delivery in wireless multimedia sensor networks: challenging and defying in the IoT era. IEEE Wirel. Commun. 24(5), 126–131 (2017). https://doi.org/10. 1109/WCM.2017.1700054 3. Newlin Rajkumar, M., Abinaya, S., Venkatesa Kumar, V.: Intelligent irrigation system – an IoT based approach. In: International Conference on Innovations in Green Energy and Healthcare Technologies (ICIGEHT) (2017) 4. Agarwal, S., Agarwal, N.: An algorithm based low-cost automated system for irrigation with soil moisture sensor. In: 2017 International Conference on Computer communication and Informatics (ICCCI-2017) (2017) 5. Rahul, D.S., Sudarsan, S.K., Meghana, K., Nandan, K.N., Kirthana, R., Sure, P.: IoT based solar powered Agribot for irrigation and farm monitoring. In: Proceedings of the Second International Conference on Inventive Systems and control (ICISC 2018). IEEE Xplore (2018) 6. Bhawarkar, N.B., Pande, D.P., Sonone, R.S., Aaquib, M., Pandit, P.A., Patil, P.D.: Literature review for automated water supply with monitoring the performance system. Int. J. Current Eng. Technol. 4(5), 3328–3331 (2014)

Wi-Fi Attendance System in the IoT Era Sarumi Usman Abidemi1(B) , Omoraka Gershion Oghenetega1 , Sekyere-Asiedu Daniel2 , and Fadi Al-Turjman1 1 Artificial Intelligence Engineering Department, Research Center for AI and IoT, AI and

Robotics Institute, Near East University, Nicosia, Mersin 10, Turkey {20214000,20213231}@std.neu.edu.tr, [email protected] 2 Department of Computer Information Systems, Near East University, Nicosia, Mersin 10, Turkey [email protected]

Abstract. Traditionally, attendance is marked manually by students writing down their name on a paper. This whole process wastes some of lecture time and might even get lost. Maintaining the attendance of the students in an institution is a hefty task. This project aims at designing a smart attendance system that automatically monitors and manages attendance of the students in an institution efficiently. The system is developed with an Arduino ESP8266 Wi-Fi microcontroller deployed in the class room. Further, Wi-Fi communication modules was used to make convenient communication between the student’s devices e.g. phone or laptop and the ESP8266 Wi-Fi microcontroller. Database was created where the attendance submitted will be logged and saved. Internet is utilized to transfer the information collected by the micro controller to the database and from the database to the frontend web page GUI graphical user interface. The students and admin will make one-time registration and subsequently establishing a Wi-Fi connection between the student’s device and the microcontroller in the class to mark an attendance. This system will arrange the attendance in a list with a real time timestamp and save it to database, and also be accessible to the lecturer/Admin over internet any time with uses of web browser e.g. Google chrome through the front end graphic user interface (GUI). This system is useful to reduce manual method of attendance by teachers and to alleviate the spread of COVID-19. Keywords: Attendance · ESP8266 Wi-Fi micro controller · Students

1 Introduction In educational institutions, attendance is extremely important. The most popular method of collecting attendance in the classroom is to call out the students’ roll numbers or to question them. To sign the attendance, a sheet of paper that is passed around during the class by hand The procedure for taking and maintaining attendance records by hand is inconvenient, cause distraction and also not safe due to COVID-19 protocol.

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 19–29, 2022. https://doi.org/10.1007/978-3-030-99581-2_3

20

S. U. Abidemi et al.

Data may be securely saved and retrieved anytime needed with the recent development of various internet of things-based computing and storage technologies database. A system that records the attendance making use of wireless connection with the ESP8266 Wi-Fi module and stores them securely on a database and it accessible over internet. The system consists of an information which is used for ascertaining a student’s identity after it has been registered in the beginning of the semester. When the student number submitted and it matches with records present in the database, attendance is granted to the student by updating to on the front end web page with graphic user interface and its accessible over the internet at any time. In addition, this attendance system was design to make marking of attendance to be easier, faster and safer for the students and the lecturer, where by the student will just connect to an access point i.e. ESP8266 Wi-Fi micro controller installed in the class, the micro controller has been programmed in a way that it receives the student number submitted, send it to a database, save the information in a well arranged manner in real time and make it accessible over internet for the lecturer or the system admin.

2 Literature Review In [2], they proposed a home automation-based possible security challenges that may arise during implementation with IOT, with a request to join the network delivered to the network coordinator. The request is forwarded and shares private data signal with the node. The coordinator grants permission for the request to participate in the automation activities at home. To increase the system’s security password is utilized to encrypt requests to join the network as well as all device connection for activation of devices. To connect to the home network properly, devices must have the correct private key. In [7], this authors describe a cheap and effective means of responding to demand to management energy system for a smart grid in this research. An incorporate network allows for the collection and transfer of usage and quality statistics, as well as the interaction of load displacement devices on electrical power. This smart devices is distinguished by its effective function of easy access to information, with the addition of the smart metering and data connection capacity which allow local and wide/long distance management of electrical power usage, resulting in a reduction in overall consumption and expenditures. In [9], The authors of this article examines Internet of Things research based, this is a type of technology that is indispensable for initiating actions, and major industry applications, as well as research trends and difficulties. This review paper’s key contribution is that it methodically describes the present state of the technology Internet of things in industries and its application. In [1], the authors presented a system for automatically maintaining student attendance data, manually inputting attendance in a paper becomes a time-consuming and demanding operation. Each hour spent reading out the names of each student wastes valuable time, due to this constraint a useful Bluetooth module that includes a RFID for managing attendance records of the students was created. The RFID of students will be enrolled in this system module. This enrollment is a one-time activity; their data

Wi-Fi Attendance System in the Iot Era

21

will be saved and also display in LCD. When marking the attendance, the student presences updated in the database from the micro controller AVR32 with the help of internet (Table 1). Table 1. Showing a comparison between ESP32 and other microcontrollers in terms of cost. Microcontroller

WIFI feature

Bluetooth features

Ethernet features Cost

ESP8266

Yes (Built-in)

Nil

Nil

Cheap

ESP32

Yes (Built-in)

Yes (Built-in)

Nil

Expensive

Arduino UNO

No (Require accessories)

No (Require accessories)

No (Require accessories)

Expensive

Raspberry PI

Yes (Built-in)

External

Yes (Built-in)

Expensive

3 Methodology The design methodology of this project is divided into different segment; these are the Hardware configuration part, Database configuration, Data Captive portal and the front end web design for Graphic users interface. Below is the list of hardware and software requirement. • • • • • •

NodeMCU ESP 8266 MySQL Database Webhost domain Arduino IDE Embedded C++ PHP

3.1 Hardware Configuration The hard ware configuration part simply entails the programming stage, the micro controller was programmed with Arduino programming IDE software, and this Software used is an open source development tool that is capable of compile, debug and upload the program code unto the micro-controller board. Connectivity section involve setting up communication link between server and client i.t the esp8266 Wi-Fi module and the database. For connectivity there are some procedures involve, first is to work using a local hotspot simulated as local area network (LAN) network for student to connect to it, for the sake of project hardware esp8266 micro controller is setup to function as an access point and as station at the same time.

22

S. U. Abidemi et al.

3.1.1 Nodemcu ESP8266 Controller A microcontroller is a compact integrated circuit designed to govern a specific operation in an embedded system. A typical microcontroller includes a processor, memory and input/output (I/O) peripherals on a single chip. Sometimes referred to as an embedded controller or node microcontroller unit (MCU) as shown below (see Fig. 1).

Fig. 1. ESP8266 Wi-Fi micro controller chip

ESP8266 PIN OUT Each pin on the ESP8266 has a special pin definition you can test using led blink code to identify the proper pin out defining. Below are the ESP8266 pin out best way to define the pin. #define LED_BUILTIN D4 #define D0 16 #define D1 5 // I2C Bus SCL (clock) #define D2 4 // I2C Bus SDA (data) #define D3 0 #define D4 2 // Same as “LED_BUILTIN”, but inverted logic #define D5 14 // SPI Bus SCK (clock) #define D6 12 // SPI Bus MISO

Wi-Fi Attendance System in the Iot Era

23

#define D7 13 // SPI Bus MOSI #define D8 15 // SPI Bus SS (CS) #define D9 3 // RX0 (Serial console) #define D10 1 // TX0 (Serial console) The configuration or programming aspect of this project was done with embedded C, the device works in a proper way that will bring the correct output program for attendance implementation. The first step of the program is to make the hardware ESP8266 Wi-Fi module micro controller to server as an access point and also server as station, the reason for this is that student or user will be able to connect to it in other to have access to the da ta captive portal where the student will input the student number, also the station features is for the ESP8266 Wi-Fi module micro controller to have access to internet by connection to the nearest internet access point in other to be able to establish communication them with database, without internet it won’t be able to forward information received to the database. 3.2 Software Configuration Database is designed using MySQL with the combination of PHP codes, this attendances record is stored in real time, it will record the student number, the student first and surname, the class in which the lectures is been taken. The student database is designed in such a way that the attendance can checked by searching for the classroom, student number, student name, date and time, it’s never produce any redundant data in the database, this stage can also be called back end stage. The front End the Software Implementation is typically a web page which can be accessible with web browser e.g. Google chrome, it serves as the graphic user interface where the output is been displace. The student/user and the Lecturer/admin will make use of this GUI to make one-time registration at the beginning of the semester, then the student will be marking attendance by connection to the ESP8266 Wi-Fi module micro controller access point installed in the class room to access data captive portal while the lecturer/admin will have to login in the admin page to have access to the attendance record based on what have been recorded based on the attendance students have logged in I.e. the ESP8266 Wi-Fi module micro controller in the class to the database. All this task was done using PHP, CSS and HTML. The frontend is done using sublime text and the Backend is done using MySQL. This enables data collection, aggregation and processing faster. This is available for the lecturer or admin over internet at any time.

4 Result and Discussion The simulation work of this project is done with embedded C was successfully complied before it was uploaded on the ESP8266 Wi-Fi module micro controller to make sure that the system work in a proper way and brings the correct output the program for the intelligence attendance system was implemented.

24

S. U. Abidemi et al.

Fig. 2. Functional block diagram

Fig. 3. System structure diagram.

The proposed working system structure has been explained with the help of following steps, Fig. 2 and Fig. 3 describe all the whole steps and process in this system.

Wi-Fi Attendance System in the Iot Era

25

Step 1: Student/User and Lecturer/Admin will do one-time enrollment/registration by filling the information as shown below (see Fig. 4 and Fig. 5) and saved on database.

Fig. 4. Student/User registration page

Fig. 5. Lecturer/Admin registration page

26

S. U. Abidemi et al.

Step 2: To mark an attendance, every student have to connect to the ESP8266 Wi-Fi module micro controller installed in the class room. E.g. AIE510 as shown in the image below (see Fig. 6).

Fig. 6. Class Wi-Fi connection

Step 3: After connecting to the Wi-Fi access point, Login to captive portal with http:// 192.168.4.1/, then enter your student number, as shown in the image below (see Fig. 7).

Wi-Fi Attendance System in the Iot Era

27

Fig. 7. Student Wi-Fi attendance captive page for login

Step 4: Click Submit button. It will automatically store our student number on the database in correspondence with your name and the real time and date, as shown in the image below (see Fig. 8).

28

S. U. Abidemi et al.

Fig. 8. Student Wi-Fi attendance page after clicking submit

Step 6: After log in with the ID and password, the below page will be as shown in the image below (see Fig. 9). In addition, Lecturer search for the attendance by Student name, course, student number, Date or time.

Fig. 9. Lecturer/Admin dashboard to view attendance

5 Conclusion Hence, the study of Wi-Fi intelligent attendance system was successfully achieved. In terms of performance and efficiency, this project has provided a convenient method

Wi-Fi Attendance System in the Iot Era

29

of attendance marking compared to the traditional method of attendance system. By using databases, the data is more organized. This system is also a user friendly system as data manipulation and retrieval can be done via the interface, making it a universal attendance system. Lastly, it make it safe for everyone not to contact virus. Thus, it can be implemented in either an academic institution or in organizations. 5.1 Future Work This attendance system can be improved by adding a feature where the attendance system indicates when a student unique identity such as MAC address, in other to improve the integrity of the system and personalize it per class room, not by course.

References 1. Azim, N.A., Hussein, A.M., Shawky, H.I., Joudah, H.I.: Bluetooth smart based automated attendance system. Int. J. 9(3), 524–527 (2020) 2. Touqeer, H., Zaman, S., Amin, R., Hussain, Al-Turjman, F.M., Bilal, M.: Smart home security: challenges, issues and solutions at different IoT layers. Supercomputing (2021). https://doi. org/10.1007/s11227-021-03825-1 3. Ianniello, G., Merola, P., Landi, C.: ARM-based management system using smart meter and web server (2011) 4. Jamdade, K., Surwase, S., Kundurkar, S., Mohite, J.N.: Automatic attendance system using Arduino and GSM module (2019) 5. Kishore, S., Karthikeyan, P.: A foolproof biometric attendance management system. Int. J. Inf. Comput. Technol. (2013). ISSN 0974-2239 6. Chithaluru, P., Al-Turjman, F., Kumar, M., Stephan, T.: I-AREOR: an energy-balanced clustering protocol for implementing green IoT for smart cities (2020). https://doi.org/10.1016/j. scs.2020.102254 7. Chaudhry, S., Alhakami, H., Baz, A., Al-Turjman, F.: Securing demand response management: a certificate based authentication scheme for smart grid access control. IEEE Access 8(1), 101235–101243 (2020) 8. Li, S., He, W., Da Xu, L.: Internet of things in industries a survey. IEEE Trans. Ind. Inf. 10, 4 (2014) 9. Malchi, S., Kallam, S., Al-Turjman, F., Patan, R.: A trust-based fuzzy neural network for smart data fusion in internet of things. Comput. Electr. Eng. J. 89, 106901 (2021) 10. Vignesh, K., Sumithra, A., Kishore, S., Karthikeyan, P.: A foolproof biometric attendance management system. Int. J. Inf.Comput. Technol. 3(5), 433–438 (2013) 11. https://randomnerdtutorials.com/esp32-esp8266-mysql-database-php/ 12. https://www.php.net/manual/en/timezones.asia.php 13. https://www.hackster.io/thanksmister/android-to-esp8266-comunication-a84f50

Position Estimation and Tracking with a Fuzzy-Logic-Based Adaptive Strong Tracking Kalman Filter for Capacitive Touch Panels Abdelrahman Almomani1(B) and Fadi Al-Turjman2 1 Electrical and Electronic Engineering Department, AI and Robotics Institute, Near East

University, Nicosia, Mersin 10, Turkey [email protected] 2 Artificial Intelligence Engineering Department, AI and Robotics Institute, Near East University, Nicosia, Mersin 10, Turkey [email protected]

Abstract. A capacitive touch panel (CTP) is one of most important applications that is used in most of the human controlled electronic devices. The sensor detects CTP and decide if there is error or not. The error might be caused by the speed of touching the CTP. However, the low touching speeds cause more errors than the fast ones. The paper of consideration introduces an algorithm with smooth tracking and predict the position. Many methods have been studied to mitigate the errors, including moving average filter (MAF) method, Kalman filter (KF) and a strong tracking Kalman filter (STKF). Generally, STKF succeed to estimate the normal and fast speed of touching the CTP, whereas it fails in estimating the low speed. The paper of consideration proposes a method that integrates fuzzy logic with STKF to decrease the error produced from low speed of finger movement. Fuzzy logic provides a solution for this problem that results in a smooth tracking at various speeds (low, high, normal and nonlinear cases). Keywords: Capacitive touch panel (CTP) · Moving average filter (MAF) · Kalman filter (KF) · Strong tracking Kalman filter (STKF)

1 Introduction CTP circuit is composed of an input device or a control display that has to be controlled and adjusted, microcontroller unit for capacitive sensing, sensor IC, interface board and capacitor, which is the key component of it. The capacitor, which is two plates separated by narrow gap, is affected by the noise resulting from the speed of the finger touch to draw (nonlinear) and the magnetic field interference from the environment. As both can cause errors in predicting the exact position of the touch and zigzag trajectory. However, as the reasons of this problem are the unknown nonlinear functions and uncertainty. The advantages of STKF are the success in estimating the normal and fast speeds of touched position, whereas the disadvantage of STKF is failure in estimating the finger’ © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 30–39, 2022. https://doi.org/10.1007/978-3-030-99581-2_4

Position Estimation and Tracking with a Fuzzy-Logic

31

movement with low speed. STKF is integrated with Fuzzy logic to decrease the error and enhance the accuracy of touch. The paper is introduced as follows. Section 1 provides an introduction to the paper. A literature review is introduced in Sect. 2. While in Sect. 3, contains the solving methods. In Sect. 4, is the methodology. In Sect. 5, the results.in Sect. 6, gives the conclusions. At long last, Sect. 7 is the future work.

2 Literature Review Numerous Recently, fuzzy logic has gained higher popularity as it can efficiently provide efficient solutions for many problems in the real life. Authors in [1] multi-sensor fusion is used with fuzzy logic to identify the terrain and its transition, where the motion is classified into five features depending on the inclination of the foot angle. The features are on the stair and on the ground, where the case of the stair is distributed into four sub-cases, including stair ascent and descent, ramp ascent and descent. On the other hand, the transition among all these cases is identified. The fuzzy logic system has been applied to identify these cases of motion and finally different terrains and their transition are identified. Another application of fuzzy logic is in industry. For example, authors in [2] has used fuzzy logic to stop and avoid the damage by adjusting the bolt tightening in automation system consisting 128 bolts in wind turbine hub, where the accuracy has a crucial importance. In specific fuzzy logic were used to detect the error and deal with nonlinear force resulting from bolt/nut connection and its mechanical features. The results have shown that fuzzy logic performs better than PID controller. Authors in [3] has investigated the use of fuzzy logic controller in controlling the voltage of autonomous system and tune the membership function parameters using blackbox. The proposed system is efficient in dealing with nonlinearities (load variability), and less sensitive to the variations in the parameters of (RLC) than the conventional controllers and guarantees the stability of the system. Authors in [4] proposed an integration between local information and fuzzy logic to enhance the change in information and decrease the noise speckle effect, where the regions have been classified in terms of change in difference image as changed and unchanged. Three terms were used in proposed solution: length term, fuzzy penalty term and energy function of fuzzy logic. Where the fuzzy energy was reduced. Authors in [5] proposed model for intelligent fashion system to introduce personalized products. Fuzzy logic has been used to deal with uncertainty regarding human perceptions and emotions. The proposed model was used to design a new scheme for any body shape in a fashion. Authors in [6] addressed the problem of storage data services in a cloud system, where a model was proposed to achieve the best quality of service (QOS) level using fuzzy logic. The selection of between best QOS and the minimum cost was the problem that has to be managed. Fuzzy set theory was used to solve the problem of the uncertainty in the customer’s subjective preferences to improve the quality of services, by choosing the best service of the customer’s preferences. Authors in [7] proposed fuzzy logic model to improve the performance of the spiral dynamic algorithm (SDA) in twin rotor system applications. The spiral model generates

32

A. Almomani and F. Al-Turjman

both the spiral motion and dynamic step size. The results showed that, the performance was improved in terms of accuracy and convergent speeds using the proposed fuzzy logic solution. The Smart Energy-Efficient Electric Cookers to decrease the fire accidents resulted from cookers, where a fuzzy logic system was proposed to produce smart, cost effective and safe cookers. The sensors were used and connected with PC via usb port, where the output was connected with the power supply of the cooker. The heating plate is controlled, and operate with safe operation techniques. Authors in [8] introduced the control of pitch angle of variable speed wind turbine systems, using a fuzzy logic controller that generates the pitch angle reference. The pitch angle of the wind speed has nonlinear characteristic that can be compensated by controlling the variables of output power of generator and speed to be maintained. The output power and speed of generator are used instead of wind speed. Fuzzy logic controller was used to maintain the turbine output power and speed within desired and limited rates, whereas, the FLC was used to derive the nonlinear characteristics of pitch system. Authors in [9] proposed adaptive fuzzy control for nonlinear systems with unknown nonlinearities. There are two types of nonlinear functions: the first one is unknown system nonlinearities that approximated by fuzzy logic system and complied with triangularity condition, and the other is partially known and consists of parametric uncertainties. The authors have combined small gain theorem with T–S type fuzzy systems to approximate unknown functions. The uncertain nonlinear systems were solved by adaptive fuzzy control system which succeeded to avoid controller singularity problem. Authors in [4] presented a design for a class of interconnected nonlinear purefeedback systems using adaptive fuzzy decentralized output feedback control. Fuzzy logic controller was used to deal with unknown nonlinear functions to approximate and estimate the immeasurable variables. The proposed approach has bounded all the variables of the closed-loop system. Authors in [10] assumed a nonlinear system to have unstructured uncertainties and approximate it by fuzzy logic, where a K-filters were proposed to solve the timevarying delays. The problem of the unknown high-frequency gain sign is solved by a special Nussbaum gain function. All previous proposed solutions are assumed as the approach of an adaptive fuzzy decentralized robust output feedback control. The adaptive fuzzy decentralized robust output feedback control scheme is developed by combining of the backstepping technique with adaptive fuzzy control theory. Authors in [11] used the proposed approach in the previous paper to enhance the nonlinear system of multiple-input–multiple-output (MIMO). The unknown nonlinear functions were approximated by fuzzy-logic systems, and the estimation of the immeasurable states performed using fuzzy state observer design. Combining of adaptive backstepping technique with dynamic surface control technique was proposed to enhance an adaptive fuzzy output-feedback backstepping-control and also to solve the problem of unavailable state measurements.

3 Solving Methods Many methods were used to reduce the errors and zigzag output. Authors in [12] Moving average filter (MAF) method was used for two reasons, the first one is to eliminate

Position Estimation and Tracking with a Fuzzy-Logic

33

the measurement noise and secondly to adjust the positioning of the touch panel. The advantage of MAF is the elimination of noise at high frequency case. However, it has the disadvantage of degrading of amplitude and signal delay, and it only eliminates the noise at high frequencies. The second method is Kalman filter (KF); CTP suffers from the noise caused by speed finger on touch panel and the effect of environment, on the other hand, the accuracy is important to be achieved. Nonlinear unknown motion is not easy to be predicted. Kalman filter can be used to predict and correct the errors. The main parameters that used in kalman filter are: measured value, sensitivity, predicted value. Position and velocity can be estimated by kalman filters. Kalman filter performance relies on prior information of the process that is defined by covariance matrix Q to predict the position values in forward loop and minimize the error after calculating the gain of kalman filter, on the other hand the measured noise is defined by covariance matrix R. the noise varies depending on the speed in specific distance, where low speed gives less accuracy and more noise than high speed. The speed variation of finger movement to draw is nonlinear. (KF) algorithm has been designed to estimate the state vector by two phases. The first phase is the time prediction where the predicted state vector is: P(k|k − 1) = AP(k − 1|k − 1)AT + Q 

(1)



X(k|k − 1) = AX(k − 1|k − 2)

(2)

Where P(k|k − 1) is prediction covariance matrix, A is the transition matrix, Q is process noise covariance matrix ⎡

⎤ 1α00 ⎢0 1 0 0 ⎥ ⎥ A=⎢ ⎣0 0 1 α⎦ 0001 ⎤ ⎡ qk 0 0 0 ⎢ 0 qk 0 0 ⎥ ⎥ Qk = ⎢ ⎣ 0 0 qk 0 ⎦ 0 0 0 qk

(3)

(4)

And α is 0.8 decided empirically from the measurements, the second phase is measurement update:

−1 K(k) = P(k|k − 1)CT R + CP(k|k − 1)CT 



(5)



X(k|k) = X(k|k − 1) + K(k)[Z(k) − CX(k|k − 1)

(6)

The disadvantages of kalman filter are: – Using fixed Q and R matrices with uncertain speed, the KF ability will be degraded to estimate the touched movement.

34

A. Almomani and F. Al-Turjman

– KF method fails to estimate the touching finger with fast and nonlinear movement. Strong Tracking Kalman Filter (STKF) is the third method to estimate the touch position; it mitigates the effect of nonlinearity in all speeds and to provide smooth trajectory. In STKF, the ability of real time tracking is enhanced, suboptimal factor (λk ) is added to adjust the accuracy of nonlinear movement. P(k|k − 1) = λk AP(k − 1|k − 1)AT + Qk

(7)

Where the Q matrix is diagonal matrix when the speed is normal λk = 1, this yields accurate values in both models (measurement and process). If the speed is high and nonlinear, λk is larger than unity, so λk will adjust the accuracy for both models to estimate the touched position. On the other hand, if the speed is low, the accuracy will be degraded and the algorithm will fail to estimate the touched position. The value of qk parameter, that is the k-th diagonal element of Q matrix is used to enhance the accuracy using fuzzy logic. STKF method succeeded in estimating the normal and fast speeds of touched position, but it failed in estimating the finger’ movement with low speed. The last method is the integration between STKF and fuzzy logic controller to decrease the error with all speed values, which is known as Fuzzy-logic-based adaptive strong tracking KF (FLASTKF).

4 Methodology This section depicts the design and gives more perspectives on the proposed system as a whole. In FLASTKF The measurement noise adjusted using qk to get smooth tracking trajectory at various speeds as introduced in [12]. Fuzzy logic is used to determine the best value of qk . ⎤ ⎡ qk 0 0 0 ⎢ 0 qk 0 0 ⎥ ⎥ (8) Qk = ⎢ ⎣ 0 0 qk 0 ⎦ 0 0 0 qk The fuzzy logic system has 4 phases as shown in Fig. 1, the first phase is fuzzification, in which, the map is set up between crisp values and fuzzy set at the input. The second phase and third phases are inference engine and knowledge base respectively, where the knowledge is collected by defining membership functions and rule bases by the form IF-THEN. The final phase is defuzzification, where it returns to crisp values as vice versa of first phase. Membership functions are triangular for both of input variables for linguistic description, the main objective of fuzzy logic in this system is to monitor to parameters (ϕ that represents the speed of finger, and innovation sequence v) in order to adjust the qk value. ϕ parameter is applied by membership function shown in Fig. 2 and v parameter which is the innovation sequence that represents the error between the measured and touched position is represented in membership number two as shown in Fig. 3

Position Estimation and Tracking with a Fuzzy-Logic

Fig. 1. Fuzzy logic system phases

Fig. 2. The speed of finger (ϕ) membership function

35

36

A. Almomani and F. Al-Turjman

Fig. 3. Innovation sequence (v) membership function

The representation of singleton membership function output qk and μqk is shown in Fig. 4 where Mamdani does not support singletons, so I first selected triangular membership functions and then made them as narrow as possible with unity to be in the shape resembling the original singleton. The output membership functions are singleton (SS, SL, MS, ML, LS, LM, LL). They are Small Small, Small Large, Medium small, medium large, Large Small, Large Medium and Large Large respectively.

Fig. 4. Singleton membership function output qk and μqk

Position Estimation and Tracking with a Fuzzy-Logic

37

The rule base is as following: – – – – – – – – –

If ϕ is normal and v is small, then value of qk is MS. If ϕ is normal and v is normal, then the value of qk is ML. If ϕ is normal and v is large, then the value of qk is LS. If ϕ is low and v is small, then the value of qk is SS. If ϕ is low and v is normal, then the value of qk is SL. If ϕ is low and v is large, then the value of qk is SL If ϕ is large and v is large, then the value of qk is LL. If ϕ is large and v is normal, then the value of qk is LM. If ϕ is large and v is small, then the value of qk is LS.

The cases of SS in qk output is to reduce the noise effect, LL to support fast tracking, the M case is nothing to do in fuzzy logic controller because of the normal speed.

5 Results

Fig. 5. The surface viewer of all variables

Figure 5 shows the result of the error, which is displayed in v parameter as innovation sequence that represents the error between the measured and touched position. Figure 6 shows the relationship between ϕ and qk , where is the horizontal axis is ϕ and the vertical axis is qk.

38

A. Almomani and F. Al-Turjman

Fig. 6. ϕ and qk relationship

6 Conclusion Fuzzy logic controller is used to solve the problems of unknown nonlinear functions and uncertainty, the approximation and estimation of function in many applications are achieved by FLC to overcome the nonlinearity and uncertainty. A capacitive touch panel (CTP) is an application of unknown nonlinear functions and uncertainty where the sensor detects a touching of touch panel and decide if there is error or not. STKF was failed to estimate the movement finger with low speed. The low speed problem is solved by FLASTKF method that is used to measure and quantify the “smoothness” of a touched trajectory, the performance of FLASTKF has been evaluated and it was shown that it can successfully achieve an accurate estimation of touched position.

7 Future Work – The fuzzy logic can be used with localization algorithm to deal with unknown, nonlinear and uncertainty functions in order to increase the accuracy with random based wireless sensor networks. – Using adaptive filter with fuzzy logic system to reduce the error resulting from nonlinear systems such as target tracking.

References 1. Yuan, K., Wang, Q., Wang, L.: Fuzzy-logic-based terrain identification with multisensor fusion for transtibial amputees. IEEE/ASME Trans. Mechatron. 20(2), 618–630 (2014) 2. Deters, C., Lam, H.K., Secco, E.L., Würdemann, H.A., Seneviratne, L.D., Althoefer, K.: Accurate bolt tightening using model-free fuzzy control for wind turbine hub bearing assembly. IEEE Trans. Control Syst. Technol. 23(1), 1–12 (2014) 3. Hasanien, H.M., Matar, M.: A fuzzy logic controller for autonomous operation of a voltage source converter-based distributed generation system. IEEE Trans. Smart Grid 6(1), 158–165 (2014)

Position Estimation and Tracking with a Fuzzy-Logic

39

4. Li, H., Gong, M., Liu, J.: A local statistical fuzzy active contour model for change detection. IEEE Geosci. Remote Sens. Lett. 12(3), 582–586 (2014) 5. Wang, L.C., Zeng, X.Y., Koehl, L., Chen, Y.: Intelligent fashion recommender system: fuzzy logic in personalized garment design. IEEE Trans. Hum. Mach. Syst. 45(1), 95–109 (2014) 6. Esposito, C., Ficco, M., Palmieri, F., Castiglione, A.: Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory. IEEE Trans. Comput. 65(8), 2348–2362 (2015) 7. Nasir, A.N.K., Tokhi, M.O.: An improved spiral dynamic optimization algorithm with engineering application. IEEE Trans. Syst. Man Cybern. Syst. 45(6), 943–954 (2015) 8. Van, T.L., Nguyen, T.H., Lee, D.C.: Advanced pitch angle control based on fuzzy logic for variable-speed wind turbine systems. IEEE Trans. Energy Convers. 30(2), 578–587 (2015) 9. Ho, H.F., Wong, Y.K., Rad, A.B.: Adaptive fuzzy approach for a class of uncertain nonlinear systems in strict-feedback form. ISA Trans. 47(3), 286–299 (2008) 10. Tong, S., Liu, C., Li, Y., Zhang, H.: Adaptive fuzzy decentralized control for large-scale nonlinear systems with time-varying delays and unknown high-frequency gain sign. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 41(2), 474–485 (2010) 11. Tong, S.C., Li, Y.M., Feng, G., Li, T.S.: Observer-based adaptive fuzzy backstepping dynamic surface control for a class of MIMO nonlinear systems. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 41(4), 1124–1135 (2011) 12. Lin, C.L., Chang, Y.M., Hung, C.C., Tu, C.D., Chuang, C.Y.: Position estimation and smooth tracking with a fuzzy-logic-based adaptive strong tracking Kalman filter for capacitive touch panels. IEEE Trans. Industr. Electron. 62(8), 5097–5108 (2015) 13. Ghelli, A., Hagras, H., Aldabbagh, G.: A fuzzy logic-based retrofit system for enabling smart energy-efficient electric cookers. IEEE Trans. Fuzzy Syst. 23(6), 1984–1997 (2015) 14. Li, Y., Tong, S., Li, T.: Adaptive fuzzy output feedback dynamic surface control of interconnected nonlinear pure-feedback systems. IEEE Trans. Cybern. 45(1), 138–149 (2014) 15. Tong, S., Sui, S., Li, Y.: Observed-based adaptive fuzzy tracking control for switched nonlinear systems with dead-zone. IEEE Trans. Cybern. 45(12), 2816–2826 (2015)

A Hybrid Metaheuristic Algorithm for the Localization Mobile Sensor Nodes Hasan Sencer Kirtil1(B) and Amir Seyyedabbasi2 1 Computer Engineering Department, Faculty of Engineering and Natural Sciences, Istanbul

Sabahatin Zaim University, Istanbul, Turkey [email protected] 2 Computer Engineering Department, Faculty of Engineering and Architecture, Beykent University, Istanbul, Turkey

Abstract. Wireless sensor Networks replace existing technologies in today’s world. It has some problems in Wireless Sensor Networks (WSN) such as security, energy optimization or mobile localization. Wireless sensor networks are used extensively in sectors such as military sectors, geographic information systems, and meteorology systems. Therefore, efforts are being made to use wireless sensor networks faster and more accurately localization problem, which is among these problems, has an important place today. It is very important to find the location of the sensors quickly and with low error rate in applications such as military applications, emergency assistance. The basis of the problem is to find the geographical points of the nodes randomly distributed in the environment and whose locations are unknown, through anchor nodes. In this study, a hybrid structure was created by using Grasshopper Optimization Algorithm (GOA) and Whale Optimization Algorithm (WOA) metaheuristic algorithms for the location of nodes, and a hybrid structure was used to detect the locations of nodes in wireless sensor networks. Metaheuristic algorithms basically imitate these actions by digitizing the events of living things such as feeding, movement or hunting. While establishing the WOA algorithm used in the study, the hunting methods of whales in nature were taken into account. While establishing the GOA algorithm used in the study, the movement and communication between grasshoppers taken into account. Main purpose of this paper, determine faster and more suitable for the localization problem in wireless sensor networks with the new algorithm. Keywords: WSN · Mobile localization · Optimization · Metaheuristic · WOA · GOA

1 Introduction Wireless sensor networks are used in many areas today. WSNs have been successful in a broad spectrum of applications including surveillance, healthcare, environmental monitoring and home automation [1, 2]. In this network system contains high number of little sensors and these sensors receives information in area they sent. In WSN, there are two type of nodes. Nodes whose location is known are called anchor nodes. Nodes © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 40–52, 2022. https://doi.org/10.1007/978-3-030-99581-2_5

A Hybrid Metaheuristic Algorithm for the Localization Mobile

41

whose location is not known are called target nodes. Target node localization is essential for communication between nodes hence important for gathering information. In this case mobile localization problem has issued. The WSN localization which is a method to identify the accurate physical coordinate of WSNs nodes with an unknown position, it is a significant and challenging problem in sensor networks [3]. WSN localization is a two phase process. In the first phase known as the ranging phase, the algorithms determine the distance between the target nodes and the neighboring beacons [4]. Equipping each sensor by a global positioning system (GPS) seems to be the first choice to locate the sensors, due to the high positioning accuracy of GPS in outdoor environments. However, this solution is impractical in WSNs, especially in indoor environments where GPS signals are not reliable [5]. Sensor nodes with GPS, known as anchor nodes, transmit beacon messages to estimate the position of unknown nodes, which requires much power [6]. Because of that recently, with the development of WSN, various studies and metaheuristic algorithms have focused on this issue, and different methods have focused on this problem. Metaheuristic algorithms are computational intelligence paradigms especially used for sophisticated solving optimization problems. The algorithms randomly separate individuals into a limited area in the first phase, and then they use a large variety of equations to update the positions of individuals [7]. The major algorithms in each metaphor subcategory are discussed including: Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Water Waves Optimization (WWO), Clonal Selection Algorithm (CLONALG), Chemical Reaction Optimization (CRO), Harmony Search (HS), Sine Cosine Algorithm (SCA), Simulated Annealing (SA), Teaching–Learning-Based Optimization (TLBO), League Championship Algorithm (LCA), and others. Also, some non-metaphor based metaheuristics are explained as Tabu Search (TS), Variable Neighborhood Search (VNS) [8]. There are some studies works in solving mobile localization problem with metaheuristic algorithms. D. Li and X. Wen, used a two-stage PSO algorithm with increased sensitivity while solving the positioning problem in CSAs in their study and compared the results with classical PSO and HPSO methods. In his master’s thesis, N. Bozkurt used the Received Signal Strength (RSS) method, which is one of the distance measurement techniques used for positioning in WSN, for position estimation [9]. In this study, the MAP-ACO is proposed that is improved version of the ACO. One of the problems in the sensor nodes is finding optimal path. The authors in this study focused on this problem [10]. Niewiadomska-Szynkiewicz and Marks proposed a hybrid algorithm with the combination of simulated annealing and genetic algorithm [6]. Manjarres et al. have presented a hybrid node localization algorithm based on Harmony Search (HS) algorithm with a local search procedure. +e main objective of the proposed algorithm is to address the localization problem and to distribute its burdens over an iterative process. [3] Niculescu and Nath proposed an efficient localization system by extending the GPS capability with accurate positioning system (APS) to non-GPS nodes in ad hoc networks as anchors flow their location information to all nodes in the network [6]. The authors in the [11, 12] proposed an improved version of the GWO and WOA algorithm respectively. Shang developed a centralized algorithm by using MDS for connectivity-based (range

42

H. S. Kirtil and A. Seyyedabbasi

free) localization. This was extended for range-based localization in. Doherty formulated the connectivity-based localization as a convex optimization problem and solved using semi definite programming (SDP) algorithms [4]. Samanipour and arc. constraint by non-dominant genetic algorithm repair techniques to increase the effectiveness of suggested the approach [13]. In this paper, WOA and GOA algorithms are used a hybrid structure was used. The main purpose of using WOA and GOA is easy implementation and easy learning WOA algorithm is better for random search mechanism and GOA algorithm is better for balancing the exploration and exploitation phase. WOA algorithm is developed by Seyedali Mirjalili and Andrew Lewis. GOA algorithm is developed by Shahrzad Saremi, Seyedali Mirjalili and Andrew Lewis. 1.1 WOA Algorithm Whale optimization algorithm is based on blue whales special hunting method. This special hunting method contains three steps. Search Prey, Encircling the prey and bubblenet feeding. Humpback whales can recognize the location of prey and encircle them. Since the position of the optimal design in the search space is not known a priori, the WOA algorithm assumes that the current best candidate solution is the target prey or is close to the optimum [14]. After that other whales updating the position to the best position. Hunting methods in special for two reason. When the hunting whales closing to the prey, they are using two method. Spiral-shaped path and shrinking encircling mechanism. This hunting methods mathematical formulation shown below.   − →  X ∗ (t) − X (t)  = C. (1) D − → D  X (t + 1) = X ∗ (t) − A.

(2)

→  and C  vektors are coeffiicent vectors. − t is the current iteration and A X ∗ is shown the − →∗ best solution in the current iteration and X updating with current iteration with actual  and C  calculates as follows. value. A  = 2a.r − a A

(3)

 = 2.r C

(4)

r is random value and a is the linearly decreasing value from 2 to 0. − → − → X (t + 1) = DI .ebl . cos(2π l) + X ∗ (t)

(5)

Formula 6 is the spiral updating position formula. In this method whales are closing − → − → − → the prey with spiral movement. DI = X ∗ (t) − X ∗ calculates for distance between whale to prey but best solution isn’t calculated. l is randomly generated number in [−1, 1] − →  D,  X ∗ (t) − A. if p < 0, 5  X (t + 1) = − (6) → − →∗ I bl D .e . cos(2π l) + X (t), ifp ≥ 0, 5

A Hybrid Metaheuristic Algorithm for the Localization Mobile

43

In the hunting method whales uses spiral updating method and shrinking circle. To modelling this behavior formula 5 is using. In this formula p is randomly generated number for each iteration between 0 and 1.  vector can be used for exploration phase. Because of that In the exploration phase A  values are randomly generated than 1 and less than −1. In exploration phase algorithm A −−→ uses for best solution obtained so far. Mathematical model shown below. Xrand is position for random search agent position (Fig. 1).   −−→  Xrand − X   = C. (7) D −−→   X (t + 1) = Xrand − A. D

(8)

Fig. 1. Pseudo code for WOA

1.2 GOA Algorithm Grasshopper are insects. They are considered a pest due to their damage to crop production and agriculture. Although grasshoppers are usually seen individually in nature, they join in one of the largest swarm of all creatures. The main characteristic of the swarm in the larval phase is slow movement and small steps of the grasshoppers. In contrast, long range and abrupt movement is the essential feature of the swarm in adulthood. Food source seeking is another important characteristic of the swarming of grasshoppers. As discussed in the introduction, nature-inspired algorithms logically divide the search process into two tendencies: exploration and exploitation. In GOA exploration phase, the search agents are encouraged to move abruptly, while they tend to move locally during

44

H. S. Kirtil and A. Seyyedabbasi

exploitation. These two functions, as well as target seeking, are performed by grasshoppers naturally. Therefore, if we find a way to mathematically model this behavior, we can design a new nature-inspired algorithm [15]. Xi defines the position of grasshopper. Si is the social interaction value for grasshopper. Gi is the gravitational force and Ai is the wind factor. Xi = Si + Gi + Ai Si =

n 

(9)

  s dij dij



(10)

J=1 J = i Social interaction is calculate with 9 formula. dij represent the distance between two grasshopper where calculated as dij = |xj − xi | and s is defining of social force and calculates as shown below. Si = fe

−r l

− e−r

(11)

Where f intensity of attraction and l is is the length of attraction scale. In Eq. (10) is defining of the attraction and repulsion of grasshopper. 

Gi = −geg

(12) 

Gravitational force calculated as Eq. (11). Where g is gravitational constant and eg is the unity vector to the earth. 

Ai = uew

(13) 

Wind factor is calculated as Eq. (12) and u is constant drift and ew is unity vector of wind direction. When the all equation is set in Eq. (8) last equation is shown below. Xi =

N 

J=1 J = i

 xj − xi  − geg + uew s xj − xı  dij 



(14)

N is the number of grasshopper. At this set of Eq. (13) this version of algorithm can’t use for optimization problem because of balancing exploration and exploitation phase. For that GOA algorithm uses c value for balancing between exploration and exploitation phase. ⎞ ⎛ ⎟ ⎜ ⎜ N  x − x ⎟  ubd − lbd  ⎜ i⎟  j ⎟ + Td xid = c⎜ c S xjd − xid  ⎜ 2 dij ⎟ ⎟ ⎜ ⎠ ⎝j = 1 J = l



(15)

A Hybrid Metaheuristic Algorithm for the Localization Mobile

45

First c is used for the reducing the movement of grasshoppers. Second c used for the equation  is the reducing the attraction and repulsion zone between the grasshoppers.    d d S xj − xi  determines of movement of the grasshopper. c = cmax − l

cmax cmin

(16)

Values of c calculates as Eq. (15). cmax is higher values of c gets. l is the current iteration and cmin values determines the lowest values of c. It mentions before in GOA c value is important for the balancing the movement of grasshopper and hence balancing the exploration and exploitation phases. In this paper, all GOA calculations values of c taken between 0 and 0.000001 (Fig. 2).

Fig. 2. Pseudo code for GOA

2 Proposed Method All of the metaheuristic algorithms are searching for best solutions. Metaheuristic algorithms has two phases. Exploration and exploitation phase. ˙In Exploration phase, algorithm search for best score in globally. Exploitation phase algorithm searching for latest iteration for updating the best score locally. In this logic, metaheuristic algorithms uses different approach for finding best score. For example, ACO algorithm uses the logic of ant movement and formulize ant behavior in general, GWO uses the grey wolf hunting technique for finding the best score because of that one optimization metaheuristic algorithms gives the best solution but using two or more algorithm the best score can be better. In this paper, main purpose, finding and improving the best score for WSN mobile localization. In this paper selected algorithms are WOA and GOA. The purpose of selecting WOA is randomness and easy implementation for mobile localization problem. The purpose of selecting GOA is well balanced structure between exploration and exploitation phases. In WOA, calculation is made continuously between a whale and the prey for finding and updating for best score, including during the exploitation phase. GOA implementation limiting the calculating best score and balancing in

46

H. S. Kirtil and A. Seyyedabbasi

the exploration duration time and exploitation duration time hence the balancing both finding best score and time for finding the best score. Implementation set during the hunting time, when the WOA algorithm select random between spiral attack and bubble-net attacking. In shown before is random value of creating each iteration for selecting the hunting method. GOA implementation sets in p < 0,5 for finding the best score. This mathematical formula shown below. ⎞ ⎛ ⎧ ⎪ ⎪ ⎪ ⎟ ⎜ ⎪ ⎪ ⎟  ⎜   ⎪ N ⎪ d x −x ⎟  ⎜  ub −lb j i ⎪ d d d d ⎪ x + Td if p < 0, 5 c = c S − x  ⎜ x ⎪ j i 2 dij ⎟ ⎨ i ⎟ ⎜ ⎠ ⎝j = 1 (17) ⎪ ⎪ J  = l ⎪   −−→ ⎪ ⎪ ⎪  Xrand − X   = C. ⎪ else if p ≥ 0, 5 D ⎪ ⎪ ⎪ ⎩ − − → D  X (t + 1) = Xrand − A. 

ub and lb defining the population top and bottom limitation. Equation 16 p is random number between 0 and 1 (Fig. 3).

Fig. 3. Pseudo code for WOAGOA algorithm

2.1 Case Study The WSN mobile localization problem determines the location of the nodes with an unknown location by providing a connection between the nodes with a certain location and those whose location is not. Several of method using in mobile localization. This methods shown below. In this paper, Distance based localization is used. 1. Randomly Initialize the N unknown nodes and M anchor nodes within the communication range (R). Anchor nodes measure their position and communicate their

A Hybrid Metaheuristic Algorithm for the Localization Mobile

47

coordinates to their neighbors. For all iterations, the node which settles at the end is termed as reference node and this node will act as anchor node. 2. Three or more anchor nodes within the communication range of a node are considered as localized node. 3. Neighboring anchor node help to measure the location of localized node. Distance measurements are distracted due to environmental consideration; to eradicate it Gaussian noise ni is incorporated with the actual distance di. di is the distance between nodes. x and y values are coordinates of unknown node. xi and yi coordinates of coordination of nearest anchor node.  di = (x − xi )2 + (y − yi )2 (18) 4. All unknown location of unknown nodes mobilizing with using WOAGOA algorithm. This steps formulization shown in below. In the formula is number of anchors with transmission range.  1 N f (x, y) = (19) (x − xi )2 + (y − yi2 ) − dl i=1 N 

5. It develops the optimal position of the target nodes, i.e. (x, y). It minimizes the error function. 6. After the optimization, the locations of the target nodes and the locations calculated from the algorithm are tried to be approximated. Error estimation calculating with calculated nodes real coordinates and calculated coordinates shown below (when L = M − N)  1 L El = (20) (x − Xi )2 + (y − Yi2 ) i=1 M 7. 2 and 6 steps are repeating end of iteration or continues until all unlocalized nodes are located. The lower the ML and L values, the better the performance. Performance also better for number of unknown location of nodes.

3 Simulation and Discussion In the simulation and performance analysis of procedure used in WSN localization were evaluated using Matlab. For e experiments, a WSN with target and mobile nodes were randomly distributed but anchor nodes are stable location into 100 × 100. 100 m × 100 m square units in 2D sensor field with 10,30 and 50 mobile nodes and 4 anchor nodes. The settings and parameter values for GOA and WOAGOA were taken as, g = 9.8, cmin = 0, and cmax = 0.000001. The localization based on WOA, GOA and WOAGOA algorithms are shown in below (Figs. 4, 5 and 6). In the showing the figures using WOA algorithm in mobile localization problem at higher density of nodes didn’t affect the normalize the mean estimation error. At different density of nodes algorithm works with normal rate and find the solution with similar results. In simulations of WOA, randomness and the searching the best score mechanism

48

H. S. Kirtil and A. Seyyedabbasi

Fig. 4. Node localization with WOA 10 mobile nodes

Fig. 5. Node localization with WOA 30 mobile node

Fig. 6. Node localization with WOA 30 mobile node

A Hybrid Metaheuristic Algorithm for the Localization Mobile

Fig. 7. Node localization with GOA 10 mobile node

Fig. 8. Node localization with GOA 30 mobile node

Fig. 9. Node localization with GOA 50 mobile node

49

50

H. S. Kirtil and A. Seyyedabbasi

are also effect the both phases because of that WOA results are better than GOA (Figs. 7, 8 and 9). Because of the c value used in the node localization in the GOA algorithm, the result of the mobile node locations calculated in GOA algorithm are much higher than the WOA Because of that hybrid methods used for balancing the WOAGOA algorithm. WOAGOA simulations are shown below (Figs. 10, 11 and 12).

Fig.10. Node localization with WOAGOA 10 mobile node

Fig. 11. Node localization with WOAGOA 30 mobile node

The performance of WOAGOA at higher density of nodes work better from GOA and WOA. In working GOA algorithm estimation error much higher than WOA and WOAGOA because of limitation works in GOA algorithm. Also in GOA working time of algorithm much higher than the other shown algorithms. The proposed method can be shown in figures much better result than both with GOA and WOA. In this simulations, transmission range and other factors in mobile localization is ignored.

A Hybrid Metaheuristic Algorithm for the Localization Mobile

51

Fig. 12. Node localization with WOAGOA 50 mobile node

4 Conclusions In this paper we have proposed and analyzed for the localization in WSN using the new hybrid algorithm with using WOA and GOA algorithm. In the WOA algorithm randomness is main structure for the algorithm. Exploration phase of WOA is well balanced but randomness in some cases gives not better solution. In GOA is better for balancing for exploration and exploit phase. In this balancing can be better for most cases but sometimes limitation of communication range can’t give better solution. In hybrid method searching algorithm is using both GOA balancing system and WOA randomness. WOAGOA algorithm is better using limitation and better randomness. In the mobile localization problem using with WOAGOA gives better solution both WOA and GOA. Mobile localization problem may be on 2D but proposed algorithm can be used for 3D platforms. GOA and WOA algorithms are been using for optimization problems. In this proposed method fitting for WSN main principle of low cost. Metaheuristic algorithm are newly developing technology. In this paper, we shown metaheuristic algorithm can be used instead of traditional methods.

References 1. Kulkarni, V.R., Desai, V., Kulkarni, R.V.: A comparative investigation of deterministic and metaheuristic algorithms for node localization in wireless sensor networks. Wireless Netw. 25(5), 2789–2803 (2019). https://doi.org/10.1007/s11276-019-01994-9 2. Seyyedabbasi, A., Dogan, G., Kiani, F.: HEEL: a new clustering method to improve wireless sensor network lifetime. IET Wirel. Sens. Syst. 10(3), 130–136 (2020) 3. Kanoosh, H.M., Houssein, E.H., Selim, M.M.: Salp swarm algorithm for node localization in wireless sensor networks. J. Comput. Netw. Commun. 2019, 1–12 (2019) 4. Gopakumar, A., Jacob, L.: Localization in wireless sensor networks using particle swarm optimization. In: 2008 IET International Conference on Wireless, Mobile and Multimedia Networks, pp. 227–230. IET, January 2008 5. Wu, H., Liu, J., Dong, Z., Liu, Y.: A hybrid mobile node localization algorithm based on adaptive MCB-PSO approach in wireless sensor networks. Wirel. Commun. Mob. Comput. 2020, 1–17 (2020)

52

H. S. Kirtil and A. Seyyedabbasi

6. Rajakumar, R., Amudhavel, J., Dhavachelvan, P., Vengattaraman, T.: GWO-LPWSN: grey wolf optimization algorithm for node localization problem in wireless sensor networks. J. Comput. Netw. Commun. 2017, 1–10 (2017) 7. Chai, Q.-W., Chu, S.-C., Pan, J.-S., Hu, P., Zheng, W.-M.: A parallel WOA with two communication strategies applied in DV-Hop localization method. EURASIP J. Wirel. Commun. Netw. 2020(1), 1 (2020). https://doi.org/10.1186/s13638-020-01663-y 8. Abdel-Basset, M., Abdel-Fatah, L., Sangaiah, A.K.: Metaheuristic algorithms: a comprehensive review. In: Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications, pp. 185–231 (2018) 9. Do˘gru, A.S., Tolga, E.R.E.N.: Kablosuz Sensör A˘glarında Konum Belirlemede Parçacık Sürü Optimizasyonu, Yarasa Algoritması, Diferansiyel Geli¸sim Algoritması ve Ate¸sböce˘gi Algoritması Yöntemlerinin Kar¸sıla¸stırılması. Uluslararası Mühendislik Ara¸stırma ve Geli¸stirme Dergisi 12(3), 52–64 (2020) 10. Seyyedabbasi, A., Kiani, F.: MAP-ACO: an efficient protocol for multi-agent pathfinding in real-time WSN and decentralized IoT systems. Microprocess. Microsyst. 79, 103325 (2020) 11. Seyyedabbasi, A., Kiani, F.: I-GWO and Ex-GWO: improved algorithms of the Grey Wolf Optimizer to solve global optimization problems. Eng. Comput. 37(1), 509–532 (2019). https://doi.org/10.1007/s00366-019-00837-7 12. Seyyedabbasi, A., Aliyev, R., Kiani, F., Gulle, M.U., Basyildiz, H., Shah, M.A.: Hybrid algorithms based on combining reinforcement learning and metaheuristic methods to solve global optimization problems. Knowl. Based Syst. 223, 107044 (2021) 13. Garip, Z., Çimen, M.E., Boz, A.F.: Harris Sahinleri ¸ ve Balina Optimizasyon Algoritmalarının Kısıt ˙I¸sleme Teknikleriyle Uygulaması: Kar¸sıla¸stırmalı bir çalı¸sma. J. Intell. Syst. Theory Appl. 4(2), 76–85 (2021) 14. Mirjalili, S., Lewis, A.: The whale optimization algorithm. Adv. Eng. Softw. 95, 51–67 (2016) 15. Saremi, S., Mirjalili, S., Lewis, A.: Grasshopper optimisation algorithm: theory and application. Adv. Eng. Softw. 105, 30–47 (2017)

The Application of Big Data in Aerobics Teaching in Higher Vocational Colleges Xin Feng(B) Chongqing Vocational Institute of Engineering, Chongqing 402260, China [email protected]

Abstract. “Big data” mainly refers to the huge amount of data information and the associated processing technology under the rapid development of network information technology. That is to say, in the massive data, quickly capture valuable data information, so as to obtain effective information quickly, cheaply and optimally. The application of the core value of “big data” in Aerobics Teaching in higher vocational colleges will change the original traditional teaching mode, and play a significant role in promoting the aerobics teaching in Higher Vocational Colleges and the improvement of the whole physical education teaching quality. Keywords: Big data · Aerobics teaching · Higher Vocational Colleges

1 Introduction Aerobics course has been set up for more than ten years in ordinary colleges in China, and it has been set up for nearly ten years in higher vocational colleges. Aerobics has developed into the main course of public physical education, but most vocational colleges have no obvious breakthrough in teaching form, communication mode and teaching content [1]. Therefore, students only regard learning aerobics as completing a course of study, and do not actively feel the special charm and fun of aerobics, and do not really realize the exercise value of aerobics. This phenomenon is more prominent in higher vocational college students. How can the teaching of Aerobics really meet the physical and mental needs of students and make aerobics really close to students’ life?

2 Overview of Big Data Technology With the advent of the cloud era, big data has attracted more and more attention. According to the analyst team, bigdata is usually used to describe a large amount of unstructured data and semi-structured data created by a company, which will take too much time and money to download to a relational database for analysis [2]. Big data analysis is often associated with cloud computing, because real-time large data set analysis needs a framework like MapReduce to allocate work to dozens, hundreds or even thousands of computers. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 53–58, 2022. https://doi.org/10.1007/978-3-030-99581-2_6

54

X. Feng

Big data technology can realize the mining of useful information hidden in massive data, and provide users with reference and use. Big data technology can not only analyze and process structured data, but also realize the analysis and processing of unstructured and semi-structured data. Big data technology has entered all levels of social life [3]. Hundreds of millions of mobile Internet users continuously upload location, microblog, circle of friends, taxi, takeout, e-mail and social information to the servers of service providers, which obtain massive data information, The visualization of data information can be realized by using data analysis and mining technology. Big data technology involves many stages of big data processing, such as collection and storage, architecture and calculation. Hadoop is an ecosystem that integrates different stages of big data technology. The core of Hadoop is yarn, HDFS and MapReduce [4]. The development trend of big data technology is mainly manifested in four aspects: data analysis will become the core of big data technology, and the results of data analysis will be applied to all fields related to big data; widely using real-time data processing methods, such as personalized recommendation and real-time traffic information, real-time data processing will promote the development and progress of big data technology; Open source will become a new driving force to promote the development of big data. Open source software is constantly developed in the process of the development of big data technology. These open source software play a very important role in the development of all fields of big data; Cloud based data analysis platform will be more perfect, and the development of cloud computing can provide certain data processing platform and technical support for the development of big data technology [5].

3 The Significance of Introducing Aerobics into Higher Vocational Colleges 3.1 An Overview of Aerobics According to the physiological and psychological characteristics of exercisers, aerobics is a means of mass aerobics, in which some movements in gymnastics, dance and other aerobics projects are organized into aerobics according to the requirements of aerobics, and practiced with music accompaniment, so as to improve health, cultivate correct posture, shape beautiful body and cultivate beautiful sentiment. Aerobics is full of motion and has high exercise value, which is popular among students [6]. Applying it to physical education not only changes the simplification and programming of conventional physical education, It enriches the form and content of the class, stimulates students’ interest in learning, and plays a positive role in improving students’ basic activity ability, physical quality and aesthetic ability. The model of health function factors of aerobics is shown in Fig. 1.

The Application of Big Data in Aerobics Teaching

55

Fig. 1. Aerobics health function factor model as shown in the figure

3.2 Conform to the Development Trend of College Physical Education Curriculum Reform The reform of the content of physical education course in Colleges and universities is the key point of the curriculum reform. In view of the reasonable choice of curriculum content, we should start from the specific situation of students, teachers and schools, and stress on the reality, and provide possibility for the increase of sports curriculum content. The school should actively improve the environment, provide resources for teachers to innovate and develop school-based courses and enrich teaching content. At the same time, teachers make full use of diversified teaching content, teach according to their aptitude, and promote the personalized development of students. Bodybuilding operation is a unique sport, which is not only in line with the development direction of the reform of physical education curriculum, but also can adapt to the development trend of physical education. 3.3 Can Meet the Requirements of the New Curriculum Standards Aerobics from the characteristics of the requirements of not only meet the requirements of students’ physical and mental development, but also lively form, can stimulate interest in learning, in addition, the requirements for the venue equipment are low, easy to

56

X. Feng

implement [7]. These characteristics are in line with the requirements of the new curriculum standards, and increase the feasibility of introducing them into higher vocational colleges.

4 Big Data and the Purpose and Direction of Aerobics Education Innovation in Higher Vocational Colleges In the process of traditional school education and teaching, what plays a decisive role in teaching quality is teachers’ understanding of students themselves and their learning effect. But for a long time, most physical education teachers judge students’ learning situation according to their own experience and examination test, and students only evaluate teaching according to their subjective feelings or their own learning interest. No matter physical education teachers or students, there is no way to objectively and accurately grasp the actual situation of teaching and learning, which makes it difficult for students to give timely feedback and physical education teachers to teach students in accordance with their aptitude. In the era of big data, precision teaching mode has become the current mainstream teaching mode. It is the main teaching mode to effectively realize precision teaching. It is a new teaching mode combining big data technology and artificial intelligence and other new technologies. It is the best booster to realize precision learning and efficient learning. Under the big data technology, precision teaching mode is a new teaching activity framework and activity procedure based on big data technology and under the guidance of certain education and teaching theories, and it is a set of methodology system to carry out teaching activities. A complete precision teaching mode mainly includes theoretical basis, technical basis, teaching objectives, operating procedures, implementation conditions and evaluation and other factors [8]. The theoretical basis mainly refers to the education and teaching theory on which the precision teaching mode is based; the technical basis mainly refers to new technologies such as big data technology and artificial intelligence; the teaching goal mainly refers to the effect that the precision teaching mode can produce on the learners; the operation procedure mainly refers to the teaching activity steps of the precision teaching mode; the teaching goal mainly refers to the effect that the precision teaching mode can produce on the learners; The realization condition mainly refers to that teachers need to optimize the combination of teaching conditions, pay attention to principles, and take effective methods and skills when using the precision teaching mode; evaluation is an essential part of the precision teaching mode. The precision teaching mode under big data technology is shown in Fig. 2.

The Application of Big Data in Aerobics Teaching

57

Fig. 2. Precision teaching mode under big data technology

5 Application of Big Data in Aerobics Teaching in Higher Vocational Colleges 5.1 It Needs Professionals to Analyze Data and High-Quality Physical Education Teachers In the process of “big data” technology application and implementation, professional teachers need to further analyze the different types, stages and problems of different students, and put forward correction opinions and praise and encouragement to students, which requires physical education teachers to have a higher quality level, and the number of graduate students of Physical Education Major is relatively small at the present stage of society It can be seen from the current situation that the effect can only be achieved under the premise of vigorously advocating and implementing the specialization of physical education, which requires many factors such as the reform of education system and the change of people’s thinking [9]. Therefore, if we want to really use the technology of “big data” in physical education teaching, we need to complete the education reform in the future for a long time. 5.2 We Need to Improve the Physical Education Infrastructure and the Cooperation of Various Industries If a school wants to carry out normal physical education and teaching activities, it cannot do without teaching venues, teaching equipment and facilities. To try a new physical education teaching mode, in addition to the requirements of teaching venues, teaching equipment and facilities, it also needs the support of mobile technology and terminal. But now many schools in remote areas have limited funds, and some schools are not even able to maintain normal teaching order. Many schools can not even guarantee the most basic sports venues, and there is no more funds to install mobile networks and add sports facilities. Therefore, this kind of teaching mode using “big data” still needs to start from economically developed cities For schools in remote areas, if they want to promote and apply it, they need the strong support of the government and the education department [10].

58

X. Feng

5.3 Breaking the Limitations of Big Data in the Application Process In the application process of “big data” technology, the more samples and scattered the data are, the more accurate and reliable the statistical results are. However, in the early stage of “big data” implementation, due to the lack of data, the results of comparative analysis are not obvious, which requires more time and resources to improve “Big data” does not provide us with the final answer, but the reference answer. If we want to get a relatively accurate answer, we must make more efforts in data collection. In addition, the limitations of “big data” are also reflected in the authenticity, integrity, timeliness and predictability of data.

6 Conclusion In short, the “big data” and the innovative education mode of Aerobics in vocational colleges can provide intellectual support for educational innovation, new educational research methods and learning methods. Although the specific application mode needs further research and analysis, and the construction and implementation also needs a long time, we should grasp the new opportunities of “big data” technology application, make full use of data media, so as to keep pace with the times in our education and teaching.

References 1. Xiang, H.: Welcome the era of big data. China’s Inf. Ind. 5, 38–42 (2017) 2. Ni, J.: Diversification of junior high school physical education teaching methods in the era of big data. Emmi 10, 196 (2018) 3. Hui, S.: Physical education in primary and secondary schools under the environment of big data. Audio Vis. Educ. Prim. Secondary Sch 9, 55 (2017) 4. Bian, L.: On Aerobics teaching in primary school physical education. Knowl. Guide 9, 148 (2015) 5. Fan, J.: Research on the application of “big data” in physical education. Sports 13, 81 (2016) 6. Fang, W.: Research on cultivating students’ various abilities in Aerobics teaching. Youth (21) (2017 ) 7. Time: Research on rhythm transformation in Aerobics teaching and training. J. Hubei Second Normal Univ. (04) (2013) 8. Liu, Y.: Thoughts on the integrated model of Aerobics teaching and training. Contemp. Sports Sci. Technol. (06) (2021) 9. Zhao, H., Li, D.: Some ways to improve Aerobics teaching. Vocat. Technol. (10) (2006) 10. Luo, P.: Research on the future development model of Aerobics clubs in Higher Vocational Colleges. Contemp. Sports Sci. Technol. (35) (2019)

Design of Data Standardization Cleaning System Under Multi-source Data Access Bo Li1 , Ruifeng Zhao2 , Fengchao Chen3(B) , Bo Zhang1 , Lide Zhou3 , Yipeng He3 , and Chengbo Lu3 1 School of Electric Power, South China University of Technology, Guangzhou 510640,

Guangdong, China 2 Power Dispatching and Control Center Guangdong Grid Co., Guangzhou 510600,

Guangdong, China 3 Dongguan Power Supply Bureau, Guangdong Power Grid Corporation, Dongguan 523008,

Guangdong, China [email protected]

Abstract. Due to the poor initial clustering ability of data, the processing time of data standardization cleaning system for multi-source data is increasing. To solve this problem, the data standardization cleaning system with multi-source data access is designed. According to the characteristics of multi-source data, the preliminary clustering module is set to complete the data preprocessing. The data similarity is calculated to determine whether the data to be processed or not need to be cleaned. The traditional system data cleaning technology is used to process the data to complete the multi-source data cleaning. So far, the design of data standardization cleaning system under multi-source data access has been completed. The experimental results show that the speed of data missing value processing, the effect of data screening and data standardization processing are better, and the comprehensive performance of system data cleaning is better. Therefore, this system is more suitable for multi-source data processing. Keywords: Multi source data · Multi task optimization · Data cleaning · Massive data

1 Introduction It is an important part of data processing to correct the quality problems existing in data, avoid decision errors and reduce decision risks. In the past research, data cleaning system is usually used to complete data cleaning. However, due to the increase of data sources, that is, the emergence of multi-source data, the difficulty of system redundant data cleaning is expanded. In order to improve the processing ability of multi-source data, reference [1] proposes a massive data cleaning system based on regular expression and combined with the special requirements of limited application scenarios. Aiming at the problem of super long error data and the problem of batch data source file fusion, it removes the errors in the data and completes the data preprocessing. Through the compatible data source file © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 59–67, 2022. https://doi.org/10.1007/978-3-030-99581-2_7

60

B. Li et al.

format, it sets the appropriate regular table Expression and preprocessing algorithm have good applicability and accuracy. In reference [2], in order to ensure the correctness of the legal status individuals and the rationality of the temporal relationship between the States, considering the common error patterns in the time series, a framework for cleaning the patent legal status information was designed, and the legal status information database was modeled by using the model checking method to automatically analyze the causes of patent legal status errors. In reference [3], a practical risk assessment and decision-making system for power grid dispatching operation process is developed. The system constructs a standardized interface platform, which puts forward higher requirements for power grid information processing ability. Through risk modeling of different equipment operation process, decision-making suggestions for dispatching operation are given according to risk indicators, which can guide dispatchers to make scientific dispatching decision. But in the past research, the processing time of data standardization cleaning system for multi-source data is increasing. Therefore, this paper summarizes the previous research experience, designs a data standardization cleaning system with multi-source data access function, sets up the preliminary clustering module from the perspective of multi-source data, completes the data preprocessing, and tries to build a data standardization cleaning system for multi-source data According to the data cleaning system, the specific data cleaning methods are concentrated in the system in the form of modules, and the preliminary clustering ability of data is enhanced by the optimization of data preprocessing, so that the system has good reusability and scalability.

2 Design of Data Standardization Cleaning System Under Multi-source Data Access According to the corresponding requirements of data cleaning technology, the software part of the system is set as subsequent module integration. The specific content is shown in Fig. 1.

data Integration 14.2857%

Data standardization cleaning 14.2857%

Data 14.2857% processing Data standardization Data quality reportcleaning system under 14.2857% multi source data access 14.2857% Data repair Data 14.2857% monitoring 14.2857% Data supervision

Fig. 1. Software module composition of data standardization cleaning system

Design of Data Standardization Cleaning System

61

According to the above components as the basis of the software design, in view of the shortcomings of the traditional system in use, some modules in the software module will be optimized, so as to improve the multi-source data processing ability of the system.

3 Preliminary Data Clustering Before data cleaning, because the system aims at multi-source data, it needs to complete data preliminary clustering. In network data, a tuple containing multiple attribute values is often used to represent the characteristics of the data, through which the collected data is classified. In this system design, the data preliminary clustering module is added, the k-means algorithm is used to read the collected data [4, 5], and the data attributes are divided. The processing complexity of this work can be expressed as A(m · I ). The complexity of data clustering can be expressed as I . The number of data with different attributes and the number of data with the same attributes m 

Ix = |S|

(1)

I =0

In the formula, S represents the clustering core distance [6, 7]. By transforming this formula, we obtain the constraint conditions suitable for multi-source data clustering m · I = |S|

(2)

A(m · I ) = A(n)

(3)

Through the above formula, the running time of the preliminary distance processing is controlled. Because the data processed this time is multi-source data and contains a variety of data types in the data item, in order to improve the reliability of data processing results [8, 9], the form of calculating similarity is adopted to control the calculation accuracy of clustering core distance. It can be expressed as:  J (A, B) = |A ∩ B| |A ∪ B| (4) In the formula, J means the similarity of calculating the core distance, B is the result of the system calculation. Through this formula, the error value of the system calculation result is controlled within 0.5%, so as to ensure the effectiveness of the subsequent calculation. In addition to the above calculation process, G considering the frequency of data types H in calculation, the frequency of data types R can be expressed by setting the frequency of data types and the weight of data types H · Gij =R Gi + Gj

(5)

Using this formula, we can get the probability of data types, and integrate the above formula into the data clustering module [10, 11] to complete the data clustering processing.

62

B. Li et al.

The data after clustering processing is used as the data source of data cleaning, and the cleaning technology suitable for multi-source data is selected as the basis of this module design. According to the analysis results of literature [12] and literature [13], the processed data is set in the form of database to facilitate data cleaning. It is set that there are two groups of data in the database Y, one of which is the data set that does not need to be cleaned, and the other is the data that needs to be cleaned. The data that does not need to be cleaned is set as C: all the data C contained in the database Y are composed of elements in the database, fc (a) indicates the number of times C that the data appears in the database. Qc (a) is the similarity between the data to be cleaned and the data that does not need to be cleaned in the database Qc (a) = lg(

|C| ) fc (a)

(6)

If you set Qc (v) the similarity of a subset in a database v, you can:  Qc (v) = Qc (v)

(7)

v∈V

Setting v1 ∈ C, v2 ∈ C, the relationship between data v2 and v1 can be expressed as: w(v1 , v2 ) =

Qc (v1 ∩ v2 ) Qc (v)

(8)

Through the above formula, the data that need to be split in the database can be processed, and the original data cleaning mode can be used to complete the multi-source data cleaning work. In view of the poor ability of the original system to clean up special data, this study sets up specific cleaning work and matching rules to complete the data cleaning process. The specific cleaning tool settings are shown in Table 1: Table 1. Data cleaning tool settings Tool serial number

Tool name

Scope of application

1

Idcentric

Address and zip code

2

Pureintegrate

3

Trillium [14, 15]

4

Datacleanseser

5

Matchit

Date, encrypted file

Combining the data cleaning tool and the calculation process, the data cleaning module of the system is designed. And this module is applied to the original software architecture to realize the multi-source data standardization cleaning performance of the system.

Design of Data Standardization Cleaning System

63

4 System Test 4.1 System Test Platform Design According to the characteristics of the designed system, the equipment connection test of the system is completed in the form of single pseudo distribution. In order to better study the use effect of the design system in this paper, the use performance of the design system and the traditional system (literature [1] and literature [2]) is compared in the form of system testing. Based on the multi-source data access settings, the system test is completed by using the combined server. On this server architecture, the equipment deployment of the traditional system and the designed system is completed, and a series of tests are carried out. In this test, a total of 5 network servers are set, and the server model is Dell r430. The hardware configuration of each data server is planned uniformly. The specific hardware configuration is shown in Table 2. Table 2. System test environment server hardware configuration Configuration serial number

Configuration item

Parameter

1

CPU

Intel

2

Number of CPUs

1

3

Number of CPU cores

5

4

Number of CPU threads

10

5

Memory

64 G

6

Hard disk

1 TB

7

Graphics card

Dual port Gigabit NIC

In this system test, in order to ensure the security of the designed system and the traditional system, the multi-source distributed structure is used as the experimental environment. For the real system environment, because the system needs long-term stable operation, the distributed mechanism can ensure the stability of the experiment. The software structure of the experimental platform is as follows: CentOS is used as the operating system, the database version is SQL 5.7.9, and the Hadoop version is 2.6.05.7.1-1335. In the process of system testing, the server cluster is set to the form of multi node connection, in which the corresponding master node is set to prevent the impact of a single node failure on the operation of the whole cluster. The configuration of server nodes in the system test environment is shown in Table 3.

64

B. Li et al. Table 3. Test environment server definition setting results

Node name

IP address

Node work content

Master

192.168.101.100

Master node

Worker1

192.168.101.101

Work node

Worker2

192.168.101.102

Work node

Worker3

192.168.101.103

Work node

Worker4

192.168.101.104

Work node

Worker5

192.168.101.105

Work node

The test environment is used as the data source to ensure the generation of multisource data, and the design system and traditional system are used to clean the data generated in the test environment, and the performance difference between the design system and traditional system is compared. 4.2 System Test Index In this system test, the system test indicators are set as three groups, and the specific test indicators are set as the speed of data missing value processing, the accuracy of data filtering and the background running time of data standardization processing. In the process of this system test, all nodes work test and part of the results work test will be carried out, 10 times in each group, a total of five groups, for 50 times. In order to make the test results intuitive, the test results are reflected in the form of images. 4.3 Analysis of Test Results the system designed in this paper has good performance in the test of this index. Because the data missing rate of the designed system is low, the data missing processing speed of this system is fast. Traditional system 1 and traditional system 2 have low ability to deal with data missing and long running time. Through the analysis of the above two systems, we can see that the two systems will cause data loss in the process of data processing, and the data processing ability is low. To sum up, the design of the system in this part of the test can get good test results. In order to verify the cleaning performance of the design system in this study, after the system design is completed, the node work test is used to ensure the use effect of the data cleaning system. The test results of different methods are shown in Fig. 2.

Design of Data Standardization Cleaning System

65

Fig. 2. Data screening test results

The analysis of the test results in Fig. 3 shows that the data screening ability of traditional system 1 and traditional system 2 is low, and the data screening result error is large. In the operation of massive data, this situation will cause adverse effects on system users and reduce the satisfaction of system users. Compared with the two systems, the data filtering ability of the designed system is better, and the data filtering results are consistent with the preset results, which will not affect the subsequent calculation. On the premise that the actual problems and hardware architecture are consistent with the design system in this paper, the design system in this paper can be used to deal with the actual problems and improve the accuracy of data. In order to confirm whether the design can meet the needs of future use, that is, the overall effect of data cleaning processing, test the standardized processing, and compare the test results as shown in Fig. 3. It can be seen from the experimental results in Fig. 3 that the use effect of the designed system is obviously better than that of the traditional system. In two different node application states, the running state of the designed system is obviously stable, and

66

B. Li et al.

Fig. 3. Test results of data standardization processing

there is no large fluctuation in the background processing caused by the change of nodes. The traditional system has the problem of large fluctuation in this part. In actual use, the fluctuation of the system will have a serious impact on the results of data cleaning. Therefore, it can be judged that the performance of the designed system in this part of the test is better than that of the traditional system.

5 Conclusion (1) For the multi-source data standardization cleaning system proposed in this study, the accuracy of cleaning data depends on the accuracy of database data processing results. Therefore, in the process of using this system, according to the characteristics of multi-source data, this paper sets up a preliminary clustering module to complete the data preprocessing, the speed of data missing value processing is fast, and the efficiency of data screening and data standardization processing is high It is necessary to ensure the reliability of data preprocessing results and complete the optimization of multi-source data cleaning.

Design of Data Standardization Cleaning System

67

(2) In this study, how to carry out high-precision data preprocessing has not been discussed, and this problem is regarded as a starting point for future research. Through the research results of this problem, the performance of the design system in this paper is optimized to ensure the reliability of the research and design results.

References 1. Zheng, C., Yong, L.V.: Massive data cleaning system based on regular expression. Comput. Appl. 39(10), 2942–2947 (2019) 2. Wu, P., Zhang, X., Lu, X.: Research on data cleaning of Chinese patent legal status based on model checking method. Intell. Theory Pract. 41(03), 49–56 (2018) 3. Zou, Q., Tang, J., Zhang, Y., et al.: Design of dispatching operation risk assessment and decision support system based on multi-source data fusion. Power Grid Clean Energy 34(03), 38–45 (2018) 4. Liang, Y.: Design of intelligent enterprise management system based on big data. Mod. Electron. Technol. 42(06), 158–161 (2019) 5. Hu, Y., Qiao, Y.: Wind power data cleaning method based on confidence equivalent boundary model. Power Syst. Autom. 42(15): 18–23 + 149 (2018) 6. Fu, Y., Yu, Z., Zeng, R., et al.: Research on data cleaning method of transmission line electromagnetic environment test. High Voltage Technol. 44(01), 289–295 (2018) 7. Qu, C., Zhang, Y., Wang, Y., et al.: Big data cleaning model of energy Internet based on spark framework. Electr. Meas. Instrum. 55(02), 39–44 (2018) 8. Sun, Y.: Research on data cleaning method of SCI address field based on Word2Vec. J. Inf. 38(02), 195–200 (2019) 9. Ma, H., Wu, S., Cao, X., et al.: Big data cleaning modeling for operation state of fully mechanized coal mining equipment. Ind. Min. Autom. 44(11), 80–83 (2018) 10. Hao, S., Li, G., Feng, J., et al.: Review of structured data cleaning technology. J. Tsinghua Univ. (Nat. Sci. Edn.) 58(12), 1037–1050 (2018) 11. Guo, K., Wang, H., Cheng, W.: Data cleaning system based on active learning. Softw. Eng. 21(09), 37–40 (2018) 12. Hong, Y.: Method of cleaning up inferior data of embedded system based on autoregressive model. Inf. Rec. Mater. 20(11), 152–153 (2019) 13. Jiang, Y., Han, X., Ma, D., et al.: Optimization of data cleaning algorithm for similar duplicate data detection. Comput. Technol. Dev. 29(10), 79–82 (2019) 14. Zhao, M., Wang, H., Zhang, C., et al.: Data cleaning algorithm for power information and communication assets based on self coding. J. Shandong Agric. Univ. (Nat. Sci. Edn.) 50(06), 1093–1096 (2019) 15. Zhong, H., Li, Y., An, X.: Research on patent data cleaning process supported by open source tools. J. Med. Inf. 40(05), 60–64 (2019)

Research and Analysis of Computer Multimedia Technology in Basketball Tactics Teaching Qingtian Zeng(B) School of Public Administration, Chongqing Vocational College of Transportation, Chongqing 402247, China [email protected]

Abstract. With the development of the new curriculum reform, multimedia technology has been widely used in all aspects of modern teaching, which can be well applied in the existing teaching mode. This paper mainly discusses the computer multimedia technology aided basketball tactical teaching design, with the help of various teaching means, improve the basketball tactical teaching effect, change the teaching method, and integrate the traditional teaching method with the multimedia assisted teaching. Keywords: Computer · Multimedia technology · Basketball tactics teaching

1 Introduction Introduction: the traditional basketball teaching method is that teachers repeatedly demonstrate and practice, which will cost a lot of practice, but the effect is still not ideal. Multimedia technology can use video, image, animation and other materials to present basketball tactics, set up interactive teaching system, stimulate students’ enthusiasm for learning, arouse students’ various senses, strengthen subjective initiative and improve teaching quality [1].

2 The Significance of Computer Multimedia Technology in Basketball Tactics Teaching The development of teaching theory promotes the improvement of teaching methods. Modern teaching technology is evolved from audio-visual teaching technology, relying on various auxiliary equipment, so that students can play a multi-sensory receiving function and improve learning efficiency in the learning stage. The progress of teaching methods can not be separated from the continuous development of science and technology. In this process, the purpose of new teaching methods is to strengthen teaching effect [2]. Many advanced technologies are combined with education as much as possible. Computer multimedia technology is an auxiliary method with the function of educational demonstration and training simulation. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 68–72, 2022. https://doi.org/10.1007/978-3-030-99581-2_8

Research and Analysis of Computer Multimedia Technology

69

The course of basketball tactics teaching is to let students understand the contents and skills of basketball tactics, the birth of a new tactic, through the explanation of professional teachers, standard demonstration, let students have a preliminary understanding, and then repeated training, the problems found in the practice stage should be corrected in time until the whole content is accepted by the students, but in the actual teaching, the tedious basketball tactics are difficult to understand, the explanation and demonstration are more troublesome, and the teaching difficulty is greatly increased [3]. Using computer multimedia to present a virtual basketball scene to students, students can quickly understand the essence of tactics, effectively shorten the teaching process, deepen the understanding of tactics.

3 Computer Multimedia Technology-Assisted Basketball Tactical Teaching Design 3.1 Analysis of Learner Characteristics Before carrying out teaching activities, we should first conduct a thorough investigation on the level of knowledge and technology and the level of psychological development of learners, understand their existing knowledge and skills foundation and learning attitude, and do a good job of feature identification, including age, cognitive maturity, life experience, learning will and so on. The important factors affecting learners’ efficient learning are also cognitive structure, whose characteristics are not constant and vary from person to person, so we should teach students according to their aptitude in teaching stage. 3.2 Teaching Objective Design It is necessary to refine the teaching content according to the syllabus, make the teaching content more clear, the teaching goal is helpful to the students’ comprehensive development, play the role of quality education, and make clear regulations on every link in the teaching process. Teaching objectives are divided into micro and macro [4]. The macro teaching goal is the ultimate goal in the curriculum standard, and the micro teaching goal is to refine to the goal of each class. In the process of basketball tactical teaching design, teachers should dig deeply into the teaching content according to the overall needs. Make careful arrangement and implement it conscientiously. 3.3 Teaching Content Design (1) With pictures The picture material can present the details of basketball action very well. The key actions include breaking, cutting, strategy and so on. It can intercept the video clips of professional basketball games, use the picture editing software to process, mark the key actions and precautions well. Teachers display these pictures on large screens in class to make students understand better which is shown in Fig. 1.

70

Q. Zeng

Fig. 1. Basketball tactics

(2) Using video material To the basketball tactics teaching, the video material may in the present coherent movement, uses the Adobe Premiere software to carry on the editing, the synthesis and so on operation, after processing becomes the wmv format, may play separately, the teacher in the teaching stage, repeats the projection video, simultaneously carries on the tactical concept and the key point explanation, lets the student watch, understands the tactical cooperation key point. Teachers can also send videos to students for review after class. (3) Using animated material Animation material can decompose and deduce the action, and the action in basketball tactics should be consistent. In the early stage of teaching, students should understand all kinds of decomposition actions, use animation tools to make animation, and use interactive on-demand technology to control the play schedule. When watching multimedia animation, students’ attention distribution has strong regularity [5]. First, they pay attention to the movement of players in the picture, and then they can associate with the purpose of movement. This requires a process to process the observed content and then construct the tactical content.

Research and Analysis of Computer Multimedia Technology

71

Multimedia animation technology, not only can make tactical image and scene, but also can choose the appropriate color for the object, scene, realistic simulation of the actual basketball tactical scene, to the virtual scene layout, light, tone and other elements reasonable collocation, using visual special effects to enrich the ideological nature of animation teaching. At the same time, animation production has the advantages of low cost, short time consuming and easy modification. The investigation shows that it is easy for students to accept the creation of teaching environment with multimedia animation, and has achieved remarkable results, and students can get a good learning experience [6]. (4) Applied textual material Text material can explain the main points of action very well. Teachers should mark the key actions well, which is helpful for students to find the right points. According to the teacher’s introduction and media material display, students can form action impression in the brain through proper braking.

4 Teaching Strategy Design The teaching strategy depends on a certain theoretical basis. In order to achieve a certain teaching goal, the teaching strategy is not a specific method. Under the premise of having the corresponding teaching thought, according to the situation, we should properly handle the relationship between the various factors of teaching. 4.1 Organizing Teaching Strategies First With the help of appropriate guidance materials to guide the knowledge to be learned, this model combines the old and new knowledge, so that learners can easily accept the new knowledge. Because this strategy is to present the guiding content through computer multimedia technology before learning new content, to clarify the goal and significance of basketball tactical learning, to construct bedding knowledge orientation and to stimulate learning interest. This method has high reference value, can play game clips, or review the tactical content that has been learned [7]. 4.2 Copying Teaching Strategies Imitating teaching strategy is a common method, which is mostly used in action teaching and accords with basketball tactics teaching. This method mainly includes four links: first, action orientation. After the teacher introduces the technical essentials and application principles, it is helpful for students to master behavioral skills. Second, participatory practice. Let the students carry on the imitation training, the teacher guides in the side, through the student feedback question, corrects the wrong movement, consolidates the correct movement, causes the student’s movement to be more skillful. Third, practice independently. After a period of training, students have a good foundation of action, and then let students practice independently. Fourth, skill transfer [8]. When students

72

Q. Zeng

are skilled to a certain extent, they should pay attention to the cultivation of students’ comprehensive application ability. At this time, with the help of multimedia technology, they make correct movements and running lines. Students are trained to record students’ training and analyze the video to find out their own shortcomings and improve their understanding of tactics. 4.3 Situational Edification Strategy Building a situation similar to reality makes students’ thinking highly concentrated, but still learning in a relaxed environment. In class, students share their training experience with each other, effectively strengthen their autonomous ability and cooperation ability, and create a good learning atmosphere. This method is applied in many fields. Teachers guide students to participate in it, hold various activities, so that students can actively think, take the initiative to join, and master knowledge unconsciously [9]. Inspired by teachers, students master the emotional tone and turn experience into a code of thought and behavior. This strategy is suitable for the teaching of multimedia technology. For example, after a basketball game, we can study the tactical ideas, practical application and final results of the two sides, fully reflect the importance of tactics, and guide students to turn teacher experience into their own understanding. Because the specific conditions of each student are different, there is no perfect teaching strategy suitable for all students, which requires teachers to formulate targeted teaching plans, create a good teaching environment, and obtain the best teaching results [10]. Conclusion: there are many drawbacks in the previous basketball tactical teaching mode. In the actual teaching process, if the teacher’s explanation of the action is not in place, the students will form the wrong action cognition and carry out the basketball tactical teaching through multimedia technology.

References 1. Jia, T.: Application of multimedia technology in teaching basketball technology in secondary vocational schools. 9 Mod. Vocat. Educ. (05), 168–169 (2021) 2. Li, C.: Application of multimedia technology in basketball course of public physical education in higher vocational college. Technol. Inf. 18(31), 34–35+38 (2020) 3. Zhang, H., Li, H.: A study on the innovation of basketball teaching method in physical education teaching in higher vocational colleges and rural staff officer (07), 244 (2020) 4. Shen, S.: Practice and exploration of multimedia technology in college physical education. Track Field (03) (2021) 5. Zhang, N.: Application of multimedia teaching technology in physical education classroom. Mod Salt Chem. Ind. (03) (2018) 6. Wang, L.: Research on the auxiliary function of multimedia technology in physical education. Wireless Internet Technol. (08) (2017) 7. Ren, H.: Analysis on the application of multimedia technology in Volleyball teaching. Leisure (06) (2019) 8. Hong, Y.: Application of multimedia technology in football teaching. Examination Weekly (93) (2016) 9. Du, S., Lv, W.: Application of multimedia technology in College Wushu practice teaching. Sports Sci. Technol. Lit. Bull. (12) (2010) 10. Liu, G.: Application of multimedia technology in traditional teaching. J. Cangzhou Normal College (03) (2001)

Computer Simulation Analysis Based on Reinforced Concrete High Rise Structure Design Lingyan Duan(B) and Rong Tang Wuchang Institute of Technology, Hubei 430000, China [email protected]

Abstract. The complexity of structural types of high-rise buildings has a certain impact on the structural design of high-rise buildings. Designers need to take into account the seismic performance and practicability of buildings, so the design scheme inevitably has omissions and errors. This paper focuses on the structural selection, foundation design, concrete shrinkage and creep of high-rise concrete buildings, This paper summarizes the application of nonlinear computer simulation of reinforced concrete structure and its important position in the development of concrete structure. The possible problems are analyzed in order to provide reliable reference for the majority of practitioners. Keywords: Reinforced concrete · Structural design · High rise building · Computer simulation

1 Introduction Reinforced concrete structure is one of the most widely used structures in civil engineering. However, the mechanical properties of reinforced concrete can not be said to have mastered very comprehensively, especially the concrete. Because concrete is composed of cement, water, sand, stone and various admixtures or admixtures, it is a building material with complex composition and diverse performance. With the increasing height of high-rise buildings in China, the structure and type of buildings are more and more complex, and the structural system is diversified. The structural design of high-rise buildings has gradually become the focus of architectural designers. Structural test plays an inestimable role in the birth and development of “concrete structure theory”. The concrete structure design codes all over the world are based on a large number of test data [1]. The concrete structure with special shape and complex structure often needs to check the design theory and improve the design method through the model test of the whole structure. However, the structural test, especially the large-scale structure test, often requires a lot of manpower and financial resources, the same test is difficult to repeat many times, and the scale model test has “distortion” effect. If we can establish a method of “simulating full-scale model test” through calculation and analysis, as an auxiliary research means, it can make up for the lack of solid test, and will have a positive effect on the development and application of concrete structure theory [2]. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 73–80, 2022. https://doi.org/10.1007/978-3-030-99581-2_9

74

L. Duan and R. Tang

In recent years, with the rapid development of computer technology, computer simulation technology also develops rapidly, but the development of concrete structure computer simulation technology is still in a relatively slow development speed. With the continuous updating of computers and the emergence of new achievements in the field of structural engineering, concrete structure simulation technology has shown great vitality since its birth, and many achievements have been put into engineering application.

2 Common Problems and Countermeasures of High Rise Building Structure Selection 2.1 Problems Related to Structure Selection Over the years, China’s high-rise building structure design code has relatively large changes in structure selection. In response to the development needs of standardization and standardization in the construction industry, the revised code over the years has increased the design content about the upper and lower stiffness of embedded end and plane regularity information. At the same time, due to the increasing number of irregular buildings in recent years, the current code also strictly points out that high-rise buildings should not adopt serious non-standard structural system. Therefore, in the design of reinforced concrete high-rise structure, we must pay attention to the structure selection [3]. On the basis of fully understanding the current specifications, we must ensure that the design scheme meets the requirements of restrictive conditions, and avoid changes in the later stage. 2.2 Structural Height Related Issues At present, in the current code for seismic design of buildings (GB 50011-2010) (2016 Edition), many new contents have been added to the height design of buildings, especially for the problem of “super height of buildings”, many related clauses have been added, especially the classification restrictions of A-level height and B-level height, which limit the height design of buildings to a certain range, but different height levels, There are some differences in structure design limitation and design method [4]. Many practitioners in the initial design, often due to not accurately distinguish the building height level or structure type, resulting in the neglect of the problem, eventually resulting in the construction drawings can not normally pass the audit, later expert meeting or redesign again, have a certain impact on the construction period, design cost and construction price [5]. Therefore, it is necessary to strictly pay attention to the hierarchical division of structural height, select appropriate treatment methods and design methods according to the current design specifications and structural seismic requirements, so as to reduce the workload of later revision of drawings, and control the design time and cost within a reasonable scope.

Computer Simulation Analysis Based on Reinforced Concrete

75

2.3 Setting of Embedded End The rationality of the embedded end design determines the stress state of the building structure, and has a certain impact on the stability of the building structure, the seismic capacity, the internal force of the components, and the lateral displacement of the structure. Generally speaking, in the design process, the correct selection of the embedded position is an “important assumption” in the design of high-rise buildings. At present, most buildings have underground structures. According to the layout of the underground structures and the change of the stiffness of the basement, the embedded depth of the embedded end also has a certain change, and may even be set in other floors. However, in the actual design process, many practitioners often ignore the requirements of the stiffness ratio of the embedded end, the design requirements of the embedded end floor, the anti-seismic grade coordination requirements of the embedded end, the overall calculation requirements of the embedded end structure, etc., and the neglect of these problems will cause a large number of design quality hidden dangers, and eventually lead to the substantial modification of the design scheme [6].

3 Structural Calculation and Analysis In the structural calculation and analysis stage, how to accurately and efficiently analyze the internal force of the project and design and deal with it according to the requirements of the specification is the key to determine the quality of engineering design. As the introduction of the new code has adjusted and improved quite a lot of contents in the calculation and analysis of the whole structure, structural engineers should also have a clear understanding of the common problems at this stage. 3.1 Selection of Software for Overall Structural Calculation At present, the more common calculation software are: SATWE, tat, TBSA or ETABS sap, etc. However, there are some differences in the calculation model adopted by each software, which leads to the differences in the calculation results of each software. Therefore, in the calculation and analysis of the overall structure of the project, we must choose a reasonable calculation software according to the characteristics of the structure type and calculation software model, and judge which is reasonable, which can be used as a reference and which is of little significance from the calculation results of different software, which will be the primary work of structural engineers in the design work [7]. Otherwise, if the unsuitable software is selected, it will not only waste a lot of time and energy, but also make the structure unsafe.

76

L. Duan and R. Tang

3.2 Influence of Building Partition Wall on Natural Vibration Period In fact, this part has been mentioned in both new and old codes, but in the new code, according to the measured period of a large number of projects, the reduction factor of calculated natural vibration period of high-rise building structure under various structural systems is clearly proposed. 3.3 Is the Number of Vibration Modes Sufficient In the new code, a concept of mode participation coefficient is added, and the limit value of this parameter is clearly put forward. In the old code design, the concept of mode participation coefficient was not put forward, or even if there is such a concept, the limit value of the parameter may not necessarily meet the requirements of the new code. Therefore, in the calculation and analysis stage, it is necessary to judge the result of the parameter in the calculation results and decide whether to adjust the value of the number of modes [8]. 3.4 Is it Necessary to Calculate the Mutual Interference of Each Seismic Period Between Multiple Towers Separately For a period of time, a large number of high-rise buildings with large chassis and multi tower have emerged. When calculating and analyzing this type of high-rise buildings, it is a problem that structural engineers must pay attention to whether to take the structure as a whole and calculate according to the multi tower type or to calculate the structure artificially separately. If the stiffness difference between multiple towers is large, it is possible that even if the participation coefficient of vibration mode meets the requirements, the calculation error of seismic force of a certain tower may still be large, so that the structure may be unsafe [9]. 3.5 Calculation and Design of Non Structural Members In high-rise buildings, there are often some non structural members which are not within the main load-bearing framework system due to the aesthetic or functional requirements of the building. In the design of this part, especially the decorative components on the roof of high-rise buildings, the seismic action and wind load of high-rise buildings are large, so the design must be carried out in strict accordance with the calculation and treatment measures of non structural components added in the new code.

4 Computer Simulation of Reinforced Concrete High Rise Structure Design 4.1 Main Mathematical Models of Reinforced Concrete At the macro level, reinforced concrete can be regarded as a material composed of steel and concrete. In the mathematical model of nonlinear constitutive relation, the two are usually treated separately, and then the continuity of material is considered to obtain the joint effect of the two. At present, there are three types of methods to simulate the nonlinear response of concrete.

Computer Simulation Analysis Based on Reinforced Concrete

77

(1) Nonlinear elastic model The so-called nonlinear elastic model is to simulate the nonlinear deformation response of concrete with the piecewise elastic material response of variable modulus. The advantage of this method is that the calculation is simple, but its disadvantage is that it can not accurately describe the characteristics of concrete in the high stress state near failure, nor can it express the so-called strain strengthening and post crack peak phenomenon. (2) Plastic model The plastic model includes ideal plastic model and elastic-plastic strengthening model. The former is based on the ideal elastic-plastic theory and is used to calculate the failure loads of concrete blocks, beams and slabs. In this model, the complex nonlinear and irrecoverable mechanical characteristics of reinforced concrete can be simulated by the so-called “rigid ideal plastic material”. Concrete deformation can be divided into three stages. It is assumed to be elastic before flow, and the plastic stress-strain relationship is used to describe the plastic law in the process of flow. After cracking, if it is fracturing, it is considered that the stress in each direction of the coagulation is reduced to zero. Therefore, it is necessary to define the initial state of plastic flow and the initial state of cracking. In recent years, the ideal plastic flow surface is often used to describe the failure criterion of concrete under multiaxial stress. In the past, the criterion of concrete cracking only depended on the stress factor. In recent years, the research tends to consider the stress and strain factors. However, due to the lack of systematic experimental data of concrete deformation under multiaxial loading, the research on the criterion of concrete cracking strain is still insufficient [10]. Another plastic model is called strain hardening plastic model, whose theory is plastic mechanics. In this model, strain hardening, cracking criterion and post cracking characteristics are properly expressed. The material parameters needed for calculation are not difficult to obtain from experiments. Therefore, the strain hardening plasticity model has high practical value in engineering. (3) Endochronic model The endochronic model is different from the above model. It is suitable for the special case that the proportion of load in three loading directions is unsteady, that is, the change of principal stress direction caused by the so-called non proportional loading. The endochronic model is expressed in the form of viscoplastic theory, which is incremental nonlinear. It can be considered that the endochronic model provides a good multiaxial stress-strain nonlinear constitutive relation of concrete. However, the cost of running this model program is high, and the input material constants are too many, which limits its engineering application. In the future, the introduction of loading surface and plastic strengthening characteristics into endochronic model may be the development trend of this model.

78

L. Duan and R. Tang

4.2 Computer Simulation Analysis of Reinforced Concrete Structure (1) The concrete model of the computer contains the following basic material properties: ➀ When the main tensile stress reaches the breaking stress, the material is broken; ➁ It will be crushed under higher stress, and then it will enter into strain softening until the ultimate strain. Concrete model in computer has three basic characteristics in describing material properties. ➀ The nonlinear stress-strain relationship is obtained by increasing the compressive stress and allowing the material to soften; ➁ It is used to define the failure envelope of tension and collapse; ➂ Methods to simulate the cracking and post crushing properties of materials. In the process of solution, the material can bear the cyclic load condition, that is, unloading and reloading are allowed in the numerical solution. In addition, thermal effects can also be considered. (2) Stress strain relationship Generally, the multiaxial stress-strain relationship is based on the uniaxial t σ˜ , t e˜ stressstrain relationship. The typical relationship of uniaxial stress t σ˜ and strain t e˜ is shown in Fig. 1.

Fig. 1. Struts frame structure

The stress-strain relationship is that of skeleton line loading. For the unloading or loading cases, the initial elastic modulus E˜ 0 is used. For the strain state beyond e˜ M , assuming that the stress is linearly reduced to 0, the following Young’s modulus is used σ˜ M − σ˜ C E˜ = e˜ M − e˜ C

(1)

4.3 Material Failure Envelope The tensile, biaxial and triaxial failure envelope curves used in ADINA are shown in Fig. 2. The failure envelope of ADINA is input by defining 24 discrete stress values.

Computer Simulation Analysis Based on Reinforced Concrete

79

Fig. 2. Three dimensional tensile failure envelope of concrete

In addition, it is usually assumed that Poisson’s ratio is constant in the whole analysis process. However, V can also be changed to simulate the expansion effect of concrete under compression. V is determined by the following formula ⎫ Vs = V ⎬ 2  (2) γ2 −γa ⎭ Vs = Vf − (Vf − V ) 1 − 1−γa

5 Conclusion In short, the design of reinforced concrete high-rise structure is a long-term, complex and even cyclic process. Any omission or error in this process may make the whole design process more complex or make the design result unsafe. The commonly used computer simulation is used in concrete simulation. The complex material characteristic parameters of concrete can be easily input in ADINA program.

References 1. Jiang, J., Lu, X., Jiang, B.: Finite element analysis of concrete structure. Tsinghua University Press, Beijing (2005) 2. Gu, X., Sun, F.: Computer Simulation of Concrete Structure. Tongji University Press, Shanghai (2)001 3. Chen, H., Saripu, Yu, T.: Constitutive equation of concrete and soil. China Construction Industry Press, Beijing (2004) 4. Luo, J.: Analysis of common problems in the design of reinforced concrete high-rise structures. Eng .Constr. Des. (09) (2020) 5. Jin, J.: Discussion on common problems in reinforced concrete high-rise structure design. Urban Archit. (24) (2013) 6. Chen, Q.: On several problems of determining structural system in high-rise structure design. Archit. Knowl. (04) (2002)

80

L. Duan and R. Tang

7. Hu, R., Wu, S., Deng, P., Sheng, Y., Lin, C.: Overall design of CAD system for multi-storey and high-rise structures. Build. Struct. (04) (1993) 8. Zhao, X.: Common problems and treatment of reinforced concrete high-rise structure design. Intell. City (21) (2019) 9. Wang, Y.: Common problems and treatment of reinforced concrete high-rise structure design. Build. Mater. Decoration (36) (2019) 10. Jiang, J., Li, J., Jin, W.: Advanced Concrete Structure Theory. China Construction Industry Press, Beijing (2007)

Design of High Availability Server System Management Software for Autonomic Computing Weipeng Liang1(B) and Xiaoqiong Qiu2 1 Guangzhou College of Technology and Business, Guangzhou 510850, China

[email protected] 2 Guangdong Provincial Mechanical Technician College, Guangzhou 528137, China

Abstract. This paper studies the design scheme of distributed high availability server system management software based on Linux platform for autonomic computing. The software realizes the automatic operation and management of the complex structure of the system, and ensures that all parts of the system perform their duties, cooperate with each other and operate in an orderly manner. This paper focuses on the architecture design of system management software, the design of task load balancing scheduling strategy of distributed high availability system, the design of virtual network management scheme and the design of high availability management scheme of dual machine subsystem of distributed high availability system. As for the architecture design of the software, this paper uses Linux shared library technology, C++ object dynamic creation technology and a specially designed interface class to make the software dynamically load, unload and replace functional modules at runtime. Keywords: Autonomic computing · The server · System management software

1 Introduction In recent years, the information industry has exploded in the Internet technology. Informatization has become a trend of economic and social development. With the development of distributed computing technology based on computer network, computing has become a new section of scientific research. The demand for computing capacity in various research fields is increasing. Cluster computing has become a widely used high-performance computing environment with its high performance price ratio and high reliability. Nowadays, the information construction has also raised the national strategic issues [1]. There are two ways to improve the performance of the system: one is to replace the high-performance and expensive mainframe, the other is to adopt distributed system to add new computing nodes. In general, the latter has a significant advantage over the former because it has a much higher cost performance. But for this kind of distributed system, how to organize each computing node effectively to make full use of its computing ability is a difficult point and a hot research hotspot [2]. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 81–88, 2022. https://doi.org/10.1007/978-3-030-99581-2_10

82

W. Liang and X. Qiu

The function of the high availability server management software is to realize the automatic management of the high availability server, and ensure that the server system can work normally without manual intervention. For example, LVS cluster system, an open source project initiated by the University of defense technology, belongs to distributed structure server. This project gives a cluster architecture, and the software mainly realizes two functional modules of load balancing scheduling and connection management at kernel level, but the project does not provide high available solutions. At present, there is no overall solution for the management software of distributed high availability server with fault tolerant structure. It is usually done manually to build and configure with some existing tools. There are many configuration guidance in this area [3]. But the first is that it is lack of all-round fault detection and treatment mechanism, and it is difficult to realize automatic configuration and management of the system, and the support for dynamic upgrading of the system is not good enough; Second, the configuration process is complicated, and the configuration personnel need to have solid system knowledge.

2 Computing the Architecture of Highly Available Server System to the Independent 2.1 High Availability Server System for Autonomous Computing The high availability server system for autonomous computing is a kind of high performance and reliable computing system with high performance, state awareness and overall adaptation. It relies on the latest fault-tolerant computing technology, adopts blade distributed architecture, and makes the server system have the following characteristics by using the idea of independent computing. (1) High performance: the system has a high processing capacity by organizing several computing blades into a high-speed parallel computing processing system. (2) Self repair: the system can detect software and hardware errors and weak links during the operation. When a failure occurs, it can locate the fault location independently and recover the fault automatically, such as restart or isolate the fault component or quickly switch to the backup component. (3) Scalability: the system has the ability to upgrade dynamic performance during operation. For example, online increase or decrease of computing units, expansion of computing capacity or storage capacity, etc. (4) Self optimization: when the system operating environment or state changes, such as dynamic upgrading of system computing capacity or failure of some components, changes in workload, the system can adjust its own working mode timely to optimize the performance of the system. (5) Self configuration: when the structure of the system changes, such as adding and deleting new components, expanding the storage capacity of the system online, the system can dynamically configure its own resources during operation, so that the newly added components can be integrated into the system or the increased storage space can be used by the system. These are self-adjustment in the case of minimal artificial intervention.

Design of High Availability Server System Management Software

83

Active fault management system is a relatively independent software and hardware system, which can continuously and effectively detect, diagnose and predict the whole system, and can isolate and recover the fault components in fine-grained way. It is an important guarantee for the system to operate continuously and efficiently, and is also one of the key links to realize independent calculation. It is combined with system management software to realize self recovery of independent computing. If the active fault management system diagnoses the leader unit in active state fails, it informs the system management software to complete the function of standby leader to take over the active leader. The faults that can be detected by active fault management system include hardware failure (such as power failure [4] CPU overheating, hard disk failure, memory failure, heavy load of computing unit, etc.) and software failure (such as Linux kernel failure, process crash or slow operation), and its architecture is divided into two levels, as shown in Fig. 1.

Fig. 1. Active fault management system architecture

2.2 System Image Under Management Software The system management software organizes all parts of the system into an organic whole through the implementation of its various responsibilities, so that they perform their duties and cooperate closely. By providing a single access interface, the system presents a high available and high-performance virtual single system image. See Fig. 2. As shown in the figure, the system can run various services such as web service, FTP service and mail service, and this kind of service program can run on the system without any modification. There is no difference between the same kind of services running without computing units, that is, they do not feel the structure of the system. The client computer in the external network accesses the system through a single interface (unique IP address), and the internal structure of the system is transparent to it.

84

W. Liang and X. Qiu

Fig. 2. System image in management software

3 Requirement Analysis and Outline Design of System Management Software 3.1 Demand Analysis The system management software runs on the leader unit to complete the business management of the whole system. Firstly, as a server, the system should ensure that the access requests submitted by network users can be timely and correctly responded. This requires the management software to capture the user’s access request and assign it to the internal computing unit. At the same time, the management software should ensure that each computing unit is fully and evenly utilized. For the fault management system, the management software should be able to cooperate with it to complete part of the fault recovery work of the system, which mainly includes the failure switching of double leaders and the task migration when the computing unit fails [5]. For the shared storage system, the management software ensures that each leader cell and computing cell can get its mapping correctly. As a server system management software, the satisfaction of system performance requirements is one of the most important indicators to evaluate the quality of software design. 1) Availability requirements The availability of the system represents the ability to provide services continuously. It depends on the reliability and maintainability of the system. The calculation formula is as follows: A=

MTTF MTTF + MTTR

Where MTTF is mean time between failures and MTTR is mean time to repair.

(1)

Design of High Availability Server System Management Software

85

Aiming at the system, this paper mainly analyzes the controllable factors that may affect the system availability in the management software. Due to the structural characteristics of the system, the most critical factor affecting the system availability is the availability of the leadership unit. Therefore, we focus on the availability of the leadership unit, as shown in Fig. 3. In order to establish the Markov model, we make the following basic assumptions [6]. (1) It is assumed that two leader units have the same performance index. (2) Each leader has only two states, namely working state and failure state, and the leader’s failure state is very important. The results are statistically independent. (3) The life distribution of each leader obeys exponential distribution, and the repair time of fault unit also obeys exponential distribution. Number distribution. (4) The success rate of leader handoff is 1. (5) It does not consider the possibility of failure when the standby leader performs state switching (6) State transition may occur at any time, but in a small enough period of time, it is impossible two state transitions occur. State set s = {0, 1, 2, 3}.

Fig. 3. Double leader Markov model

3.2 Virtual Network Management This module provides a single access IP to shield the internal structure of the system and provide a single access IP for the client.

86

W. Liang and X. Qiu

A system image function. The virtual network is realized by NAT technology. It provides a single access IP for the whole system, which is called virtual IP. As a kind of resource, virtual P is owned by the active leader. When the active leader fails, the standby leader will take over the virtual IP to complete the function switch and become a new active leader. In this way, the external clients can access the system consistently [7]. When the packet passes through the leader, the leader translates the network IP address and port through NAT. The message flow is shown in Fig. 4

Fig. 4. Network address translation information flow diagram

In the figure, VIP represents virtual IP address, CIP represents client IP address, rip represents real (computing unit) IP address, dip represents leader node IP address. The service request to access the system is received by the leader on its VIP, and then the leader forwards the request to the computing node on its rip. The computing node responds by sending packets back to the leader, so the leader needs to translate the rip address of the computing unit into its own VIP address, This makes it look as if all packets are sent and received by a VIP to the client computer outside the system.

4 Detailed Design and Implementation of System Management Software The operating system environment of the software is Linux. The main program of the software is implemented by C++ programming language, the kernel module is implemented by C language, and some system configuration programs are implemented by shell script [8]. The architecture of the system management software includes six components: main program, kernel task scheduling module, kernel virtual network management module, web management interface, command line management interface and configuration file. The main program as a daemon runs in the background, monitors and analyzes the commands received by each interface, and controls the operation of the lower components [9]. The main frame of the main program is written in C++ language. Figure 5 shows the structure design class diagram of the main program. In the main program, a function class

Design of High Availability Server System Management Software

87

is designed for each function module. The collaborative management class is responsible for monitoring and analyzing the commands received by the interface, and controlling the execution of these commands by leader management class, member management class, task management class, virtual network management class, configuration management class, security management class, and shared storage class [10].

Fig. 5. Class diagram of main program structure design

5 Conclusion This paper studies the design of the management software of the highly available server system of autonomous computing, and proposes a framework structure of the management software for computing based on this framework. Based on the background of the project, this paper takes the highly available server system for autonomous computing as the target system, and studies the design scheme of the distributed structure high availability server management software of Linux platform. At present, the definition of rules in ACMS software is relatively simple. The next step of this paper focuses on the research of analysis and decision module. By establishing the correlation model of the system, the system perception is carried out according to the uncertainty reasoning of monitoring messages, and fault location and recovery are carried out.

References 1. Siripoonya, V., Chanchio, K.: Thread-based live checkpointing ofvirtual machines. In: 2011 IEEE International Symposiom on NetworkComputing and Applications, pp. 155–162 (2011) 2. Arianyan, E., Tarighi, M., et al.: Virtual machine reallocation in data centers through multi parameter decision making model. In: 2011International Conference on Information Communication and Management, IPCSIT, vol. 16, pp. 211–216 (2011) 3. Cheng, S., Chan, C.W., Huang, G.H.: An integrated multi-criteriadecision analysis and inexact mixed integer linear programming approach forsolid waste management. Eng. Appl. Artif. Intell. 16, 543–554 (2003)

88

W. Liang and X. Qiu

4. Menon, A., Santos, J.R., Turner, Y.: Diagnosing performanceoverheads in the xen virtual machine environment, pp. 13–23. ACM (2005) 5. Wu, Z.: Research and implementation of high availability network attached storage cluster. Huazhong University of Science and Technology (2004) 6. Meng, W.: Application of high availability cluster technology. Netizen World (11) (2012) 7. Li, C., Li, D., Xiao, N., Yang, X.: Measurement model of computational grid application availability. Comput. Res. Dev. (12) (2003) 8. High availability computing: a new definition of network. Internet Weekly (30) (1999) 9. Min, L.: Monitoring technology of document resource availability based on web crawler mechanism. Sci. Technol. Inf. (27) (2020) 10. Lai, G.: On the design and implementation of high availability network. Guangdong Sci. Technol. (15) (2007)

Application of Decision Tree Algorithm in Teaching Quality of Higher Vocational Colleges Fang Mei(B) Chongqing College of Architecture and Technology, Shapingba District, Chongqing 400030, China [email protected]

Abstract. With the development of higher education, aiming at the application research of teaching quality in higher vocational colleges, this paper uses decision tree algorithm to construct decision tree to discover the classification rules contained in the data. Decision tree method is an algorithm with data mining as the core technology. Its main advantage is that it can find potential and valuable information from the integrated data. Through data mining analysis, the evaluation results can bring unprecedented harvest and surprise to education and teaching, help school administrators to better carry out teaching management, improve teachers’ teaching quality, improve teaching, and provide reference for their reasonable curriculum setting. Keywords: Teaching quality · Decision tree algorithm · Data mining · Higher vocational colleges

1 Introduction Decision tree method is an algorithm based on data mining, and its main advantage is that it can extract data from the whole tree. The potential and valuable information for decision-making can be found from the combined data. Data mining technology is a hot area of academic attention, decision tree algorithm as a classic algorithm in data mining, in the course of the rapid development of the information age, the internal power of digitization and informatization is deeply affecting the development of society, data has become an important force to promote the development of science and technology and economy in China. The core value influence of big data is gradually expanding to financial analysis, education, transportation, medical education, culture and many other fields, and has been widely concerned and applied [1]. In recent years, the student achievement data of higher vocational colleges is also growing explosively, and the data management of many school educational administration systems only stays in the stage of simple query and statistics of data. For computer teaching, the traditional assessment method can not fully reflect the learning effect of students. Because the traditional assessment methods are mainly © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 89–95, 2022. https://doi.org/10.1007/978-3-030-99581-2_11

90

F. Mei

multiple-choice questions and judgment questions, which can test students’ understanding of computer theory knowledge, but can not test students’ practical operation ability. According to the teaching objectives of computer course, a set of comprehensive evaluation system can be established. Students’ comprehensive scores include examination scores and usual scores. On the basis of students’ participation in the first level examination, students’ usual homework, experiments and small tests can be increased. Therefore, for the quality evaluation of computer teaching, we need to use a new type of decision tree to achieve the optimization and upgrading of teaching quality. The application of data mining technology for more in-depth mining and analysis of data has become an urgent need for university teaching management. As far as the application in foreign countries is concerned, data mining technology has been gradually applied to university management and education practice, which is embodied in student educational administration system management, platform management, alumni system management and so on [2]. In China, the overall use of data mining technology is later than abroad, but its application has developed rapidly in recent years. Data mining technology can help colleges and universities complete the work of large amount of data, such as the evaluation of students’ comprehensive quality, the evaluation of teachers, the reasonable setting of courses and the selection of teaching methods, the evaluation of examination papers and the quality evaluation of examination questions. Educational data mining is the comprehensive use of statistics, artificial intelligence, management information system, pattern recognition and data mining technology to analyze and count big data. Through mathematical modeling, it can timely find the quantitative relationship between the specific content, learning results and learning behavior in the process of students’ learning, so as to realize the comprehensive prediction of students’ later learning [3]. Educational data mining can also help colleges and universities to improve teaching, such as improving students’ learning effectiveness, mining the internal links between courses, timely helping teachers to continuously improve and optimize specific teaching methods, so as to enhance the teaching pertinence, help teaching managers to make decisions quickly, so as to provide the basis for improving teaching and improving teaching quality.

2 Decision Tree Algorithm Nowadays, there are many decision tree classification algorithms, such as ID3 algorithm, C4.5 algorithm, cart algorithm, CHAID algorithm and so on. ID3 is the basis of all decision tree algorithms, which was proposed by Quinlan in 1986. This algorithm uses information gain as the standard of attribute measurement. One of the core research contents of data mining stage, the above algorithm has been pursued by relevant researchers at home and abroad. Decision tree algorithm is one of the commonly used classification methods, which describes the influence of all variables on the data with the shape of tree branches. The detailed implementation process is as follows: first, determine the corresponding root node according to the standard; second, analyze the attributes of the root node, The sample set is divided into several subsets, and the same method is used to determine the nodes from the subsets, and the continuous iteration is completed until the subsets are empty or reach the given stop condition [4]. The corresponding node is

Application of Decision Tree Algorithm in Teaching Quality

91

the child node, and the child node can be considered as a certain type of attribute value. Finally, the above inheritance relationship is expressed in the form of tree to form a decision tree. 2.1 Decision Tree Model Theory The application of decision tree includes three aspects: data preprocessing, decision tree model and decision tree pruning. In the early stage of data mining, the basic and important part is data collection. The data information collected in the early stage is about students’ daily learning, including homework, test, class situation, final exam and so on. This kind of information collection can directly reflect whether the students are serious about the distance teaching, can directly find the students’ shortcomings in learning, and give students timely help. Let T have m classes, T = {t1 , t2 , · · · tm }, an attribute a in training sample has n values, A = {a1 , a2 , · · · an }, the information expectation of training samples can be obtained as follows: m Inf (T ) = − p(ti )lg2 p(ti ) (1) i=1

The information entropy of attribute a for training sample partition is: n p(ti )Inf (ti ) E(T ) = i=1

(2)

The information gain of attribute a for training sample partition is: Gain(T ) = Inf (T ) − E(T )

(3)

In the same way, the information gain rate of other attributes is calculated. The attribute with the largest information gain rate is selected as the root node of decision tree. The nodes of each layer are calculated by recursion in the same way. 2.2 Application of Decision Tree Web interactive environment is the main way of data collection. Data can be mined from web server, application server and TCP/IP network layer. The data mining involved in this paper is obtained from the web on the server, in which the user name of the login server and the access page are within the scope of data mining. Learners’ information can be collected through online questionnaires. When the server receives the user’s login request, the questionnaire survey also starts, and all the students who use the teaching platform will accept the online survey. Whether they have the habit of taking notes, whether they finish their homework on time, whether they preview before class and review after class are the main contents of the survey [5]. When the server receives the login request, the questionnaire survey starts. All the students who use the teaching platform will accept the online survey. Whether they have the habit of taking notes, whether they finish their homework on time, whether they preview before class and review after class are the main contents of the survey. After that, the back-end server can analyze and count the survey results, and the back-end

92

F. Mei

server will automatically accept the survey results at the moment of clicking submit page. In the process of establishing decision tree model, we should ensure the analysis of the whole teaching, and systematize the information of students and teachers, so as to ensure the advanced teaching. In the process of decision tree pruning, it is necessary to realize the reasonable reservation value of data. The whole pruning should be based on the basic principles of data optimization to ensure the integrity of data research. In order to get scientific and real data from a complete and growing decision tree for the quality evaluation of computer experiment teaching, we must prune the data [6]. There are many ways to prune the data, such as front pruning or back pruning, It ensures the conventional principles of data analysis, and realizes the analysis value of teaching quality and ensures the advanced teaching quality.

3 Construction of Teaching Quality Evaluation Index System AHP (analytic hierarchy process) is used to verify the model of teachers’ teaching evaluation system, and the best evaluation index is selected one by one. It is a model that applies data mining technology to teaching evaluation. The model combines the actual teaching evaluation work and uses the decision tree algorithm of data mining technology to build a decision tree about teaching evaluation information. The main process of the framework is shown in Fig. 1. (1) Data preprocessing: it is mainly to standardize the teacher information in the teacher database into the data format that can be processed by the decision tree through data selection and transformation [7]. (2) Data cleaning and integration: because the teacher information in the teacher database is generally incomplete, there are noises and inconsistencies, Therefore, before data classification, we need to clean it. In the process of data cleaning, we need to supplement the missing values and correct the inconsistency of data. Teacher information may exist in different databases. Data integration mainly solves the problem of heterogeneous data. (3) Data discretization: it helps to generate better decision tree. (4) Decision tree generation: mainly to solve the problem of decision tree construction. (5) Decision tree pruning: its main function is to prevent the decision tree from being too large and over matching. (6) Classification rule generation: generate relevant rules through the optimized decision tree.

Application of Decision Tree Algorithm in Teaching Quality

93

Fig. 1. Establish the flow chart of teaching quality evaluation

4 Evaluation of Teaching Quality Model The development process of system login module, data management module, teaching evaluation mining module, user management module and database management module is designed, in which the five steps of data mining module are mainly studied, including the program implementation process of generating uncut decision tree, pruning decision tree, displaying decision tree, extracting rules and testing the effectiveness of rules [8]. C4.5 (j48) and ID3 classifiers in Weka are used to construct decision tree model. Since the steps of the two algorithms are the same, we only give the visual model generated by weka-c4.5, as shown in Fig. 2. The first row of the matrix indicates that there are 38 samples with Category attribute a, 30 of which are correctly classified and 8 of which are misjudged as B; the second row indicates that there are 36 samples with Category attribute B, 27 of which are correctly classified, 6 of which are misjudged as a and 3 of which are misjudged as C; the third row indicates that there are 26 samples with Category attribute C, 23 of which are correctly classified, 1 of which is misjudged as a and 2 of which are misjudged as B;

94

F. Mei

Fig. 2. Decision tree model based on weka-c4.5

The proportion of samples correctly classified is (30 + 27 + 23) / 100 = 80%. The larger the diagonal value is, the better the decision tree model is. Based on weka-id3 output fusion matrix, the accuracy is (30 + 24 + 17) / 100 = 71%. The accuracy rates of C4.5 and ID3 algorithm training samples are 80% and 71% respectively, so C4.5 algorithm can better provide decision support for us to explore the path to improve the teaching effect of practical courses [9]. In this paper, decision tree C5.0 algorithm is used in the experiment of curriculum relevance analysis in higher vocational colleges, which is easy to understand and widely used. It is superior to other classification methods in comprehensibility, easy training, easy implementation and generality. Decision tree algorithm can be applied to the decision analysis of continuous or discrete data. It can more clearly distinguish the importance of different attributes, reduce the amount of calculation, and generate criteria that are easy for conventional users to understand. The application of decision tree algorithm in the school performance management system can help colleges and universities complete information mining more efficiently and obtain the hidden data [10].

5 Conclusion This paper discusses the decision-making role of the conclusions of data mining in the recruitment of personnel department, and the decision-making support role of teaching managers in taking measures to improve the teaching level of teachers. In the process of experimental teaching quality evaluation in higher vocational colleges, it is necessary to establish the teaching evaluation system. At present, one of the decision tree methods is very mature in the application of teaching quality evaluation. Therefore, under the determination of evaluation methods, the mining and analysis of predictive data needs to realize the authenticity of teaching data, and then collate and prune the data, Determine the final value data, make the final preparation for the data analysis and the conclusion of teaching quality evaluation, and realize the optimization and upgrading of teaching quality. The evaluation of computer teaching quality should be a dynamic process, so for

Application of Decision Tree Algorithm in Teaching Quality

95

the substantive analysis of teaching, we need to make more data integration and analysis to ensure the authenticity and effectiveness of the results.

References 1. Wu, X.: Thoughts on optimizing the teaching quality evaluation system of pure practice course in Higher Vocational Colleges. J. Xiangyang Polytech. 1, 56–59 (2013) 2. Shuhui, S., Bangqi, L., Xin, L.: Data mining and learning analysis framework for smart classroom and its application Ding. China Audio Vis. Educ. 2, 59–66 (2018) 3. Yu, L., Yang, Q., Zhao, N.: Model driven education big data mining promotes teaching and learning 4. He, T., Wang, W.: Application of data mining in computer course performance analysis. Zhejiang Med. Educ. 16(5), 4–6 + 42 (2017) 5. Wang, J.: Decision tree C4_ 5 algorithm improvement and application. Xi’an University of Technology, Xi’an (2017) 6. Cui, J., Liang, F.: Strengthening teaching management and improving teaching quality. J. Univ. Petroleum (Soc. Sci. Edn.) (S1) (1996) 7. Lin, L.L.: Reflections on how to improve teaching quality in Higher Vocational Colleges. Sci. Technol. Inf. (29) (2018) 8. Wang, J.: Strengthening teaching management, improving teaching conditions, broadening the way of running a school and improving teaching quality. Vocat. Skill Training Teach. (05) (1997) 9. Zhang, L., Niu, Y.: Strengthening teaching management and improving teaching quality. Vocat. Educ. Newslett. (02) (1998) 10. Mobilizing the enthusiasm of teachers and students and improving teaching quality. Academic Affairs Department. Yangtze River Water Conservancy Education (03) (1991)

Application and Research of Artificial Intelligence Technology in Civil Architecture Teaching Ya Qin(B) Chongqing Vocational Institute of Engineer, Chongqing 400039, China [email protected]

Abstract. With the continuous improvement of artificial intelligence technology and the continuous change of facilities and equipment, the emerging technology of artificial intelligence has a qualitative development. Integrating information technology into classroom teaching has become a more common way in today’s education industry. In the future civil architecture design and construction, more and more intelligent technology will be used. However, the intelligent technology of civil architecture in China is still lack of integrity, and lags behind the developed countries in the core technology. The traditional way of teaching and learning develops to a new teaching mode, and then changes into students’ active intake of knowledge, which is more positive, thus greatly improving the quality of teaching. Keywords: Artificial intelligence technology · Civil architecture teaching · Application ability

1 Introduction In the first mock exam, the traditional teaching mode is a teaching mode centered on teachers, textbooks and classes. This model has achieved good results in a certain period. But with the change of times and the progress of ideas, the shortcomings of traditional teaching mode have been exposed. In this teaching mode, students are passively accepting knowledge and accepting a lot of knowledge in the whole teaching process. But it can not digest knowledge in time, which will greatly depress students’ enthusiasm and creativity in learning. Civil engineering takes the engineering design and construction of various buildings or structures as the research object [1]. The main task of the professional course is to learn through the course, so that most college students have the ability to choose, design the scheme and successfully carry out the construction management, and master solid civil engineering practice knowledge for the future work such as structural engineering design, engineering supervision and engineering contract control, It has the ability to solve the practical problems of engineering, and then improve the competitiveness of the students in this major [2]. With the rapid development of global engineering technology, the demand for talents in society is diversified. The practitioners should not only have solid theoretical knowledge, but also have strong technical © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 96–102, 2022. https://doi.org/10.1007/978-3-030-99581-2_12

Application and Research of Artificial Intelligence Technology

97

application ability, so as to meet the social needs. At present, the innovation ability of our engineers is relatively weak. There is a gap between the knowledge structure, ability structure, quality structure and post requirements of the students trained in the teaching of Civil Engineering Specialty in Colleges and universities. In the 21st century, the times have changed, and the traditional teaching mode is not suitable for the current education. Therefore, the reform of engineering education is imminent [3].

2 Teaching Research of Civil Architecture 2.1 Characteristics of Civil Engineering 1. It is very special, descriptive and statistically poor. 2. Comprehensive, the factors that influence many: structure, beauty, environment, social culture, psychology. 3. Complexity (most of the problems are nonlinear problems, the relationship between variables is complex), uncertainty (fuzziness and randomness). For example: seismic load, wave load, wind load, current load, discrete nature of materials, incomplete information (most of the project projects are single production, and poor statistical performance). Many practical problems are difficult to describe with exact mathematical and mechanical models. 4. Systematic, design, construction, use, maintenance is a system; The construction of large-scale system is also a system. It is increasingly important to manage with the help of computer and information technology. The above characteristics put forward higher requirements for the knowledge structure, innovation ability and working level of civil engineering talents. But at present, the talents trained in civil engineering major are still far from this requirement. 2.2 Status of Civil Engineering Professionals At present, the general situation of graduates in civil engineering majors is that they have certain theoretical level, but they are not able to apply design and construction standards to do well, but they are weak in design and construction: they can design under the condition of good certainty and information integrity, but have poor ability to deal with the uncertainty and information integrity; It has certain computing ability, but the qualitative analysis and conceptual design ability is insufficient (conceptual design is often the soul of civil engineering design): it has strong calculation and design ability in normal operation of civil engineering, while the design ability for construction, sudden disaster and vulnerability is poor.

3 The Support of Artificial Intelligence Technology to the Teaching Reform of Civil Construction 3.1 AR/VR Technology The application of ar/vr technology in civil architecture teaching can greatly increase the students’ learning fun and improve their learning innovation and self-study ability.

98

Y. Qin

Using ar/vr technology can let students learn some tasks that can not be completed independently. For example, when learning chemistry course through ar/vr technology, we can recognize the process of building technology in civil architecture through virtual scenes, and learn the energy generated by collision of planets through the scenes generated by this technology in physics course [4]. It is also easy to realize ar/vr application in civil architecture teaching. The real parameters are incorporated into the computer, and then the corresponding building scenes can be designed through ar/vr equipment. Through this learning method, students’ enthusiasm and interest can be greatly improved, which is different from the traditional teaching mode and the students passively accept knowledge, The use of this kind of autonomous learning method will greatly improve the quality and benefit of students’ learning [5]. The VR technology construction site education map is shown in Fig. 1 below.

Fig. 1. VR technology construction site education map

3.2 Computer Vision With the popularity of neural network and deep learning in recent years, many technologies have integrated algorithm technology and image processing technology. Computer vision can process image information and extract relevant information from image for analysis. Therefore, computer vision technology can be applied to the teaching of civil engineering and architecture, making full use of big data analysis to maximize the function of computer vision analysis technology [6]. The most feasible way to combine computer vision with the field of education is to enable students to extract and analyze the information in the image after seeing some educational images of civil engineering and architecture, and display the meaningful information, so as to mobilize students’ learning motivation. In addition, electronic textbooks can also be implemented to make the textbooks electronic, Students can identify the relevant chapters through the computer, extract and analyze the formulas, illustrations, English sentences through computer

Application and Research of Artificial Intelligence Technology

99

vision technology, so that learners can better understand the civil construction information, and make learners really become the main body in the learning process. Figure 2: virtual design of civil engineering buildings.

Fig. 2. Virtual civil engineering architectural design

4 Research on the Transformation of Teaching and Learning Methods by Artificial Intelligence Technology 4.1 The Transformation of Artificial Intelligence to Teaching Integrating artificial intelligence technology into the teaching process can better meet the level of modern education. The teaching mode has changed from the original two in one of teachers and learners to the three in one of teachers, learners and intelligent machines [7]. With the changes of the times, projector, computer, television and other teaching tools have gradually entered the classroom, and the classroom has gradually become information-based and technical. The intelligent machine can better assist the teaching process. Through the intelligent machine, teachers can release homework after class, preview content before class, correct homework, classroom teaching display, question answering and comprehensive evaluation, which can maximize the learning quality of

100

Y. Qin

learners and reduce the teaching burden of teachers [8]. This modern education mode can effectively improve the quality of teaching, can let teachers have more time for teaching design, teaching reflection. 4.2 The Transformation of Artificial Intelligence to Learning The introduction of artificial intelligence technology into the learning process can not only exercise students’ learning innovation initiative, but also greatly improve students’ learning enthusiasm. Combined with the existing modern educational equipment, it can provide learners with an information-based learning environment. Compared with the rigid learning method in the traditional learning process, Learners can learn their own interest courses in the highly information-based learning environment, study compulsory courses such as number of languages, add interest courses, and improve the learning breadth of learners. Secondly, learners can use intelligent machines to consolidate knowledge, sort out knowledge and answer questions [9]. At the same time, they can also use AR/VR devices to carry out some experiments that are not easy to show in the classroom and test in the virtual scene.

5 Research on the Transformation of Teaching and Learning Methods of Civil Architecture by Artificial Intelligence Technology 5.1 The Transformation of Artificial Intelligence to Civil Architecture Teaching Integrating artificial intelligence technology into the teaching process of civil engineering and architecture can better meet the level of modern education. The teaching mode has changed from the original two in one of teachers and learners to the three in one of teachers, learners and intelligent machines. With the changes of the times, projector, computer, television and other teaching tools have gradually entered the classroom, and the classroom has gradually become information-based and technical. The intelligent machine can better assist the teaching process. Through the intelligent machine, teachers can release homework after class, preview content before class, correct homework, classroom teaching display, question answering and comprehensive evaluation, which can maximize the learning quality of learners and reduce the teaching burden of teachers. This modern education mode can effectively improve the quality of teaching, can let teachers have more time for teaching design, teaching reflection. 5.2 The Transformation of Artificial Intelligence to Civil Architecture Learning The introduction of artificial intelligence technology into the learning process of civil engineering and architecture can not only exercise students’ learning innovation initiative, but also greatly improve students’ learning enthusiasm. Combined with the existing modern education equipment, it can provide learners with an information-based learning environment. Compared with the rigid learning mode in the traditional learning process,

Application and Research of Artificial Intelligence Technology

101

Learners can learn their own interest courses in the highly information-based learning environment, study compulsory courses such as number of languages, add interest courses, and improve the learning breadth of learners. Secondly, learners can use intelligent machines to consolidate knowledge, sort out knowledge and answer questions [10]. At the same time, they can also use AR/VR devices to carry out some experiments that are not easy to show in the classroom and test in the virtual scene. 5.3 Real Case Simulation Teaching Method The actual case teaching course can provide practical engineering education for the graduating class. In teaching, the application of multimedia classroom for example teaching [4], the use of vivid pictures, can cultivate students’ interest in learning, improve students’ perceptual knowledge of some practical problems. Especially for the engineering survey, engineering test, structure detection, road detection and bridge detection and other aspects that are not touched in the process of practice, or the current school experimental conditions do not have the test detection project, can be demonstrated through multimedia. For the engineering design, engineering construction new technology and new technology, found common technical problems and solve common technical problems, the school gives project approval, organizes some teachers to go deep into the engineering practice, records the whole process of the project, adopts integrated image teaching materials to play to students, and teachers cooperate with lectures, so that students can master the whole process of construction technology.

6 Conclusion Artificial intelligence technology civil construction technology has become an indispensable demand in China. It is widely used and closely related to our life. It can create a good working and living environment for us and realize the modernization of all kinds of buildings. Urban intelligent civil construction also needs the support and help of urban comprehensive construction, Therefore, it is urgent to Cultivate Civil Engineering application-oriented talents by using artificial intelligence technology. In the teaching reform of civil engineering specialty, it is necessary to closely integrate with the engineering practice, constantly improve the curriculum system and practice teaching content of civil engineering specialty, and cultivate application-oriented talents who can become the applicators, practitioners and implementers of modern science and technology knowledge.

References 1. Hua, L.: Research on artificial intelligence promoting teaching reform. Jiangsu Normal University (2018) 2. Li, Z., Zhou, D., Liu, N., Ou, Y.: Research on educational artificial intelligence under the background of artificial intelligence application. Mod. Educ. Technol. 28(09), 19–25 (2018) 3. Li, Q.: Application of project teaching method in curriculum teaching. Educ. Explor. (2008) 4. Yan, X.: Introduction to Civil Engineering. People’s Communications Press (2005)

102

Y. Qin

5. Lei, H.: Discussion on construction supervision of building envelope energy saving engineering. Guangxi Urban Constr. (08) (2011) 6. Dan, W.: Research on teaching reform of housing architecture. Theor. Res. Pract. Innov. Entrepreneurship (04) (2021) 7. Guo, Q.: Teaching reform and practice of building architecture based on new engineering construction. Neijiang Sci. Technol. (07) (2021) 8. Li, D.: Exploration on the full English teaching of housing architecture for foreign students under the background of internationalization. Green Technol. (15) (2021) 9. Chen, Y.: Exploration and practice of teaching reform of housing architecture. Sci. Technol. Vis. (36) (2019) 10. Wang, H.: Course design and teaching of “housing architecture”. Agric. Staff (05) (2020)

Application of Random Simulation Algorithm in Physical Education Teaching Evaluation Jianan Li(B) Dongguan Nanbo Vocational and Technical School, Dongguan 523083, China [email protected]

Abstract. On the basis of the traditional teaching, through the combination and application of the current network technology, the space and time are finally broken through in the traditional classroom. This is the so-called network course teaching, which can make the modern education needs more effectively met. With the continuous development of network course teaching, it has attracted the attention of many scholars, and the research on network course teaching has become more and more extensive, more and more in-depth. However, in the process of the continuous development of network course teaching, there are some problems, and in the network course teaching, cloud computing is introduced. According to the collaborative filtering algorithm, these problems can be effectively improved. This paper introduces the application of network course platform based on cloud computing in physical education teaching for your reference. Keywords: Cloud computing · Collaborative filtering algorithm · Physical education · Network platform

1 Introduction So far, the concept of cloud computing network teaching has not been determined. The author gives a general concept with the help of literature search, expert inquiry and other ways. Network teaching is a new teaching mode that unifies network technology and cloud computing technology. It is based on cloud computing network technology to introduce multimedia technology, and makes the dull classroom interesting by means of pictures, audio, video and other means Vivid, promote the improvement of interactive teaching form [1]. Combined with the emergence of cloud computing and the development of Internet technology, multimedia network teaching is the third generation of distance education. In fact, the network teaching based on cloud computing is the inevitable outcome of the development of Internet technology and multimedia technology. Ding Xingfu, a domestic expert, systematically sorted out the three generations of distance education, three generations of information technology and three generations of major media [2]. Compared with other subjects, physical education is also an educational activity, which requires the interaction between teachers and students. Teachers play a role of © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 103–108, 2022. https://doi.org/10.1007/978-3-030-99581-2_13

104

J. Li

guidance, and students are the main body of targeted and targeted learning of knowledge or skills. However, physical education also has other characteristics, that is, physical activity class is based on the thinking of teachers and students, through physical exercise to achieve the purpose of spreading knowledge and skills. According to the characteristics, it can effectively use multimedia technology to play the advantages of network teaching, break the limitations of traditional teaching, promote the network of physical education teaching, and establish a mature multimedia network teaching mode [3]. The multimedia network teaching of college physical education consists of the following elements.

2 The Composition of Cloud Computing Network Teaching in College Physical Education Compared with other subjects, physical education is also an educational activity, which requires the interaction between teachers and students. Teachers play a role of guidance, and students are the main body of targeted and targeted learning of knowledge or skills. However, physical education also has other characteristics, that is, physical activity class is based on the thinking of teachers and students, through physical exercise to achieve the purpose of spreading knowledge and skills. According to the characteristics, it can effectively use cloud computing technology to play the advantages of network teaching, break the limitations of traditional teaching, promote the network of physical education, and establish a mature cloud computing network teaching mode. The multimedia network teaching of college physical education consists of the following elements. The purpose of teaching, all teaching is based on the purpose of teaching, network teaching is no exception, but also to achieve the purpose of education, which is also the development direction of college sports cloud computing network platform. Combined with the policy and policy formulated by the Ministry of education at present, the purpose of physical education in Colleges and universities is to spread the knowledge of physical exercise, sports skills and health care, encourage students to strengthen their physical fitness and improve their physical quality through sports, so as to form a persistent sports spirit [4]. Of course, this purpose is of great significance in the implementation of cloud computing network teaching. The basic network environment is an important condition for the development of college sports cloud computing network teaching, and the implementation of network teaching is directly affected by LAN, campus network and hardware support. Compared with the original physical education teaching mode, the stable network environment is an important guarantee for the implementation of physical education network teaching. To some extent, it shows the unique features of the network teaching mode. The relationship between man and machine, the relationship between man and machine is the core component of college physical education network teaching, the former refers to physical education teachers and students, the latter refers to hardware equipment or software equipment, the relationship between man and machine is divided into teacher-student relationship, teacher-student relationship and network relationship [5]. In cloud computing network teaching, teachers, students and computers form a special triangle relationship. In this teaching mode, teachers and students interact with each

Application of Random Simulation Algorithm

105

other through the media of network. Compared with the traditional teaching mode, it is no longer a face-to-face teaching form for teachers and students. Physical education teachers transfer course materials to the teaching platform through the network, and students only need to browse the web page for online course learning [6]. In addition, different regions, colleges and universities, and PE teachers have different ways of understanding and explaining the same professional theory, but at the same time, they transmit the course content to the server, so that students have a variety of teaching styles to choose from, so as to strengthen the understanding of physical education knowledge of college students.

3 The Application of Collaborative Filtering Algorithm in Recommendation Network Course Platform Different from content-based recommendation, collaborative filtering recommendation network system courses predict the effectiveness of the project to a specific user based on other users’ ratings of the project. That is to say, the utility function U (C, s) of item s to user C is estimated by the utility function U (ry, s) of user C; similar to user C. For example, in the application of course recommendation system, in order to recommend physical education courses to user C, collaborative filtering recommendation method first finds the neighbor of user C (other users who have similar courses with user C), and then recommends the courses his classmates like to user C. The algorithms of collaborative filtering recommendation system can be divided into two categories: memory based algorithm and model-based algorithm [7]. Among them, the memory based algorithm predicts the new score according to the user’s historical score set, so it is heuristic. That is, user C scores item s R., is unknown, then R., you can summarize the scores of other users for item s, as shown in formula (1). rcs = affrrrcs

(1)

Where, f is the set of N users that are most similar to user C and have rated item s. 1  rcs c1 ∈C 1 N    1 rcs = K xrcs sim c, C 1 1 rcs =

c ∈C

(2) (3)

In the collaborative filtering recommendation system, there are many methods to calculate the similarity between users sim (C, c), most of which use two users to calculate the common score of the project. With the reduction of system terminal requirements, learners can learn more easily. All service resources are distributed in the cloud in cloud computing. Therefore, users with only one browser can access and use resources according to their own needs, so that they can liberate users in high-performance PC. In addition, reducing the starting point of port access can make learners’ learning needs more fully satisfied, so that learners basically get rid of the shackles of the device. Effective integration of teaching resources to promote the realization of resource sharing because some areas are affected by various

106

J. Li

factors such as server quality, broadband speed, network equipment and geographical location, so it can not fully share the existing teaching resources on the network, so it is difficult to improve the quality of education. Cloud computing can effectively integrate the developed teaching resources and promote the realization of resource sharing [8].

4 The Implementation of Network Course Platform Based on Cloud Computing in Physical Education Teaching In order to enable the learners to obtain a very satisfactory learning effect in the physical education learning of the network course, it is necessary to reasonably organize and design the physical education teaching resources in the network course, so as to ensure the learners to carry out effective learning in the orderly and scientific physical education learning activities. The traditional network course has the disadvantages of high development cost and too static. Once the content of the traditional network course is developed, it is difficult to change it. Nowadays, the speed of people’s knowledge updating and the pace of life are becoming faster and faster, so it is urgent to support learners’ personalized sports learning in online courses. In addition, the learning content of the network course also has the shortcomings of fragmentation and miniaturization. In the network course platform based on cloud I computing, when it is designed for the physical education course, it adopts the form of special subject to organize the physical education course effectively, and at the same time, it can also divide the physical education subject according to the specific and reliable operation subject form. Before the enterprise curriculum learning, we can first tell the learners the design concept of physical education curriculum, so that students can effectively participate in their own curriculum construction, and can have a very strong interest in learning physical education curriculum, and consciously build physical education curriculum, so as to maximize the physical education curriculum to meet the learning needs of learners [9]. For the effective organization of physical education curriculum, after the design of the theme of physical education curriculum, then the learning activities of physical education curriculum should be closely around the theme, well and through the use of collaborative learning to carry out the theme learning activities. At the same time, the ability of autonomous learning must be emphasized when cooperative learning is carried out. Organizing learning resources, the learning resources of physical education curriculum mainly include these two parts, that is, the related resources of subject learning activities and the related resources of physical education curriculum learning activities. At present, there are quite rich learning resources in the network physical education course, which naturally include some very high-quality resources. However, these resources are effectively integrated in the learning process of physical education course, so as to serve the learning of this course well [10]. Topic learning activity resources include not only the resources already existing in the network, but also the resources created by learners through the use of services in the suite. For example, some learning sites, learning calendars, learning documents and other resources play a very critical role, which can not only effectively reflect the growth and thinking of learners in the learning process, but also dynamically generate some resources when learners use these

Application of Random Simulation Algorithm

107

resources, Through the use of these dynamic resources can play an effective role in improving and enriching the learning activities of learners. Organizing learning activities, when organizing for sports learning activities, can be based on the tasks assigned by each person, so that each person can carry out independent learning. In this learning process, learning members should work out their own learning plans, and make reasonable arrangements for individual sports learning activities to keep the learning process consistent with the collective teaching progress. Finally, it is necessary to summarize and summarize all members’ sports learning activities, and form the learning report. In the process of learning activities, if there is any question, the sports learners can post in the sports learning forum, and the rest of the members can use the way of post, and finally form a good atmosphere of cooperation and communication. Once one of the learners discovers the high-quality learning resources, they can use the way of adding links to share with other sports learning [11]. At the same time, they can also share their learning experience with other members in the process of sports learning, so that they can exchange their growth, confusion and feelings in the process of sports learning.

5 Conclusions Based on the analysis of network courses, this paper introduces cloud computing into the teaching of network courses through the effective use of cloud computing, so that cloud computing can inject more energy into network courses, so that under the support of cloud computing technology, we can carry out the sports teaching activities in network courses.

References 1. Yan, T.: Research on the teaching of general volleyball course for Physical Education Majors in Gansu Province based on multimedia platform. Northwest Normal University (2013) 2. Jin, J.: Application analysis of computer technology in College Physical Education. Autom. Instrum. (10) (2015) 3. Ding, L.: The application of multimedia in physical education from the perspective of communication. Wuhan Institute Phys. Educ. (2012) 4. Yin, Y.: Distributed Minimum Spanning Tree Algorithm in Social Network Analysis Tools. Beijing University of Posts and Telecommunications, Beijing (2011) 5. Hao, S.: Methods of collecting evaluation information for physical education teaching evaluation. J. Luliang Institute Educ. (01) (2012) 6. Hu, Y., Zhou, D., Wu, S.: Research on evaluation index system of effective physical education. J. Beijing Univ. Phys. Educ. (08) (2011) 7. Zhao, J.: Research on college students’ horizon of expectation and countermeasures of college physical education teaching evaluation. J. Changchun Univ. Technol. (High. Educ. Edn.) (04) (2008) 8. Wu, X.: Research on the reform and development of physical education teaching evaluation in colleges and universities since the founding of the People’s Republic of China. J. Henan Vocat. Tech. Normal Univ. (Vocat. Educ. Edn) (02) (2007) 9. Li, Y.: On the problems of physical education teaching evaluation in Colleges and universities. J. Beijing Univ. Phys. Educ. (S1) (2007)

108

J. Li

10. Zhang, J., Yang, T.: Reform of contemporary American Physical Education teaching evaluation. J. Tianjin Institute Phys. Educ. (01) (2002) 11. Li, G.: Current situation and reform trend of physical education teaching evaluation. Contemp. Phys. Educ. Technol. (34) (2015)

Contribution of Block Link to Issues in SME Financing Bai Yan(B) Xijing University, Xi’an 710123, Shaanxi, China [email protected]

Abstract. The block link technology has become the key to solve the financing problem, and has far-reaching impact on the long-term development of SMEs. In this study, this paper analyzes the background of SME financing difficulties and contributes to the block link technology and its response strategy, hoping to provide reference for solving the financing difficulties of related enterprises. Keywords: SMEs · Financing · Block links

1 Introduction improve the level of industrial chain and supply chain modernization, promote the new pattern of double circular economy, is the important strategic goal of China’s economic and social development, in 2019, the meeting of the Political Bureau of the CPC Central Committee collective learning meeting, xi general secretary clearly put forward: block link technology has extended to digital assets, digital finance and many other fields, has a far-reaching impact [1]. Therefore, in the current financial market, in view of the financing difficulties faced by small and medium-sized enterprises, relevant scholars need to realize the impact of block links and explore new work paths, which is also the main purpose of this research.

2 Financing Problems of Small and Medium-Sized Enterprises On the whole, small and medium-sized enterprises face many problems in financing, attention: (1) from the perspective of enterprise internal structure, small and mediumsized enterprises, so will use most of the funds in production, enterprise investment in fixed assets, difficult to provide qualified products for financing guarantee, the overall risk resistance is insufficient, unable to meet the lending requirements of financial institutions. Table 1 introduces the current common financing methods, but from the data of Table 1, there are still some defects in various common financing methods.In view of this problem, enterprises can only choose appropriate institutions to guarantee loans, but because of the weak strength of the enterprise itself, the loans obtained also have a short repayment period and high guarantee costs, leading to the enterprise to face higher financial pressure. For financial institutions, its own commercial nature determines that © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 109–113, 2022. https://doi.org/10.1007/978-3-030-99581-2_14

110

B. Yan Table 1. Financing methods of SMEs

Financing method

Specific content

Features

Credit loan

Financial institutions issue loans according to the credit of the enterprise, during which they need to understand the financial and management level of the enterprise

The examination of the enterprise qualification is relatively strict, requiring the enterprise to have a good reputation

Mortgage loans

Enterprises need to provide collateral as a guarantee for repayment

Complex procedures and long audit time

Private financing

Financial support through financial organizations outside of financial institutions

Simple, flexible procedures, but higher interest rates and costs

Business credit

Use commercial credit to improve Convenient and quick, but a capital utilization by delaying short-term financing payment and other methods through cooperation with upstream and downstream companies

enterprises must take profits as the focus of work. In the face of many lending methods, financial enterprises need to consider their own economic benefits, possible risks and other factors to ensure that enterprises can obtain more economic benefits in financial behavior. For this reasons, financial institutions give priority to working with reputable and strong enterprises [2]. At present, there are many cases of non-performing loans for small and medium-sized enterprises in China, and financial institutions may face the problems of bad debt after making loans. In order to avoid the damage to their rights and interests, the enthusiasm of financial institutions to lend to small and medium-sized enterprises has been further reduced [3]. (3) From the perspective of social environment, the national policy support for the financing of small and medium-sized enterprises still has some deficiencies, coupled with the irregular supervision method and supervision mechanism will further increase the difficulty of enterprise financing.

3 Analysis of the Contribution of 2. Block Link to SME Financing 3.1 Block Link Perfectly Meets the Financing Requirements of SMEs According to the relevant content of the Evaluation Rules of Financial Application of Block Link Technology, the block link is actually an effective method of being jointly maintained by various parties, ensuring data security through cryptography, and realizing effective data storage and credit prevention. As a new technology means, it can adapt to long processes, multi-subject, and high-value scenarios. From the existing application experience, block link technology has effectively solved the shortage of traditional technology, can adapt to the large-scale market environment, long economic chain and the joint participation of various subjects, in line with the development characteristics

Contribution of Block Link to Issues in SME Financing

111

of small and medium-sized enterprises, make block link finance an important part to enhance the vitality of block economic development. For relevant enterprises, it can also use the role of “cost reduction and efficiency increase” of block link technology to explore new development models, and finally improve the internal management structure and improve the management level, which is of great significance to enhancing the financing ability of enterprises [4]. At the same time, because the block link data itself can not tamper with, data traceability, can effectively solve the current small and medium-sized enterprises in the credit risk financial market, for financial institutions, the emergence of block link can help institutions more effectively evaluate the specific situation of small and medium-sized enterprises, eventually for good momentum of enterprises to provide financing support. Some scholars also believe that block link technology can provide an open and transparent financial environment, reduces tentative transaction behavior, ensure that both parties can achieve full communication between financial activities, then reduce cooperation costs and promote the reshaping of business model [5]. 3.2 Block Link Can Realize the Multi-level Circulation of Enterprise Credit Block links have obvious decentralized characteristics, which determines that small and medium-sized enterprises can participate in financial activities more flexibly in the block link mode. For example, the registration and certification of centralized institutions can not be needed to realize the “universal certification” in the accounts payable, which ensures the transmission effect of all kinds of information in financial activities [6]. And this “certification” change, make enterprises at all levels can further clarify their debt and debt relationship, and form an electronic voucher, and complete on the block link confirmation, circulation and split a series of behavior, through the block link consensus trust mechanism, can be formed under the unified algorithm of “machine trust” mechanism, to ensure that accounts payable electronic leveling can spread widely within the block link, this process helps to spread enterprise credit, improve the recognition of financial institutions to small and medium-sized enterprises. In addition, thanks to this advantage of block link, all small and medium-sized enterprises and their corresponding financial institutions can be split based on the real trade scenario. At this time, the enterprise financial information obtained is more detailed, and the difficulty of applying for financing among financial enterprises will be further reduced. Therefore, it can be believed that under the block link environment, small and medium-sized enterprises can obtain the necessary credit guarantee to ensure that financial institutions “dare to borrow” and “willing to borrow” to small and medium-sized enterprises, and finally solve the problem of financing difficulties. 3.3 Block Link is the Key to Reduce Financing Costs and Improve Financing Feasibility In the traditional supply chain financing link, financial institutions need to take a series of complex evaluation of small and medium-sized enterprises, and also need after loan management to check the value and state of mortgage goods, in this link need to produce a lot of human capital investment, operating cost, and the increase of such operating costs will also be transferred to small and medium-sized enterprises, financing costs rapidly.

112

B. Yan

In view of this problem, the block link introduces the intelligent contract mechanism on the basis of the original technology, and adopting the advantage of distributed ledger can reduce the capital and cost investment in the process of financial services, which is an important link to realize intelligent financing [7]. On the block link, small and medium-sized enterprises, enterprise suppliers, financial institutions, storage companies can realize data sharing on the platform, each link on the chain can consult at any time, relying on the advantages of traceability, can improve the operation effect of the supply chain, ensure the operation efficiency, can eventually help to reduce the cost of enterprise financing. In addition, through the block link “point-to-point” dynamic network mode, can deploy financial data to the form of block link, finally the financial contract collection can spread to the network in a short time, to ensure the self-financing of enterprises, in the open financial environment, the transfer and split of multiple financial scenarios, which is an important part of the financing security and availability.

4 Application Countermeasures of SME Financing in 3. Block Link Technology 4.1 Government-Level Support As an important link of the future financial system, block link technology is an important part of government departments to guide the development of financial industry and of small and medium-sized enterprises. In this case, in order to make block link technology play a more role in financing small and medium-sized enterprises, we need to give full play to the functions of government departments, and improve legal supervision, scientific and technological support and other methods. Among them, in terms of legal supervision, it is necessary for government departments to improve the digital financial risk supervision by improving laws and regulations, realize the self-discipline of the financial industry through the function of law, finally improve the technical level of blockchain, and finally more effectively prevent risks [8]. At the same time, in the process of block link management, government departments can adhere to the block link management with node inlay, use data tools to emphasize the data supervision through data analysis, and improve the effect of data processing [3]. In addition, for the low physical performance of block link, government departments can guide research institutions and market departments for technological innovation and development, especially the information processing capacity of the peak trading volume in the process of financial financing, to ensure the financing effect. 4.2 Financial Institution Strategy Under the block link technology, the financial structure is in a special position, in order to adapt to this feature, this paper believes that financial institutions can improve from the following aspects: (1) set up special service inclusive financial commercial bank, clear the business and responsibilities; (2) will build SMEs into an important carrier of inclusive financial development, strive to highlight the essential advantages of SME

Contribution of Block Link to Issues in SME Financing

113

financial services at the business level; (3) all qualified financial institutions should actively connect to blockchain, can better serve SMEs. In addition, financial enterprises can pay attention to product innovation, can start with the needs of small and mediumsized enterprises, can provide personalized products for enterprises, and improve the level of service [9]. 4.3 Enterprise-Level Countermeasures For small and medium-sized enterprises, we should actively guide small and mediumsized enterprises to carry out information and digital construction, and adhere to the methods to ensure information smooth and transparency through block links. At the same time, in the internal management, small and medium-sized enterprises also need to innovate and improve, such as establishing and sound financial constraints and financial management mechanism, adhere to a good internal control system, through the introduction of quality financial talents, provide necessary human resources support, to better adapt to the new environment of blockchain, promote talent and timely reasonable cooperation, strengthen the external financing level, so as to further improve the financing effect [10]. Conclusion: block link technology plays an important role in the financing of small and medium-sized enterprises, become an important part of improving enterprise financing ability, therefore, for the relevant personnel, need to correctly realize the advantages of block link technology, can on the basis of the existing internal management technology innovation and development, so as to better adapt to the future development requirements, become the source to solve the problem of enterprise financing.

References 1. Li, X., Deng, Y., Cui, X., et al.: Innovation research on guangdong small and medium-sized enterprises financing platform under big data. Technol. Ind. 21(05), 185–190 (2021) 2. Chen, H., Wang, W.: The significance of the digital currency application scene in solving the financing problem of SMEs. Mod. Bus. 13, 111–113 (2021) 3. Han, B.Q.: Takes Zhejiang Province as an example. Economist (05), 283 + 285 (2021) 4. Liu, Q.: Research on risk control of small and medium-sized enterprises. Chin. Chief Acc. (06) (2018) 5. Du, K.: Research on accounting security and risk control of small and medium-sized enterprises under the background of accounting informatization. Contemp. Acc. (07) (2019) 6. Miao, Z., Yuan, Y., Ye, Q., Zhong, Z., Pan, Y.: Private financing risk control of small and medium-sized enterprises in Zhejiang Province. Coop. Econ. Sci. Technol. (04) (2016) 7. Zhao, X.: On the position, role and risk control of government led financing guarantee institutions in the financing of small and medium-sized enterprises. Econ. Manag. Abstract (19) (2020) 8. Sun, G.: Suggestions on strengthening training on epidemic risk control of enterprise resumption. J. Taiyuan City Vocat. Tech. Coll. (03) (2020) 9. Su, J.: Research on evaluation and control of financial risk of small and medium-sized enterprises. Acc. Learn. (03) (2019) 10. Zhang, Z.: Countermeasures for risk control of small and medium-sized enterprises. Chin. Small Medium-Sized Enterprises (07) (2020)

Application of Genetic Algorithm in Evolutionary Music Lingqiong Zeng(B) Jiangxi Teachers College, Yingtan 335000, Jiangxi, China [email protected]

Abstract. In recent years, evolutionary computing has been gradually applied in the field of music creation. Based on the analysis of music coding and genetic operation, genetic algorithm is applied to music creation, so that the computer can automatically complete the composition, and finally realize the evolutionary music operation by optimizing the way of crossover. Keywords: Genetic algorithm · Evolution · Music

1 Introduction At present, many music composition systems are based on interaction, because for the creation of arts such as music and art appreciation and composition, interactive operation is conducive to reflecting people’s subjective feelings and making music more vital. For example, Aladdin. Ayesh and Andrew hugill’s system using EMFA algorithm„ The evolution system of jazz style music based on genetic algorithm proposed by George Papadopoulos and Geraint Wiggins, and the composition system based on interactive genetic algorithm proposed by muneyuki unehara and Takehisa onisawa can reflect users’ subjective feelings [1]. However, for the computer composing system, we should consider how to produce more musical segments and more diversified music. Moreover, the interactive composing system needs a lot of users’ participation, which will undoubtedly add a lot of workload to users [2]. One of the purposes of the design of computer composing system is to make the computer imitate the composer to automatically generate the ideal music.

2 Genetic Algorithm 2.1 Principle of Genetic Algorithm As an important branch of evolutionary computation (EC), genetic algorithm (GA) has been paid more and more attention in recent years, and has been widely used in engineering. Different from the traditional search algorithm, genetic algorithm starts the search process from the initial solution randomly generated by - group, which is called population. Each individual in a population is a solution of the problem, called a chromosome. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 114–120, 2022. https://doi.org/10.1007/978-3-030-99581-2_15

Application of Genetic Algorithm in Evolutionary Music

115

These chromosomes evolve in subsequent iterations, which is called heredity. Genetic algorithm is mainly realized by crossover, mutation and selection. Crossover or mutation operations generate the next generation of chromosomes, known as offspring. The quality of chromosomes is measured by fitness. According to the size of fitness, a certain number of individuals are selected from the previous generation and offspring as the next generation population, and then continue to evolve [3]. After several generations, the algorithm converges to the best chromosome, which is likely to be the optimal or suboptimal solution of the problem. The concept of fitness is used in genetic algorithm to measure the degree of excellence that each individual in the population is likely to reach the optimal solution in the optimization calculation [4]. The function that measures individual fitness is called fitness function. The definition of fitness function is generally related to solving specific problems. The steps of basic genetic algorithm are described in Fig. 1.

Fig. 1. Flow chart of basic genetic algorithm

2.2 Convergence Analysis of Genetic Algorithm The convergence of the algorithm can be defined as follows: if the population xt of the algorithm at time t satisfies: lim Xt = X0 , X0 ∈ X

t→∞

Then, the convergence of the algorithm is called x 0 . for the convergence of genetic algorithm, Michalewicz proves the convergence theorem based on the principle of compression. Rudolph proved the convergence theorem based on Markov chain.

116

L. Zeng

3 Music Creation and Music Evolution 3.1 Music Creation The beautiful melody of music can bring people’s spiritual pleasure. Music creation is the main content of composers’ creation. Creating beautiful music with musical beauty is a complex spiritual production process. At present, many scientific and technological elements have been added to music creation, including electronic musical instruments, digital music and electronic music composition. Among them, the most representative is computer composition, which liberates composers from traditional music creation, thus promoting the change of musicians’ creation mode. Through computers, digital equipment, audio equipment, etc., The transformation of traditional music composition into digital music generation has greatly expanded musicians’ creative ability and technological innovation [5]. In the creation of music, it is inseparable from such elements as the name, syllable, speed, interval, and so on. At the same time, it should be expressed through the corresponding forms, such as rhythm, melody, harmony, mode and so on. The reasonable arrangement of music elements is the key to creating wonderful music. How to give full play to the combination of different elements through the corresponding forms of expression and transform them into digital scores is the main task of evolutionary music and the key to solving the problem [6]. This requires evolutionary computing as the technical support for computer music creation. 3.2 Evolution Music On the basis of evolutionary algorithm, evolutionary music combines musicology, biology, computer science and emotionalism through interdisciplinary, so as to realize the coordination and fusion of music elements and achieve the effect of computer automatic music composition. In this process, it has been applied to the knowledge and technology of evolutionary computing and artificial intelligence. Before that, it has been applied to music research by using expert system and theory. With the development of science and technology, it gradually began to use computer to evolve. It has been proved that the technology of music creation and the realization of music creation system from different ways are accurate. Evolutionary computing is inspired from natural, combined with the process characteristics of biological evolution, through a series of crossover, mutation, genetic, to generate new problem solutions, after optimization to generate the maximum fitness to solve the problem, and combined with computer technology to achieve the optimal solution.

4 Evolutionary Music Synthesis Coding and Genetic Mutation Operator 4.1 Music Code In the current digital music files, the common sound formats include MIDI, mp4. WAV, etc., and there are also some unusual formats, such as AAC, AIFF, Au and other music

Application of Genetic Algorithm in Evolutionary Music

117

formats, which may adopt different frequency, channel number, tone, bit rate, etc. so relevant encoding and decoding mechanism is needed to solve this problem, Different music codes are involved in the creation of music by evolutionary computing [3]. The most common encoding forms are binary coding, tree coding, decimal coding, dynamic coding, etc. binary coding is to map the problem solution by using 0, 1 binary numbers, and form the binary bit string decoding value by some appropriate calculation through the relevant mutation and genetic operation. In tree coding, the tree structure is formed by numbers or symbols to represent each gene element. Symbols can be expressed by function or command. When solving problems of evolutionary programming, tree coding is more common, and the operation of crossover and mutation operators is relatively easy to implement. Decimal coding is to increase the search ability of genetic algorithm by obtaining heuristic information, and carry out direct genetic operation on the value [7]. By using the coding characteristics of decimal system and certain genetic variation operation, many values are optimized to improve the average efficiency of the algorithm. Dynamic coding is to reduce the search area when it converges to local region to achieve the optimal search area by increasing the accuracy of search. 4.2 Genetic Operators and Genetic Operations Genetic algorithm is based on biological evolution, simulating natural selection and natural inheritance in biological world, and obtaining the optimal solution by random search and mutation. Generally, there are three common types of operators in genetic algorithm, namely, selection operator, crossover operator and mutation operator. Among them, crossover and mutation are the most basic operators, and their advantages and disadvantages determine the quality of genetic algorithm to some extent, which plays a key role. At the same time, there are many types of crossover operators. According to different types and corresponding implementation methods of operators, there are mainly single intersection operators, two intersection operators, multi intersection operators and uniform intersection operators. These operators can keep the excellent individuals of the original group, and at the same time, we can get new gene space through optimization algorithm, So crossover operator is very important to genetic algorithm [8]. Mutation operator is to change gene value in population, and to alienate individual gene value of some individuals, that is, to realize mutation by 0, 1 flip. It can be realized by two steps: first, determine gene position randomly in the population, and then set mutation probability to operate on mutation. The efficiency improvement of genetic algorithm is realized by changing the random search ability of genetic algorithm by mutation operator and simulating genetic variation of biological evolution. In mutation operation, each operator of mutation corresponds to corresponding gene, and corresponds to code value with probability change to realize local extreme value minimum [9]. For music coding, music elements can be coded separately, The basic elements of music composition mainly involve the elements of notes, intervals, frequencies, etc. the corresponding application forms are note coding, pitch code and frequency coding [10].

118

L. Zeng

5 Evolutionary Music Algorithm Based on Genetic Algorithm 5.1 Steps of Genetic Algorithm The key of genetic algorithm is how to evaluate individual and optimal solution through evaluation function, which is also the main basis of genetic operation. In general, a new mutation population is formed by mapping the appropriate function value with a certain probability through multiple iterations. (1) The adaptive function is constructed, the corresponding coding strategy is determined, and the parameter set X and field are transformed to obtain the bit string structure space S; (2) F (x) is defined as fitness function to encode the solution of the optimization problem, and the corresponding genes constitute coding elements; (3) The optimization strategy is determined, in which n is the population size, Pc is the crossover probability, Pm is the mutation probability and other genetic parameters, and selection, crossover and mutation methods are used; (4) The initialization of the population, which is randomly generated by initialization, is represented by P; (5) The fitness value f (x) is calculated, which represents the decoded value of individual position strings in the population; (6) According to the evolutionary strategy, through selection, crossover and mutation operators acting on the population, after each round of genetic operation, the mutation is eugenic solution, as a new population. After the above steps of iteration, judge whether the new group meets the optimization conditions, otherwise continue to optimize according to the optimization strategy until the number of iterations is used up. 5.2 Steps of Genetic Algorithm Composition Evolutionary music can be realized by genetic algorithm, and its corresponding evolutionary steps are shown in Fig. 2.

Application of Genetic Algorithm in Evolutionary Music

119

Fig. 2. Operation flow chart of composition based on genetic algorithm

6 Conclusion The application of genetic algorithm to evolutionary music is a new exploration in the application of artificial intelligence. The core of evolutionary music algorithm is the genetic optimization algorithm obtained by simulating biological evolution, which realizes the digitization of music through computer automatic music composition. This paper proposes a simple and feasible evolutionary music algorithm based on genetic algorithm, which can automatically compose music by machine, but there are still some problems to be solved, such as the selection of evolutionary music elements, writing corresponding operators to automatically evaluate evolutionary music and so on. Acknowledgements. Provincial subject of teaching reform in Jiangxi Province in 2020. JXJG—20—47—4. Research on College “Music+” Aesthetic Education Teaching.

References 1. Liu, K., Kang, L., Zhao, Z.: A brief report on the branch of cognitive evolutionary computing. Comput. Sci. 36(7) (2009) 2. Li, M., Kou, J.: Basic Theory and Application of Genetic Algorithm. Science Press, Beijing (2002)

120

L. Zeng

3. Zhang, Z.: Research and application of genetic algorithm. Master thesis of Guizhou University (2003) 4. Aladdin, A., Andrew, H.: Genetic approaches for evolving form in musical composition. (453–228 ) Artif. Intell. Appl., 318–321 (2005) 5. Yao, P.: Weight learning in weighted ELM classification model based on genetic algorithm. Shenzhen University (2018) 6. Chen, X.: Research and application of comprehensive planning of laboratory equipment based on genetic algorithm. Shanghai Jiaotong University (2017) 7. Cao, Q.: Research on neutron shielding optimization strategy based on genetic algorithm. Nanhua University (2019) 8. Yang, T.: Research on workshop layout optimization of CR company based on SLP and genetic algorithm. Beijing Jiaotong University (2019) 9. Shen, G.: Research on furniture production scheduling based on genetic algorithm. Central South University of Forestry Science and Technology (2019) 10. Wu, J.: Research on Optimization of train speed curve based on heuristic genetic algorithm. Jiangxi University of Technology (2019)

Research and Design of Automatic Piano Accompaniment System Based on Sound Database Ning Ding(B) Zhanjiang Preschool Education College, Hangzhou 524084, Guangdong, China [email protected]

Abstract. Algorithmic composition is a research direction in the field of artificial intelligence, and melody accompaniment is one of the most challenging and practical research branches. In this paper, melody harmony is regarded as a task similar to machine learning. Through training a series of samples, a meta structure database of piano accompaniment is constructed. Then, two HMM models are established to try to simulate the composer’s thinking process of accompaniment for melody. Finally, Viterbi algorithm is used to accompaniment the new melody. Keywords: Algorithmic composition · Hidden Markov model · Phoneme structure

1 Introduction Algorithmic composition, also known as automatic composition, refers to the use of some logical process to control the generation of music. In the process of algorithmic composition, people first set composition rules and design appropriate logic; After that, let the computer complete the composing process without interference. Algorithmic composition is a kind of research that tries to use a certain formalized process to make people (or composers) get the least degree of intervention when they use computers to create music [1]. The artistic style of music works generated by algorithmic composition is affected by the setting of composition rules. It’s hard for most musicians to accept that algorithms can create and understand music. Many people regard music creation as the deduction of inspiration and other imprecise concepts. Despite the randomness of music creation, we generally believe that music is the product of human thinking activities. We know that the algorithm can be described by a set of constraints. These constraint sets perform at least one task in a finite unambiguous step [2]. Any music style can be defined by restriction. Theoretically speaking, a composer has unlimited freedom of choice when composing music. However, music creation is not “what you can do” but “what you can’t do”.

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 121–127, 2022. https://doi.org/10.1007/978-3-030-99581-2_16

122

N. Ding

2 Formal Description of the Basic Concept of System 2.1 Overview of Theoretical Model of Automatic Accompaniment System Piano automatic accompaniment system is a computer music system which can automatically configure piano accompaniment for monophonic melody (song). Our basic idea is to establish the HMM model of mode harmony movement of piano accompaniment, and the HMM model of melody line and rhythm contrast relationship between main melody and piano accompaniment. Some existing spectrum examples are selected as the training samples of the two HMM models. By training samples with different styles individually or in combination, we can obtain HMM model parameters describing piano accompaniment techniques with specific styles or mixed styles, and automatically configure piano accompaniment scores with similar specific styles or mixed styles for new melodies [3]. We use “the meta structure of piano accompaniment” to express various piano accompaniment techniques that represent different composers’ different creative styles. Collecting the meta structure of these piano accompaniment patterns can build a meta structure library of piano accompaniment patterns. When the system configures piano accompaniment for new melody, according to the mode, chord characteristics and rhythm mode of each melody segment in the new melody, it selects a suitable piano accompaniment type meta structure from the existing piano accompaniment type meta structure library, and through the mode of melody segment, the root of chord and various replacement functions provided by the selected piano accompaniment type meta structure, Piano accompaniment score for the new melody. 2.2 Formal Description of Notes and Clusters Here we first discuss the formal description of a musical note. We know that pitch and length are the two basic components of music. Generally speaking, any piece of music has its mode. Each tone in the mode system is called mode level in the basic theory of music. We can use the concept of mode scale in mode system to describe the pitch of notes. The reason for using mode scales to describe the pitch of notes is that mode scales are combined according to a certain relationship, and each tone has a specific mode meaning, such as stability, tendentiousness, mode tonic, leading tone, etc. [4]. This particular modal meaning is conducive to the progression of modal harmony described later. This means that the same physical sound appears in music with different modes of connotation and has different forms of expression. Because it plays a different role in different modes. The pitch of any note can be described by the key number and mode level of the piece of music. In general music theory books, chord and mode levels are often represented by Roman numerals I, II, III, I, IV, V, V and VI. Later in this article, we will discuss the use of mode scales to describe mode chords. In order to avoid the confusion of the two expressions, we use C, D, e, F, GA, B with subscripts to express the mode level. The subscript is introduced to facilitate the calculation of octaves when the interval number R (or R degree) is replaced up or down in the back face mode scale. In the normal sense, any note can correspond to an expression in the staff (as shown in Fig. 1).

Research and Design of Automatic Piano Accompaniment System

123

Fig. 1. The seven modes of the natural mode scale in C Major

2.3 An Overview of the Structure of Phoneme In our system, we get the original piano accompaniment patterns from music score examples, which are between 1 and 3 bars in length. It is worth noting that these styles may be imitated, molded and other creative techniques, and in these original piano accompaniment styles, the pitch information of all notes is determined. The meta structure of the sound pattern is obtained from these original piano accompaniment sound patterns. In this process, the absolute pitch information of the original piano accompaniment is replaced by the relative pitch information. There are two kinds of variable information in our meta structure: one is called root variable, the other is called melody segment variable. Generally, there is a harmonic conversion process in the range of variables in multi tone music. Setting one or more root tone variables in a bar is to adapt to this feature of multi tone music. After setting the root variable information, the pitch information of this bar or other notes of this beat is replaced by the r-level difference between the note pitch and the root pitch [5]. The variables of melody segment are mainly related to imitation and progression. This variable records the relationship between the imitation in the accompaniment pattern, the pitch of the note in the modular group structure and the specific pitch of the melody. With this variable, we can generate piano accompaniment patterns with a certain imitation and progression relationship with the given melody.

3 Two HMMs in Automatic Accompaniment System Set is a music score example that includes melody m and piano accompaniment PA. Based on the previous segmentation strategy and the results of discussion, we can get the segmentation form of Q: (M0 PA0 ), (M1 PA1 ), . . . , (MT PAT )

(1)

(rhy(M0 )) rhy(meta − PA0 ), . . . , (rhy(MT )) rhy(meta − PAT )

(2)

(K − MP(m0 )h0 ), . . . , (K − MP(mN )hN )

(3)

The above three segmentation sequence can be considered as a piano accompaniment style. This accompaniment style includes the following information: (1) The mode information of music score example Q and its harmonic motion characteristics are described.

124

N. Ding

(2) The rhythm contrast sequence of example Q in music score. (3) There are some structures in music score example Q (m, PA) including imitation and progression. (4) Music score example Q’s beat, speed, bundle way, fragment length and other information. Generally speaking, the style of piano accompaniment includes the harmony movement of Q and the rhythm and melody line contrast between the melody part of Q and the piano accompaniment part. Among them, the harmony movement of Q involves the piano accompaniment texture creation technology of harmony, including the mode and the characteristics describing its harmony movement, the chord sequence, the ending way of the music (the piano accompaniment group structure at the end of melody): the comparison of rhythm and melody line between the melody part and piano accompaniment part of Q involves the piano accompaniment texture creation technology of polyphony, including the beat, Rhythm contrast sequence and imitation structure [6]. Based on the two aspects of the piano style, we build two hidden Markov models. One HMM is used to describe the mode harmony movement of the music example with piano accompaniment, and the other HMM is used to describe the melody line and rhythm contrast relationship of the music example with piano accompaniment [7]. Figure 2 depicts a hidden Markov model of melody harmony. Where, h1 is the implied state. But k − MP(mi ) corresponding to the observation value, which can be observed in the piano accompaniment stage.

Fig. 2. HMM for melody harmony

HMM training process According to the previous formal description and the establishment of the two hidden Markov models of harmony and rhythm comparison, let’s first take a look at the training process of an example with piano accompaniment (Fig. 3). It can be seen that in the process of a training, our input is a music sample with piano accompaniment, and the training result is: on the one hand, we collect the phoneme structure, rhythm observation value, k-mp that appear in the sample music sample but not in the database; on the other hand, we update our HMM parameters. Among them:

Research and Design of Automatic Piano Accompaniment System

125

Fig. 3. Training flow chart

(1) The extraction of sample information includes the information of beat, speed, author, mode and so on. (2) The recognition of imitation structure is to collect the phoneme structure with imitation and modeling skills. According to the recognition results, the state is segmented. (3) For the state segmentation of samples. After segmenting according to the recognition result of imitation structure, for each segmented state, the observed value queries the database. If there is no such phoneme meta structure, rhythm observation, k-mp in the database, the database will be updated [3]. The direct result of step (3) is to obtain the sequence: (rhy(M0 )) rhy(meta − PA0 ), . . . , (rhy(MT )) rhy(meta − PAT )

(4)

(K − MP(m0 )h0 ), . . . , (K − MP(mN )hN )

(5)

Finally, we adjust the parameters of rhythm HMM and harmony HMM respectively according to the obtained rhythm contrast sequence and k-mode scale feature optimal feature chord sequence.

126

N. Ding

4 System Design Objectives and Components The design goal of piano automatic accompaniment system is to match single melody songs with piano accompaniment with certain musical value. Therefore, the input of the system is a single melody song, and the output of the system is the input single melody song and the piano accompaniment with a certain style matched by the machine. And the style of the piano accompaniment depends on the samples of music score with piano accompaniment that we train systematically before accompaniment [8]. The piano accompaniment style includes the harmony movement of the song and the rhythm and melody line contrast between the melody part of the song and the piano accompaniment part. After establishing the two hidden Markov models of harmony and rhythm contrast, we use the training module of the system to continuously adjust the parameter configuration of the two HMM, and collect the piano accompaniment patterns in the form of pattern meta structure in the established database [9]. Through the modeling and formal description of the single beat group structure, as well as the imitation of music skills and the progressive structure in advance, we collected the phoneme structure with imitation and progressive skills and the single beat independent group structure in the process of training. In the process of accompaniment for single melody songs, the application of these musical techniques makes the results of machine music more changeable, more innovative and vitality. The main part of the automatic accompaniment system mainly includes: training module, music module, and database. Among them, the training module reads in the sample spectrum examples, identifies and collects the voice structure, and adjusts the HMM parameters; The database is used to store all kinds of music information and collect the phoneme structure [10]; The music module reads in a single melody music, and outputs the music with piano accompaniment by using the parameter information of the training part and the phoneme structure stored in the database.

5 Conclusion Algorithmic composition is a challenging research direction in the field of artificial intelligence, but also has far-reaching theoretical research value. In the process of research, we can understand and simulate the composer’s way of thinking in the specific process of music creation; The composing program based on the research technology of algorithmic composition, which creates different forms of music works, can also entertain people. On the basis of the concept of “piano accompaniment meta structure”, this paper constructs a database of phoneme meta structure. Then, rhythm contrast HMM and harmony HMM are established. Finally, Viterbi algorithm is applied to the field of music creation.

References 1. Qing, W.M., Huang, Q.S., Zang, X.H.: A composition method based on genetic algorithm. Science and Technology Plaza (2008)

Research and Design of Automatic Piano Accompaniment System

127

2. Liu, J., Huang, Z.: Algorithmic composition and hierarchical structure control. J. Wuhan Conservatory Music (2003) 3. Feng, Y., Zhou, C.: Research progress of algorithmic composition. Acta Sinica Sinica (O2), 209–215 (2006) 4. Lin, H.: Concise course of Polyphonic Music. Shanghai Conservatory of Music Press (2006) 5. Shen, D.: The integration of vocal singing and piano accompaniment. Jiangxi Normal University of Science and Technology (2017) 6. Song, G.: Research on piano accompaniment of Beethoven’s vocal suite to distant lovers (op.98). Xi’an Conservatory of Music (2019) 7. Li, K.: Emotional experience and teaching practice of piano accompaniment of Chinese songs. Chongqing Normal University (2019) 8. Jiang, Z.: Discussion on the role between vocal singing and piano accompaniment. Hubei Normal University (2019) 9. Hou, X.: Discussion on the artistic effect of the combination of vocal singing and piano accompaniment. Tianjin Conservatory of Music (2019) 10. Xiao, M.: On the song creation and Piano Accompaniment in Frey’s vocal suite five songs of Venice. China Conservatory of Music (2019)

Discussion on Curriculum Reform of Chemical Engineering Drawing and CAD Based on Big Data Era Yi Fang(B) and Jinxin Liu Wuhai Vocational and Technical College, Wuhai 016000, China [email protected]

Abstract. Big data is a new era sign after the development of cloud computing. The course of chemical engineering drawing and CAD, which is offered by higher vocational colleges, is a basic course of technology serving the practice of chemical engineering design. In order to meet the needs of training skilled and applied talents in higher vocational colleges, we must also take big data as the development direction, combine with practical work, and vigorously study the relevant curriculum innovation. Knowledge points are regarded as basic units to realize the online and mobile learning. Around students, the goal of personalization and humanity can be achieved. A large amount of resource information can be shared through the network. Innovation and progress are new requirements in the era of big data, and it is also the basic requirement for training talents suitable for the post and the development of the times. Keywords: Chemical engineering system and CAD · Content of courses · Teaching methods · Teaching means · Reform in education

1 Introduction “Chemical engineering drawing” is an important technical basic course for chemical engineering majors in higher vocational colleges. With the development of chemical industry, it is differentiated from cartography. It is the product of the combination of descriptive geometry and chemical engineering majors. It has a strong spatial concept, practicality and standardization. Engineering drawing is the main means of expressing design ideas and technical communication in engineering technology, which is called “the language of engineering technology”. Because of its good intuitive and accurate measurement, it is an important means for engineering personnel to express design ideas and technical exchanges [1]. Chemical engineering majors in higher vocational colleges directly undertake the task of training high skilled talents for various chemical enterprises in the field of national economy. A good study of this course will help graduates to operate chemical plant and carry out engineering construction more efficiently. Every qualified chemical engineering graduate should have the knowledge and ability of chemical engineering drawing. With the increasing application of computer technology in production, computer aided drawing (AutoCAD) is an indispensable software system © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 128–133, 2022. https://doi.org/10.1007/978-3-030-99581-2_17

Discussion on Curriculum Reform of Chemical Engineering Drawing and CAD

129

for process design of chemical engineering specialty. Its working interface is simple and easy to learn. It can greatly improve the speed and accuracy of drawing, and improve the efficiency of work. Therefore, for the specialty of chemical pharmacy in higher vocational colleges, we should not only master the basic knowledge of chemical engineering drawing, but also learn the basic functions of AutoCAD, so that we can use AutoCAD to draw qualified chemical engineering drawings. Based on the era of big data, in the actual teaching process, we should continue to improve the teaching content, teaching methods, assessment methods and other aspects of the reform of a useful attempt [2].

2 The Impact of Big Data Era on University Teaching The arrival of the era of big data has brought a certain degree of influence on the traditional teaching mode in Colleges and universities, which is embodied in the following four aspects. 2.1 The Influence on Teaching Decision In the traditional teaching mode, the decision-making of teaching often depends on the teaching experience of university teachers, which makes the decision-making of teaching more subjective. In the era of big data, colleges and universities can provide scientific and objective basis for the formulation of teaching plans and ensure more perfect teaching decisions through statistical analysis of historical teaching data, such as the change of student source, teaching practice demand and professional development trend. In addition, colleges and universities can also predict the long-term development plan of education and teaching by analyzing big data, so as to help colleges and universities scientifically plan the development path of self-taught teaching and formulate medium and long-term teaching reform plans [3]. 2.2 The Influence on Teaching Methods Under the traditional teaching mode, the teaching methods in Colleges and universities are lack of individuality. They usually adopt a “one size fits all” approach to teaching, which ignores the individual differences of students and hinders their personality development. Through the use of big data analysis technology, we can comprehensively collect students’ data information, analyze students’ learning rules, learning characteristics and learning needs, and provide the basis for teachers to adopt personalized teaching methods. In the teaching process, teachers can also use big data to analyze the learning situation of individual students in the class, take effective teaching methods for individual students, and implement the teaching concept of teaching students in accordance with their aptitude [4]. 2.3 The Influence on Teaching Design Teaching design is the support of the whole teaching activities. In the era of big data, colleges and universities can sort out and mine students’ learning data, master students’ learning progress, weak links and learning achievements, so as to adjust the

130

Y. Fang and J. Liu

teaching progress according to the obtained data and information, and highlight key knowledge points according to students’ learning situation in teaching design, Ensure that the instructional design meets the learning needs of students. 2.4 The Influence on Teaching Evaluation In the traditional teaching mode, teaching evaluation is only limited to structural data evaluation, such as students’ test scores, attendance rate and so on, which leads to the lack of comprehensiveness of teaching evaluation results. In Colleges and universities, the use of big data technology can make up for this drawback. By analyzing the non structural data related to students’ learning, such as the application records of micro class, the amount of books borrowed, and so on, the evaluation can be more objective, and the knowledge and skills acquired by students during their learning can be evaluated from many aspects, so as to realize the process evaluation of students’ learning. 2.5 Significant Changes in Learning Time and Space Under the background of big data era, learning can completely break through the constraints of time and space. Learning will not be constrained by identity, gender, age and other conditions. With the help of the Internet, it provides equal learning opportunities. On the one hand, it has greater selectivity and freedom in learning content. On the other hand, human communication is more free. It can greatly expand the scope of its learning objects, and it can also get unlimited expansion in space and scope, but the traditional education model can not achieve these contents [5]. At the same time, there are sufficient information resources for learning on the Internet, which is very beneficial for people to expand their knowledge. The accurate teaching mode under big data is shown in Fig. 1.

Fig. 1. Precision teaching mode under big data

Discussion on Curriculum Reform of Chemical Engineering Drawing and CAD

131

3 Teaching Status of Chemical Engineering Drawing and CAD 3.1 Backward Traditional Teaching Methods The traditional teaching mode is basically teacher centered “teachers speak, students listen”. This kind of teaching method is boring and students don’t want to listen to it. Learning should be a happy thing to acquire knowledge, but many teachers only teach students according to the content of books, students can only passively accept, resulting in a great lack of enthusiasm and initiative of students. Because most of the time in the classroom is the teacher guiding the students’ learning, students’ thinking has been greatly limited, students’ imagination and creativity can not be improved, and students’ self-learning ability can not be cultivated. The traditional teaching mode pays attention to the teaching of the course theory, and “chemical engineering drawing and CAD” is a course that pays equal attention to practice and theory, which will inevitably lead to the students’ separation from the actual production, resulting in the disconnection between practice and theory, and the students’ lack of practical experience. Students only understand the drawing principle of chemical machinery and equipment from the pictures and words in the books, but they may not know why to draw the drawings in this way [6]. Although the drawing knowledge learned from the classroom, but only for drawing, obviously this can not cultivate students’ imagination and practical ability. 3.2 Single Assessment Method The traditional assessment method is single and monotonous. The academic performance examination focuses on the assessment of students’ theoretical knowledge and ignores the assessment of practical teaching, which limits the play of students’ practical ability. The single way of examination will also lead to students’ learning for examination, which inhibits students’ creative ability and can not effectively reflect the real level of students [7]. And most of the teachers will only publish the test results, but will not analyze the test papers after the test, so that students do not know their weaknesses, and teachers do not know their teaching weaknesses. In addition, the school’s educational administration department only uses scores to decide whether students pass the exam or not and teachers’ awards, which makes students study only for scores and teachers teach only for students’ scores, ignoring the practical teaching of the course [8].

4 Content of Chemical Engineering Drawing and CAD Curriculum Reform Based on Big Data Era 4.1 Combination of Multimedia Teaching and Computer Operation As the theory and practice of this course are equally important, the course can be divided into two parts, namely, multimedia teaching and computer operation. The first is to use multimedia teaching to let students master the theoretical knowledge of chemical engineering drawing. Multimedia teaching is the use of multimedia computers and large screen projection system in the classroom for teaching content. Multimedia teaching

132

Y. Fang and J. Liu

has a strong intuitive. According to the characteristics of chemical engineering drawing and CAD, teachers can combine the pictures on the network with their own knowledge in class, and students can also intuitively understand the characteristics of chemical machinery and equipment. For complex models and unimaginable section lines, teachers can use flash animation to show them when teaching, so as to deepen students’ understanding of this knowledge. Then is the computer operation, the computer operation is mainly to learn the computer drawing software AutoCAD, the theoretical knowledge learned in the classroom will be applied in the actual drawing [9]. At the beginning, we should remember some basic commands in AutoCAD, and then the teacher arranges the tasks for the students in class, so that the students can learn computer drawing purposefully. 4.2 Interaction Between Students and Teachers In the process of learning this course, students will certainly have some unclear or vague understanding, which requires students to timely reflect to the teacher and seek help from the teacher; Teachers also need to improve their teaching through students’ feedback, which is a win-win process. Students gain knowledge, teachers can also timely understand their own teaching deficiencies. This requires interaction between teachers and students. Students can ask questions about the course in the last ten minutes before the end of the course, and then the teacher and students discuss these questions together. After class, the teacher and students should also have interaction. After class, the teacher can take out some small part models and let the students finish the drawing of three views in groups after class, which is also to exercise the students’ practical ability. Then the teacher can find out the mistakes that the students may not notice in the learning process by reviewing the drawings drawn by the students, and then the teacher can explain these problems in class to deepen the students’ impression, which can prevent the students from having similar problems again. 4.3 Diversification of Assessment Methods Because the practicality and theory of chemical engineering drawing and CAD are very important, the traditional assessment method obviously can not reflect the real level of each student. Therefore, according to the characteristics of this course, the following assessment methods should be adopted: The total score is 100 points = 60 points in the examination (including 30 points in theory course and 30 points in computer course) + 40 points in the usual performance (including 20 points in theory course and 20 points in computer course). In order to make the knowledge learned by students truly transform into the skills and tools they master, students should pay attention to the accumulation of this course at ordinary times, and it is very important to complete the tasks assigned by teachers at ordinary times. The advantage of doing this is that it emphasizes the importance of homework at ordinary times, strengthens the training of basic skills of drawing, and makes students pay attention to the study of this course from the beginning [10]. The traditional examination only focuses on the theoretical part of the knowledge, but can not fully evaluate the students’ practical application ability. Therefore, the computer examination part should be added to the assessment method of this course, so as to

Discussion on Curriculum Reform of Chemical Engineering Drawing and CAD

133

comprehensively test the students’ understanding and application of knowledge. But the examination has a lot of contingency, and can not completely determine the students’ mastery of curriculum knowledge and students’ practical application ability by one examination, but the examination also has its necessity, and the examination can reflect the students’ comprehensive quality and comprehensive understanding of knowledge on the other hand.

5 Conclusion The traditional teaching method of chemical engineering drawing and CAD can not meet the requirements. In the era of big data, we should reform the teaching mode and teaching method. Although new problems will be exposed in the process of reform, we should further improve the teaching reform to make students more interested in this course, So as to stimulate students’ space imagination and creativity.

References 1. An, Q.: Discussion on the teaching of AutoCAD chemical engineering drawing. Inner Mongolia Petrochemical Ind. 8, 34–35 (2007) 2. Gni, X.: Research on MOOC teaching of college mathematics in the era of big data. Educ. Teach. Forum. 4, 102–103 (2018) 3. Liang, Y.: Research on university teaching method reform mode in the era of big data. Heilongjiang Sci. 6, 57–58 (2018) 4. Zhang, H., Wang, Y., Sun, B.: Discussion on curriculum reform of chemical engineering drawing and CAD, vocational education forum (2009) 5. Huo, L.: Analysis on specific strategies of infiltrating environmental protection education in chemical engineering teaching. Low Carbon World (02) (2021) 6. Zhao, Y., Chang, W., Yang, K., Zhang, L., Liu, B.: Research and approach analysis of chemical engineering education in Colleges and Universities based on improving innovation ability. Shaanxi Educ. (High. Educ.) (01) (2021) 7. Hao, X., Fang, Z., Gao, Y.: Research on training and promotion strategies of chemical professionals under the background of engineering education. Guangdong Chem. Ind. (06) (2021) 8. Gong, X., Zhen, L., Li, H.: Current situation analysis and improvement suggestions of cognition practice of chemical engineering specialty. Shandong Chem. Ind. (05) (2021) 9. Xin, Z.: Deepen teaching and curriculum reform and promote the connotation construction of first-class chemical engineering specialty. High. Educ. Chem. Eng. (01) (2021) 10. Wu, C., Dan, Y., Tian, D., Tan, Z.: Research on the teaching of chemical engineering courses in local universities for Nationalities under the background of new engineering. Sci. Technol. Innov. (10) (2021)

The Design and Implementation of the Data Statistics Method in the Quality Development Network Certification System for College Students Shasha Gao(B) Shandong Woman University, Jinan 250300, Shandong, China [email protected]

Abstract. This paper will analyze the design and implementation of the student quality development certification system in our college, and the full text is divided into five parts: thread theory, demand analysis, outline design and detailed design, implementation and testing, summary and prospect. By analyzing the original background of quality certification in our college, this paper puts forward the shortcomings of similar systems in quality certification in China. This system is technically based on B/S network mode. The development language in the process of design and implementation is the most widely used java language nowadays. The main design mode adopts MVC idea, and the technical architecture used is the open source Struts2 framework. Keywords: Quality certification · Activity booking · Struts2 · Java

1 Introduction As we all know, the development of computer industry has penetrated into all walks of life. With the rapid development of information technology, network has been widely used in schools, enterprises, medical and other fields. No matter in any industry, there are quality certification problems. At the same time, in order to improve the quality of students, the college often needs to communicate through activities, constantly improve the comprehensive quality of students and the ability of team cooperation. In recent years, the school has expanded the number of internal activities, and the amount of information of activities gradually increases. The way of the school activities is limited [1]. The technical means of the activities are not perfect. The current activities are mainly in the traditional form of written application and simple network form. In the form of written application, students or administrators simulate the activity draft, prepare the activity plan, modify and submit, and gradually apply for approval will take a long time to be unfavorable to the activity. In the form of network, computer network is used as the service platform. Students teachers can release the activity information without the limitation of distance and region, so that the participants can get information and participate in it in time [2]. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 134–141, 2022. https://doi.org/10.1007/978-3-030-99581-2_18

The Design and Implementation of the Data Statistics Method

135

Compared with other forms, network forms are convenient, quick, resource saving, unnecessary activity costs avoided, and cross regional activities can be exchanged, which can improve the participation of activities and then improve the efficiency of school activities. With the continuous progress of science and technology, enterprises, schools and medical care pay more attention to their informatization construction. It is necessary way and means for the development of schools to establish information platform. Compared with traditional forms of activities, video network activities are used more and more, and traditional common forms pay more and less attention. At present, most of the quality certification of our college is carried out through the way of too long. In the management mode, manual operation is still used, and the management efficiency is low, and the number of errors is very frequent, which is more unfavorable to the activity data management. It can be seen that the development of an efficient quality development certification system is the necessary prerequisite for better management quality certification, and can achieve efficient communication opinions, put forward better activities, formulate better activity themes, make the school at all levels identify, and work together to achieve the activities of the college Therefore, we should develop a system of student quality development certification to improve the overall management of the school. The progress of science and technology has promoted the emergence of many authentication systems, but the quality certification system for campus network is extremely lacking, and most of the network-based student quality development certification system can not fully manage the activities of the campus, so the demand gap of the network-based student quality development certification system is very large and necessary. Under the premise of the widespread application of computer in today’s society, the development and application of computer software makes the computer manage activities very convenient and has the advantages that manual management cannot compare [3]. Although there are similar system of student quality development certification in China, such as the student quality development certification system of Zhongshan University, the credit certification system of quality development in Changshu University of technology, and the network system of university students’ quality development in Chengdu. Although these systems are already running, each school should have its own school style system, and the focus of these systems is different from the actual situation of the college. Therefore, we need to use the college student quality development certification system to share data with multiple users in different places with the network platform, and then manage the activities of the school [4].

2 Related Work In order to coordinate the activities time of departments and departments, and to realize the activity arrangement efficiently, the college can make the activities successful and convenient for students to apply for activities and actively participate in the new activities The paper and the holding way can improve the activity quality and efficiency of the college, improve the management efficiency, unite the students and improve the quality of all aspects of learning, use the quality certification control method systematically and reasonably, and then avoid multiple activity conflicts. Therefore, a set of quality expansion certification system for students’ quality management of the college is designed and

136

S. Gao

implemented to manage the activities of the college. The system of quality development certification of students in the college mainly realizes the quality certification control of all activities of the college, and manages the activities such as time distribution, personnel coordination and activity planning. In addition, administrators can control the theme, time and place of the activities, and facilitate students to understand the activities at any time The content, the theme of the time and event, the organizer, the co organizer, the participants of the event, etc. shall be detailed to avoid the failure of the event due to the failure of the event due to the failure of the notice in time, and then enhance the enthusiasm of the event and improve the management efficiency of the administrator [5]. According to the actual situation of the college, the Department of the technical college is investigated to divide the user roles of the system in the design of the system. The system mainly includes the user, the administrator user and the hospital There are four roles of administrator user and management user of the League branch. According to the corresponding authority of the four roles, the detailed analysis and analysis of each user function is as follows: 1. Student user business analysis student business process is mainly aimed at the quality of students in the college that has passed the school registration system Only the students who have the right to register and authenticate can carry out the business analysis of the students. Here, the activity query details the function of student users. (1) Activity inquiry: before the formal application of the activity of the student quality development certification system of our college, students can check the status of the activity, and provide the details of the theme, time and details of the activity. (2) The students who have experienced the inquiry can inquire their past activities, mainly including the past experience, the application experience and the personal experience [6]. 2. business analysis of school level administrators. In the student quality development certification system of the college, the approval activities of school level administrators are from the activities approved by the lower level. The steps of the approval activities are to submit the approval step by step. The submission sequence is taken as the preliminary submission by the student users. The main activities submitted are from the secondary manager users, and the submission approval activities of the secondary management come from the level 3 administrator users. In the college student quality development certification system, the administrators, student administrators and social Federation administrators belong to the secondary management, and all the secondary management submission processes are submitted to the school level administrators. The level 3 administrator is responsible for the preliminary audit and approval of the activities and submit it to the secondary management for gradual submission. 3. the analysis of the user business of the administrators of the Department; in order to facilitate the management and improve the efficiency of the school activities, the secondary administrator is set up, which plays an important role in the process of approval. 4. business analysis of the management of the League branch the activities approved by the administrators of the League branch in the student quality development certification system of the college will be submitted to the school level administrators, and

The Design and Implementation of the Data Statistics Method

137

the number of activities waiting for approval will be displayed, and the corresponding numbers will be displayed for the experience, grievance and news waiting for approval.

3 General Design and Detailed Design The basic architecture of the college students’ quality development certification system is J2EE. J2EE is a kind of architecture which mainly uses Java2 platform to develop and manage enterprise solutions. It has strong earth function and portability. It is a very robust and stable architecture standard. Its foundation is standard Java, and it can also provide users with convenient application interface. These are important factors that make J2EE become industry standard. Because of these excellent features, J2EE is a pretty good choice. In the framework selection, the system uses the open source struts framework to realize MVC framework. Struts is a very convenient framework in software development, and its structure is clear and clear. It is based on MVC mode, which can greatly improve the speed of implementation [7]. The action class in the system can call the method of the model, update the state of the model, and can provide help in the application of management controller. In the database selection, the system uses SQL Server 2010, the most powerful and comprehensive version of SQL server so far, which greatly reduces the cost of managing data infrastructure and data. In addition, it can encrypt the data and files in the whole database, thus ensuring the security of user data and satisfying the user’s pressing to the database The security and confidentiality requirements. In addition, SQL server2010 can also flexibly perform the audit configuration, and make its audit specification for a database independently, so that its performance is better. The technical framework of the college students’ quality development certification system is designed as shown in Fig. 1.

Fig. 1. System technical architecture

The system is based on B/S framework. The development language in the design and implementation process is JA, a, MVC is adopted in the main design mode, and the

138

S. Gao

technical framework used is Struts2 framework. The model layer of the student quality development certification system of our college is mainly designed: activity entity type, experience entity class undergo, news entity news, user entity user activity application entity bookingactivity, bookingundergo, activity theme entity type activitytheme entity, etc. The main design of view layer of the student quality development certification system of our college: query activity page Queryactivity.jsp, application activity page bookactivity.jsp, modify activity.jsp, cancel activity.jsp, querypersonalconfeasenda.jsp, query the activity page of personal experience, query activity details page Q ueryactivityDetailed.jsp, declaration activity page Bookingac tivity.jsp news release page newsize.jsp personal news release list query queryper sonalnews.jsp users add additionuser.jsp, etc. [8]. The main design of the control layer of the student quality development certification system in our college is: activity query controller, activity processing type activityqueryform, experience query controller undergoqueryform, activity list controller activitylistform, and undergoqueryservice, approval application control Approveapplicationform, application activity controller bookingactivityform, activity theme management controller activitythemeform, activity application processing class activitybookingservice, news query controller newsqueryform, news list controller newslistform news release processing class newsqueryservice, user added processing class additionuserservice, user added controller Additionuserform, etc. [9]. The activity query module operators of the student quality development certification system in the college mainly include student users, school level management users, hospital level management users and group branch management users to add the categories involved in the activity use, activity query controller activityqueryform, activity processing activityqueryservice and activity entity type. Students also have the function of querying their own password and exiting the system. The activity query class diagram is shown in Fig. 2.

Fig. 2. Activity query design class diagram

The Design and Implementation of the Data Statistics Method

139

According to the activity query class diagram, this module mainly involves three classes. The detailed design of specific methods and attributes is as follows: 1. Properties associated with activity query controller activityqueryform: activityqueryform activity processing class, activityroom activity entity class, activity activity activity entity class. Activity queryform association method: queryactivitydetail0 query activity details, query activity status queryactivity (), apply for activity bookactivity0, modify activity modifyactivity0, cancel activity cancelactivity0. 2. Property associated with activity processing class activityqueryservice: activity activity entity class. Activity queryform association method: findactivitybyelements0 query activity according to the condition. 3. Attribute associated with activity entity class activity: activity date activitybook_ Activitydate, activitybook_ Start time, activity book_ Endtime, activity theme activitybook_ Theme, activitybook_ Department, ActivityBook_ Name activity name activity description activitybook_ Description, activity book_ Host, activity book_ Attendees, send SMS to activitybook_ SMSNtification, ActivityBook_ Send email notification. The appeal operators of our college’s student quality development certification system are mainly student users, school level management users, college level management users and League branch management users [10]. They are mainly involved in class package, appeal query controller complainqueryform, appeal processing class, complainqueryservice and activity entity class activity. Hospital level users also have other functions, personal password query and exit system functions, as shown in Fig. 3.

Fig. 3. Activity appeal function design class diagram

140

S. Gao

4 Conclusion In order to coordinate and efficiently arrange activities, facilitate students to apply for activities, and further improve the quality and efficiency of activities in our college, we use reasonable quality certification control methods, so as to avoid the conflict of activities. Therefore, we design and implement a set of Jinan Vocational College Students’ quality development certification system. The system mainly realizes the quality certifier to control each activity of the college, and manage the distribution, coordination, planning and other activities. In addition, it also controls each equipment of the activity, which can facilitate students to understand the relevant situation of the activity at any time, avoid the absence phenomenon caused by not receiving the notice in time, and further enhance the value and efficiency of the activity. The first part of the design and implementation process of our college’s student quality development certification system is to analyze the background of our college’s needs in quality certification, and understand the current situation of our college’s student quality development certification system in detail. According to the actual quality certification situation of our college, the system business is divided into six aspects, including activity inquiry, experience inquiry, activity appeal, news management and other functions. The student quality development certification system of our college is based on B/S framework. The development language in the process of design and implementation is Java. The main design mode is MVC, and the most widely used open source technology architecture is Struts2 framework. In the process of functional design of our college students’ quality development certification system, we design six business requirements, including activity query module, experience query module, activity appeal module, news management module and other functional modules, and complete the design of table relationship and table structure in our college students’ quality development certification system. The implementation process of our college students’ quality development certification system is described by interface, method and algorithm diagram, and the function test process mainly uses test cases.

References 1. Jia, S.: Developing dynamic website with PHP and MySQL. Volkswagen Technology (03), 14–15 (2011) 2. Luo, X.: Design of efficient search system for English translation terms in massive Xi Linlin. In: Investigation on the Implementation of “College Students’ Quality Development Plan” and Countermeasures. East China Normal University (2006) 3. Internet data. Mod. Electron. Technol. 40(13), 134–136 (2017) 4. Ding, H.: Dreamweaver web design and production case course. Tsinghua University Press (2012) 5. Chen, L., et al.: New theory of Xingzhi Education [M]. Wuhan University of Technology Press, Shi Han (2003) 6. Huang, X., Shao, Y.: Exploration on yuan Zhizhe exhibition plan of Shituo College Students – Taking the school of construction and engineering of Inner Mongolia University of science and technology as an example. Sci. Technol. Xinming (6) (2009) 7. Dong, H.: Construction of a quality control system for students in Higher Vocational Colleges. China Vocat. Tech. Educ. (20) (2008)

The Design and Implementation of the Data Statistics Method

141

8. Yu, H.: Research on the implementation status and Countermeasures of College Students’ yuan quality development. Today Keyuan (8) (2009) 9. Du, J.: Theory and Practice of Zhang Zhi Expansion Plan for College Students. China Youth Publishing House, Beijing (2006) 10. Xiaoqiang, D.: Research on High Control Quality Education. Wuhan University Press, Wuhan (2003)

Application of Data Mining Technology and Association Programming Algorithm in Marketing Strategy Jianhao He(B) Ningbo Polytechnic, Ningbo 315100, Zhejiang, China [email protected]

Abstract. The development of science and technology innovation enterprises plays a very important role in the development of China’s economy and science and technology. However, due to the current Chinese science and technology innovation enterprises in the embryonic stage, there are many problems, especially in financing. Although there are traditional financing methods, such as endogenous financing and exogenous financing, many commercial banks and credit institutions are more willing to lend to other types of enterprises due to the uncertainty of the future development and operation of scientific and technological innovation enterprises compared with other enterprises, the lack of perfect credit system, and the lack of fixed assets as collateral. The background of the current data mining and the main data mining technology in this field, and then through examples, this paper focuses on the association rule algorithm, which is widely used in knowledge data mining technology, and its application in marketing strategy. Keywords: Science and technology innovation enterprises · Financing · Big data · Route · Data mining · Association rules · Algorithm

1 Introduction With the development and wide application of computer network and database technology, the important role of information in the development of enterprises is more and more recognized by people. People’s ability to use information technology to produce and collect data has been greatly improved. Behind these data is extremely important business knowledge, but these business knowledge is implicit and unknown in advance. Therefore, how to avoid being submerged by the vast ocean of information, find useful knowledge in time, and improve the utilization rate of information is particularly important. In the face of this challenge, data mining technology came into being and flourished, showing its strong vitality [1].

2 Data Mining Technology Data mining is a process of extracting potentially useful information and knowledge from a large number of, incomplete, noisy, fuzzy and random data that people do not © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 142–148, 2022. https://doi.org/10.1007/978-3-030-99581-2_19

Application of Data Mining Technology and Association Programming Algorithm

143

know in advance. There are many similar terms, such as KDD, data analysis, data fusion and decision support. In particular, data mining technology is application-oriented from the beginning. It is not only a simple retrieval and query call for a specific database, but also a micro, meso and even macro statistics, analysis, synthesis and reasoning for these data, so as to guide the solution of practical problems, try to find the correlation between events, and even use the existing data to predict future activities [2]. For example, the coach of the NBA, a famous national basketball team in the United States, used the data mining technology provided by a company to decide to replace the players on the spot, which was once well-known in the database industry. In this way, people’s application of data is improved from low-level terminal query operation to decision support for all levels of business decision-makers. This demand driving force is more powerful than database query. It should be pointed out that all the discovered knowledge is relative, with specific preconditions and constraints, oriented to specific fields, and easy to be understood by users. Common data mining technologies can be divided into three categories: statistical analysis, knowledge discovery and other types of data mining technologies [3]. 2.1 Statistical Analysis Statistics is a branch of data collection and description mathematics. Statistical inference analysis is usually completed by statistical mathematical model. It infers unknown information from existing information, such as inferring future from past data, inferring population from local data, etc. Statistical analysis tools can be used in a series of business activities, such as using statistical tools for data analysis, in order to seek the best opportunities, increase market share and profits, etc. Statistical data mining technology has become the most mature data mining technology. Among them are: ➀ Data aggregation and measurement technology. This technology needs to use the common aggregation functions in database, such as: amount (), sun (), AVG (), max (), etc. ➁ Histogram data mining technology. This technology can directly display some important information in the database. ➂ Linear regression data mining technology. Regression is an analytical method to study the relationship between independent variables and dependent variables. Its purpose is to estimate and predict the total mean value of dependent variables according to the known independent variables. For example, the profit of an enterprise depends on the purchasing power of customers and the cost of sales. Through the analysis of this dependence, we can predict the average profit level of an enterprise when the number of customers, purchasing power and cost of sales are known. ➃ Nonlinear regression data mining technology. When the relationship between variables is roughly a straight line to reflect its changing relationship, a straight line can be fitted to reflect its changing relationship. However, in many cases, the relationship between variables is in the form of a curve, that is, non-linear, then we should fit a curve to reflect the relationship between variables. There are many kinds of nonlinear regression models: hyperbolic model, conic model, logarithmic model, trigonometric function model and so on.

144

J. He

➄ Clustering data mining technology is a data mining technology that groups data objects into multiple classes or clusters. ➅ Nearest neighbor data mining technology. The basic concept of forecasting with this method is that the objects close to each other have similar predicted values. If you know the predicted value of one of the objects, you can predict its nearest neighbor object. For example, when predicting a person’s income, it is often necessary to know what class he is in or what degree he has obtained. Because people’s income is often related to the people they live with and their education level, it is necessary to detect the people closest to them [4]. 2.2 Knowledge Discovery Knowledge discovery is a technology to extract information from data in an indirect way, which is implicit, unknown and has potential application value. Knowledge discovery can be regarded as a valuable information search process, it does not have to presuppose or ask questions, but it can still find those unexpected and interesting information; It can also find valuable business rules through complete and comprehensive information discovery and data analysis. It can be divided into three parts: ➀ Association rule based knowledge mining technology. It is not only a main form of data mining, but also the most popular form of knowledge discovery in non teacher learning. It is also a data mining form most similar to the data mining process imagined by most people, that is, to discover some information about the database that is not known or can not be clearly expressed in the large-scale data warehouse. ➁ Neural network knowledge mining technology. It is mainly composed of the interconnection of “neurons”, or nodes organized by layers. Generally, the neural network model consists of three layers: input layer, middle layer and output layer. After each neuron gets the input value, the total input value is calculated; The input value is compared by the filtering mechanism to determine the output value of the network. ➂ Genetic algorithm based knowledge mining technology. Genetic algorithm is a computational model simulating the process of biological evolution. It is a computational method combining natural genetics and computer science. Genetic analysis applies search technology. First, two suitable parent samples are found, and the next generation samples are generated by “crossover”, “mutation” and other operations with biological genetic characteristics. Then, the next generation sample set can be obtained by repeatedly “crossover” and “mutation” operations on the sub samples until the sub samples converge, and then the other two suitable parent samples are found to repeat the above process. The possible development direction of the current sample set is obtained. ➃ Rough set knowledge mining technology. Rough set was put forward by Pawlak Z in 1982, which is a mathematical tool to study uncertainty problems. As an extension of set theory, it is mainly used to study the data mining technology of incomplete and incomplete information description. It can solve the problem of fuzzy or uncertain data analysis and processing on the basis of data classification ability without prior knowledge of data [5].

Application of Data Mining Technology and Association Programming Algorithm

145

2.3 Other Data Mining Technologies In addition to the data mining technology described above, in recent years, with the rapid development of various data processing tools, advanced database technology and Internet technology, there are also some other data mining technologies. Such as: text mining technology, web mining technology, classification analysis technology, geographic information system and spatial data mining technology and distributed data mining technology [6].

3 Analysis of Association Rules 3.1 Association Rules and Algorithm Selection Association rule is a rule-based method, which is used to find the implicit relationship between items from the data set, so as to further find the relationship between the data and facilitate cross selling. It can be used for text mining, also can be used in other fields such as bioinformatics, medical, geographic science to find some hidden links. First, its goal is to find similar rules. For example, the frequency of these rules is very high, which means that there is a strong correlation between them [7]. However, the support of each product is quite different. In the process of application, we should not over interpret it, but analyze it according to the actual situation and specific business. First of all, the support of association rules should be determined. The support of association rules means that the relationship between some purchased goods and the total purchased goods is expressed by frequency. If the original support of an item is low, even if the association is strong, it may affect the mining results. The support formula is shown in Formula 1, where p (X ∪ Y) represents the probability of containing each item in X and y. support (X ⇒ Y ) = P(X ∪ Y )

(1)

The next step is to determine the confidence level. The confidence level of association rules refers to the proportion of people who buy X and Y through conditional probability, which indicates the strength of association. In other words, it refers to the reliability of rules. If the confidence is too low, there will be no practical significance, as shown in formula 2. confidence (X ⇒ Y) = P(Y|X) =

support (X ∪ Y) support(X)

(2)

Finally, the support threshold of association rules is set to find all frequent itemsets, and the confidence is calculated for all possible associated items of each frequent itemset, which is compared with the pre-set confidence threshold_ The result of mining association rules is greater than or equal to the confidence threshold [8].

146

J. He

3.2 Apriori Algorithm Apriori algorithm is a frequent itemset algorithm for mining association rules. It mines frequent itemsets through two steps: generating candidate sets and downward closure detection. The algorithm has been widely used in various fields such as business and information network security. The idea of Apriori algorithm is to find all frequent itemsets whose frequency is greater than or equal to the preset minimum support, and then use the frequent itemsets to generate the required rules, and generate all the rules that only contain the items in the set, in which each rule has only one item in the latter item [9]. After generating these rules, only those rules that are larger than the minimum confidence set by users are retained. In order to generate all frequent itemsets, recursive method is used. The basic property of the algorithm is that all nonempty subsets of any frequent itemset must also be frequent. The basic process of Apriori algorithm mainly includes the following four steps: the first step is to retrieve all frequent itemsets in the relevant database through iteration, which refers to the itemsets whose specific support cannot be lower than the threshold set by the user. The second step is to construct the minimum confidence by the frequent itemsets in the first step, that is, to set the minimum confidence. The third step is to find the frequent itemsets according to the minimum support, to find the candidate itemsets by using the frequent itemsets, to determine the candidate itemsets, and to mine the two frequent itemsets. In the fourth step, repeat step three until no more frequent k-itemsets can be found, and write the rules with the minimum confidence into the rule base. As shown in Fig. 1.

Fig. 1. The basic flow of Apriori algorithm

Application of Data Mining Technology and Association Programming Algorithm

147

4 Mechanism of Big Data 4.1 Big Data Credit System Strengthens Credit Evaluation of Scientific and Technological Innovation Enterprises The traditional financing methods of enterprises include endogenous financing and exogenous financing. But no matter what kind of financing method, there is a lack of real data as a supplement, and because banks, financial institutions, and the government have their own systems, the data is scattered, prone to bias, increasing costs, and poor timeliness. Big data can solve these problems. First of all, big data credit can use cloud computing to complete the whole process of data input and output through computer algorithm operation, avoiding the deviation and dispersion of data caused by the different systems of banks and other financial institutions. Secondly, because the operation of big data credit system comes from the input of various hardware intellectual property rights, compared with the input of various human and technical personnel, the cost is lower [10]. Finally, big data credit can meet the synchronization of evaluation results and information. When the credit system of the evaluated scientific and technological innovation enterprises changes, the big data credit platform can quickly output the corresponding results according to the changes, so as to ensure the high efficiency of big data credit. 4.2 Big Data Technology Strengthens Credit Risk Control of Scientific and Technological Innovation Enterprises Based on the characteristics of scientific and technological innovation enterprises, there are great uncertainties in their future development and risk size, which is one of the reasons for the financing difficulties of scientific and technological innovation enterprises. In the traditional way of financing, risk control technology is not perfect, although the policy support, but banks and other financial institutions are not willing to provide credit loans for science and technology innovation enterprises. Big data technology can effectively solve the problem of imperfect risk control technology. Firstly, in the stage of risk identification, the big data information platform for scientific and technological innovation enterprises is established, including the credit collection system for scientific and technological innovation enterprises by commercial banks and other financial institutions, as well as the registration, tax payment, talent and technology information of relevant scientific and technological innovation enterprises by various government departments. Secondly, in the risk measurement stage, the risk measurement model based on the big data information platform of scientific and technological innovation enterprises is constructed. It includes standardized and conventional measurement model of structure and parameter index predetermined in advance and interactive and intelligent risk measurement model. The former mainly provides low-cost standardized risk measurement services for local financial institutions with weak technical measurement, while the latter allows financial institutions to customize models and their structures and parameters according to their needs. It is mainly to serve the in-depth data development and personalized needs of financial institutions with strong technical force. Finally, in the stage of risk disposal, scientific and technological innovation enterprises rebuild

148

J. He

their risk disposal strategies. Including risk aversion, risk reduction and risk bearing. First of all, big data technology adopts positive risk aversion strategies through credit rating, data analysis and other means. Secondly, we can use the relevant laws of big data to eliminate some risks. Finally, due to the characteristics of big data itself, it can help to develop derivative risk sharing tools for scientific and technological innovation enterprises, identify, measure and price risks, and undertake risks among participants.

5 Conclusion At present, the research of data mining technology is in the ascendant, and it is expected to form a greater climax in the 21st century. The research focus may focus on the following aspects: the research of data mining language specialized in knowledge discovery may move towards formalization and standardization like SQL language; The visualization method in the process of data mining is sought to make the process of knowledge discovery understood by users and facilitate human-computer interaction in the process of knowledge discovery; This paper studies the data mining technology in the network environment, especially the establishment of knowledge discovery (data mining) server on the Internet, cooperating with the database server to realize data mining; Strengthen the mining of all kinds of unstructured data, such as text data, graphic image data, multimedia data. However, no matter what, demand driven market is eternal. DMKD will first meet the urgent needs of users in the information age, and a large number of decision support software tools based on data mining will come out.

References 1. Chen, J.: Data Warehouse and Data Mining Technology. Electronic Industry Press, Beijing (2002) 2. Qian, F., Xu, L.: Data mining and its application in marketing. J. Hangzhou Inst. Electron. Technol. 21(4) (2001) 3. Inmon, W.H.: Building the Data Warehouse. Jibei Industry Press, Beijing (2000) 4. Mallach, E.G.: Decision Support and Data Warehouse Systems. Electronic Industry Press, Beijing (2001) 5. Yuan, Y., Yang, S.: Research on the application of association rule data mining technology in insurance industry. Electronic World (08) (2020) 6. He, D.: Data mining technology and association rule mining algorithm. Electron. Technol. Softw. Eng. (23) (2016) 7. Jin, Y.: Research on association rule algorithm in data mining technology. Sci. Technol. Commun. (12) (2011) 8. Liu, A.: Analysis of academic performance of college students based on association rule data mining technology. Inf. Comput. (Theor. Edn.) (22) (2015) 9. Zhang, L., Fu, H., Guo, J.: Analysis and research on data mining technology based on knowledge discovery. Knowl. Econ. (23) (2010) 10. Jia, F.: On data mining technology. Inner Mongolia Petrochem. Ind. (01) (2004)

Simulation and Analysis of Influencing Factors of Water Drive in High Water-Cut Stage of Computer Technology Dongsheng Hu(B) Geological Brigade in No. 7 Oil Production Plant of Daqing Oilfield Company Ltd., Daqing 163458, China [email protected]

Abstract. This paper analyzes the influence of rhythm, scour ratio and water injection ratio on water drive condition of high water cut oilfield in Gudong 7 area of Shengli Oilfield. The research shows that because the permeability distribution of anti rhythm reservoir is conducive to the downward flow of injected water, the effect of water flooding development is better than that of positive rhythm reservoir. The greater the scouring ratio of reservoir, the smaller the distribution of remaining oil, the better the effect of water flooding development. The water flooding ratio has a great impact on the recovery degree in the early stage of oilfield development, but it is not obvious to increase the recovery degree by increasing the water flooding ratio in the high water cut stage. Keywords: High water cut stage · Water drive condition · Scour multiple · Water injection multiple

1 Introduction At present, more and more old oilfields enter the high water cut stage. Due to the interlayer and plane heterogeneity, the injected water will burst and tongue advance, which makes the oil well water breakthrough early. A considerable amount of reserves will be produced in the high water cut stage. Therefore, the research on the water drive situation in the high water cut stage is more and more important, Han Da Kuangjian thinks that the main direction to improve oilfield development effect is to continue to improve water drive recovery in high water cut period. In the high water cut stage, reservoir parameters will change due to long-term water erosion, and the water drive situation in the high water cut stage has great changes compared with the initial stage of development [1]. In view of the characteristics of large total water injection and serious erosion in high water cut stage, the concepts of erosion multiple and water injection multiple are proposed to characterize the influence of reservoir parameter changes on water drive in water cut stage [2]. This paper analyzes the influence of rhythm, scour ratio and water injection ratio of 63 * 4 unit in upper Xiguan section of Gudong 7 area on recovery degree and remaining oil distribution, and puts forward measures for tapping the potential of remaining oil. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 149–153, 2022. https://doi.org/10.1007/978-3-030-99581-2_20

150

D. Hu

2 Study on Water Drive Development Law in High Water Cut Stage Waterflooding still plays an irreplaceable role in oilfield development. The theory and development of waterflooding is still an important research topic in oilfield development system. The oilfields in eastern China have generally entered the stage of high water cut development, but the old oilfields with high water cut are still the main body of oilfield development from the perspective of reserves and annual production. Therefore, it is necessary to make a detailed analysis of the water drive production characteristics and development law in high water cut period. 2.1 Analysis of Mining Characteristics The low water cut oil recovery period is the stage when the main oil layers give full play to their functions, water injection is effective and the oil field is on production. At this stage, the injected water continuously replenishes energy, the oilfield water injection takes effect quickly, the oil production increases rapidly, and the water cut changes little. For the large and medium-sized multi-layer sandstone reservoirs with insufficient natural energy, the water flooding development has a high utilization rate, which can maintain the pressure of the formation and keep the oil well in a long low water cut production period [3]. According to the development status of oil layers, the actual oilfield should carry out early separate layer water injection and maintain pressure production, so as to meet the development index requirements of low water cut oil recovery stage, and produce 20% of recoverable reserves. 2.2 Study on the Law of Water Drive Development Many oilfields in Shengli Oilfield have entered the stage of high water cut development, and the comprehensive water cut of 19 oilfields has reached more than 90%. This paper focuses on the development status of Shengtuo, Gudao, Gudong and Chengdong oilfields, and obtains the production law of development units in the stage of high water cut. The trend analysis law obtained from the research has a certain guiding role for the prediction of development indexes of oilfields in the stage of high water cut, This paper analyzes the reasons for the change of development law, and provides the basis for determining the evaluation index and formulating the evaluation standard [4]. The development units with high water cut are mainly medium and high permeability reservoirs, while low permeability reservoirs are relatively few. Therefore, this paper mainly analyzes the water drive development status of high water cut period for medium and high permeability reservoir. The above recoverable reserves should be recovered in the high water cut stage, and the water cut rising curve is convex (as shown in Fig. 1). It can be seen that the high water cut stage is an important oil recovery stage of the oilfield.

Simulation and Analysis of Influencing Factors of Water Drive

151

Fig. 1. Water cut recovery curve of high permeability reservoir

3 Production Capacity Change Law Generally, oil production index, fluid production index or dimensionless fluid production index are used to evaluate production capacity. In high water cut stage, with the increase of water cut, the oil recovery index decreases. The production index is the daily oil production per unit pressure difference. When the fluid is in single phase (no free period) flow state in the reservoir, the oil recovery index of different working systems is basically the same: JO = qo /(P − Pwf )

(1)

When the fluid is in the multiphase (with free gas) flow state in the reservoir, the oil recovery index is different under different working systems: JO = qo /(P − Pwf )n

(2)

In the process of water injection development, especially after entering the high water cut stage, the water saturation of the reservoir increases continuously. In the relative permeability curve, the relative permeability of oil phase decreases gradually, the relative permeability of water phase increases, the partial flow of water increases, and the water cut increases rapidly. From Eq. (2), it can be seen that with the decrease of the relative permeability of oil phase, the dimensionless oil recovery index decreases continuously, especially in the high water cut stage, The decline rate of dimensionless oil recovery index increases obviously [5].

4 Remaining Oil Potential Tapping Measures At present, it is in the high water cut stage, but the numerical simulation technology shows that there is still a large amount of remaining oil in the underground. In order to further enhance the oil recovery, combined with the numerical simulation technology,

152

D. Hu

the measures to tap the potential of remaining oil in the block are proposed. The swept volume of 632 layer is small, the degree of water flooding is low, the remaining oil is more, and a large amount of water flows to the bottom. Therefore, it is necessary to exploit it separately and develop the layered system. The infill well pattern can be used to further improve the injection production system, change the direction of liquid flow, prevent a large amount of injected water from flowing into the dominant channel, improve the utilization rate of water, and increase the sweep efficiency. 641 and 642 layers have been flooded, so there is little room to improve water flooding recovery. Other development methods, such as chemical flooding, can be considered to reduce water oil mobility ratio and oil-water interfacial tension, so that residual oil can be turned into movable oil to improve oil recovery [6]. According to the above analysis, the remaining oil potential tapping measures are optimized for 63 layers, and the injection production well pattern is improved on the basis of subdivision of layers. The numerical simulation shows that the remaining oil potential tapping measures can improve water drive control and water drive, and the water drive effect is obviously improved.

5 Study on Evaluation System of Water Drive Condition 5.1 Analysis on Evaluation Index of Water Drive Condition In the process of oilfield water injection development, it is necessary to continuously master the water injection performance, clarify the water injection status, and further evaluate the water injection development effect. In the process of waterflooding development in oilfields with similar geological characteristics, the effect of waterflooding development is different under different development conditions (such as division of development strata, well pattern density, displacement speed, well pattern mode, etc.) [7]. Therefore, the geological factors of the reservoir itself and the development factors in the actual production have an impact on the actual development effect, and the geological factors have been considered in the actual modeling, so the main development factors can be evaluated [8]. The so-called development technical indicators are the variables describing the changes of some dynamic parameters in the development process, which are used to evaluate the development dynamic status of the management unit. 5.2 Comprehensive Evaluation Method of Water Drive Condition It is one of the important tasks of oilfield development to evaluate the water drive status reasonably and accurately. According to the different water cut stages of oilfield development, the development indexes are also quite different [9]. When the oilfield enters the high water cut stage, in order to increase the utilization rate of injected water, reduce the invalid water circulation, increase recoverable reserves, and improve the effect of water drive development, a complete set of evaluation index system is needed to evaluate it, so as to objectively evaluate the water drive status, and guide the oilfield to formulate effective adjustment measures, Reasonable development plan is used to improve oil recovery and further tap more remaining oil [10].

Simulation and Analysis of Influencing Factors of Water Drive

153

6 Conclusion Through the experimental method and numerical simulation method, it is found that crude oil viscosity, well pattern density, heterogeneity, injection production ratio, water injection multiple and scour multiple have great influence on water drive condition. The dynamic sweep efficiency is studied quantitatively, and the expressions of dynamic sweep efficiency under different injection multiples of 40 mpas and ompas oil viscosities of 5-point well pattern plane mean model and vertical homogeneous and heterogeneous model oil viscosities are established.

References 1. Li, Y.: Practice of improving water drive recovery in continental high water cut reservoir. Acta Petrologica Sinica 30(3), 396–399 (2009) 2. Hu, Y., Wang, Y., Yang, S., et al.: Adjustment of development technology policy in late high water cut stage of waterflooding oilfield. Acta Petrologica Sinica 25(5), 65–69 (2004) 3. Fu, Y., Feng, M., Liu, H., et al.: Analysis of remaining oil distribution and control factors in high water cut oilfield. Drill. Prod. Technol. 33(6), 61–63 (2010) 4. Yang, C., Bai, X.: Exploration and practice of optimization, adjustment and transformation of old Daqing Oilfield. Petrol. Eng. Constr. 30(2), 1–9 (2004) 5. Juanjuan, H.: Study on factor analysis and evaluation system of water drive in high water cut stage. China University of Petroleum (2011) 6. Dai, Y.: Research on development effect evaluation method and application of high water cut oilfield. Heilongjiang Sci. Technol. Inf. (10) (2016) 7. Gong, B., Li, S., Tian, X., Zhang, J.: System engineering method for evaluating the development effect of water drive oilfield. Daqing Petrol. Geol. Dev. (05) (2015) 8. Su, Y., Wang, Y., Miao, F.: New development index evaluation system of water drive sandstone reservoir. China Offshore Oil Gas (03) (2015) 9. Yin, D., Guo, Z., Zhang, C.: Application of grey correlation method and fuzzy evaluation method to evaluate the development effect of water drive in ultra-high water cut stage. Pract. Underst. Math. (12) (2015) 10. Miao, F., Zhang, H., Zhang, Y., Mou, C., Biemengjun: A new method for evaluating the development effect of decline rate index of water drive oilfield. Fault Block Oil Gas Field (03) (2015)

Design of the Evaluation Index System of Human Resources Ecosystem in Emerging Industries Based on Big Data Wei Hu(B) University of Chinese Academy of Social Sciences, Hangzhou 310000, Zhejiang, China [email protected]

Abstract. The human resources of emerging industries are the most important factor affecting the development of the industry. The human resources ecosystem of emerging industries includes two parts: human resources in the industry and the ecological environment of human resources inside and outside the industry. These two parts can be evaluated from the ecological point of view, and can be divided into three evaluation indexes: the viability, competitiveness and development of human resources of emerging industries. Survival and competitiveness reflect the human resources of emerging industries, and development reflects the ecological environment of human resources of emerging industries. Based on the background of big data, this paper designs the evaluation index of human resources ecosystem of Xingye, which provides a scientific method for the evaluation of human resources of emerging industries, and provides a theoretical basis for the sustainable development of industries. Keywords: Emerging industries · Human resources · Ecosystem · Niche · Evaluating indicator

1 Introduction The emerging industries are high-tech industries with high technology density, knowledge intensive and talent intensive. The key to accelerate the development of emerging industries and to comprehensively improve the level of industrial technology and international competitiveness lies in talents. Human resources play an important role in leading, supporting and protecting the development of emerging industries, and it is the foundation of the development of emerging industries. From the ecological perspective, an industry is similar to biological species, and it is also a functional organism with material exchange [1]. Its survival and development process is full of complexity, dynamic and tortuous. The industry forms leading team, talent resources, technology level, product market, economic benefits and asset scale through the embedding of resources and space, which becomes an important factor to promote the development of industry and the change of external environment, and it is also transformed into the ecological characteristics of industry adapting to environmental change, among which human resources is © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 154–161, 2022. https://doi.org/10.1007/978-3-030-99581-2_21

Design of the Evaluation Index System of Human Resources Ecosystem

155

the most important factor [2]. The human resource ecosystem of emerging industries is a subsystem of the emerging industry ecosystem, which is a conscious choice to adapt to the changes of external environment and internal structure of the industry, so as to ensure the succession of human resource planning, management, implementation and evaluation of emerging industries, To ensure the interweaved catalysis and interactive evolution of the relationship between human resource management and the core competence of industry to shape the competitive advantage improvement. Therefore, it is necessary to study the human resources of emerging industries from the ecological perspective [3].

2 The Structure and Evaluation Framework of Human Resource Ecosystem in Emerging Industries 2.1 Structure Analysis of Human Resource Ecosystem in Emerging Industries According to the theory of industrial ecology, the human resource ecosystem of emerging industries is a special composite ecosystem with human resources as the main body. It has the specific distribution of material, energy and information flow, and depends on the resources and services provided by the natural biosphere. The core of the system is to promote the development and evolution of the original industrial human resource system by imitating the operation rules of the natural ecosystem, Thus, a complex ecosystem with the coordinated development of natural ecosystem is formed. In the theory of ecological psychology, the theory of ecosystem holds that the analysis of psychology and behavior should be placed in the background of space and time. In terms of space system, from small to large, they are micro system, intermediate system and external system. The system includes and interacts with each other, and forms a model of superposition like onion. The research on human resources in emerging industries should be carried out in the context of the whole ecosystem [4]. In the human resources ecosystem of emerging industries, micro system is the human resource individual in the emerging industry, the intermediate system is the human resource environment in the emerging industry, and the external system is the external human resource environment of the emerging industry in the first - fixed region. The human resources of emerging industries are not only placed in various systems, but also the degree of interaction between human resources and environment, and also depends on the distance between environment and human resource living range [5]. The ecosystem is affected by the internal and external environment and human resource status of the industry. See Fig. 1 for the composition of human resource ecosystem of emerging industries.

156

W. Hu

Fig. 1. Human resource ecosystem structure of emerging industries

2.2 Overall Framework Analysis of Human Resource Ecosystem Evaluation of Emerging Industries The operation of human resource ecosystem in emerging industries is conditional. In a specific period, human resource has a certain quality, quantity and scale. Emerging industries can only use or occupy specific human resource ecological factors at a certain stage. These human resource ecological factors are reasonably allocated and utilized, and combined with the internal organizational structure of the industry to form the human resource niche of emerging industries. The niche of human resources in emerging industries refers to the specific position of human resources in the environment of emerging industries [6]. According to the theory of ecology, the niche of any biological unit mainly depends on “state” and “potential”. State refers to the state of biological unit, which is the result of growth and development, learning, social and economic development and interaction with environment in the past “Potential” refers to the actual influence or dominant power of biological units on the environment, such as the rate of energy and material transformation, productivity, growth rate, economic growth rate, and the ability to occupy new habitats. The “state” and “potential” of human resource ecosystem in emerging industries are mainly manifested in the exchange and transformation of material, energy and information between individuals and industrial environment; The metabolism of human resource itself, that is, the internal operation of various components of human resources and the coordination of human resources. The “state” of human resources in emerging industries is the state of human resources in emerging industries, which is the result of the past establishment, development and interaction with the environment. It constitutes the viability of human resources in emerging industries, that is, the performance level of human resources; The “potential” in the human resources of emerging industries is the actual influence or domination of individuals on the environment of emerging industries, which constitutes the competitiveness of human resources of emerging industries, that is, the quality of human resources; The combination of “state” and “potential” refers to the relationship between human resources in emerging industries and the elements of industries, that is, the development power of human resources in emerging industries, that is, the ecological environment of human resources in emerging industries. Survival and competitiveness reflect the human resources situation of emerging industries, and

Design of the Evaluation Index System of Human Resources Ecosystem

157

development reflects the human resources ecological environment situation of emerging industries [7]. The relationship between the indicators in the human resource ecosystem of emerging industries is shown in Fig. 2.

Fig. 2. The relationship diagram of the indexes of the ecosystem

The existing performance level of human resources in emerging industries reflects its quality level and is affected by the quality level. That is, the survival and development of human resources in emerging industries have mutual influence. Secondly, the human resource quality of emerging industries affects the human resources ecological environment in the region. If the human resources in the region have higher quality, the whole and the ecological environment of human resources will be improved. Meanwhile, the good ecological environment of human resources in the region promotes the overall quality of human resources in the emerging industry. That is, the competitiveness of human resources and the development of emerging industries interact. Finally, the performance level of human resources in the emerging industry is closely related to the overall human resources ecological environment in the region. If the overall human resource performance level of the emerging industry is high, a better human resource environment will be created, and the good human resources ecological environment in the region will also produce high-level human resource performance. Therefore, the survival and development of human resources in emerging industries have mutual influence [8].

3 Evaluation Index of Human Resource Ecosystem in Emerging Industries According to the above discussion, the evaluation of human resource ecosystem in emerging industries is divided into three levels, namely, survival, competitiveness and development.

158

W. Hu

3.1 Evaluation Index of Human Resource Viability in Emerging Industries The survival of human resources in emerging industries mainly refers to the performance indicators of human resources. Performance reflects the results of people doing certain jobs. The emerging industry should pay attention to the performance level of its human resources, and its human resource performance level reflects the development of the industry. Only if every enterprise in the emerging industry is in a good development condition, the whole industry can continue to develop. This paper starts from the characteristics of human resources in emerging industries and constructs evaluation indicators. Because of the large number of scientific research personnel in the industry, the researchers measure their performance level from the quantity and quality of scientific research, including the quantity of scientific research achievements and the number of patents; The quality includes the level of scientific research achievements, the application value of scientific research achievements and professional technical positions [9]. Other employees in the industry are mainly measured from the perspective of work efficiency. 3.2 Evaluation Index of Human Resource Competitiveness of Emerging Industries in District and City The competitiveness of human resources in emerging industries mainly refers to the quality index of human resources. The index mainly includes the following aspects. (1) Physical quality. Physical quality is an important part of competence. Because of the majority of human resources in emerging industries engaged in science and technology and innovation, the strength and difficulty of the new industry have certain requirements for physical quality, and good physical quality has an important influence on the level of work in the emerging industry. Physical quality is an index that can be quantified and analyzed, which can be measured from three aspects: physical fitness, exercise status and attendance. Physical fitness can be tested according to physical examination, reflecting the basic physical condition of human resources in emerging industries. The exercise status can be measured by the number of exercises, the more exercise times, the better the physical quality. Attendance can be measured from attendance rate, the higher the attendance rate, the better physical quality. (2) Psychological quality. Psychological quality is also an important part of the competence of employees. Emerging industry is a deep combination of emerging technology and emerging industry. It combines three key words, namely emerging technology, emerging industry and strategy, which plays an important role in industrial structure adjustment. Therefore, the development of emerging industries is exploratory, The human resources in this environment will inevitably face more changes and challenges, so the psychological quality of human resources in emerging industries is very important. This paper, based on the characteristics and requirements of emerging industries, measures the psychological quality of human resources in the emerging industries from four aspects: thinking, professional ethics, achievement motivation and willpower.

Design of the Evaluation Index System of Human Resources Ecosystem

159

(3) Knowledge and skills. As the main body of innovation, the human resources of emerging industries must have professional knowledge and skills to realize scientific and technological innovation. The quantitative evaluation can be made from the aspects of education, professional skills, foreign language and computer level. The degree of education is the degree of formal education, generally measured by the highest degree of education. The level of professional skills is the level of individual mastery of professional knowledge and professional skill level. The degree of professional knowledge can be measured from the depth and breadth of mastering professional knowledge, and the level of professional skills is measured from its actual operation level. The level of foreign languages and computers can be measured by the foreign language and computer level obtained [10].

4 Evaluation Index of Human Resource Development in Emerging Industries The evaluation of human resource eco-environment of emerging industries can be divided into two parts: internal environment layer evaluation and external environment layer evaluation. The internal environment layer of human resources in emerging industries is mainly the evaluation of human resources environment in emerging industries. The evaluation of the external environment layer of human resources in emerging industries mainly reflects the situation of human resources outside the industry in the region and the related regional environment. 4.1 Evaluation Index System of Industry Internal Environment Layer The internal environmental evaluation of emerging industries mainly refers to the evaluation of human resource environment in the industry. From the perspective of ecosystem, the human resources of emerging industries and the internal environment of the industry are interdependent. Therefore, the evaluation of the internal environment of emerging industries mainly designs indicators from the perspective of the impact of emerging industries on human resources. As the most complex and dynamic resource in the emerging industry, human resource management should focus on each function module of human resource, and fully mobilize human resource to realize the industrial development strategy. The evaluation index of human resource environment in emerging industries is mainly from three aspects: the stability and sustainable development of human resources in the industry and the job satisfaction of employees. (1) Stability. Whether emerging industries can retain talents can be judged by the stability of human resources. We can measure the stability of human resources in emerging industries mainly from the loss rate of human resources. (2) Sustainability. This index mainly reflects whether emerging industries have certain ways to promote the sustainable development of human resources. Incentive is a way of external control to promote the sustainable development of human resources in emerging industries, which can be reflected by the competitiveness of the industry salary. Training is an important means for enterprises in emerging industries to

160

W. Hu

improve the knowledge and skills of human resources and enhance their learning ability. If the knowledge and skills of human resources are improved, the learning ability of the whole industry can be improved. It is a way to promote the sustainable development of human resources from within human resources. We can use the industry average training investment as a measure. 4.2 Evaluation Index System of Industrial External Environment Layer The external environment evaluation of emerging industries mainly reflects the situation of human resources in the region and related regional human resources policies. As the human resource environment in a certain region has a significant impact on the emerging industry, it is necessary to understand the external human resource situation of the industry for the development of the emerging industry, and to evaluate the external human resource environment of the emerging industry. Combined with the characteristics of human resources in emerging industries, the external environment evaluation of human resources in emerging industries is mainly composed of the economic status, scientific and technological status, cultural status, education status, living environment and human resources policy of the region. This index reflects the current situation and future potential of the regional environment, and reflects whether the human resources in emerging industries are competitive. (1) The state of the economy. The index can be measured by the per capita GDP of the region, reflecting the economic status of the region. (2) The state of science and technology. It can be measured by the number of scientific research institutions, R & D expenditure, regional human resource patent applications, scientific research papers published, scientific and technological inventions and other indicators. (3) Cultural status. It can be measured by regional cultural development index. (4) Education. It can be measured by the number of colleges and universities in the region, the number of scientific research institutes, the number of students in Colleges and universities, the number of regional human resources with various academic qualifications, the number of years of education of human resources in the region and the human learning rate of higher education. (5) Living environment. It can be measured from the security, social security, transportation convenience, wage level and consumption level of the region.

5 Conclusion In this paper, the human resource ecosystem evaluation of emerging industries is based on the theoretical framework of human resource ecosystem evaluation. The evaluation index system of human resource ecosystem of regional emerging industries based on niche theory is established, which is evaluated from three aspects of survival, competitiveness and development. Through the evaluation of human resource ecosystem of emerging industries, it can help to determine the current situation and problems of human resources of emerging industries in China, provide scientific basis for the rational formulation of human resource policies and systems of emerging industries, and then effectively improve the efficiency of human resources of emerging industries.

Design of the Evaluation Index System of Human Resources Ecosystem

161

References 1. Yan, A.: Introduction to Human Resource Ecosystem – Preliminary Construction and Application of the System. Economic Management Press, Beijing (2011) 2. Shang, H., Hui, S.C., Zheng, X.C.: Study on the evaluation of urban human resource ecosystem in Liaoning Province based on niche model. Sci. Res. Manag. 35(11) (2014) 3. Wang, Z.H., Wu, C.Y.: Comparative study on industrial symbiosis model based on industrial ecology. Sci. Sci. Manag. Sci. Technol. (2) (2002) 4. He, W., Song, G.: Theoretical orientation and significance of ecological psychology. J. Nanjing Normal Univ. (Soc. Sci. Edn.) 7(4) (2012) 5. Shang, H., Hui, S., Zheng, X.: Evaluation of urban human resources ecosystem in Liaoning Province based on Niche model. Sci. Res. Manag. (11) (2014) 6. He, W., Song, G.: Theoretical orientation and significance of ecological psychology. J. Nanjing Normal Univ. (Soc. Sci. Edn.) (04) (2012) 7. Wang, B.: Summary of talent research in the development of domestic strategic emerging industries. Sci. Technol. Econ. Market (01) (2017) 8. Wang, B.: Construction of talent support system for strategic emerging industries. Chin. Foreign Entrepreneurs (01) (2017) 9. Li, S., Liu, Y., Dong, S., Shanxi, N.: Analysis on financial support for the development of strategic emerging industries in Jiangsu province. (24) (2020) 10. Wang, Z., Wu, C.: Comparative study on industrial symbiosis model based on industrial ecology. Sci. Sci. Manag. Sci. Technol. (02) (2002)

Study on the Role of Big Data Age in Making Fitness Programs for Individual Science Chenqi Xiang(B) School of Public Administration, Chongqing Vocational College of Transportation, Chongqing 402247, China [email protected]

Abstract. With the rapid social change and the era of big data technology, the sports industry data management is more scientific and effective to promote the development of the industry. The collection and feedback of personal fitness related data will greatly promote the achievement of fitness effect. This paper will use the methods of literature review, questionnaire survey and interview to study the effect of big data technology on the development of personal fitness program. The results show that big data technology can play an important role in the development of personal fitness program in the following five aspects. The realization of realtime sports data access and physique test data access can track and analyze the citizens’ fitness electronic files for a long time, Experts give accurate scientific fitness guidance to establish a complete scientific fitness closed-loop system from fitness test, scientific fitness guidance to health effect feedback. The pilot project of “body + medicine” mode has clear calculation and display of energy data related to various sports and food. This study provides an effective development path and direction for the application of big data technology in the fitness industry. Keywords: Big data · Scientific fitness · Impact

1 Introduction With the in-depth development of the national fitness program, people’s awareness of fitness is increasing. But at the same time, the problem is that due to the lack of professional knowledge, personal fitness is lack of scientific, systematic and effective, which greatly weakens and hinders the effect of mass fitness, and even brings unexpected injuries [1]. Therefore, with the development of science and technology, the mass has higher and higher requirements for scientific individualization of fitness, and the way of fitness is undergoing fundamental changes. How to make the masses know their current physical condition in time, scientifically and correctly choose the way and intensity of fitness, avoid blind exercise, put an end to injuries, and truly improve the health level of the masses has become a topic in front of the government reform and fitness enterprises [2]. Data has become an important asset to carry out research. In terms of making personal fitness plans, it is also inseparable from big data technology, because people are affected by the body and the objective environment, and © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 162–166, 2022. https://doi.org/10.1007/978-3-030-99581-2_22

Study on the Role of Big Data Age in Making Fitness Programs

163

change every moment. Only by synthesizing these data changes and studying and analyzing them, can we scientifically provide data and basis for the final formulation of personal fitness plans. Some sports companies have developed some fitness app application software and programs, But the data technology and analysis basis still stay in the age, gender, height, weight and other basic data, can not fully reflect the real situation of fitness.

2 Basic Introduction of Big Data 2.1 Overview of Big Data Overview of big data big data refers to the data set that cannot be captured, managed and processed by conventional software tools within a certain period of time. It is a relative concept because the current storage and computing mode and ability can not meet the needs of storage and processing the existing data set scale. Big data mining is a process of discovering valuable and potentially useful information and knowledge from massive, incomplete, noisy, fuzzy and random large databases. It is also a decision support process [3]. The common methods of big data mining include classification, regression analysis, clustering, association rules, neural network method, web data mining and so on. These methods mine data from different angles. 2.2 ID3 Algorithm ID3 algorithm is a kind of decision tree, which is based on the principle of Okam’s razor, that is to do more with less. In information theory, the smaller the expected information, the greater the information gain and the higher the purity. The core idea of heart D3 algorithm is to measure the selection of attributes by information gain, and select the attribute with the largest information gain after splitting to split. The algorithm uses top-down greedy search to traverse the possible decision space. The main calculation algorithm is as follows: 5 9 5 9 log2 − log2 = 0.940259 14 14 14 14

(1)

2 2 3 3 Entropy(sunny) = − log2 − log2 = 0.970951 5 5 5 5

(2)

Entropy(S) = −

3 Research on Big Data Technology and the Development of Personal Fitness Program Under Its Background 3.1 Application Status of Big Data With the continuous development of science and technology and society, people have higher and higher requirements for fitness, more scientific, convenient and effective way of fitness is more and more needed. Now is the Internet information age, data has become

164

C. Xiang

one of the important assets of the Internet, for many things, it is the most basic basis of scientific judgment [4]. Nowadays, big data has been used in all walks of life, and big data strategy has been listed as an important development strategy by the state. Therefore, big data technology also plays a very important role in the development of personal fitness program, because people are different from other things. People are affected by the body and environment at any time and are changing all the time [5]. Only by synthesizing the changes of these data and then studying and analyzing them, can we scientifically provide accurate basis for the development of personal fitness program. 3.2 Advantages of Big Data Application I think many people are not very clear about the concept of big data. We are now before ten o’clock of big data. To put it simply, it is the result of the combination of massive data and perfect computing power. More specifically, the massive data generated by the mobile Internet and the Internet of things require people to collect, divide, calculate and analyze these data. If it is done manually, it is basically impossible to complete such a large amount of work. However, big data computing technology can perfectly solve these problems and bring great convenience to people, It also makes the results more accurate and convincing [6]. First of all, it gives a more detailed and comprehensive introduction to the development of big data technology and the new data emerging in the era of big data. The big data we are referring to now differ from the traditional data. The way it produces, the way of storing, the way of accessing and the form of simultaneous interpreting are very different from traditional data. Because big data is closer to the behavior data of a certain group, it is more comprehensive and accurate, and brings more value to people. Although people already have the awareness of fitness, there are always some big and small problems on the way to fitness, which are hidden in your shaping concept, exercise mode and eating habits. Maybe your fitness plan is perfect, but it can’t achieve the effect you want [7]. So at this time, you need to think about whether your fitness program is scientific and reliable.

4 The Premise of Scientific Fitness Under the Background of Big Data 4.1 Have a General Assessment of Your Physical Condition Before starting the road of fitness, it is necessary to understand your own physical condition. I think most people should be very clear about the basic data of body data and body height, so many people may not be clear about the body fat index, heart rate and other infrequent data. If you don’t know the data of your body, how can you make a fitness plan according to your body condition. So before fitness, it is necessary to ask a fitness coach to do a test for Baiji, and then adjust Baiji’s fitness plan according to the test results [8]. If you want to have a clear fitness goal, you need to have a goal in everything you do. Only in this way can you move towards the goal in a certain direction. Otherwise,

Study on the Role of Big Data Age in Making Fitness Programs

165

aimless rushing will only be thankless. So setting a small goal has an inestimable effect on the implementation of the whole fitness plan. Because challenge and evaluability can help you stick to your plan [9]. The expected good results will encourage you to never give up. Make a scientific training plan, such as losing 5 kg or 2 cm in a month. Keep these data in mind when exercising, and you will be more motivated. 4.2 Strengthen the Combination of Aerobic Training and Strength Training In order to quickly achieve the goal of reducing body weight, many people will focus on strength training, but they don’t know that hydrogen training and strength training are really the same. Strength training is very effective in increasing muscle group, so it is more useful to burn calories. However, hydrogen training is good for relieving pressure and relaxing mood. If we know how to combine hydrogen exercise and strength training perfectly, we will have better effect. The application of big data technology to make up for the deficiencies in the formulation of personal fitness plan. A few years ago, no one could imagine that they could enjoy the treatment of playing personal wonderful goals on the big screen of the stadium like CBA stars [10]. They had real-time statistical data of personal competition technology and won the title of scoring king, assists king and blocking king, Family members and friends can also see the live broadcast of the whole game all over the country [11]. All this can be achieved through a national basketball mobile app. If the performance is excellent, it is not only supported by scores, rebounds, assists and other data, but also can be used for his training analysis, Coaches can customize personalized training programs according to their specific performance in different colleges. With such big data assists, everyone who loves basketball can constantly improve their skills.

5 Summary and Exhibition Conclusion (1) it is conducive to the access of real-time sports data and physical fitness test data. (2) It can track and analyze the fitness electronic files for a long time. (3) Establish a complete scientific fitness closed-loop from the test, fitness guidance, health effect feedback data. (4) The pilot project of “built-up sports + medical treatment” mode. (5) Integrate life data to accurately measure real-time data of diet and consumption Looking forward to the development of big data technology, there is a large amount of data output in the sports industry [12]. The integration of industry and technology will accelerate the effective development of the industry. With the help of big data technology, personal fitness link is conducive to achieve more accurate, real-time and specific fitness programs [13]. At the same time, with the help of big data technology and the development experience of other fields, it is an effective way to form a long-term and effective integration of fitness related data of various platforms for the large-scale and effective development of fitness industry.

166

C. Xiang

References 1. Qiu, J., Ma, L.: Development and innovation of index and database in big data era. China Index (04) (2013) 2. Zhang, Y.: The “training revolution” of competitive sports – the enlightenment of 2014 ball games big data and physical training seminar. Chin. Sports Coaches (04) (2014) 3. Luo, Q., Wang, Q., Lin, L., Hou, D.: Theory and practice of sports public service system construction – taking some cities in Guangdong province as an example. Sports (17) (2016) 4. Xu, H., Wang, S., Xu, Z., Xu, W.: Empirical research on the two-way channel of sports culture in the era of big data. Sports Cult. Guide (11) (2015) 5. Xiao, T., Lin, M.C., Yang, F.: Research on the Internet service platform for young people’s scientific fitness guidance under the background of “Internet plus”. Sports Boutique (10) (2020) 6. Zhuang, Q., Zhang, L.: Types and construction of social sports fitness guidance volunteer team. J. Hubei Inst. Sci. Technol. (01) (2020) 7. Liao, S.: Research on the development strategy of fitness guidance and management specialty in Higher Vocational Colleges in Fujian province. Neijiang Sci. Technol. (05) (2020) 8. Zhang, H.: Teaching reform and practice of sports nutrition course for fitness guidance specialty. J. Chifeng Univ. (Nat. Sci. Edn.) (02) (2017) 9. Wang, H., Meng, B., Ding, C., Li, S.: Hebei Vocational Education (02) (2017) 10. Mao, L., Ju, G., Mao, S., Yao, J.: Construction of scientific fitness guidance service platform for community residents. Sports Cult. Guide (07) (2017) 11. Ma, T.: Analysis on cognition, demand and countermeasures of youth scientific fitness guidance service in Jinan. J. Qilu Normal Univ. (03) (2017) 12. Arts and Sciences: Research on the cultivation of fitness guidance ability of students majoring in Physical Education. Contemp. Educ. Pract. Teach. Res. (09) (2017) 13. Yin, W.: Investigation and research on the current situation of establishing sports fitness guidance stations in Chengdu. Sports Sci. Technol. Lit. Bull. (11) (2015)

Construction of Performance Evaluation System for Intelligent Simulation of University Research Under Big Data JiZhi Lin1(B) and Minghai Xin2 1 Science and Technology Research Department of Huaqiao University, Quanzhou 362021,

Fujian, China [email protected] 2 College of Computer Science and Technology, Huaqiao University, Xiamen 361021, Fujian, China

Abstract. Performance evaluation of scientific research can effectively improve the overall performance of construction projects and the core competitiveness of scientific research enterprises. Considering the financial situation, customer satisfaction, internal operation ability, agility, learning and growth of scientific research, this paper establishes a scientific research performance evaluation index system including 5 first level indicators and 15 s level indicators, and puts forward a BP neural network model to evaluate the scientific research performance. Taking the data of a construction enterprise in Qingdao in December 2017 as the sample, the performance of the enterprise in January and February 2018 is predicted after learning, and the results prove the feasibility of the method. Keywords: Scientific research · Performance evaluation · BP neural network

1 Introduction With the development of scientific research industry, management has become a new management mode of scientific research industry, and occupies a certain weight. Scientific research refers to a complete functional network structure from project design to project delivery and operation, which is composed of all project participants including owners, contractors, suppliers, subcontractors and supervisors, and involves two-way flow of logistics, capital and information flow, so as to meet the needs of owners and maximize the benefits of scientific research projects. Scientific research performance evaluation is an important part of scientific research management, which can reflect the operation status of scientific research and measure the realization degree of objectives [1]. Through the performance evaluation, we can understand the operation of each scientific research node, find out the problems and weaknesses in the operation process and analyze them, so as to provide support for managers to formulate strategies and improve the mechanism. Domestic scholars have used different evaluation methods to evaluate scientific research performance, among which Chen Yan and others chose © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 167–174, 2022. https://doi.org/10.1007/978-3-030-99581-2_23

168

J. Lin and M. Xin

benchmarking method as the main method to evaluate scientific research performance; Wang Haiqiang and Wang Yaowu studied scientific research performance evaluation method on the basis of conceptual model of maturity, and verified the feasibility of the proposed method through case analysis; Chen Weiwei and Zhang yunning based on uncertaintyAnalytic hierarchy process (AHP) established the objective optimization model, and combined with genetic algorithm to conduct a comprehensive evaluation of scientific research performance; Shen Yun and others used principal component analysis and key performance index method to evaluate the quantitative and qualitative indicators of scientific research performance, and then obtained the comprehensive evaluation results through AHP. In the evaluation process, the above methods have certain subjectivity for the determination of index weight, and the weight of each scientific research performance index is objective, and there is nonlinear correlation between them. This paper uses BP neural network learning, objective and dynamic characteristics to solve the problem of comprehensive evaluation of scientific research performance [2]. Performance evaluation refers to the comprehensive evaluation of the degree of achievement of the performance goal set by the central department to achieve its functions and the implementation results of the budget arranged to achieve this goal by using certain evaluation methods, quantitative indicators and evaluation standards. The process of performance evaluation is to compare the collected work performance of employees with the required work performance standards [3].

2 Construction of Performance Evaluation Index System and Evaluation Method (1) Critical event method It is required to keep a written record of the most favorable and unfavorable work behaviors. When such a behavior has a significant positive or negative impact on the efficiency of the Department, managers record it. Such an event is called a key event. In the later stage of performance appraisal, the evaluator uses these records and other information to evaluate the performance of employees. Merit: it is possible that performance appraisal conducted in this way will run through the whole evaluation stage, rather than focusing only on the last few weeks or months. Disadvantages: if a grass-roots supervisor has to evaluate many employees, it may take too much time to record these behaviors [4]. (2) Narrative method Just write a short narrative to describe the employee’s performance. This method tends to focus on the outstanding behavior of employees at work rather than the daily performance. This kind of evaluation method is closely related to the evaluator's writing ability. Because of their excellent writing skills, some supervisors can even describe a barely qualified worker as a model worker. Because there is no uniform standard, it may be difficult to compare narrative evaluation methods. Advantages: narrative evaluation method is not only the simplest, but also the best way to evaluate employees. Disadvantages: in a certain performance evaluation system, there are many specific methods for evaluation, which can achieve different purposes.

Construction of Performance Evaluation System

169

(3) Forced distribution method The evaluator needs to assign the members of the working group to a limited number of types similar to a normal frequency distribution. For example, put the best 10% of employees in the top level group, next 20% in the next level group, next 40% in the middle level group, next 20% in the penultimate level group, and the remaining 10% in the bottom level group. Advantages: this method is simple and clear-cut. Disadvantages: this method is based on the controversial assumption that all groups have the same distribution of excellent, average and poor employees. It is conceivable that if a department is full of excellent workers, it may be difficult for the Department Manager to decide who should be put in the lower level group [5]. (4) Employment report The evaluator is required to choose from a series of personal statements, and these people should be the employees who are most or least described. Disadvantages: one of the difficulties of this approach is that descriptive statements may be essentially the same. (5) Assessment Report Evaluators complete a form similar to forced selection of performance reports, but give different weights to different questions. Advantages: due to the choice of weights, it is more fair. Disadvantages: the determination of weights is sometimes controversial. (6) Operation standard method Operation standard method is a method to evaluate each employee & apos; performance with predetermined standard or expected output level. The standard reflects the general output of an ordinary worker operating at an average speed. Operational standards can be directly applied to all kinds of work, but they are mainly frequently used in production work. There are disadvantages: the standard is not easy to determine [6]. Permutation evaluators simply rank all the employees in a group in the order of total performance. For example, the best performers in a department are ranked at the top and the worst at the bottom. Disadvantages: the main problem with this method is that it is difficult to rank individuals when their performance levels are similar [7]. (7) Parallel comparison method Parallel comparison is an evolution of permutation. In this method, the performance of each employee is compared with that of other employees in the group. This comparison is often based on a single criterion, such as total performance. The employees who get the most favorable comparison results are ranked in the highest positionDisadvantages: this method is mainly suitable for production departments or marketing departments, some departments' performance itself is difficult to have a quantitative standard. The status and role of performance evaluation in human resource management: performance

170

J. Lin and M. Xin

evaluation is the basis for more reasonable allocation of human resources, and it is also the basis for reasonable promotion to measure whether the personnel of each position are successful or not. In addition, performance evaluation is also an essential part of the implementation of incentive measures. Whether the performance evaluation is fair or not is an important factor affecting the effectiveness of incentive measures in the next cycle.

3 BP Neural Network Model 3.1 Determine the Structure of BP Neural Network The number of layers of BP neural network structure is determined. Kolmogrov theory has proved that a three-layer BP neural network with one hidden layer can approximate any continuous function with any precision as long as there are enough hidden nodes. So this paper chooses three-layer BP neural network structure. The number of input layer nodes I and output layer nodes K of BP neural network are determined. In this paper, a total of 15 evaluation indexes are selected, so the number of input layer nodes I is 15. For the output layer, the results of scientific research performance evaluation are divided into four levels: excellent, good, medium and poor. The output node K is 4, which is expressed by four-dimensional vector: when the output is (1, 0, 0, 0), the performance evaluation result is excellent; when the output is (0, 1, 0, 0), the performance evaluation result is good; when the output is (0, 0, 1, 0), the performance evaluation result is good. When the output is (0, 0, 0, 1), the performance evaluation result is poor. The number of hidden layer nodes J of BP neural network is determined up to now. There is no relevant theory that can accurately predict the number of hidden layer nodes of BP neural network, and the “trial and error method” is mostly used to determine the number of hidden layer nodes [8]. In this paper, considering that the nonlinear mapping ability of single hidden layer neural network is weak, for the same problem, in order to get the predetermined mapping relationship, the number of hidden layer nodes should be more, in order to increase the adjustable parameters of neural network, so the number of hidden layer J is finally determined to be 6. 3.2 Principle of BP Neural Network 3.2.1 Standardization of Indicators Considering that there are benefit type and cost type indicators in the performance of scientific research, it is necessary to standardize the indicators. The benefit type indicators are treated according to formula (1) and the cost type indicators are treated according to formula (2). X =

A − Amin Amax − Amin

(1)

X =

Amax − A Amax − Amin

(2)

Construction of Performance Evaluation System

171

In formulas (1) and (2), a is the original value of the performance index, X is the normalized index value, and Amax and Amin are the maximum and minimum values of the same index value. For qualitative indicators (such as environmental protection control ability), first convert them into numerical indicators, and then normalize them according to the above method. 3.2.2 Training Process of BP Neural Network Algorithm For the above BP neural network, it is set as the connection weight from the input layer to the hidden layer, the connection weight from the hidden layer to the output layer, the threshold value of the hidden layer and the threshold value of the output layer unit. A random number between (−1, 1) is randomly assigned to the connection weight from input layer to hidden layer, the connection weight from hidden layer to output layer, the threshold value of hidden layer and the threshold value of output layer [9]. Provide a pair of learning samples (input and expected output values), give the input vector. The value of Xi is input into the input layer node for forward calculation. xj = f (

m 

wij xj − θj )(j = 1, 2, ...u)

(3)

wjk xj − θk )(j = 1, 2, ...n)

(4)

i=0

yk = f (

m  i=0

Calculate the error between the output value {} and the expected output value δk = yk (1 − yk )(ˆyk − yk )

(5)

The BP neural network is shown in Fig. 1

Fig. 1. Schematic diagram of BP neural network

In the history of the development of artificial neural network, MLP (multi layer perceptron) network has played a great role in the development of artificial neural network. It is also considered to be a real model of artificial neural network. Its emergence has set

172

J. Lin and M. Xin

off an upsurge in the study of artificial neural network. Single layer perceptual network (M-P model), as the original neural network, has the advantages of clear model, simple structure and small amount of calculation. However, with the deepening of research work, it is found that it still has some shortcomings, for example, it can not deal with nonlinear problems. Even if the action function of the calculation unit uses other complex nonlinear functions instead of valve functions, it can only solve the linear separable problem and can not realize some basic functions, which limits its application. The only way to enhance the classification and recognition ability of the network and solve the nonlinear problem is to use the multi-layer feedforward network, that is, to add a hidden layer between the input layer and the output layer. A multilayer feedforward perceptron network is constructed. In the mid-1980s, David runelhart. Geoffrey Hinton, Ronald w-llians and David Parker independently discovered the error back propagation training (BP) algorithm, which systematically solved the problem of learning the hidden layer connection weights of multilayer neural networks, and gave a complete mathematical derivation. The multilayer feedforward network which uses this algorithm for error correction is called BP network. BP neural network has the ability of arbitrary complex pattern classification and excellent multi-dimensional function mapping, which solves the exclusive or (XOR) and some other problems that can not be solved by simple perceptron. In terms of structure, BP network has input layer, hidden layer and output layer; in essence, BP algorithm takes the square of network error as the objective function and uses gradient descent method to calculate the minimum value of the objective function. Artificial neural network does not need to determine the mathematical equation of the mapping relationship between the input and output in advance, only through its own training, learning some rules, and getting the closest result to the expected output value when the input value is given [10]. As an intelligent information processing system, the core of artificial neural network is algorithm. BP neural network is a kind of multilayer feedforward network trained by error back propagation (referred to as error back propagation). Its algorithm is called BP algorithm. Its basic idea is gradient descent method. Gradient search technology is used to minimize the mean square error between the actual output value and the expected output value of the network. The basic BP algorithm includes two processes: the forward propagation of signal and the back propagation of error. That is to say, the error output is calculated in the direction from input to output, while the weight and threshold are adjusted in the direction from output to input. In forward propagation, the input signal acts on the output node through the hidden layer, and the output signal is generated through nonlinear transformation. If the actual output is not consistent with the expected output, it will turn into the error back propagation process. Error retransmission is to retransmit the output error layer by layer through the hidden layer to the input layer, and allocate the error to all units of each layer. The error signal obtained from each layer is used as the basis for adjusting the weight of each unit. By adjusting the connection strength between the input node and the hidden node, the connection strength between the hidden node and the output node and the threshold, the error decreases along the gradient direction. After repeated learning and training, the network parameters (weights and thresholds) corresponding

Construction of Performance Evaluation System

173

to the minimum error are determined, and the training stops. At this time, the trained neural network can deal with the input information of similar samples by itself, and the non-linear transformed information with the smallest output error. BP network is mainly used in the following four aspects. 1) Function approximation: train a network with input vectors and corresponding output vectors to approximate a function. 2) Pattern recognition: use a pending output vector to connect it with the input vector. 3) Classification: classify the input vector in the appropriate way. 4) Data compression: reduce the dimension of output vector to facilitate transmission or storage.

4 Conclusion In this paper, through the research of BP neural network model on scientific research performance evaluation, the main conclusions are as follows: (1) Using BP neural network to evaluate scientific research performance index can comprehensively consider a large number of influencing factors, including both qualitative and quantitative, which is advanced, accurate and simple. (2) Most of the performance indicators used to evaluate scientific research performance come from university data statistics. The subjectivity of human factors has been effectively avoided, and the increasing learning samples also objectively improve the accuracy of the evaluation, making it more and more widely applicable.

References 1. Zhao, Y., Cao, Z., Zhang, S.: Evaluation and construction of university scientific research system based on national innovation system. Res. Sci. Technol. Manag. 32(10), 110–113 (2012) 2. He, T., Zhao, Y.: Research on performance evaluation system of university scientific research team based on input-output perspective. China Internal Audit 02, 91–95 (2021) 3. Huang, Y., Guo, H., Wang, J.: Research on innovation of performance evaluation system of scientific research funds – taking universities as an example. Res. Educ. Acc. 31(05), 60–69 (2020) 4. Wan, S.Y., Liu, S.A.: Performance evaluation of scientific research investment in Colleges and universities from the perspective of subject classification. Educ. Sci. 36(04) 57–62 (2020) 5. Zhong, L., Yuan, J., Lou, M.: Research on intelligent simulation technology of structural state. J. Wuhan Univ. (Inf. Sci. Edn.) (10), 932–935 (2005) 6. Ding, P.: Construction of higher vocational teachers’ performance evaluation system under the new situation: problems and countermeasures. Vocat. Educ. Forum. (26) (2017) 7. Li, Y.: On the performance evaluation of teachers in Higher Vocational Colleges. China Adult Educ. (21) (2014)

174

J. Lin and M. Xin

8. Li, H.: Research on the effectiveness of teacher performance evaluation system in Higher Vocational Colleges. Chongqing High. Educ. Res. (04) (2015) 9. Zhang, L.: On the reconstruction of teacher performance evaluation system in Higher Vocational Colleges under the background of “double high schools”. Mod. Vocat. Educ. (10) (2021) 10. Liu, J.: Research and practice of teacher performance evaluation system in Higher Vocational Colleges. Mech. Vocat. Educ. (12) (2013)

Analysis of 3D Modeling and Detection of Wrong Action in Sports Training Yi Shao(B) and Ye Wu Shanghai Customs College, Shanghai 201204, People’s Republic of China [email protected]

Abstract. In sports training, only by accurately identifying the wrong movements of athletes can we provide scientific guidance for athletes. Based on this, this paper proposes an action recognition algorithm based on 3D modeling detection, which can realize the reconstruction and analysis of visual images. From the simulation results, using this method can achieve 86% recognition rate, and the average detection time can be shortened by 1.5 s, so it can meet the requirements of error detection in sports training. Keywords: Three dimensional modeling detection · Sports training · Wrong action judgment

1 Related Concepts of Personalized Recommendation System In sports action recognition, computer image processing technology has been widely used. But at present, there are all kinds of complex movements in sports training. It is difficult to accurately judge the wrong movements by relying on the traditional contour detection method, which makes the athletes unable to get the action correction in time. The application of three-dimensional modeling detection method can strengthen the computer vision image analysis and reconstruction processing, and improve the accuracy of error action judgment.

2 Analysis of Wrong Action Recognition in Sports Training In sports training, visual recognition technology is used, mainly through the decomposition of three-dimensional contour features to complete the wrong action recognition. For example, in Nanquan, the field is fixed, assuming that the starting point angle of the field is the origin, the length and width, and the height direction are x axis, Y axis and Z axis respectively, and the length and width of the field are respectively x0 , y0 and z0 , taking 14 m, 8 m and 5 m respectively, which can establish a three-dimensional coordinate system [1]. The three-dimensional coordinate system is shown in Fig. 1. By confirming the coordinates of the key parts such as shoulders, fingers and toes, the outline of athletes’ movements can be described. For example, when an athlete makes a flying leg action, according to the value difference between the toe and shoulder on the © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 175–179, 2022. https://doi.org/10.1007/978-3-030-99581-2_24

176

Y. Shao and Y. Wu

z-axis, it can determine whether there are movement errors such as swinging legs and feet, and then deduct points according to the number of errors. However, in practice, it is easy to be affected by environmental disturbance, which leads to high error rate of error motion detection. Using 3D modeling detection technology to achieve moving image processing, image feature decomposition and detection can be completed through image processing, and integrity inspection of wrong actions can be implemented, so it can provide more normative guidance for operation training [2].

Fig. 1. Moving 3D coordinate system

3 Method of Judging Wrong Actions in Sports Training Based on 3D Modeling Detection 3.1 Image Acquisition and Processing In accordance with the above ideas, using three-dimensional visual scanning and tracking recognition technology to complete the wrong action image acquisition in sports training [3]. For image preprocessing, we need to consider the random distribution of the image, and at the same time with irregular attributes. If any point is regarded as the initial data acquisition value, the attenuation coefficient should be set and the image row column replacement should be carried out. Combined with the wrong action image sequence, corner marking and 3D template matching, the image reconstruction can be realized, and the contour calibration can be completed by using the template. On the basis of image location, the moving frame difference can be used to compensate the feature quantity and get the image difference feature quantity [4]. Using parallax function, the pixel features of the image can be weighted, the shape model can be solved, and the distribution region of error action can be obtained. By decomposing the associated pixel features, the tracking parallax of the image can be obtained and the contour feature quantity can be determined. Using the intersection weight to cover the information of each interval, we can determine the feature, extract the data items and complete the pixel estimation.

Analysis of 3D Modeling and Detection of Wrong Action

177

3.2 Image Decomposition and Reconstruction According to the above ideas, it is necessary to complete the motion feature extraction in the process of image pixel decomposition, and estimate the edge features of error action contour. According to the motion attitude space vector, action primitives can be introduced into the closed curve. The active region can be represented by delay function, and the multi-dimensional scale decomposition coefficients of image can be obtained by referring to the rule set of background image [5]. For the image module obtained by modeling, block matching can be implemented, and the difference matching of moving frames can be realized by multidimensional decomposition. In practice, the contour length of the reconstructed image can be obtained: E = θ E LBF + (1 − θ )E LGF + vL(φ) + μP(φ)

(1)

Among them, θ refers to the gray weight coefficient of the neighborhood of each error action pixel. In the 3D data field, there are two regions, ELBF and elgf are the local gray information and gradient energy respectively, and P (ϕ) are the constraint and regular terms of the edge contour length. Through smoothing filtering, the model definition can be completed, and the local gradient feature decomposition can be realized by using quantitative information, and the correct and wrong actions in the image can be distinguished. In the case of centralized distribution of moving image pixels, the gray value of neighborhood error action image reconstruction has correlation, which can be used for image segmentation, extract the information of image 3D data field, and complete the reconstruction of action 3D coordinate system [6]. According to the detection results, the error action contour model can be matched to complete the corner marking of the image sequence, and the Gaussian distribution of the error action in the image can be determined:  1 (|∇φ| − 1)2 dx (2) P(φ) = 2

3.3 Motion Modeling Detection According to the gray-scale contour model, it can complete the action 3D modeling detection combined with the wrong action rules [3]. Specifically, it is to match the action relevance in the wavelet kernel space and complete the action mapping function. In the region boundary position, the collected image template value can be analyzed, and the image feature moving frame coordinates can be obtained from the root ray direction. In the error action modeling detection, to solve the intersection coordinates of feature moving frames, it is necessary to complete the minimum analysis of the reconstructed gray value to obtain the corresponding three-dimensional data field. When the external interference is not fixed, it is necessary to decompose the edge contour features of athletes and enhance the estimation of visual recognition components.

178

Y. Shao and Y. Wu

3.4 Feature Dimension Reduction Analysis Through the three-dimensional modeling detection, we can complete the feature extraction of wrong movements, but there are great differences in the actual position of different sports. In order to meet the requirements of sports training guidance, it is necessary to realize the extraction of all the position information, and then realize the vector normalization processing by summation. For any action, it is necessary to extract the spatiotemporal variation characteristics, select the direction gradient and the boundary, so as to accurately describe the motion. In fact, in the combination of action features, we can know that the image collected by machine vision contains 30–960-dimensional information, which makes the feature dimension far beyond the training sample, which easily leads to the operation time process of the classifier, which is not conducive to the accurate recognition of wrong actions [7]. In order to ensure the efficiency of the method, it is necessary to reduce the computational complexity while preserving the important features. Specifically, Gaussian mixture model can be used to complete feature extraction based on the acquisition of action video, and then fusion to obtain high-dimensional feature quantity. 3.5 Method Simulation Analysis In the process of method simulation analysis, it is necessary to use Visual Studio 2013 software on amd 3.4 GHz CPU computer to complete the development of sports error action recognition program. The computer RAM is 4 GB, and the experimental object is UCF data set, which contains more than 50 sports actions. The number of samples is 6618. 4500 samples are selected as the training set and the rest as the test set. The sampling frequency of computer image is 1200 kHz, and the dynamic sampling frame is 1024. The moving area is divided into 5 × 5.7 × 7 grid, and then the error action is modeled and detected. The three-dimensional motion model of the South fist can be used to detect the error of the motion [8]. In order to determine whether the method is suitable for the detection of the wrong movements in various sports training, the paper detects the movements with complex background such as diving, horizontal bar and playing basketball, and uses the traditional contour recognition methods to strengthen the comparison. As shown in Table 1, the proposed method can achieve a high recognition rate, with an average of 86.0%, and the traditional method can only reach 81.4% [9]. Compared with the traditional methods, the proposed method can project the action features into the low dimensional space, thus reducing the redundancy of information, completing the efficient recognition of wrong actions, and shortening the recognition time by 1.5 s on average. Therefore, the use of the above methods in sports training can improve the recognition rate of wrong actions by 3D reconstruction modeling and detection of motion images, and maintain a high recognition efficiency, so as to provide scientific guidance for sports training activities in time [10].

4 Conclusion In conclusion, the use of computer vision recognition technology in sports training can achieve high detection accuracy, make the detection error be effectively controlled, so

Analysis of 3D Modeling and Detection of Wrong Action

179

that the wrong action can be judged timely and accurately. In the process of using the method, we should pay attention to image reconstruction and decomposition modeling, and improve the detection speed through dimension reduction processing, and then provide strong reading time for error judgment to record. The experimental results show that the system has high data processing efficiency.

References 1. He, H.: Research on virtual interactive library information management system based on VRML. Inf. Technol. 43(12), 131–134 + 140 (2019) 2. Liang, X., Wang, X.: Research on user portrait system of digital library based on hadoop. Intell. Explor. 11, 6–12 (2019) 3. Na, R.: Construction of subject service system of University Library under the background of “double first class.” Agricult. Libr. Inf. 31(07), 36–43 (2019) 4. Zhou, D., Lin, L.: Tang liangtie. Thinking and practice of transformation and development of public library – taking Shanghai library as an example. Libr. J. 33(10), 4–12 (2014) 5. Zhang, X.: Determination of Defect Size in Infrared Thermal Wave Nondestructive Testing Technology, pp. 23–28. Capital Normal University, Beijing (2006) 6. Cao, Y., Wu, X.: Application of infrared nondestructive testing technology in aircraft flaw detection. J. Changsha Aviat. Vocat. Tech. Coll. 1(8), 3 (2008) 7. Mei, L., Zhang, G., Wang, Y.: Infrared thermal imaging nondestructive testing technology and its application status. Nondestr. Test. NDT 21(3), 10 (1999) 8. Zhu, B., Zhang, J.: Application of wavelet analysis in coating quality detection of rocket engine. NDT 26(1), 18–21 (2004) 9. Tang, Z.: Analysis on the influence of relevant design parameters of synchronizer. Autom. Sci. Technol. (2) (2008) 10. Zhou, S.: Research on Modeling and Simulation of Automotive Manual Transmission Synchronizer. Wuhan University of Technology (2011)

Government Environmental Accounting Information Disclosure System Under the Background of Big Data Ying Song and Xiaoping Chen(B) Liuzhou Institute of Technology, Liuzhou 545000, Guangxi, China [email protected]

Abstract. In 2012, after Davos Economic Forum proposed big data to create wealth and the United States proposed big data development strategy at the national level, “big data” swept the world, rapidly applied in many fields and became the mainstream, and the economy and society entered the era of big data. With the opening of “three public funds” from the central government to the local government, it reflects the increasing public demand for government accounting information, and also reflects the government’s determination to build a transparent service-oriented government. Government accounting information has become an important way for the public to analyze and evaluate the performance of the government’s entrusted responsibilities, which is an inevitable requirement to restrict government behavior and improve financial transparency. Therefore, the use of big data technology to establish a scientific government accounting information disclosure system will help to promote the “three public funds” and other specific issues. Keywords: Government accounting · Information disclosure · Disclosure system · Big data technology

1 Introduction At the end of last century, China has begun to carry out relevant research on the reform of government accounting, and the disclosure of government accounting information has also improved. But in recent years, with the continuous progress of the reform of the financial budget, such as the “three public funds” and the increasingly severe debt risk of local governments, these present conditions put forward many new requirements for the government accounting information. Therefore, it is of great theoretical and practical significance to study the issue of the government accounting information disclosure system [1]. (1) It is helpful to enrich the accounting theory of our government. It is necessary to strengthen the reform of government accounting in the new historical period. Through the comparative study at home and abroad, not only try to improve the government accounting information disclosure system in China under the guidance © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 180–186, 2022. https://doi.org/10.1007/978-3-030-99581-2_25

Government Environmental Accounting Information Disclosure System

181

of the concept framework of government accounting, but also analyze the specific contents of the government accounting information disclosure system in developed countries, which will lead to more thinking about the reform of the government accounting information disclosure in China, thus enriching the existing government accounting theory in China. (2) It is helpful for the information users to understand the accounting information of the government in China. With the increase of external demand of government accounting information, different users of government accounting information have different understanding and demand for our country’s government accounting information. The study of the disclosure system of government accounting information can improve the understanding of the government accounting information by the users of government information. This not only helps them make correct economic and social decisions, but also helps to supervise and control the economic behavior of our government and to safeguard the vital interests of all the stakeholders [2]. (3) It is conducive to the establishment of efficient and clean service-oriented government. Our government is trying to establish an efficient and honest service-oriented government organization, hoping to let the public have a clear understanding of the state of the government’s financial revenue and expenditure, so as to make an effective performance evaluation of the government’s behavior. The government accounting information is an important factor to realize the construction of transparent government and performance government. The standardized disclosure system of government accounting information is not only conducive to the construction of government credibility, but also to provide impetus for China to integrate into and adapt to the international economic system.

2 Conceptual Framework of Financial Accounting In 1930s, western countries, especially the United States, issued a series of accounting standards in order to regulate the accounting behavior of companies and maintain the normal order of capital market. However, people found that there was no coordination in the application of concepts, procedures and methods of the standards, even contradictory. Therefore, it is necessary to formulate a conceptual framework to unify concepts, coordinate contradictions and guide directions. The financial accounting concept framework was first proposed by the American Financial Accounting Standards Committee. In the financial accounting concept Announcement No. 2 published in 1980, the financial accounting concept framework was defined as a coherent theoretical system composed of objective and basic concepts related to each other. These objectives and basic concepts lead to consistent guidelines [3]. Promote fair financial accounting information and related information by developing the structure and direction of financial accounting and reporting, so as to help the effective operation of capital markets and other markets. At present, different countries have different names for the announcement of the concept framework of financial accounting, such as Canada as the concept of financial statements, the British financial reporting principle announcement and Australia as the financial accounting concept announcement. Although the name is different, its essence

182

Y. Song and X. Chen

is the same, which is involved in the process of making financial accounting and accounting standards - some basic concepts are the core of accounting theory, which can be used to guide the formulation of the original and new accounting standards. The government accounting is an important part of financial accounting. The Ministry of finance thinks that the government accounting should learn from the experience and lessons of enterprise accounting. The reform of government accounting should be theoretical first, which can make the reform of government accounting have a definite aim and avoid detours. After the research in recent years, the theoretical circles believe that the construction of the government accounting concept framework has its important significance: first, it can lay the principle foundation for the formulation, evaluation and revision of accounting standards, provide theoretical guidance, and ensure the consistency and system of accounting standards. Secondly, it can provide reference for people to analyze new financial accounting and reporting problems in the development and change of social and economic environment, and help the development and improvement of the government accounting standards system. Third, it can provide the theoretical basis for professional judgment for the Government Accountants when recording and compiling financial information [4]. Fourth, it is helpful for the users of government accounting information to better understand the purpose, content, nature and limitation of the information provided by government accounting. At the same time, the basic content of the conceptual framework of government accounting is basically agreed. It is believed that the basic contents of the conceptual framework of government accounting include the government accounting objectives, the basic assumptions of government accounting, the quality characteristics of government accounting information, the elements of government accounting and its recognition and measurement, and the government financial report. The conceptual framework of government accounting can better guide the reform of government accounting, so the reform of government accounting information disclosure should also be carried out under the guidance of the concept framework of government accounting [5]. In China, the government refers to the executive organ of the state power organ, and it is an organization system in which the administrative power is legally enjoyed in the system of state power. The government has its own functions, including economic function, political function, social function and cultural function. These functions need to be reflected through certain media, and accounting has two functions of reflection and supervision. Therefore, accounting can reflect the execution activities of state power organs well by means of accounting.

3 Accounting Information Disclosure System In the new era when the public demands the government and its departments’ information disclosure is increasing, the standardized and effective disclosure of government accounting information will help to improve the public trust of the government. In the aspect of the comparative content, this paper mainly under the guidance of the concept framework of government accounting, based on the people, through the comparative analysis of information users and their needs, studies the objectives of government accounting information disclosure. The goal of government accounting information disclosure can also be called the goal of providing accounting information [6]. It is the

Government Environmental Accounting Information Disclosure System

183

position to be achieved in the disclosure of accounting information, the starting point and final destination of information disclosure, and the logical starting point of the research. At the same time, we need to compare and analyze who is the disclosure subject on the basis of the disclosure target. The subject of government accounting information disclosure involves many contents, such as the scope and composition of the content to be disclosed and the explanation of its reasons. At present, professional organizations such as FASAB, GaSb and ipsasb have studied the definition of the subject of government accounting information disclosure from the perspective of the objectives of government accounting information disclosure. Therefore, China should make clear the subject of government accounting information disclosure from the perspective of the goal of accounting information disclosure. In addition, in order to ensure the realization of the disclosure target, what standards must be met and how to guarantee the generation of these accounting information, this requires the analysis of the quality standards and accounting basis of the disclosure of government accounting information [7]. Finally, we should also analyze the forms of these accounting information to be disclosed, which requires comparative analysis of the two carriers of information disclosure, budget report and financial report. As shown in Fig. 1.

Fig. 1. Government accounting information disclosure system

Therefore, based on the reform of government accounting under the big data technology and the differences in the objectives, quality standards, subjects, accounting basis and carriers of government accounting information disclosure in China, this paper discusses how to improve the system of government accounting information disclosure in order to establish a scientific disclosure system [8]. The main factor of the reform in the United States, Britain, France and New Zealand is the requirement of the new public management system. The fundamental driving force is the dissatisfaction of the public with public services. To solve this problem, we need the government accounting system to give full play to the function of information support and guarantee, fully reveal the performance of the government’s accountability, and constantly improve the quality and efficiency of public services provided by the government, Establish a transparent, efficient and clean government. With the reform of

184

Y. Song and X. Chen

the public system in China, the current government budget accounting system has been unable to meet the requirements of the new public management system, and with the strengthening of public democratic consciousness, higher requirements are put forward for the service-oriented government. China’s “Twelfth Five Year Plan” clearly requires to further promote the reform of government accounting, gradually establish the government financial reporting system, and accelerate the transformation and optimization of government functions [9]. It is imperative to promote the government accounting reform including the government accounting information disclosure system.

4 Improving the Government Accounting Information Disclosure System by Means of Big Data In order to effectively deal with the crisis caused by accounting information, government departments must grasp the development trend of accounting information by means of big data, improve the ability of analysis and monitoring of accounting information, and then put forward effective countermeasures to avoid network violence and the development of network rumors, play a good guiding role in the Research of accounting information disclosure system, and enhance the credibility of the government. The basic goal is the most basic guarantee to reflect the government’s ability. The main goal is the inevitable requirement with the transformation of our government’s functions, and is the supplement and promotion of the basic goal. The comprehensive goal is the ultimate embodiment of building a service-oriented government and serving the people wholeheartedly. As shown in Fig. 2.

Fig. 2. The objectives of the government accounting information disclosure system

1. build an effective supervision platform and strengthen the supervision mechanism. It is one of the effective governance methods of the country to analyze and supervise

Government Environmental Accounting Information Disclosure System

185

the accounting information by means of big data and to effectively manage the crisis of the public opinion on the Internet. Driven by the Internet, the development of self media is more and more extensive, and the diversification and popularization of mobile terminal devices also provide a carrier for the generation of network public opinion. Tiktok Kwai, a mobile phone terminal, is experiencing unprecedented popularity. Such as micro-blog, WeChat.QQ, official account and new fast APP, fighting fish, jitter, etc., many network public opinions are generated on these platforms. 2. government information disclosure and data sharing. In the era of big data, the government to establish a shared, fair and transparent data open system is an important link to democratic politics. The government can establish an open system of data resources between governments and between governments and society based on data analysis and processing technology, break the phenomenon of government information island, promote information exchange and sharing, and improve the level of public service and governance of the government. 3. improve the accounting information disclosure system, study accountability mechanism and rule the network according to law. We will accelerate the construction of data legislation system, improve law enforcement procedures and means, and improve the legal and regulatory system of accounting information disclosure system research and management. The rights and obligations of the government, enterprises, various social organizations and individuals shall be clearly defined, and it is strictly forbidden to harm the rights of others to seek personal interests [10]. 4. introduce advanced technology and professional talents. The network technology and e-government in China started late, and there is still a gap with other countries. The government should increase investment in technology and talent introduction, and establish technology and talent introduction system from two aspects. First, the government can introduce advanced network technology and E-government from abroad, combine with the national conditions, and develop a set of accounting information disclosure system which is applicable to China; Secondly, China can establish cooperation mechanism with universities, companies and other scientific research institutions, establish talent training relationship with them, and the government can provide certain financial support, establish experimental platform and school enterprise cooperation platform, and introduce excellent professional and technical personnel.

5 Conclusion In short, it is the basic goal to reflect and supervise the legal compliance of Finance and strengthen the internal supervision of government departments. The financial management departments of governments at all levels mainly use information to prepare and implement government budget, and supervise and manage the government financial fund movement; Secondly, the legislative organs and audit departments are used to examine and approve and supervise the budget and finance of the government. It is the main goal to meet the needs of stakeholders and provide useful information for decision-making. The government has the demand for the government accounting information both inside and outside, such as the government macro management

186

Y. Song and X. Chen

department, which needs to make economic decision and macro-control according to the information; The public supervises the government performance and makes selfdecision according to the disclosed information; Investors such as the company are concerned about the government’s financing plan, solvency, etc. to make correct investment analysis; International investors also need to understand the overall financial situation, economic strength, the use and management of aid funds. Acknowledgements. 2020 Basic Research Capacity Improvement Project of Young and Middleaged Teachers in Guangxi Universities “Research on Environmental Accounting Information Disclosure Process in the Automobile Industry—Take Liuzhou Automobile Enterprises as an Example” (2020KY60025).

References 1. Government Accounting Standards Board (GaSb): Concepts statement No. 1–4 [Z] (1987– 2007) 2. FASAB: 2011 FASAB Handbook, 1997–2007 (2011) 3. Accounting Department of the Ministry of Finance: Government Accounting Research Report. Northeast University of Finance and Economics Press, Dalian, November 2005 4. OECD: OECD Best Practices for Budget Transparency (2002) 5. Liu, J., Li, Y.: How to improve the level of accounting informatization in the era of big data. Mod. Econ. Inf. (02) (2019) 6. Zhu, H.: Risk analysis and suggestions of accounting informatization under the background of big data. Chin. Foreign Entrepreneurs (05) (2019) 7. Liu, D.: Application of big data in enterprises. Electron. Technol. Softw. Eng. (07) (2019) 8. Sui, Z., Zhou, X.: On the problems and solutions of cloud accounting in the era of big data. Chin. Foreign Entrepreneurs (11) (2019) 9. Zhang, W.: Research on accounting informatization in the era of big data. Taxation (23) (2019) 10. Zhang, X.: Discussion on accounting informatization under the background of big data. Nat. Circ. Econ. (20) (2019)

The Influence of MOOC on College Physical Education in the Era of Big Data Dongsheng Wang(B) Sports Department, Henan College of Industry & Information Technology, Jiaozuo, Henan, China [email protected]

Abstract. Nowadays, with the rapid development of society, great changes have taken place in the flow of information. Big data is the product of this era. It has triggered the birth and development of MOOC, which has brought an opportunity for the development and reform of traditional college physical education. This paper discusses the emergence and characteristics of big data and the origin and development of MOOC, mainly focusing on the analysis of the impact of MOOC on College Physical Education in the era of big data, and combining with the actual situation of College Physical Education under the background of MOOC in the era of big data, Firstly, it explains and discusses the influence of MOOC on College Physical Education in the era of big data from the positive and negative aspects. Secondly, it analyzes the idea of applying MOOC in College Physical Education in the era of big data, further highlights the influence of MOOC on College Physical Education in the era of big data, and gives full play to the value of MOOC teaching mode, aiming to provide reference for relevant research Information. Keywords: Big data era · MOOC · College physical education · Teaching influence

1 Introduction Today’s society is a society of rapid development, with advanced science and technology, information circulation, closer communication between people and more convenient life. Big data is the product of this high-tech era. Because of its diversity, massification, quickness, flexibility and complexity, it will naturally have a huge impact on our education. McKinsey, a well-known global consulting company, first proposed the arrival of the era of big data, which has penetrated into every industry and business functional area and become an important production factor [1]. The advent of the era of big data has changed people’s way of learning and thinking, and also injected new vitality into the development of higher education. All kinds of new teaching modes that break through the traditional school education mode continue to emerge. MOOCS is one of them. It has the characteristics of large-scale, open, free online courses and so on. Its emergence challenges the traditional university teaching and provides new opportunities for the innovation of its teaching methods. Based on the background of big data, this paper © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 187–193, 2022. https://doi.org/10.1007/978-3-030-99581-2_26

188

D. Wang

analyzes the main characteristics of MOOC, compares with the traditional classroom teaching mode, and finally puts forward the mixed teaching mode of “traditional teaching + MOOC platform + big data technology”, in order to have some enlightenment and reference for the traditional physical education teaching in Colleges and Universities [2]. The era of big data promotes the development of teaching mode. MOOC breaks the limitation of traditional teaching time and region, and there is no limitation of number and qualification. It takes open sharing as the core concept, and provides many high-quality online courses for teachers and students. It specially explains knowledge modules in the form of micro video, so that learners can use fragmented time to learn and improve the effectiveness of learning. Foreign influential MOOC platforms include udacity, coursera and EDX, while domestic MOOC China, Netease cloud classroom and so on are widely concerned. As a new teaching mode, m0oc focuses on the learning process of participants and the learning experience of learners.

2 The Origin of MOCC MOOC, full name of massive open online course, is a large-scale open online learning course. The real rise of MOOC is an online free course opened at Stanford University in 2011, which has attracted more than 100000 registered students in a short period of time. With the promotion and practice of Stanford University, MOOC has been carried out all over the world. In 2012, the three MOOC curriculum platforms jointly established by MIT and Harvard University fully reflect the attempt of combining MOOC with higher education system. In the same year, the New York Times called it “the first year of MOOC”. The soul of MOOC is the open knowledge platform of big data and big schools, which is an attempt of university teaching in the face of the challenge of big data era [3].

3 MOOC Teaching Supported by Big Data Since 2012, m0oc has received keen attention from the government, education and business fields at home and abroad. In China, the initial research mainly focused on theoretical research, curriculum teaching practice exploration and education mode reform. At the same time, with the spread of coursera, EDX, Udacity and other course platforms, excellent MOOC platforms such as Chinese University MOOC, Xuetang online and haoxuexue online have emerged in China. However, in the application and promotion of MOOC, some disadvantages of MOOC gradually appear: such as high user registration rate, low course completion rate is a prominent problem. In order to improve the quality of teaching and promote the sustainable and healthy development of MOOC, we should collect the information of MOOC platform learners, and then study the learning behavior of platform learners, so as to truly understand their needs and beliefs [4]. Big data technology supports every link of MOOC, as shown in Fig. 1, and will also provide support for the development of MOOC [3]. The teaching design of MOOC is an important factor that affects and determines the quality of the course. The difference of content design affects the completion rate of the

The Influence of MOOC on College Physical Education

189

Fig. 1. Big data analysis to support MOOC construction

course to a certain extent. The top teachers of the first-class universities in China have set up some professional core courses on the MOOC platform. These MOOC platform learners’ learning behavior data is an important data source of curriculum reengineering, such as the progress of watching videos and the hot content of discussion area [5]. We can reflect on the key and difficult points of curriculum content, re-examine the investment of teaching links and teaching resources, and achieve the purpose of using MOOC platform learners’ discussion resources to reverse design curriculum content.

4 The Influence of MOOC on the Development of College Physical Education College physical education is an important public basic course in Colleges and universities. In traditional teaching, teachers usually teach students the basic knowledge of physical education within the class hours specified in the training plan, so that students can master the basic skills of sports, so as to improve their sports level and physical quality. But this kind of teaching is very limited, coupled with the lack of teacher-student ratio in many colleges and universities, the choice of projects in the physical education classroom is very limited, many students can not choose the courses they are interested in, more unable to meet the sports knowledge supplement and sports skills training outside the curriculum [6]. MOOC is a combination of modern Internet technology, computer technology, mobile technology, so that learning can be anytime, anywhere, fast access to knowledge. Sports MOOC is an attempt to superimpose the classroom teaching content on the basis of these modern information, from massive information into cloud information, which makes the coverage of sports teaching content have the possibility of unlimited expansion, which is beyond the reach of traditional sports teaching content. In addition, the open characteristic of m00c makes it possible for students to get access to the physical education courses of other schools, other regions and even other countries in addition to their own physical education courses, which provides a platform for students who want to master the knowledge of different sports [7]. At the same time, the development of MOOC can break the limitations of time and space, not because of the limited number of

190

D. Wang

elective courses and let students lose the opportunity to learn, can also avoid the conflict of elective time when learning multiple courses, so as to greatly expand the coverage of sports teaching content, make the popularization of sports knowledge and the use of teaching resources greatly improved [8]. 4.1 Realize the Integration of Physical Education and Happy Sports In the organizational structure of MOOC courses, learners’ learning is completed in the cloud learning environment. The cloud learning environment allows students to learn at any time in different places and environments. With the help of mobile terminals, students can more freely obtain the learning opportunities of m0oc. Students can use their mobile phones to learn anywhere on campus. The breakpoint continuation of the same account makes learning more free, It can be said that it is a humanized and personalized learning process, which makes students’ learning very easy [9]. Sports MOOCS can integrate sports training and tactical frontier into traditional sports teaching, greatly enriching the teaching content, especially adding the latest sports events in the teaching of sports knowledge, which can greatly enhance students’ interest in sports. In addition, the biggest advantage of sports MOOC is that it allows students to choose the content of the class that they are interested in as much as possible, which has a very big supplementary learning role for students with different physical fitness and different sports hobbies, and makes the single traditional physical education become diversified. 4.2 Strengthen the Cultivation of Lifelong Sports Consciousness As early as the 1990s, our country put forward the slogan of lifelong physical education, which refers to a person’s lifelong physical exercise and physical education. The key of lifelong physical education is the cultivation of self-awareness of physical education, and school physical education is the basis of lifelong physical education. However, in recent years, the data of College Students’ physical fitness test is declining year by year. College students show obvious polarization for physical exercise [10]. Most students show resistance to physical exercise and fear for physical health test, The guiding ideology of “lifelong sports, healthy sports” can not be reflected. The main reason for this phenomenon is that the traditional single teaching method can not make students interested in sports, thus killing the students’ initiative in sports learning. The emergence of MOOC enriches the content of traditional sports teaching, and it can also increase students’ interest in sports in the environment of massive dissemination of information, which is undoubtedly a solid foundation to solve the problem of lifelong sports. The correct self-awareness of sports should be based on the interest in sports and improve the rational understanding of sports. However, the boring theoretical knowledge and action essentials are difficult to be accepted by students in traditional sports teaching, while MOOC can effectively solve such problems. The comparison between MOOC teaching and traditional teaching and learning methods is shown in Table 1.

The Influence of MOOC on College Physical Education

191

Table 1. Comparison between MOOC teaching and traditional teaching and learning methods MOOC teaching mode

Traditional teaching mode

Learning style Personalized autonomous learning is Passive learning mode. The content of the biggest feature of online course the class is only the teacher’s input learning. How to learn is up to you Autonomy

Active learning, can control the progress of learning, can learn repeatedly

Students in the classroom. Is one-way passive acceptance

Interactivity

It can realize barrier free communication without time limit and place limit

Teachers face n students, and the communication in class is limited

4.3 Big Data Driving, Online and Offline Combination to Improve Learning Effect Edgar Dell, a famous American learning expert, puts forward that more than 50% of the learning effects are team learning, active learning and participatory learning. As shown in Fig. 2, active learning methods such as discussion, practice, and teaching others can achieve better learning effect. Therefore, although MOOC organizers spend a lot of effort on classroom design, if students only watch videos through MOOC platform, they can only achieve 30% learning effect at most. Of course, well-designed courses can improve the learning effect by adding tests and selecting thoughtful discussion topics, but the effect is still not as good as face-to-face discussion and debate, so the combination of online and offline is the key to improve the quality of learning.

Fig. 2. Learning effect pyramid

192

D. Wang

5 Conclusion With the advent of the era of big data, education informatization begins to popularize, and more and more science and technology and information technology are introduced in the field of teaching. MOOC entering university teaching has become the development trend of current higher education. Physical education is a highly applied subject. The arrival of MOOC has injected new vitality into college physical education. However, both traditional physical education and MOOC are means and ways to cultivate students’ sports ability and transfer sports knowledge. The pursuit of m0oc does not mean the progress of physical education, Only by integrating the advantages of the two can we truly realize “lifelong sports and happy sports”. Under the strong impact of MOOC in the era of big data, only by seizing the opportunity and skillfully facing the challenge can we truly establish a new physical education teaching mode. Acknowledgements. 1. Project name: A systematic study of General Secretary Xi Jinping’s important discourse on school PHYSICAL Education; No.: 2021-ZZJH-091), subject source: General Project of Humanities and Social Sciences Research in Colleges and Universities of Henan Province. 2. Project name: Talent training in colleges and universities based on the optimization of sports industrial structure; No.: SKL -- 2020–3063), project source: Research project of Henan Federation of Social Sciences. 3. Project name: Research on employment and Entrepreneurship Practice of College PE graduates; JYB2020100), subject source: Employment and Entrepreneurship project of Colleges and Universities in Henan Province. 4. Project name: Research on talent Training of sports Service Industry in the context of “Healthy China”; No.: 21B890001), subject source: Key Scientific research project of Institutions of higher learning in Henan Province.

References 1. Jingmin, M., Qiong, W.: Overview of foreign development of MOOC research. Ind. Inf. Educ. 11, 3–10 (2014) 2. Lingling, S., Xibin, H., Jiangang, C., et al.: The ultimate return of “post-m0oc era” to open online education. Mod. Distance Educ. Res. 129, 18–26 (2014) 3. Jieting, H.: Research on micro curriculum design in MOOC environment I. taking “Computational Thinking” micro curriculum as an example. Shanghai Normal University, Shanghai (2013) 4. Fang, L., Long, Y., Ling, S.Z.: Challenges and opportunities: the enlightenment of MOOC on college physical education. Sports Res. (5), 100–103 (2015) 5. Dong, L., Dong, C., Feng, S.: Research on the impact of MOOC on college physical education in the era of big data. Contemp. Sports Technol. (36) (2019) 6. Wei, T.: Application of mu class teaching mode in college physical education. Res. Commun. Power (32) (2019) 7. Jianhua, J., Ying, L.: On the teaching mode of physical education theory course in colleges and universities in the era of big data. J. Hebei Univ. Eng. (Social Science Edition). (03) (2019)

The Influence of MOOC on College Physical Education

193

8. Zhiyong, L.: Experimental research on the application of micro class teaching method in college martial arts under the concept of MOOC -- the impact on college students’ mental health. J. Nanjing Inst. Phys. Educ. (01) (2019) 9. Yuanyuan, T.: The impact of MOOC on college physical education in the era of big data. Contemp. Sports Technol. (35) (2017) 10. Wei, F.: The impact of MOOC on college physical education in the era of big data. J. Guangzhou Inst. Phys. Educ. (03) (2017)

Measurement of Tax Paying Ability and Design of Tax Expenditure for Real Estate Tax of Urban Families in China Haishu Wang(B) Tongling College, Tongling 244000, Anhui, China [email protected]

Abstract. With the deepening of reform and discussion, a question has emerged: whether the taxpayer has the ability to pay real estate tax. The object of real estate tax is residents’ own houses, which is the accumulation of wealth in the past. This paper mainly adopts the method of combining quantitative analysis and qualitative analysis to analyze the ability of urban residents to pay real estate tax. This paper analyzes the existing real estate tax system in China which is contrary to the principle of capacity based taxation, designs several simulation schemes of real estate tax, uses the survey data of China Household Finance Survey (chfs) in 2013, designs corresponding tax expenditure items, and evaluates the cost and benefit of tax expenditure items. Keywords: Real estate tax · Capacity based taxation · Ability to pay taxes · Tax expenditure

1 Introduction In 2003, the Third Plenary Session of the 16th Central Committee of the Communist Party of China made it clear that “the property tax of unified and standardized standards should be imposed on real estate when the conditions are met” (that is, the real estate tax referred to in this paper). This can be seen as the beginning of official clear discussion on the reform of the real estate tax system. Since 2011, Shanghai and Chongqing took the lead in the pilot of housing tax reform, and began to levy real estate tax on individual residential housing. In 2016, the 13th five-year plan outline for national economic and social development of the people’s Republic of China pointed out that “improve the local tax system and promote the legislation of real estate tax” [1]. At the opening ceremony of the first session of the 13th National People’s Congress in 2018, Premier Li Keqiang reiterated in the government work report that “improve local tax system and promote real estate tax legislation steadily”, which is the second time real estate tax has entered the government work report after 2013. These voices and reform measures from the item level show that the central government attaches great importance to the legislation of real estate tax. The pace of real estate tax reform is closer [2]. But with the deepening of reform and discussion, a question also emerges: whether the urban families in China have the ability of real estate tax. The old real estate tax © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 194–200, 2022. https://doi.org/10.1007/978-3-030-99581-2_27

Measurement of Tax Paying Ability and Design of Tax Expenditure

195

is mainly for business use, and the business house can generate certain cash flow to compensate the tax of the property tax. However, when the scope of levy is extended to the residential housing, the problem of residents’ tax paying capacity will arise. The object of real estate tax is the residents own housing, which is the wealth accumulated by the residents in the past, but the source of tax comes from the flow wealth of residents, that is, the existing income of residents, which leads to the disjunction between tax base and tax source. Once the real estate tax payable by residents due to existing property exceeds the tax burden that can be borne under the existing income level, the cash flow and the taxable payment do not match, and cannot bear the real estate tax, then any real estate tax reform will be passive water, which is no different from the demand for fish by the wood [3]. Therefore, the tax capacity of real estate tax is a problem closely related to the reform and promotion of real estate tax, which is worth further discussion.

2 The Explanation of the Principle of Quantifying Tax and its Application in Tax Legislation 2.1 Concept of the Principle of Taxation The principle of quantifiable taxation, literally, refers to the tax assessment according to the taxpayer’s tax ability, which includes two meanings: one is to protect the basic right of existence for the non tax payer, so that it does not lose the ability to survive due to tax; Second, for those with tax ability, the tax burden is determined according to the ability to pay tax. The strong ones pay more taxes, and the weak ones pay less tax. The principle of quantifying tax guarantees the basic human rights of the right to subsistence of residents. The principle of quantitative taxation reflects that tax not only has the function of raising financial revenue for the government, but also the tool to achieve other specific political and economic purposes. The principle of quantifiable taxation does not impose tax on the basic materials necessary for the maintenance of the taxpayers who are suffering from the difficulties of living due to taxation, which is conducive to maintaining social stability and respect for basic human rights [4]. The measurement of energy tax is also one of the performance of the principle of tax fairness. Tax is free and compulsory. The government does not return the public services or products provided by the revenue raised by tax to the extent that the actual tax paid by a specific taxpayer is limited. Therefore, it is difficult to determine the tax burden according to the benefit degree of taxpayers. Under the principle of quantitative tax, taxpayers should determine the tax burden according to their respective tax capacity, which will help to distribute tax burden more fairly, promote the normal operation of economy and protect the rights of taxpayers. Because the tax paying ability is often related to the economic capacity or status of residents, taxpayers bear the tax burden with the tax capacity reflected by their economic status, which helps to realize the tax fairness better [5]. 2.2 The Status of the Principle of Quantifying Tax in Tax Legislation The principle of quantitative energy taxation is of great significance to guarantee the fairness of tax revenue and safeguard the rights and interests of taxpayers. However, there

196

H. Wang

is a controversy about the role of the principle of quantifiable taxation in tax legislation, that is, whether the principle of measurement of Taxation exists as the principle of tax legislation or should only be regarded as a kind of fiscal and tax thought. The author believes that the principle of tax fairness should be applied to tax legislation as a kind of legislative principle. But the principle of tax fairness is a principle concept, which is not enough detailed rules. To implement the fairness, we need to make the principle of tax fairness concrete to guide the tax legislation, which is the significance of the principle of quantifying tax in tax legislation. According to the principle of quantitative tax, tax burden distribution is determined according to the income and property of taxpayers in tax legislation, and the horizontal and vertical equity can be achieved [6]. The principle of quantifying tax is the specific application of the principle of tax fairness, and tax law should be applied and interpreted. In history, different constitutions of different countries have also been expressed by using quantitative tax as the guiding principle of tax legislation. For the above reasons, the author thinks that the principle of quantitative tax should be used as the guidance and interpretation principle of tax legislation, rather than simply a kind of financial and tax thought, which is applied to the legislation and management of real estate tax in China [7].

3 The Measurement and Evaluation of the Tax Paying Capacity of Urban Residents’ Real Estate The design of tax capacity index is related to the accuracy of measuring the tax capacity of a tax, but it is also one of the focus of academic debate. From the historical research, the indicators used to measure the tax capacity include income, wealth, consumption, net income and so on. However, each indicator has its own advantages and disadvantages. However, there is no more conclusions or framework for the indicators of real estate tax capacity. In view of the advantages and disadvantages of each single index, this paper designs three tax capacity evaluation indexes, and examines their relevance to verify each other, and avoids the defects brought by single index as far as possible. 3.1 Tax Capacity Index of Income Standard First, referring to the index of house price income ratio proposed by weicher (1977) to judge the housing tax paying capacity, a similar index of income real estate tax ratio is established. The index of tax capacity of real estate tax under the income standard (hereinafter referred to as ATP income) can be expressed as follows ATP revenue = I/T Among them: I represents the annual income of the family; T represents the annual real estate tax payable by the family. 3.2 The Tax Capacity Index of Net Income Standard Considering the basic consumption expenditure of the family including clothing, food, living, transportation, communication, education, entertainment and health, etc., the tax

Measurement of Tax Paying Ability and Design of Tax Expenditure

197

capacity index of the net income standard (hereinafter referred to as ATP net exposure) can be expressed as ATP net grazing = (I-C)/t Among them: I represents the annual income of the family; C represents the basic household consumption expenditure; T represents the annual real estate tax payable by the family. 3.3 Tax Capacity Index Considering the Net Income Standard of Savings The tax capacity index of the net income standard (hereinafter referred to as ATP micro plus) can be expressed as follows: ATP net income plus = (i-c + s)/t Among them: I represents the annual income of the family; C represents the basic household consumption expenditure; T represents the annual real estate tax payable by the family; S represents the amount of savings for the family. Adding savings factor will make more families have the ability of real estate tax payment. But if the income status of families cannot be improved, the savings they keep will be exhausted for a day. Therefore, the real estate tax capacity measured by this indicator is short-term tax paying ability or unsustainable tax paying ability.

4 Design Suggestions of Tax Expenditure of Real Estate in China 4.1 Summary of the Characteristics of Families without Tax Paying Ability The comparison of some family economic and wealth status for different types of families is shown in Table 1, which is distinguished by the ability to pay taxes or not: Table 1. Comparison of the characteristics of families with and without tax capacity (0.5% tax rate, no tax reduction scheme) Family category

Families with no ability to pay taxes

Families with tax capacity

Average annual income (yuan)

41974

103341

Average annual real estate tax (yuan)

8197

4263 (continued)

198

H. Wang Table 1. (continued)

Family category

Families with no ability to pay taxes

Families with tax capacity

Number of houses

1.31

1.26

Building area (M2)

175.65

140.76

Proportion of households with housing loans

8.48%

13.26

First, the income and tax characteristics are compared. The average annual income of non tax paying families is significantly lower than that of those with tax paying ability, less than half of the latter. In contrast, the average value of real estate tax that households with no tax ability need to pay in the year is higher than that of the families with tax paying ability, which is 1.92 times. This reflects two prominent characteristics of non tax - paying families: low income and high tax revenue. Considering whether or not the family has the ability to pay taxes, the family needs to maintain the basic living every year - the basic consumption expenditure is fixed, and the net income that low-income families can use to pay real estate tax is less than that of the families with tax paying ability, and the tax ability will be worse [8]. There are obvious differences between the two families in income and real estate tax payable, which can be used as the characteristic variable to identify the families without tax paying ability. 4.2 Design of Tax Expenditure Project The relief object of tax expenditure is mainly the family without tax ability. In designing tax expenditure, we hope to distinguish the family according to the level of tax paying ability, so that tax expenditure can precisely affect the family with the lowest tax ability and the most need of help. As mentioned above, the outstanding feature of non tax households is low income high tax burden. According to this characteristic and the experience of foreign countries, the author proposes to introduce the “circuit breaker” mechanism, and the excess part will not be levied when the tax burden income ratio of the family real estate exceeds the fixed threshold. Such a threshold is similar to the circuit breaker [9]. When the tax burden exceeds the “safety threshold”, the tax system will automatically start the “fuse mechanism” to avoid the “overload” of the taxpayer tax burden. In the “breaker” policy, the government abandons the “excess” tax revenue, which is the relief to families with difficulty in tax paying ability, which is equivalent to another kind of expenditure of the government. Therefore, the expenditure should not only be regarded as tax preference, but also included in the scope of financial expenditure and its cost and benefit should be examined. 4.3 Cost and Benefit Assessment of Tax Expenditure Income abandonment is a common method to estimate the cost of tax expenditure, which is widely used in the world because of its simplicity. Income waiver method determines

Measurement of Tax Paying Ability and Design of Tax Expenditure

199

the scale of tax expenditure by calculating the tax revenue reduced or abandoned by the government due to the implementation of tax preference in each year, or comparing the actual tax system with relevant tax preferential provisions and the benchmark tax system without relevant tax preference terms. On the basis of the cost of tax expenditure, we should pay attention to whether the tax ability and the situation of the families without tax ability are acceptable when the tax expenditure is minimized [10]. After adopting the tax expenditure items designed in the previous article, the number of households without tax ability decreased by 147, which was more than half lower than the benchmark tax system. The proportion of households with no tax paying ability accounts for 1.74% of all taxable families, which is basically the same level as other relief schemes, even better than that of per capita value reduction [11]. It can be found that after tax expenditure, the distribution of households with tax capacity under 50 has a significant right shift, which shows that the tax expenditure has better coverage to the target of the design beginning - the family with low tax capacity, which improves the tax paying ability, The comparison of the tax capacity of urban household real estate tax before and after tax expenditure is shown in Fig. 1.

Fig. 1. Comparison of the tax capacity of urban household real estate tax before and after tax expenditure

5 Conclusion Under different real estate tax simulation schemes, the tax capacity of urban households is different. Among them, under the first suite and per capita area reduction, the three indicators of tax capacity indicate that the tax capacity of urban households is much higher than other schemes when the two methods are adopted. But this high tax capacity is at the expense of a large reduction in tax base and revenue. In the design of the tax system of real estate tax, although the indicators of urban household tax capacity are lower than other schemes, they are still in the safe range. Therefore, from the perspective of reaching the balance between tax capacity and tax revenue, it is suggested to adopt the real estate tax scheme without setting up the reduction or less reduction.

References 1. Fu, A.T., Jing, G.: Research on several related issues of real estate tax legislation. Finance Trade Econ. 08, 5–12 (2014)

200

H. Wang

2. Yanfeng, B., Yutong, M.: Introducing circuit breaker mechanism to build a scientific modern financial system. Fin. Think Tank 06, 91–103 (2016) 3. Huiyu, C.: Research on Tax Expenditure Budget. China Finance and Economics Press, Beijing, pp. 57–68 (2011) 4. Huixia, F.: The payment problem of real estate tax and the rational use of tax expenditure in economic transformation. Local Financ. Res. 12, 57–63 (2017) 5. Chao, G., Yun, L.: China rural family finance development report 2014. Southwest University of Finance and Economics Press, Chengdu, pp. 1–119 (2014) 6. Yang, H., Yanyun, M., Wei, L.: International experience in the design of real estate tax base and tax preference. Soc. Sci. Forum 97, 104052 (2018) 7. Huixia, F.: Payment problems of real estate tax and rational use of tax expenditure in economic transformation. Res. Local Finan. 34(5), 617–622 (2017) 8. Yunyun, J., Haitao, Z., Ziqi, L.: Research on China’s real estate tax exemption from the perspective of equity. Econ. Manag. Res. 1084(1), 012036 (2017) 9. Shujie, W.: Enlightenment of American tax expenditure budget management. Tax Res. 112, 106344 (2017) 10. Yilin, H.: Research on the Design of Elements of China’s Real Estate Tax System. Economic Science Press, Beijing (2016) 11. Huiyu, C.: Research on Tax Expenditure Budget. China financial and Economic Publishing House, Beijing (2011)

Design and Research of Big Data Multimedia Technology in College Physical Education Teaching System Lin Wang(B) and Tao Tang The College of Arts and Sciences YunNan Normal University, Kunming 650222, YunNan, China [email protected]

Abstract. This paper first analyzes the problems existing in the physical education in Colleges and Universities under the background of big data, and then analyzes the reasons for the problems. The use of multimedia technology in college physical education is conducive to the innovation and breakthrough of physical education methods, arousing students’ learning enthusiasm and enhancing learning effect. Therefore, multimedia technology must be applied to the theoretical teaching, technical teaching and teaching management of physical education in Colleges and universities, so as to enhance the effect of physical education. Finally, the paper puts forward some suggestions on the teaching of big data in the use of physical education in Colleges and universities, aiming to explain that the physical education in Colleges and universities needs to make rational use of big data, optimize the allocation of educational resources, and provide reference for teaching research. Keywords: Physical education teaching · Big data technology · Multi-Media

1 Introduction In recent years, with the continuous innovation and improvement of the level of science and technology in our country, the information and intelligent information technology dominates the main development direction of our country, people’s life, study, work and entertainment have been changed, and the information society is affecting people’s life. The application of big data has brought great impact and challenge to the traditional education industry. Physical education in Colleges and universities needs to change the traditional education mode, adapt to the development of big data, make rational use of big data, change teaching mode and teaching methods, innovate teaching content, enrich students’ classroom content, carry out personalized education for students, and improve the level of physical education, which is conducive to the management of physical education in Colleges and universities [1].

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 201–206, 2022. https://doi.org/10.1007/978-3-030-99581-2_28

202

L. Wang and T. Tang

2 Problems in College Physical Education Under the Background of Big Data 2.1 Data Resources are Scattered In the process of physical education in Colleges and universities, there are a lot of data and information, such as students’ physical fitness test results every semester, sports meeting students’ performance records, physical education examination results, etc. because these data resources are used by different teachers or different periods of time, resulting in scattered and independent data resources, Because these data resources are not timely archived or saved after being used, resulting in the independent existence or loss of data resources, which has a certain impact on physical education [2]. With the emergence of the era of big data, college physical education teachers need to use big data technology reasonably and correctly to collect, analyze, archive, manage and control all the information and data resources of students, so as to ensure the integrity of data resources, which is conducive to teachers’ better understanding of students. 2.2 The Phenomenon of “Information Island” Exists There are different organizations in China’s universities, such as departments, classes, teams, and so on. These organizations are relatively independent and have different permissions. There are also great differences in the acquisition of data information. The information of each organization is relatively closed, and there is a phenomenon of “information island”. At the same time, different universities have different goals, there is competition between each university, and there is no information and data platform between universities. Therefore, various data resources of students can not be shared among universities, which increases the difficulty of data mining [3]. 2.3 Low Utilization Efficiency of Data Resources Students in school study, life, sports, exercise and so on will produce a lot of data, but the university physical education teacher just to complete the task arranged by the superior leaders, save and hand in the collected information and data, there is no reasonable use of these data resources for deep information mining, unable to dig out each student’s learning ability, interests and potential, As a result, physical education teachers in Colleges and universities can not teach students in accordance with their aptitude in the process of teaching students, so as to ensure the comprehensive development of students’ moral, intellectual, physical and aesthetic [4].

Design and Research of Big Data Multimedia Technology

203

3 The Application of Multimedia Teaching in Physical Education In the traditional physical education teaching, the technology class is mainly “demonstration + explanation + ten exercises”, while the theory class purely depends on the teacher’s classroom explanation. The teaching method is rigid, and there are some disadvantages: students can not get a complete image memory from the teacher’s explanation; Some technical movements are dynamic, so it is difficult for students to distinguish the details of each movement; The accuracy and standardization of the demonstration movement can not be guaranteed; 4. It is easy to be limited by the field equipment, which affects the teaching effect. Computer aided instruction can obtain the feedback information of students’ learning through human-computer interaction activities in time, and can find and solve problems and strengthen the teaching content in time [5]. The teaching process has also changed from one-way indoctrination by teachers to two-way communication between teachers and students, thus arousing students’ interest and enthusiasm in learning. At present, the application of multimedia technology in the field of physical education is mainly manifested in the following aspects: 3.1 Development and Application of Sports Multimedia Courseware Multimedia courseware is one of the most widely used forms of CAI in physical education. By using computer multimedia technology and combining with the characteristics of physical education teaching, we can research and make teaching courseware suitable for some subjects and learning courseware suitable for students’ after class learning. Modern computer multimedia technology integrates text, graphics, sound, animation, video in one, with rich content, flexible forms and means of expression, making physical education more characteristic. According to the different teaching contents, teaching objectives and teaching strategies, sports multimedia courseware can be roughly divided into four types: demonstration type, interactive type, intelligent type and comprehensive type. Sports multimedia learning courseware (CAL) is a new learning mode based on the interactive function of computer and modern network technology. The development and application of sports learning courseware make students’ learning behavior change from passive to active, which can better reflect students’ subjectivity, initiative and autonomy. In addition, we can also use computer multimedia technology for microteaching [6]. Microteaching is a small-scale teaching activity that uses modern educational media to help students master certain skills. 3.2 Application in Physical Education Teaching Management Office Management Office software is widely used in daily physical education. Such as the use of software “word” to write teaching plans, the use of “excel” for data statistics. In addition, there are more practical application systems based on physical education developed by using office automation software, such as “physique monitoring system”, “track and field games arrangement and performance management system”, which greatly improve the work efficiency.

204

L. Wang and T. Tang

Question Bank Using the computer and some related software to establish the examination database of physical education theory teaching, it is very convenient to transfer the examination questions for testing and automatic scoring, saving time and improving work efficiency. Electronic Library The books and reference materials related to physical education are made into e-books and placed on the campus network. Students can quickly, accurately and comprehensively find what they need. At the same time, students can also use network technology to query and exchange information about physical education in other colleges and universities, and update more sports information. Applied to Sports Training Using computer technology can accurately analyze and study the movement technology, and can also design high, difficult and new movements on the basis of studying the basic movements. Using multimedia technology to deal with sports skills and tactics can present diversification and multidimensional, make it vivid and clear at a glance, help students to establish the appearance of skills and tactics as soon as possible, improve the accuracy of action understanding, and achieve learning goals faster [7]. In sports training, we can also use multimedia technology to establish some simulation systems, such as “athlete injury first aid simulation system”. This system is a kind of teaching system which can instruct students how to rescue correctly when there is a kind of sports injury in the simulated state. Such a system not only improves the students’ understanding of the knowledge, but also exercises their ability to solve problems in emergency situations. Applied to Sports Research Sports scientific research is the top priority of physical education, which guides the development of sports. The introduction of computer and multimedia technology into sports scientific research is bound to play a huge role in promoting the smooth progress of sports scientific research. Multimedia technology can systematically display the topics and argumentation materials with sound, words, pictures and animation, which can most accurately express the author’s ideas and achieve twice the result with half the effort [8]. At the same time, the organic combination of computer and network technology has opened up a new field for the research of physical education teaching, making cross regional collaborative research possible, such as the comparative study of students’ Physique in different regions.

4 The Causes of the Problems in College Physical Education Under the Background of Big Data 4.1 Lack of Scientific Understanding of the Use of Big Data The introduction of big data technology in college physical education requires the collection, collation and screening of all data and information resources produced by teachers for students, and the further analysis and collation of the screened data, so as to better improve the teaching methods and teaching mode through valuable and meaningful data,

Design and Research of Big Data Multimedia Technology

205

and enhance the teaching level and quality of college physical education. In the process of using big data, physical education teachers can comprehensively and accurately grasp all the information and data resources of students, and teachers can improve and optimize the curriculum through data information, so as to teach students in accordance with their aptitude [9]. In the process of physical education in reality, teachers are unfamiliar with the professional term big data, lack of scientific understanding of the use of big data, unable to use big data accurately and reasonably, unable to conduct deep data mining, resulting in big data technology can not achieve its own value in college physical education. 4.2 Not Familiar with the Application of Big Data Physical education teachers in Colleges and universities are unfamiliar with big data application system, and there are no relevant personnel to guide and train. As a result, teachers do not pay attention to the application system of big data, and the development of big data in Physical Education in Colleges and universities is relatively slow.

5 Suggestions on the Application of Big Data in College Physical Education 5.1 Enrich Teaching Content and Promote Teaching Quality Students’ mastery of knowledge and skills in the classroom often has a significant relationship with teachers’ teaching experience and knowledge reserve. Big data technology can comprehensively collect and record each teacher’s teaching methods, and integrate and analyze these data resources to obtain the teaching mode suitable for college physical education teachers, realize the sharing of resources, optimize the teaching content and improve the teaching quality; Big data technology can also provide individualized and targeted teaching methods for teachers, and carry out differentiated teaching for different students’ learning ability and interests, so as to truly teach students in accordance with their aptitude. 5.2 Improve the Awareness of Using Big Data As big data technology is a new type of technology in recent years, people know little about big data technology and are relatively unfamiliar with it. There are various difficulties and challenges in the use of big data technology. College physical education needs to change the traditional teaching mode, accept the application of big data technology, and improve the awareness of using big data. We should constantly learn and master the application methods of big data, reuse big data technology, fully understand the use process of big data technology, improve the operation ability of big data technology, combine the data resources generated by students, make use of big data technology to better master students, constantly tap the potential of students, and cultivate their innovation ability.

206

L. Wang and T. Tang

5.3 Training Professional Big Data Talents Only by fully mastering the application of big data can the value of big data be reflected in all walks of life. Therefore, colleges and universities in China need to pay attention to the screening and training of big data talents, formulate and improve a scientific and reasonable talent training system, link big data technology with the actual educational activities carried out by schools, and cultivate professional talents who understand both business and technology [10]. At the same time, colleges and universities can carry out big data training courses, increase the knowledge reserve of college physical education teachers, improve the practical operation ability of physical education teachers, and then improve the level and quality of college physical education through big data technology.

6 Conclusion To sum up, the emergence of big data technology has brought convenience to college physical education. College physical education needs to strengthen the understanding of big data technology, make rational use of big data technology, optimize the allocation of educational resources, improve the quality of physical education, and provide reference for teaching research. Acknowledgements. Yunnan Provincial Education Department of the sixth batch of university science and technology innovation team project construction “Yunnan Province university wisdom tourism science and technology innovation team”.

References 1. Haitang, W., Shu, C.: Research on the practice of big data in college physical education. J. Qiqihar Univ. (Philos. Soc. Sci.) 02, 173–175 (2018) 2. Guanyuan, L., Huaijin, L.: Discussion on the influence of big data era on physical education teaching research. J. Changjiang Normal Univ. 32(04), 121–124 (2016) 3. Hong, D., Zhong, W., Dawei, S., Ling, L., Changsheng, T.: Research on college physical education from the perspective of big data. China School Phys. Educ. (High. Educ.) 3(07), 35–39 (2016) 4. Jianwei, F.: Research on the application of big dat in physical education. Sports 7(13), 81– 82+108 (2016) 5. Guilin, Z.: Application of multimedia technology in college physical education. China New Commun. (11) (2018) 6. Tieniu, X.: On the necessity and optimization strategy of introducing multimedia technology into college physical education. New West. (09) (2020) 7. Guilin, Z.: Application of multimedia technology in college physical education. China New Commun. (20) (2017) 8. Zheng, H., Qinying, W., Hao, S.: Analysis on the application of multimedia technology in college physical education. Contemp. Sports Technol. (24) (2015) 9. Xiaojing, Z.: On the application of multimedia technology in college physical education. Sporting Goods Tech. (07) (2011) 10. Xiaolei, H.: Research on multimedia technology in college physical education. Sports Fashion. (10) (2017)

A System of English Spoken Pronunciation Learning Based on Speech Recognition and Mobile Phone Platform Lin Wang(B) Henan University of Animal Husbandry and Economy, Zhengzhou 450000, Henan, China [email protected]

Abstract. With the rapid development of mobile Internet, the application products for mobile phone platform are more and more popular, and the products based on speech recognition technology have aroused great repercussions in the market as soon as they are launched. This paper studies a practical application scheme of English learning system based on speech recognition technology on mobile platform. HMM (hidden Markov model) and Viterbi algorithm are used as the model and algorithm basis of the system. Aiming at the limitation of mobile platform, the algorithm design and implementation are improved to reduce the operation time and ensure the recognition accuracy. Keywords: Hidden Markov model · Speech recognition mobile phone · Viterbi

1 Introduction With the rapid development of science and technology and economy, the performance of the global smartphone terminal has been greatly improved. The major mobile phone manufacturers have increased the software development of the smartphone platform, and various voice phones have appeared. However, the speech recognition of mobile phones provides users with the function of interpersonal interaction to control the mobile phone. The application research and development of English learning needs is still relatively lacking. In the current environment of using English for oral communication, using the portable terminal of smart phone will provide users with intelligent English learning system which is not limited by time, location and teachers resources, which will provide users with better and faster e-learning means [1]. At present, the existing PC based intelligent English learning software has been able to provide the intelligent function of computer-aided learning technology, which enables learners to get the pronunciation quality score in time. If you want to transplant such software to mobile platform, it will be limited by the mobile phone computing speed, storage space and bus bandwidth. In view of the hardware and software limitations of embedded system, this paper studies a set of English learning system based on continuous speech recognition technology which runs smoothly on the mobile phone platform [2]. The system uses speech recognition technology to evaluate the learners’ © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 207–213, 2022. https://doi.org/10.1007/978-3-030-99581-2_29

208

L. Wang

pronunciation quality effectively and feedback to the user pronunciation information. The system develops the Sphinx of Carnegie mellong University as the core recognition engine of the whole system, which has the advantages in large vocabulary and continuous pronunciation recognition.

2 Extraction of Speech Signal Eigenvalue The feature value extraction of speech signal refers to the preprocessed speech signal after a transformation, which removes redundant parts, and extracts only the characteristic parameters representing the essence of speech. The subsequent processing of the system is based on the feature parameters. Once the feature parameters can not reflect the essence of speech signals effectively, the recognition will not succeed. Therefore, the feature value extraction module is the basis of speech recognition system [3]. In order to realize this module better, the selected feature parameters must meet the following two conditions: (1) The characteristic parameters can reflect the essential attributes of speech signal effectively; (2) The feature parameters contain useless and redundant information in speech signal as few as possible. In practical application, LPCC and MFCC are commonly used as characteristic parameters. 2.1 Mel Frequency Cepstrum Coefficient (MFCC) It is a common understanding in the field of speech recognition to make full use of the perceptual characteristics of human ear to voice to model speech signals. The results show that the sound frequency is not linear proportional to the sound frequency, but is in the approximate linear relation on the logarithmic frequency coordinate. Mel frequency scale and actual frequency are approximate logarithmic relations. The expression and relation Fig. 1 are as follows: Mel(f ) = 25951g(1 + f /700)

(1)

MFCC is a cepstrum parameter of speech signal in Mel frequency domain. In view of this, using MFCC as a feature parameter can simulate the processing characteristics of human ear to speech signal to a certain extent, and play a role in regulating foreign signals, especially noise [4]. A large number of studies have proved that MFCC can improve the recognition performance better than LPCC, because MFCC can better preserve the low-frequency effective information in the speech signal and suppress the interference of high-frequency noise to the system.

A System of English Spoken Pronunciation Learning

209

Fig. 1. Correspondence between Mel frequency and actual frequency

2.2 LPCC In speech signal processing, homomorphic filtering is considered to be an effective processing technology, because many current recognition systems are based on channel attribute modeling, and homomorphic filtering can separate the excitation signal in the composite speech spectrum from the channel response, which can better reflect the situation of the channel. LPCC is the cepstrum parameter obtained from the linear prediction coefficient (LPC) of speech signal after homomorphic filtering. It is a kind of parameter of bionic human speech system modeling, which can more accurately reflect the essential attributes of speech.

3 System Implementation 3.1 User Voice Input The sampling frequency of this system is fixed at 16 kHz. In feature extraction, the speech signal is divided into several overlapped frames, and the speech feature is extracted once for each frame. In framing, due to the short-term stationarity of speech features, a part of the previous frame and the next frame overlap, which is used to reflect the correlation between two adjacent frames. Generally, the frame is shifted to 1/2 of the frame length. In order to do fast Fourier transform conveniently, the frame length of this system is 32 ms and the frame shift is 16 Ms. 3.2 Model Establishment According to the characteristics of English pronunciation, the semi continuous hidden Markov model of phoneme level is used as the recognition framework. For the phoneme

210

L. Wang

model, the two vowel and three vowel models are used as the basic units of the acoustic model. When describing the acoustic model, the system uses three states to describe vowels and five states to describe consonants. In addition, silence, pause between words and noise are described by one state respectively. Finally, through state clustering, 400 phoneme models are obtained, including 1120 states in total [5]. 3.3 Sound Feature Extraction Generally, when the system is used in the actual environment, the recognition performance of the sound feature value will be significantly reduced. The reasons are as follows: (1) additive noise is the sum of real speech signal and background noise. Speech signal is often interfered by background noise in real environment, which is usually additive. (2) Channel distortion speech signal is also affected by some factors such as speech generation, recording and transmission. (3) Other factors, such as the extraction of feature parameters, are also affected by some other artificial or instantaneous noise. It can be seen that the diversity of mobile phone use environment determines that the system needs to consider the impact of noise in the environment. Only relying on the traditional MFCC eigenvalue “its anti noise performance is not the best. In this paper, a combination of multiple parameters is considered to suppress noise, and the parameters that can suppress noise are introduced [6]. At the same time, more speech is introduced through parameter expansion. Assuming that the noise is stable, we get the premise that the noise is relatively stable in each speech frame. Therefore, we consider using the first-order and secondorder difference of MFCC to suppress the stationary noise and improve the recognition rate. The difference calculation adopts the following formula: 1 d (k) =  n

2 i=−n i

n i=−n

i × c(k + i)

(2)

Where C is a frame speech parameter and K is a constant, usually 2. Generally, the recognition system based on PC platform takes 39 dimensional MFCC features, but considering the limitation of mobile platform computation, after experiments, we finally choose 12 dimensional MFCC, 12 dimensional first-order differential MFCC, 1-dimensional normalized energy, 1-dimensional first-order differential energy and 2-order differential energy address, a total of 27 vit eigenvalues [7]. Table 1 shows the comparison of performance parameters of different dimension eigenvalues.

A System of English Spoken Pronunciation Learning

211

Table 1. Performance comparison of 27 and 39 Vitt eigenvalues 27 dimensions

39 dimensions

Recognition rate (%)

92.01

97.88

Recognition speed (MS/word)

5

48

3.4 Improved Viterbi Alignment Algorithm Due to the large amount of computation of HMM, under the condition of limited computing power of mobile phone, this paper optimizes the processing to reduce the amount of computation in the recognition process, but at the same time to ensure the recognition rate. It is found that the key operations include: Gaussian computation, HMM computation (Viterbi path finding) and Gaussian mixture model computation. Viterbi decoding algorithm can be represented by grid graph (Fig. 2).

Fig. 2. Viterbi grid

4 Pronunciation Score In the Viterbi decoding process introduced in this paper, we compare the differences between the graded speech and the standard speech, calculate the posterior probability of the whole sentence, and score it according to the weighted joint scoring algorithm. At present, the common algorithms to measure the quality of pronunciation are: Hmm log likelihood score, segment classification score, segment duration score, log posterior probability score and so on. All of these scoring algorithms are based on the standard pronunciation as the reference template, through a variety of effective similarity calculation to obtain. After research, HMM based phoneme posterior probability algorithm has good robustness, and is not easy to change dramatically due to the changes

212

L. Wang

of individual characteristics or voice channels of learners, which better reflects the similarity between learners’ pronunciation and standard pronunciation [8]. Therefore, after synthesizing the advantages and disadvantages of several pronunciation algorithms, this system uses HMM based phoneme posterior probability algorithm as the pronunciation evaluation algorithm. For a phoneme, the observation vector of each frame of the i-th segment speech is given O, The frame based posterior probability is calculated as follows P(qi |Oi )P(qi ) P(qi |Oi ) = M q=1 P(qi |Oi )P(q)

(3)

Considering the slow pronunciation of English beginners, speaking speed should also be added to the pronunciation score as an influencing factor. Finally, the score of phoneme duration can be defined as: D=

  1 N lg p(f (di |qi )) i=1 N

(4)

Because the delay probability score of Junior English learners will be lower than that of oral English teachers. This kind of score can reflect the pronunciation errors of non-native speakers to some extent. Hidden Markov model (HMM) is derived from Markov chain. Later Baum proposed an algorithm to optimize the model, and successfully applied to speech recognition. In this paper, the acoustic model used in speech recognition is trained based on Hidden Markov model [9]. HMM model is basically a kind of double random process, which is called hiding because a group of random processes are hidden and invisible. In speech, just as human beings are in the process of making sound, the state changes of their vocal organs are invisible. For example, the changes of throat, tongue and mouth can not be seen from the observable speech signal sequence. Another group of stochastic processes is called observation sequence, which describes the probability distribution of various speech feature parameters observed in each state by state observation probability [10]. The characteristics of HMM are just suitable for describing the characteristics of speech. We can regard each state as the vocal tract is in an artistic configuration, while the state observation probability describes the possibility of hearing various sounds in a certain vocal state.

5 Conclusion On the basis of applying the improved Viterbi segmentation algorithm and delay probability algorithm to score phonemes accurately, it can basically reflect the learners’ spoken English pronunciation level, and also can be used on the mobile application platform. It is helpful for the training of English pronunciation. At the same time, the system also has some shortcomings. Because of the assumption that the system is stable to the environment, the burst noise has great interference to the system. The specific performance is that the error detection accuracy of inserted phonemes in the recognition process is not high, which leads to the failure of efficient

A System of English Spoken Pronunciation Learning

213

deletion of error branches in Viterbi decoding, thus affecting the recognition rate. At the same time, the recognition rate of consonant is much lower than that of causal phoneme. In view of this situation, we can consider the method of selecting the feature value of enhanced consonant and adding consonant model in HMM to improve.

References 1. Nitta, F.: Orthogonalized distinctive pbonetic feature extraction fornoise robust automatic speech recognition. IEICE Trans. Inf. Syst. 87, 1110–1118 (2004) 2. Yao, K.S., Paliwal, K.K., Nakamura, S.: Noise adaptive speech recognitionbased on sequential noise parameter estimation. Speech Comrnun. 42(1), 5–23 (2004) 3. Suontausta, J.: Fast decoding in large vocabulary name dialing. In: IC-ASSP, pp. 35–46 (2000) 4. Chen, D.: Research and Implementation of Speech Parameter Extraction Algorithm. School of Optoelectronic Engineering, Chongqing University, pp. 25—26 (2007) 5. Linting, Z.: Research on autonomous mobile learning system model of smartphone platform. China Market (18) (2011) 6. Lei, L., Xiangzeng, M.: Learning piece development based on mobile phone platform. Inf. Technol. Educ. (11) (2007) 7. Ye, H.: Design and implementation of video client on mobile platform. Sci. Technol. Econ. Market (07) (2011) 8. Zhongwu, L., Yaocheng, Y., Guoliang, X., Shoujian, D.: Create a mobile platform system for party building and deeply tap the party building function of mobile network. Electron. World (02) (2014) 9. Haoming. L.: Application of mobile platform in marketing. Shanghai Bu. (10) (2013) 10. Guoying, W., Yang, Y., Shan’an, Z.: Dual CDMA embedded monitoring system based on mobile phone platform. Electromechanical Eng. (10) (2006)

Material System Technology Based on Oracle Database and Java Language Tong Wang(B) and Zhibo Wang Shenshuo Railway Branch of China Shenhua Energy Co., Ltd., Shenmu 719316, Shan XI, China [email protected]

Abstract. With the rapid development of science and technology such as aerospace engineering, bioengineering, industrial engineering and micro electro mechanical system, the performance requirements of product parts are higher and higher in today’s society. The common parts composed of single-phase or homogeneous materials are often difficult to meet the functional requirements of products for parts, This makes the design and manufacturing of multi-material parts based on rapid prototyping technology become one of the frontier topics in the field of advanced manufacturing technology. Using Java technology combined with Oracle’s material system technology research, this paper puts forward a system solution based on distributed structure, and analyzes the key technologies and methods. It has reference significance for the development of similar systems in different fields. Keywords: Java oracle database · JDBC · Multi material parts · Rapid prototyping

1 Introduction With the continuous development of computer and network communication technology, the rise and wide application of Internet technology has greatly promoted the research and application of database under the network environment. Remote database based on network plays an important role in national economy and scientific and technological research, and its application and status in various fields are increasingly prominent, In particular, information acquisition and resource sharing based on network environment [1]. There is a strong demand for network database, such as supporting remote operation, remote control, remote information exchange, query storage and security technology through the network, Using JVA technology and Oracle to design and implement remote database. The earliest artificial multi-material parts are composite parts. The composition of composite materials is to combine two or more kinds of materials with different properties to form a new material with better performance than the components. The radome made of glass fiber reinforced unsaturated polymer is the earliest product of modern composite materials [2]. This material is made by hand paste method. It only needs one side mould made of common material and no other special equipment. It is suitable for © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 214–219, 2022. https://doi.org/10.1007/978-3-030-99581-2_30

Material System Technology Based on Oracle Database

215

making large-scale products of various complicated shapes. Later, spray forming technology appeared, using fine fibers to replace the glass cloth used in the previous hand lay up process, which greatly improved the preparation efficiency and reduced the labor intensity. With the wide application of composite materials, there are many new technologies for directly manufacturing composite parts. Such as vapor deposition method, powder metallurgy method, plasma spraying method, self propagating high temperature synthesis method, foaming method and so on.

2 Key Technologies Based on Network 2.1 Introduction to Java Technology Java language is an object-oriented and platform independent programming language. It has many advantages, such as object-oriented, portability, platform independence and high security [3]. Java technology provides a unique development environment for creating highly dynamic web applications. It can be embedded into small applications in HTML, In Java environment, HTML code is mainly responsible for describing the display style of information, while program code is used to describe processing logic. Ordinary HTML page only depends on Web server, Java technology separates user interface and content easily, which allows web developers to easily create dynamic web pages. Therefore, using Java technology to develop client-side and server-side programs has the following advantages [4]. 1) It can contain JVA program code which can generate dynamic content in HTML webpage. It is more convenient to write static HTML in JVA. It overcomes the disadvantage that other programs can’t separate the transaction logic from the design logic. 2) It has good interactivity. It can do a lot of extra work before sending the data back to the network server, such as checking the data and finding errors in time, which will reduce the network transmission cost and improve the response speed. 3) Java bean is a kind of Java class, which becomes an object group with some function or transaction by encapsulating properties and methods. 4) The important function of the server-side program written in Java is to browse and modify data interactively, generate dynamic web content, and adopt the working mode based on ask and answer. 2.2 Oracle Features Oracle is an excellent relational database. It has high response speed, can handle a large amount of data, has comprehensive system functions, and perfect security management and data recovery mechanism. It is mainly used in large-scale systems with more users. Because Oracle introduces the concept of object-oriented, it matches the object-oriented technology of Java very well, The database entity can be operated through the application program interface encapsulated in the database object.

216

T. Wang and Z. Wang

2.3 Three Tier Architecture Based on Java The advantage of using three-tier system on the Internet is obvious. Nowadays, most of the Internet adopts the three-tier architecture of B/B/Web database. In this architecture, complex computing and task processing are concentrated on the server side, while the client only presents the calculation results to the user in the form of web page or accepts the simple operation data input by the user, The client tends to be a thin machine structure, often only need browser or client software, which simplifies the environment configuration of the client, shortens the software development cycle, makes the system easy to operate, maintain and upgrade, and also enables the centralized management and release of user data. Practice has proved that it is a reasonable choice to adopt the three-tier architecture based on Java technology on the network [5]. As a network oriented programming language, Java is also a concise, multithreaded web programming language. It is closely combined with the Internet, and overcomes the low efficiency and low real-time response requirements of the original CGI common gate interface programming, At the same time, the MDBC (Java language access database interface) developed by javasoft company can ensure the efficient and safe connection between Java and we database [6].

3 Basic Research on Manufacturing of Multi Material Parts Multi material parts are manufactured for the purpose of meeting the use performance of parts. They can meet the requirements of gradient function and intelligent performance of parts, including mechanical properties, thermal properties and electromagnetic properties, so as to save resources and improve the performance of parts. This chapter mainly studies the modeling method of multi-material parts and the forming method of multi-material parts [7]. Based on RREP 839, Kumar uses RSET set to describe the shape of HEO model and RM set to describe material change information to model HEO. The geometric information of HEO is described by geometric space, and the material information of HEO is described from space [8]. The modeling method uses RSET and regular Boolean operation based on regular set to define the non manifold characteristics of multi-material parts in geometry and topology. According to the characteristics of HEO material information part, the HEO geometric region is divided into a finite number of mutually disjoint regular geometric regions, and the union of each sub region forms a complete part geometry region [9]. In the material information representation of parts, for the material feature model of a single point, assume that the number of material types of HEO is n, and the material properties at any point in the part are expressed by the volume percentage of various constituent materials. And the sum of the percentages of each material component at each point is always 1. The material space V is expressed by Formula 1.   n  vi = 1vi ≥ 0 (1) V = v ∈ Rn |v ≡ i=1

Material System Technology Based on Oracle Database

217

The material mapping function from the geometric space E3 to the material space R3 is as follows:     F : E 3 → V F(x ∈ E 3 ) = 1 (2) 1

The data is exchanged between PC software and main control chip through the USB data communication interface built by ATmega16. The data content includes the control command of the upper computer and the system state parameters of the real-time movement of the forming device. Figure 1 is the functional schematic diagram of the USB data transmission module [10].

Fig. 1. Schematic diagram of data transmission module

4 Encryption of Oracle Database At this stage, the data adopted by most application systems are fully stored in the database in plaintext form. Although normalized password verification can play a role, it is not comprehensive and sufficient. Even if access control technology is used at the same time, it is still unable to effectively ensure the full security of the database. Moreover, once the security measures are not accurate in place, illegal users or hackers will enter the database maliciously, thus threatening the security of database data information. They can not only pry into the internal data information of the system at will, but also modify the audit log data information by stealing the authority of the authority person, so as to cover up the traces and phenomena of human invasion. Therefore, relying solely on the self-protection function of the computer is far from enough. Users also urgently require data storage and transmission based on ciphertext, especially log encryption. In terms of the database itself, the smallest unit is the data item, then the field and table, and finally the database. According to its structure, the encryption of the database can be divided into different parts, namely data elements, fields, records, database, data table, etc. the size of the encryption unit is closely related to the difficulty of encryption. In short, the larger the encryption unit is, Then the operation will be less difficult. Therefore, in order to ensure the smooth and effective development of system encryption, different encryption strategies should be adopted for different units according to the specific actual situation, so as to avoid the adverse phenomenon of excessive resource consumption.

218

T. Wang and Z. Wang

Especially when the sensitive fields and data elements are encrypted, although the logs or fields will be attacked and obtained by illegal customers or hackers, they cannot be tampered with at will.

5 Conclusion Using Java platform and Oracle as database, the architecture of cross platform distributed remote database based on WCB is designed. It meets the development direction of remote database based on network to multi domain based on distributed computing, The remote database based on Java and Oracle will get more development and popularization. The design and manufacturing of multi-material parts need to use digital technology to unify the structural features, material distribution features, manufacturing features and functional features of parts. According to the functional requirements of parts, the integrated design of external geometric topological features and internal material features of parts is carried out under the constraints of material processing technology, According to the geometric information and material distribution information of the part, the external geometric feature and internal material feature of the part are formed at the same time. In short, although the manufacturing technology of multi-material parts has achieved certain results. However, this technology is not very mature, so it is necessary to further research and develop the modeling theory of multi-material parts, combine rapid prototyping technology with material technology, biotechnology and intelligent control technology, and integrate multiple disciplines to solve the manufacturing problem of multi-material parts. It can be foreseen that, in the near future, parts will be manufactured according to the required functions, just like the design and construction of houses.

References 1. Zhihua, X.: In depth java servlet network programming. Xi’an University of Electronic Science and Technology Press, Xi’an (2001) 2. Yan, J., Zhiying, W., Weiqiu, H., et al.: Distributed Database Technology. National Defense Industry Press, Beijing (2000) 3. Wensheng, L., Fengjuan, F., Yuhong, H., et al.: Oracle Database System Foundation and Tools. People’s Posts and Telecommunications Press, Beijing (1999) 4. Brown Ski, S.B.: Oracle8 I for Windows NT Practical Guide. In: Ming, Z., Wen, Z. (eds.) Trans. China Machine Press, Beijing (2000) 5. Jingwen, Q.: Research on excel financial software system design. Electron. Des. Eng. 23(18), 53–55 (2015) 6. Tingting, H.: Report design and research of university financial management information system based on web. Electron. Des. Eng. 25(10), 41–43 (2017) 7. Junqing, J., Ting, C.: Design and research of financial voucher management system based on web. Softw. Eng. 40(1), 81–91 (2015) 8. Song, Q., Xiong, C.: Design and research of enterprise financial management system based on struts. Contemp. Econ. 71(9), 300–313 (2015)

Material System Technology Based on Oracle Database

219

9. Jiangche, G.: Research on the design of enterprise financial data management platform. Electron. Des. Eng. 24(21), 1–3 (2016) 10. Yongli, S.: Design and research of university financial management system based on J2EE. Electron. Des. Eng. 25(19), 68–70 (2017)

Analysis of Three-Dimensional Multi-motion Simulation of Intelligent Snake Robot Based on Reconfigurable Modularity Zhenmin Yang, Hongbo Li, Yuying Feng, and Xiaodong Wang(B) Kunming Metallurgical College, Kunming 650300, Yunnan, China [email protected]

Abstract. The biological snake has several kinds of motion modes, such as winding movement, peristalsis and rolling lateral movement, and has the ability to survive in various environments on land and water. According to the motion characteristics of biological snakes, researchers put forward bionic robots, which make snake robots have the same advantages as snakes, and use them in various complex scenes to assist human rescue activities. Based on the structure optimization design of reconfigurable modular intelligent snake robot, this paper puts forward the idea of three-dimensional multi-motion simulation. Keywords: Reconfigurable modularization · Artificial intelligence · Snake robot · Motion simulation analysis

1 Introduction Intelligent snake-shaped robot can find the specific location of the trapped person in time in earthquake rescue, or reduce the risk of poisoning after personnel entering in pipeline detection, replace personnel to complete the work of high altitude cable detection, and play an important role in water resources protection, species population research, field exploration and so on [1, 2]. Based on reconfigurable modular snake robot has good stability, small cross section and flexible characteristics. It can work in rough and winding complex environment and help human solve various problems.

2 System Principle and Module Analysis 2.1 System Principles The snake-shaped robot explored in this paper consists of snake head, snake body and snake tail. Each part has a reconfigurable module, and the actual construction needs to be set according to the specific requirements [3, 4]. The total length of the robot snake section 50 mm, 670 mm, the maximum contour size 70 mm, the snake body each section uses two kinds of connection modes, namely the ball head hinge connection and the front and rear embedded connection way. A snake body is uniformly distributed along the axis © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 220–225, 2022. https://doi.org/10.1007/978-3-030-99581-2_31

Analysis of Three-Dimensional Multi-motion Simulation of Intelligent Snake Robot

221

in the direction of 120°. The wheel consists of three forms: the wheel connected to the ball head, the wheel fixed to the shaft, the wheel connected to the shaft, the grinding wheel installed between the wheels, and the snake robot has three sets of motion modules and multiple electrical components [5]. The driving module is installed on the rear axis of each section of the snake body to support the advance and retreat of the snake body, and the climbing module is installed in the 2–3 section, so that the robot can lift up in many sections and complete the climbing movement. In order to control the steering and climbing of the robot, the robot can adjust its movement direction by installing contacts in the snake head, installing thermocouple, air collector, infrared temperature sensor, lighting lamp and camera in the snake head, and installing sound sensor in the middle part. The mileage sensor is installed on the drive shaft, which can collect sound, image, position and other information at the same time. 2.2 Module Subsystem The lifting module inside the snake robot includes brushless motor, spur gear, bevel gear and hinge. The bearing is between 2 and 3 knots of snake body. The front hinge is provided with gear support and installed in the inner ring of the front bearing [6, 7]. The motor and gear system and support rotate regularly in the inner ring of the front and rear bearings, and complete the working state according to the motion requirements of the snake robot. In this process, the climbing module inside the snake robot will increase or reduce the counterweight to keep the straight gear end face perpendicular to the horizontal plane, no matter how the snake robot rolls in the work, The climbing module can maintain the normal working state. The front part of the robot is raised to complete the climbing work. The turning motion of the snake robot needs to be realized by the acceleration and deceleration operation of the left and right wheels. The left wheel is controlled by the single chip microcomputer, so that the deceleration motion is gradually completed, and the robot accelerates through the right wheel control. a serpentine robot left and right conversion module keeps the ball hinge between the snake body joints and the joints at an angle of 30°. to a certain extent, it strengthens the mobility of the left and right conversion module and makes the left and right conversion more flexible. 2.3 Power Drive Module A total of 15 active wheels and 15 driven wheels are distributed on five carriages. Each section uses the ball hinge as the connection mode to support the free rotation of the snake 360°. Or use the front and rear embedded connection mode, by placing the lifting module to complete the connection of each section. When a certain section or several sections in the middle of the snake robot are overturned, it is necessary to ensure that 15 active wheels and follower wheels are grounded, and the signal output by single chip microcomputer is used to effectively control the forward and backward operation of the motor. When there is a torsion phenomenon in a section of snake robot, the output signal of single chip microcomputer is used to control the same part of each part, so that the power drive module can complete the operation of forward, backward, turning and so on. If the snake body is twisted at a certain time, the switch in the body is turned on,

222

Z. Yang et al.

and the two wheels of the motor are controlled to connect with each other to realize the overall control of the motion of the snake body.

3 Structure Design of Intelligent Snake Robot 3.1 Motion Patterns of Serpentine Robots According to the above mentioned motion modules, there are the following main modes of motion of snake robot: (1) winding motion. A snake body will have a “S” track” on the ground, and the friction force of the snake body in the tangential direction is lower than the friction force in the direction, thus pushing the snake robot forward. Compared with other motion modes, winding motion efficiency is very high, but it needs large motion space. If the ground is smooth or the friction coefficient is small, it is not recommended to use winding motion structure design. (2) Stretch motion. When the snake robot is telescopic, the front end of the snake begins to shrink, the back end is still, then the back end shrinks, the front end is still, and the circular motion is completed [8]. This is the snake robot in a smooth plane or narrow space commonly used in the movement. (3) Linear motion. When snakes prey on, they move in a straight line as they approach their prey, and the snake body shifts its joints by the force of abdominal muscle contraction. The linear motion efficiency of snake robot is low and the moving speed is not fast. (4) Side-shifting motion, which originates from the rattlesnake in the desert, where the snake moves from scratch, with parts of the body in contact with the ground at a faster rate and then quickly lifted up, with only a small part of the snake in contact with the ground at the same time, pushing the snake forward through friction between the abdomen and the ground. 3.2 Drive Unit Design The driving unit of each joint module of snake robot needs to complete the motion according to the corresponding rotation law, thus forming different motion modes. At present, there are three main driving units of snake robot: pneumatic type, electric type and hydraulic type. The electric driving mode is the most common. The motor is used to drive joint rotation under the action of deceleration gear group, which makes the driving structure more compact. Increase output torque with appropriate deceleration ratio and optimize snake motion performance. Select the steering gear according to the performance requirements of the snake robot, the relevant parameters are shown in Table 1. 3.3 Modular Structure Design According to the structural characteristics of snake robot, the modular structure design idea is put forward. The module contains two MG995 steering gear, which can control

Analysis of Three-Dimensional Multi-motion Simulation of Intelligent Snake Robot

223

Table 1. Performance parameters of steering gear of snake robot Performance

Parameters

Voltage

4.8 V

6V

Speed

0.17 s

0.13 s

Torque

Kg/cm 13

Weight

62 g

Size

40.7 × 19.7 × 42.9 mm

the horizontal yaw motion and vertical lifting motion of the robot. The steering gear can control one degree of freedom of rotation of the module, the control program is independent, the output shaft and the gear with a deceleration ratio of 9:1 are connected to complete the joint rotation motion. Limited by mechanical structure, the ultimate rotation angle of robot is between − 79° − 79°. In winding motion and lifting motion, the rotation angle of each joint should not exceed 75°±. The relevant technical parameters are shown in Table 2. Table 2. Technical parameters of the robot Performance

Parameters

Number of modules

9

Length of Joint Module

mm 200

Weight

Kg 6

Horizontal angle

40°

Raise the angle

70°

Lift the height

450 mm

4 Research on 3D Multi-motion Simulation of Intelligent Snake Robot Based on Reconfigurable Modularization Taking the winding motion of snake robot as an example, the simulation study is carried out. From the point of view of biological snake research, a snake curve based on the motion trajectory of snake robot is proposed, and then the discrete ratio is expanded to calculate the relative rotation angle between the rotating joints of the robot, so as to complete the robot motion control. The curvature equation of serpentine curve is as follows:   b ab sin s + c (1) K(s) = L L

224

Z. Yang et al.

S refers to the arc length of serpentine curve; a is the parameter that affects the amplitude of curve fluctuation; b is the parameter that affects the number of waveforms contained in the length; c is the parameter that determines the direction of deflection. When a = π/3, b = 4π, ca = π/3, b = 0, the snake robot can achieve the best winding motion state according to the simulation analysis [9]. Snake robot contains n same joints, which are connected to each other to complete the winding state of the robot. These joints are of the same length and consistent with the length of the joint module. The snake curve is discretized, the length of the curve is L, the length of each section of the discrete curve is L/n, then the curve length of the first to i joints of the snake robot is (i = 1,…, n), after the dispersion, the point formula is as follows: xi =

k=1

yi =

    kb kc cos a cos + n n n

(2)

    kb kc sin a cos + n n n

(3)

i  L

i  L k=1

θi The angle between the i joint and the x axis is used to indicate that the coordinates   of the i and 1 connecting rod intersection points are (x). Theiy, Ii θi = a cos ibn + icn Then, the angle formula between the two adjacent two connecting rods is as follows:   β +γ (4) φi = θi − θi+1 = α sin iβ + 2 The formula α refers to the waveform amplitude, β refers to the angle and phase difference of adjacent joints, γ the direction of robot motion. Through the above formula, the simulation analysis of snake robot’s winding motion can be completed [10].

5 Conclusion In a word, this paper analyzes the gait and related principles of snake robot, and puts forward a modular structure design scheme according to the structure of biological snake body. Through the simulation and analysis of snake robot, the influence of each parameter on snake motion is summarized, and the curve parameters suitable for robot winding motion are obtained.

References 1. Xian, G., Yongchun, F., Xueyou, Z.: Development of reconfigurable modular serpentine robot and study of multi-motion modes. Inf. Control 49(01), 69–77 (2020) 2. Qizhen, S., Wenfan, Z., Nuo, F.: Application of snake-shaped intelligent inspection robot in distribution network cable channel. Res. Electr. Mech. Inf. (20), 38–39 (2019) 3. Yanqiong, F., Qinglei, D., Xifang, Z.: Structure of self reconfigurable modular robot. J. Shanghai Jiaotong Univ. (06) (2005)

Analysis of Three-Dimensional Multi-motion Simulation of Intelligent Snake Robot

225

4. Yashu, L., Yan, Z., Weimin, L.: Research on curriculum reform of deep integration of industry and education under the background of new infrastructure construction -- Taking the course of robot modular innovative design as an example. Electron. Test. (21) (2020) 5. Jianming, Z.: Application of modular automatic production system in teaching. Res. Vocat. Educ. (06) (2004) 6. Xuan, W., Wenjun, Y.: Modular diagnosis method for a class of distributed systems. Control Theor. Appl. (04) (2003) 7. Yunhong, C.: Modular enterprises and products. Mech. Res. Appl. (01) (2000) 8. Qixin, Z., Qin, P., Qiang, M.: Design scheme and development of modular robot. Electron. World (21) (2015) 9. Yonghua, H., Yueqing, Y., Liying, S., Jianxin, Y.: Research on inertial parameter identification of modular robot. Microcomput. Inf. (02) (2007) 10. Xin, M., Hanqing, C., Yanhe, Z., Aihong, W.: Design Exploration of modular autonomous deformation robot. Design (06) (2019)

New Media Art and Ant Colony Algorithm in the Construction of Art Curriculum Platform Na Wei(B) Zhengzhou Normal University, Academy of Fine Arts Henan, Zhengzhou 450044, China [email protected]

Abstract. In this paper, new media art and ant colony algorithm are integrated into art education, and many new teaching ideas and methods emerge; There are all kinds of digital art works in the appreciation class; All kinds of digital art works produced by teachers and students in practice class; More and more largescale competitions of digital art works. New media art and ant colony algorithm platform construction plays an increasingly important role in art courses. In the context of the new curriculum reform, this paper discusses how to better build the art curriculum resource platform, and how to make full use of the resource platform in the teaching classroom. Keywords: Art courses · Ant colony algorithm · New media art · Platform construction

1 Introduction With the rapid development of science and technology, new media art and ant colony algorithm have been widely used in art education. Art Curriculum Education in the training mode, objectives and methods of content also appeared strong changes, the concept of education and learning has also been developed [1]. New media art teaching resources are widely spread, and there are many kinds of teaching resources websites on the network, but they are all in their own array and cannot be shared, which increases the time cost in the process of teaching and learning, and causes the low utilization rate of new media art teaching resources to some extent [2]. In this context, the majority of teachers and students for new media art information sharing of high quality education resources is increasingly urgent. In this situation, there is an urgent need to build an open and sharing, dynamic update, synchronous with the curriculum reform and oriented to the society, teachers and students of the diversified resource library, in order to meet the needs of different people, essentially solve the problem of educational resource platform. When it comes to new media art, we usually think of multimedia art. The combination of multimedia technology and Internet brings human beings into the new media era. New media art, also known as modern media art or digital media art, is a new art developed by means of science and technology. Up to now, the concept of new media and new media art lacks mainstream and objective expression. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 226–231, 2022. https://doi.org/10.1007/978-3-030-99581-2_32

New Media Art and Ant Colony Algorithm

227

In the 1960s, the information revolution made the personal computer the main form of computer. Artists mastered the portable photography and video equipment, and began to use this media for artistic expression, from which the new media art began. The concept art of the sixties, which was greatly influenced by Duchamp, and the performing art of the seventies, which was transformed from the early futuristic Manifesto and dada style behavior, and the later emergence of happenings. At the same time, in the avant-garde art experiments in the 1950s and 1960s, dynamic art combined with mechanical technology and the earliest electronic art works also appeared. Communication and cooperation have become the focus of artists who create in these areas. They constantly explore new behavior patterns and new media materials, trying to explore the possibility of creating new thinking, new human experience and even a new world [3]. In the 1990s, new media art began to sprout and develop in China. In a short period of more than 20 years, new media art has developed at an extremely amazing speed and has become a new era art of great concern in China. The earliest video art exhibition in China was held in September 1996 in the gallery of China Academy of Fine Arts in Hangzhou, entitled phenomenon and image. Since then, video art as a group began to occupy a place in China’s art territory, and attracted international attention.

2 Ant Colony Algorithm Ant colony algorithm (ACO) is a new inspired bionic evolutionary system, which is proposed by Dorigo m, a famous Italian scholar, according to the ant’s “looking for food” behavior. The algorithm adopts distributed positive feedback parallel mechanism, and is easy to combine with other methods, and has strong robustness [4]. The optimization mechanism of ant colony algorithm includes two basic stages: adaptation stage and cooperation stage. In the adaptation stage, each candidate solution changes its own structure and updates its own attribute information according to the pheromones obtained continuously. The more ants passing through the path, the more pheromones left, and the higher the probability of being selected; In the cooperation stage, the candidate solutions may produce better performance solutions through information exchange, which is very similar to the learning mechanism of learning automata. In order to make it easy to understand, taking solving the traveling salesman problem as an example, the ant colony algorithm can be expressed as follows: at the initial time, the amount of pheromones on all paths is the same, let τij = 0 (C is a constant), K (k = 1,2,3,…. m) in the process of movement, according to the amount of pheromone on each path and other external factors determine the direction of transfer [5]. The transfer rule used by ant algorithm is called random proportion rule, that is to say, if the pheromone amount of each path is the same, the ant randomly chooses a path to move. At time t, the probability p (T) of ant K in city I and moving to city J is: τij (t) · nij (t) pijk (t) =  j=1 τij (t) · nis

(1)

In ant colony algorithm, nij usually takes the reciprocal of the distance between city I and city J. α and β It reflects the relative importance of accumulated information and

228

N. Wei

heuristic information in the process of ant movement. When all the ants complete a tour, that is, all the ants traverse all the cities once, and the pheromones on each path are updated according to formula (2). τij (t + n) = (1 − p) · τij (t) + p · τij (t) τij =

m k=1

τijk

(2) (3)

In fact, ant colony algorithm is a combination of positive feedback principle and heuristic algorithm. As shown in Fig. 1 below, the ant chooses the path through the distance and pheromone between the two cities [6].

Fig. 1. Distance between two cities and pheromone selection path

The model of periant system uses global information to update pheromone quantity on the path [7], so it has better performance than the model of ant quantity system and ant density system; However, because the ant population system and ant density system model use local information, the computation is small and the system complexity is low.

3 The Content of New Media Art Curriculum Resources Reasonable use of network information resources and digital media equipment technology. Today, people have entered the era of network information. The network links the world together, and can understand all kinds of real-time information of countries in the world at the first time. At present, the development and utilization of network technology has become an important factor affecting curriculum development. The application of network technology in art teaching can share various educational resources, provide personalized learning environment, and provide a possibility and platform for a wider range of interactive and collaborative learning. The Internet has gradually become a platform

New Media Art and Ant Colony Algorithm

229

for people to learn and exchange. There is no longer a distance between international culture and art, breaking the gap in space. Through the Internet, we can collect the most modern art works at home and abroad, broaden our artistic vision, and art works can only be seen in art textbooks and art classes. Professor Yin Shaochun said in the interpretation of art curriculum standards for ordinary senior high schools that teachers should be good at going out of textbooks. Textbooks are not rules and Bibles. In addition to the works of art in textbooks, students have to watch a large number of other excellent works of art to improve their aesthetic standards, and the network will accommodate thousands of new works. The network has the function of resource sharing. Students can also upload their works to the Internet for display, which broadens the space of works display. But now there are many cases about students addicted to the Internet. Middle school students are in a critical period of life development, and they are very vulnerable to the temptation of the external environment. Therefore, teachers should cultivate students to establish correct values of the Internet in the classroom, surf the Internet healthily and civilly, and make rational use of network resources. In order to guide students positively and correctly, teachers can provide some special art websites to facilitate students to search and make network resources play their most effective role [8]. New media art is a work of art created by means of media and technology. Therefore, the development of new media art courses, modern media technology is the students to master. Camera, camera hardware and operating program knowledge, some basic design and production software, such as Photoshop, Coredraw, flash and other software. In the process of art teaching, relevant computer software can be selected for computer painting creation and computer design (graphic design, animation design and threedimensional design), and relevant computer software can be selected for design and webpage production for communication. Through computer processing, we can edit the hot topics and events around us to create works of art.

4 Construction of Art Curriculum Platform On the art resource platform, the modules are designed step by step, from diffuse to deep. Through the teaching practice of new media art and ant colony algorithm, the modular teaching mode is combined with the use of art resources, which can stimulate students to actively learn knowledge and skills. Moreover, teachers have more passion in Teaching, and the teaching effect is better. Relying on the website platform, the teaching and learning space can be expanded and extended, Make the art teaching quality and evaluation system to a higher level, improve the students’ artistic quality in all aspects [9]. Expanding and integrating teaching resources, digitizing the teaching resources of new media art and ant colony algorithm in time, expanding and integrating the collection channels of teaching resources, and digitizing and collecting the teaching resources in time are the basis of the construction of teaching resource database, and the most important and difficult link in the construction process. At present, the collection channel and content of teaching resources are relatively single. We should introduce corresponding incentive measures, fully mobilize the enthusiasm and initiative of teachers and students to participate in the construction of teaching resources database, and collect resources by

230

N. Wei

downloading, self-made and editing, so as to further enrich the content and form of teaching resources. Resources should reflect the core resources of teaching content, teaching methods and teaching process. Resources can systematically reflect the teaching ideas, teaching ideas, teaching design, curriculum resource allocation and application of the course, and fully reflect the results of teacher education curriculum reform [10]. Update the information and material of teaching resource platform in time. New media art, ant colony algorithm, art teaching philosophy and students’ personalized needs are changing with each passing day. Art teaching resource information also needs to be updated in time, so that teachers and students can learn the most advanced professional information and materials in time. This not only needs the support of website technology, but also needs the platform managers to expand the channels to collect information, However, we can not blindly seek large and complete resources. The construction of resources website should be planned, and the organization and management of resources should be more rigorous, efficient and useful, so as to better serve teachers and students and meet the needs of different individuals [11, 12]. Improve the service function of new media art and ant colony algorithm art course platform. Building a good art new media art and ant colony algorithm resource platform is the prerequisite for the effective use of resources and standardized management. At present, the function of the resource platform is relatively simple and the service is relatively single, which can not meet the needs of teachers and students. The management platform we want to build should mainly provide the following services: (1) user multidimensional management service function. Users need to register their real name before entering the platform. (2) Provide fast resource retrieval service. All the stored resources are presented in the form of specialty and module on the webpage of teaching resource database. Meanwhile, the classified search and keyword query functions are provided on the main page to provide users with a fast way to find resources. (3) Provide teachers and students to share and build resources [13]. In order to facilitate teachers and students to upload, download, comment and other functions in the resource website, so that teachers and students can better participate in the construction of the resource platform.

5 Conclusion In a word, in the process of art teaching, the construction and teaching application of resource platform based on new media art and ant colony algorithm is the inevitable trend of education development. The combination of resource website and art teaching process can effectively improve the teaching effect, enrich students’ perceptual knowledge, and stimulate their learning initiative and interest, It promotes the overall improvement of students’ artistic quality, expands the teaching space of teachers, makes teaching and learning achieve efficient combination, and promotes the long-term development of art curriculum reform.

New Media Art and Ant Colony Algorithm

231

References 1. Xiangzhong, L.: New Media Art and Innovative Education. Communication University of China Press, Beijing (2008) 2. Shaochun, Y.: Research on Contemporary Art Education. Capital Normal University Press, Beijing (2013) 3. Yongxin, S., Jizhou, S., Haijiang, Z.: Simulation algorithm of Chinese ink painting based on particle system. J. Comput. Aided Des. Graph. 15(6), 667–672 (2003) 4. Ying, L.: Application of folk art resources in animation art. Grand View of Art. (11) (2015) 5. Shu, Y.: On the symbolic expression of lens in animation art. Beauty Times (the first half of the month). (02) (2010) 6. Jianping, L.: Aesthetic cultivation of animation art. Contemp. Anim. (03) (2021) 7. Xinyue, Z., Xiangyang, Z.: Inheritance of Dunhuang Cultural Heritage in animation art. Drama House (24) (2016) 8. Yongrong, T.: On the influence of new media art on animation art. Popular Lit. Art. (07) (2014) 9. Mianmian, X.: On the impact of the dissemination of animation works of art on the public’s aesthetic outlook. News Res. Guide (06) (2020) 10. Jie, J.: Analysis on the role of traditional national cultural elements in animation art creation. Writer (20) (2015) 11. Weigang, J.: Interpretation of animation art and its cultural context. Sichuan Drama (10) (2013) 12. Shenglin, L.: Analysis and Research on the expression form of Chinese animation art. Everyone (17) (2012) 13. Xiangyu, L.: Research on 3D animation art style under the background of industrialization. Res. Art Educ. (24) (2016)

Design and Implementation of Internet Plus Sports Health Management System Yonggang Wu(B) Hainan Medical College, Xueyuan Road, Longhua District, Haikou, Hainan, China [email protected]

Abstract. In this paper, the health collection equipment of the Internet of things is extended to residents’ families. The health status of residents is continuously recorded through the mobile Internet. A series of personal health management services such as health status evaluation, management and guidance, health care consultation, education and health risk factor assessment are provided for residents by using the information resources of the regional residents’ health file platform. The collection devices of Internet of things include: watch type wearable health manager, home health management client, home electronic blood pressure device, blood glucose tester and fat detector. Mobile communication devices include: mobile phones for the elderly and dedicated mobile communication gateway. Keywords: Internet of things · Mobile Internet · Residents’ health records · Regional health information platform · Health management

1 Introduction In recent years, China’s aging population, while chronic diseases show a rapid growth trend, which not only affects people’s health and life, but also seriously affects social and economic development [1]. At the same time, in big cities such as Beijing, Shanghai, Guangzhou and Shenzhen, the accelerated pace of life and the huge pressure of life also leave hidden dangers for the health of many young people who are struggling. The traditional medical and health service process is cumbersome, people need to go to the designated medical institutions to detect health signs information, and then need to wait for a certain time to get the measurement results. This is also an important reason why most people rarely take the initiative to measure their own health signs information, because what people need is a more intelligent and convenient way of personal health management [2]. With the rapid development of mobile Internet, Internet of things and other hightech, the traditional medical and health services are quietly changing. The combination of traditional medical and health services and emerging mobile Internet, Internet of things and other technologies produces a new concept - mobile medical and health services [3]. In the traditional medical service mode, people need to go to hospitals or other medical institutions to obtain all kinds of medical and health-related services. The emergence of mobile medical and health services will change this traditional medical © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 232–237, 2022. https://doi.org/10.1007/978-3-030-99581-2_33

Design and Implementation of Internet Plus Sports

233

service mode, whether at home, on the road or anywhere else, As long as it is in the area covered by mobile services, people can use intelligent mobile terminals to obtain health information they care about. With the use of emerging mobile Internet technology and mobile communication technology in the field of medical and health services, the cost of medical treatment or access to other medical and health services is greatly reduced, and it can also effectively guide people to develop good living habits [4].

2 Demand Analysis of Regional Health Management Platform With the increasing awareness of public health, the public has put forward more highquality health management needs in recent years, which shows that Chinese residents have not only stayed in the medical security of medical treatment, but also provided comprehensive health management services for individuals according to their health status, disease treatment status and daily health information tracking [5], At present, the management systems of most medical institutions are relatively independent, and there is basically no data interaction with medical business application software. The systems are provided by different software manufacturers and implemented on different platforms. Although the experience of group and individual health examination information has been accumulated in recent years, due to the lack of follow-up full information, dynamic update and information contact exploration methods, As a result, these resources can not be integrated and utilized, and the real health management can not be realized for users. In this regard, this paper proposes to integrate various resources of the hospital, and provide a comprehensive health management service platform for residents through information technology, Internet technology and expert knowledge base technology, including: evaluation and intervention of health, health guidance and consultation, measurement of health risk elements, collection of health data, monitoring of daily health data, etc., So that patients and the public can better maintain and promote their health, and comprehensively reduce medical costs. Through health management, we can change the unhealthy living habits, reduce the cost of medical treatment, reduce the possibility of disease occurrence and deterioration, enhance the quality of life and improve the service image of medical institutions [6]. The functional framework of the carrier is shown in Fig. 1. The regional health service carrier meets the functional needs of three modules.

Fig. 1. The frame diagram of carrier function

234

Y. Wu

In the traditional sports software industry, no matter at home and abroad, there is no mature solution to help athletes carry out health management in the market [7]. The most difficult factor is that it is difficult to integrate the medical data of the hospital and the training data of the sports club, and the software development cost is high. Another reason is that in the training process of athletes, individual differences make it difficult to achieve unified management, logistics personnel are relatively few, and managers generally believe that the cost performance of purchasing software is low. However, due to the cost problem, the software application of ordinary sports associations or commercial clubs has not been popularized. There are only ordinary management systems in the market. These management systems are more like information management systems. They can only complete simple personnel management and do not have the function of monitoring and rapid response to athletes’ health at all. Most international sports groups are similar to the domestic situation. They pay attention to the health of athletes, but there is no market-oriented professional application available. Technically, most of the traditional database software used at home and abroad. In today’s big data era, the operation of a large amount of data can hardly achieve real-time result presentation, which consumes and wastes a lot of precious time of data analysts.

3 Design and Implementation of Health Management Platform 3.1 Platform Design Principles To ensure the quality of the platform, this paper will follow in the design, development, deployment and operation management planning of the system. Security. The overall security of the system is ultimately completed by the system carrier application system related security and security settings. Ensure that the system is not intruded by non authorized users, data is not lost, data is not illegally obtained and tampered during transmission, and the identity of users, senders and receivers is confirmed. By using Microsoft carrier security properties, we can integrate protocols that are consistent with global security standards. The digital certificates that conform to the specification of x509 can be integrated seamlessly. The protocol is a PKI standard developed by ITU-T for SSO single sign on and PM privilege management infrastructure [3]. The probability of individual I being selected and passed on to the next generation is as follows: Pi = Fi /

 

Fi

(1)

i=1

The error energy function is defined as: 1  ˆp p (Ys − Ys )2 2 s

e=

p

s=1 p=1

When the fitness function is the maximum, the individual is the best.

(2)

Design and Implementation of Internet Plus Sports

235

3.2 Architecture Design of Mobile Internet of Things Platform Based on the extension of health collection equipment of Internet of things to residents’ families, this paper records residents’ health status continuously through mobile Internet, and fully combines with the information resources of regional residents’ health records platform, It provides a series of personal health management services for residents, such as health status evaluation, management and guidance, health care consultation and education, health risk factor assessment, etc. Its IOT collection devices include: watch type wearable health manager, home health management client, and home electronic blood pressure monitor, blood glucose tester, fat detector, etc. [8]. Watch health manager, a mobile terminal providing timely heart rate detection service to users, can automatically collect and transmit data, track real-time health status, give early warning when abnormal conditions are found, receive professional health assessment, interact with the database of health service center, and make plans for personalized diet health guidance, health intervention and guidance.

4 Testing of Health Management System In order to ensure the normal operation of the system to meet the expected requirements, functional and non functional tests need to be carried out before the system is officially delivered and launched. Functional testing writes test cases according to the main function points of the system, and tests according to the test cases; non functional testing mainly tests the stability and performance of the system through virtual time and multiple runs [9]. Testing is a very important process in the software life cycle. It is the stabilization stage before the product is released and submitted to the end user. Part of the functions of this system are the integration functions of the existing operating system. Its overall performance optimization and system stability have a significant impact on the existing production system [10]. Therefore, the testing work of this system is very important on the basis of the real system work, Compared with the meaning of system requirements, the purpose of system testing is to detect whether the configuration items of integrated and complete software can be accurately linked with the system, and to obtain the inconsistency or inaccuracy between the existing provisions of software research protocol and the design of software and system (subsystem) documents [11]. The way is to take the software confirmed by testing as one of the overall factors of the computer system, and comprehensively integrate with various system factors such as computer operators, data, some supporting software, peripherals and hardware, so as to test the computer system on the basis of real environment. So as to obtain its shortcomings, measure the quality of its products, and carry out the corresponding detection according to the needs of system performance, function and other aspects. At the same time, the validity and completeness of the data such as system documents are measured, and the test cases in the process of testing must rely on the design requirements analysis specification to expand, and let it operate on the basis of reality. The whole process of code completion and software design and development will run through the system testing operation, which is to report the pressure, performance, ease of use, fault tolerance and security of the system [12].

236

Y. Wu

According to the software system requirements, the system completes the sorting of test cases, executes all test cases, and verifies whether the contents listed in the test purpose are achieved according to the test requirements. At the same time, we use rational test manager & rational robot (test management platform) to track defects, implement management, and manage use cases. Using black box testing technology, independent testers, developers and users jointly complete the system testing work [13, 14]. The shortcomings of the software system will be further obtained in the continuous testing process of the software development process, and the software will be enabled only after the continuous repair and improvement of the developers, In the whole process, the performance and pressure test of the system and the function test of the system are mainly completed.

5 Conclusion This paper mainly studies and explores the use of intelligent mobile terminals to provide a series of efficient, convenient, simple and easy-to-use health services for people with the support of mobile services such as mobile Internet and modern network communication. This paper briefly introduces the development status and trend of mobile Internet, mobile medical, mobile health and other technologies related to the content of this paper. On this basis, it analyzes the requirements of the system and makes the overall design of the health management system. Then, according to the requirements and overall design, the specific implementation process of the system is described in detail. Finally, the system meets the expected requirements through functional and non functional testing.

References 1. Lu, H.: Design and implementation of smart medical system based on convenient terminal, electronic science and technology, pp. 1–7 (2013) 2. Hongming, G.: Design and implementation of mobile health service system based on cloud platform. Beijing University of Posts and telecommunications, pp. 1–5 (2012) 3. Bo, W.: Research on China’s mobile Internet industry. Huazhong University of science and technology, pp. 1–3 (2013) 4. Shuang, H.: Design, development and application evaluation of College Students’ physical health management system. Public Invest. Guide (16) (2018) 5. Cunsheng, L.: College Physical Education and student health management system based on wechat platform. J. Hengshui Univ. (03) (2018) 6. Weizhen, P., Yu, Z., Tong, L.: Solutions for statistics of students health standards. China Educ. Technol. Eqpt. (10) (2009) 7. State council: national symposium on school physical education held in Hangzhou. Basic Educ. Curriculum (19) (2017) 8. Zihe, S.: A comparative study on school physical education between China and ancient Greece in the axis era. Sports Sci. Technol. Lit. Bull. (04) (2021) 9. Jun, H., Jun, C.: Implementation, dilemma and solution of school sports supervision organization: from the perspective of third-party evaluation. J. Tianjin Inst. Phys. Educ. (02) (2021) 10. Na, Z., Jiangxia, L., Tian, Z.: Value of incorporating outward bound training into school physical education curriculum. Phys. Educ. Res. Educ. (03) (2021)

Design and Implementation of Internet Plus Sports

237

11. Na, L., Yanhong, M.: Enlightenment of the evolution of school physical education policy in Japan on the promotion of adolescent physical health in China from the perspective of sports education integration. J. Shenyang Inst. Phys. Educ. (03) (2021) 12. Peng, J.: Research on the types of school sports policy in China since the reform and opening up. Sports Sci. Technol. (02) (2021) 13. Chaozhou, G.: Research on the reform and development of school physical education curriculum integration policy in Britain. Careless. Phys. Educ. Technol. (03) (2021) 14. Jie, Y.: Research on LBS privacy protection technology in mobile Internet. PLA University of information engineering, pp. 2–10 (2012)

Elastic Plastic CPPM Algorithm of Pore Water Pressure and Inversion of Mechanical Parameters of Tunnel Surrounding Rock Miao Yu1(B) , Xuesheng Yu2 , Xiaolei Zhong1 , Shuang Lu1 , and Ye Wu3 1 Shenyang Institute of Technology, Fushun 113122, Liaoning, China

[email protected]

2 LiaoNing Academy of Safety Science, Shenyang 110000, Liaoning, China 3 Liaoning Share Country Garden Property Co., Ltd., Shenyang 110000, Liaoning, China

Abstract. In order to study the stress and deformation law of tunnel surrounding rock under the action of pore water pressure, the change of plastic zone and the problem that the mechanical parameters are not easy to be accurately given, the modified effective stress formula is introduced into the integration algorithm of elastoplastic constitutive equation -- closest point projection method, and the accuracy of inversion parameters under different difference strategies is compared, The evolution trend of inversion parameters with evolution algebra is analyzed. Self developed intelligent back analysis program inversion, in which the difference strategy has a significant impact on the inversion accuracy. At the same time, we need to comprehensively select the variation factor and cross factor of the algorithm. In order to achieve the purpose of inversion parameter optimization, the developed program can be applied to the actual tunnel surrounding rock mechanical parameter inversion, which plays an auxiliary role in the design and dynamic construction. Keywords: Cross harbour tunnel · Pore water pressure · Plastic zone · Nearest point projection algorithm · Parameter inversion

1 Introduction In recent years, the pace of human marching to the sea is accelerating, and the construction of large-scale subsea tunnel has brought unprecedented challenges and opportunities to the development of human engineering technology and theory [1]; On the other hand, compared with the land tunnel, the geological exploration of subsea tunnel is more difficult, and the accuracy of mechanical parameters is worse. The difficulty and inaccuracy of mechanical parameters become the bottleneck of calculation, How to reveal the bad section in the excavation process and dynamically obtain the mechanical parameters of surrounding rock according to the existing geological data are the problems to be solved in the construction of subsea tunnel [2]. Many scholars at home and abroad have studied the stress and deformation response characteristics of tunnel surrounding rock under the action of pore water pressure. From © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 238–243, 2022. https://doi.org/10.1007/978-3-030-99581-2_34

Elastic Plastic CPPM Algorithm of Pore Water Pressure

239

the perspective of analytical and numerical calculation, Li Zongli et al. Derived the elastic-plastic analytical solution of deep buried tunnel considering the seepage field. The calculation model mentioned in this paper has a certain gap with the actual situation, But it has important theoretical value to understand the influence of seepage field around the tunnel on the stress field; Wang Xuebin et al. Studied the localization process of different confining pressure and pore water pressure by considering the pore water pressure of each unit through the effective stress principle, and calculated the distribution of failure area and tensile rock burst area after excavation of circular roadway under hydrostatic pressure; Fang Qian et al. Summarized the analytical analysis of water pressure distribution and fluid solid coupling simulation analysis of tunnel stable seepage. From the experimental point of view, Xu Jiang et al. Studied the evolution of rock shear strength under different pore water pressure, the relationship between pore water pressure and shear strength, and carried out the test of mechanical properties of sandstone under pore water pressure confining pressure [3]. At present, some achievements have been made in the related research, but due to the complexity of the problem itself, a systematic theoretical system and comprehensive conclusions have not yet been formed, which still need to be further explored and studied [4].

2 Nearest Point Projection Algorithm of Pore Water Pressure In the stress calculation considering the effect of pore water pressure, constant pore water pressure can be set to obtain the effective stress of all nodes. In the whole calculation process, liquid flow does not occur and pore water pressure remains unchanged, The distribution of pore water pressure is consistent with the initial state without strain, and the distribution remains unchanged and is not affected by mechanical deformation. Based on this point of view, this paper considers the influence of constant pore water pressure on the deformation of tunnel surrounding rock, combined with the modified effective stress formula and the nearest point projection algorithm to develop the elastic-plastic finite element program [5]. Terzaghi’s (1923) effective stress principle is in good agreement with the deformation characteristics of soil under pore water pressure, but it is not suitable for rock materials. Therefore, some scholars have proposed a modified effective stress formula for rock. σ  = σ − αpw (0 ≤ α ≤ 1)

(1)

Where, σ’ Is the effective stress tensor; σ Is the total stress tensor; α is the equivalent pore pressure coefficient, which is determined by the development degree of rock pores and fractures; pw Is pore water pressure; α pw Is the equivalent pore pressure. The influence of pore water pressure on material strength is expressed by Mohr’s stress circle. When pw = 0 in formula (1), there is no effect of pore water pressure, and the stress condition is shown in Fig. 1; pw = 0, that is, after introducing the pore water pressure, all normal components of the stress tensor are effectively reduced through the pore water pressure, as shown in Fig. 1. Through the pore water pressure, the Mohr circle moves to the left by a value P., and it is possible to reach the failure position of the material [6].

240

M. Yu et al.

Fig. 1. The movement of Mohr stress circle under pore water pressure

The solution of constitutive equation is the key problem of elastoplastic numerical calculation. It is necessary to integrate constitutive equation for every Gauss integral point entering yield in the equilibrium iteration. The effectiveness of the integration algorithm directly affects the effectiveness and stability of the overall numerical analysis. Most of the solutions are based on the return mapping algorithm, and the nearest point projection algorithm is the return reflection [7]. A projection algorithm, which can avoid the phenomenon of stress drift yield surface when updating. Newton Raphson method can obtain the convergence speed of approximate square in iteration, which has high accuracy and stability. It includes two parts: initial elastic prediction and plastic correction. The elastic prediction state is driven by the total strain increment, and the plastic correction state is driven by the increment of plastic parameters, In the elastic prediction stage, the plastic strain and internal variables are fixed; In the plastic correction stage, the overall strain remains unchanged.

3 The Programming and Numerical Simulation of Elastoplastic Considering Pore Water Pressure 3.1 Elastoplastic Programming Considering Pore Water Pressure In this paper, a Drucker Prager constitutive solution program is developed in visual 6.0 environment by using C++ language and object-oriented method. The mesh division of the model is completed by ANSYS software; The solution part adopts the program of elastic-plastic solution which considers the pore water pressure; The results of stress and displacement are displayed by the software teeplot, which can complete the whole process of finite element pretreatment, solution and post-processing [8]. In the calculation of elastic-plastic problems, the nonlinear stress-strain relationship should be expressed by a more complex function. The incremental iteration method is often used to solve the finite element method, and the nonlinear solution is approached by piecewise linear solution. The total load f is divided into many load increment AF, and the incremental finite element equation is as follows [9]. K(d )d = f = fext,n+1 − fint (dn+1 )

(2)

Elastic Plastic CPPM Algorithm of Pore Water Pressure

241

3.2 Self Programming Verification and Numerical Simulation In order to verify the correctness and availability of the program, a circular plane strain tunnel model is established. The length along the X and Y directions of the coordinate axis is 10 m, and the radius is r = 1 m. It is divided into 613 elements and 671 nodes, as shown in Fig. 2. Drucker Prager ideal elastic-plastic model is used in this case, assuming homogeneous lithology, undeveloped pores and fissures. Material parameters: elastic modulus E = 2 gpa, Poisson’s ratio μ = 3, cohesion c = 0. 82 mpa, friction angle ϕ = thirty °, Dilatancy angle ϕ = thirty °, density. ρ = The uniform load on the top of the tunnel is q = −2500 kN/m2, assuming that the equivalent pore water pressure coefficient is a = 1.0

Fig. 2. Finite element model of circular tunnel

4 Intelligent Back Analysis Program and Back Analysis of Surrounding Rock Mechanical Parameters In this paper, an intelligent back analysis program is developed based on the de algorithm and the elasto-plastic finite element program compiled in part 2, and its correctness and reliability are verified. The parameter inversion problem is essentially a constrained optimization problem. The mathematical model is as follows 2 1  0 Yi − Yi m m

min f (x1 , x2 , ..., xn ) =

(3)

i=1

Differential evolution (DE) algorithm is a global optimization algorithm proposed by Rainer storm and Kenneth price. On this basis, more than ten different differential

242

M. Yu et al.

strategies are proposed to implement mutation and crossover operations. The general expression of differential strategy is as follows [10]. DE/x/y/z

(4)

Where de is differential evolution algorithm; X is the method to select the disturbed vector; Y is the number of perturbed difference vectors; Z is a cross type. Firstly, the surrounding rock parameters of the circular tunnel model are inversed. Five measuring points 101, 105, 107, 114 and 113 are selected as the monitoring points, as shown in Fig. 3. The horizontal displacement and vertical displacement of the measuring points are calculated by the finite element program. The relative displacement between the two measuring points is calculated by the displacement of the measuring points, and the measuring line 1 = 1.044 mm, 2 = 1.117 mm.

Fig. 3. Inversion line layout

Under the condition of parameter f = 0.7 and Cr = 0.8, parameter inversion is carried out for different difference strategies [11]. The parent individuals and difference vectors of De/RAND/1 and de/RAND/2 models are random numbers [12–14]. Previous studies have shown that the overall evolution rate is slower than that of best model, but the probability of premature and stagnation is reduced, When the premature phenomenon occurs, the premature phenomenon can be controlled by reducing the variation factor f or increasing the population size NP. It can also be seen that the two disturbance vector models are more stable than one.

5 Conclusion An intelligent back analysis program is developed based on the differential evolution algorithm and the elastic-plastic finite element program. The accuracy of inversion parameters under different differential strategies is compared, and the evolution trend of inversion parameters with the evolution algebra is analyzed. The inversion results show that the intelligent back analysis program has high accuracy and correctness, There is no need to encode and decode, so it has great application value in the inversion of mechanical parameters of tunnel surrounding rock. In this paper, we consider the case of constant pore water pressure, combined with the constitutive integral algorithm to develop the solution program, without considering the coupling relationship between stress and seepage, which is also the next research work of the author.

Elastic Plastic CPPM Algorithm of Pore Water Pressure

243

References 1. Xuebin, W., Wei, W., Yishan, P.: Numerical simulation of strain localization in surrounding rock of circular roadway under pore pressure. Acta Coalae Sinica 35(5), 723–728 (2010) 2. Xuebin, W., Yazhi, D., Yishan, P., et al.: Elastic brittle damage model and its application in local failure of rock. J. Appl. Found. Eng. Sci. 20(4), 642–653 (2012) 3. Jiang, X., Hongwei, Y., Shoujian, P., et al.: Experimental study on mechanical properties of sandstone under pore water pressure and confining pressure. J. Rock Mech. Eng. 29(8), 1618–1623 (2010) 4. Comprehensive evaluation and practical application of roadway surrounding rock. HD. Sci. Technol. Consult. Guide (18) (2007) 5. Cong, G., Yongwei, L., Guobing, Y.: Numerical simulation analysis of heat transfer in tunnel surrounding rock heat regulating zone. Sci. Technol. Prospect (24) (2016) 6. Yanqing, L., Xing, Y.: Numerical simulation study on heat dissipation law of surrounding rock of rectangular roadway. Min. Technol. (01) (2015) 7. Lunxiang, D., Dengmeng, X., Aijun, J.: Appearance and analysis of surrounding rock of fully mechanized roadway. Shandong coal Technol. (05) (2013) 8. Wei, J., Jing, B.: Experimental study on fracture development model of roadway surrounding rock unloading failure. J. Hunan Univ. Sci. Technol. (Nat. Sci Edition). (01) (2012) 9. Yingmin, W., Yi, Z.: Application of computer simulation in the study of heat exchange between roadway surrounding rock and air flow. Coal Mine Safety (06) (1984) 10. Gongsheng, C.: Study on radius and temperature field distribution law of tunnel surrounding rock heat regulating zone. Coal Technol. (04) (2014) 11. Dehai, L., Chenghe, M.: Influence of mining on roadway surrounding rock movement. Coal Mine Des. (07) (1993) 12. Yuanpeng, S., Pingsong, Z., Rongxin, W.: Electromagnetic measurement and analysis of water loss characteristics of roadway surrounding rock. J. Eng. Geophys. (01) (2013) 13. Tinghao, Z.: Study on the influence of ventilation time on the temperature field of roadway surrounding rock. Coal Mine Saf. (02) (2010) 14. Yang, C.M.: On the fourth order tensor valued function of stress in the return mapping algorithm. Acta Mech. Sinica 42(2), 228–237 (2010)

A New Way to Cultivate Innovative and Employable Talents Based on Computer Xinyin Zhang(B) ChongQing Three Gorges Medical College, ChongQing 404000, China [email protected]

Abstract. In recent years, the employment problem of college graduates has become increasingly prominent. It is very important for students to actively improve their vocational skills, and then enhance the core competitiveness of individual employment. Therefore, combined with the actual situation of colleges and universities, based on computer informatization, this paper attempts to explore a new training mode of skilled employment talents, reform the existing practice teaching system and teaching methods, correct the narrow specialization tendency, and combine general education with professional education In terms of training contents and ways, we should construct the talent training mode of “combination of general education and professional education”. At the same time, it puts forward the new idea of promoting learning by competition, that is, to improve the comprehensive quality of students and deal with the bottleneck problem of employment. Keywords: Personnel training · Employment oriented · New ways of training

1 Introduction With the rapid development of China’s economy and society, higher education has developed by leaps and bounds from the elite education stage to the popular education stage. The quality of talent cultivation in Colleges and universities has gradually attracted social attention, and the number of talent cultivation has increased dramatically. The problem of employment difficulty of college graduates has become increasingly prominent [1]. According to the survey of employment Blue Book - 2011 employment report of Chinese college students by Mycos Research Institute, the number of college graduates in 2010 is 5.754 million, and 570 000 are unemployed; In a survey of employers, it is found that graduates’ mastery of basic working ability is lower than the level required by the job [2]. It is true that for a long time, China’s higher education has trained and transported a large number of talents for the modernization drive [3]. However, in the face of the new situation and new requirements of international and domestic political, economic and social development, the relatively backward education concept, obsolete specialty setting and single teaching method in the traditional talent training mode are increasingly out of line with the social needs, Higher vocational colleges should reexamine and © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 244–250, 2022. https://doi.org/10.1007/978-3-030-99581-2_35

A New Way to Cultivate Innovative

245

attach importance to the cultivation of students’ vocational skills and comprehensive quality [4]. Therefore, based on the computer, we explore a new training mode of skilled employment talents, reform the existing practice teaching system and teaching methods, supplemented by skills competition to improve the comprehensive quality of students, lay a good foundation for the successful employment of college students, so as to make the graduates out of the difficult employment predicament.

2 An Analysis of the Current Situation and Causes of Employment Through the investigation of vocational skills training of Higher Vocational Graduates in China, the results show that there are the following problems (1) From the perspective of the number of graduates: with the implementation of the enrollment expansion policy, the total number of graduates will continue to rise. In 2012, there were 6.8 million college graduates in China, and it is estimated that the average annual scale of fresh graduates will reach nearly 7 million during the 12th Five Year Plan period. The total pressure will continue to increase, and the sharp increase in the number will bring heavy pressure on the employment situation [5]. (2) From the perspective of market demand: the overall employment situation is developing in a positive direction, but there are new changes and new problems. The uncertain factors of economic development are increasing, and the employment situation is still uncertain [6]. The cultivation of graduates’ special vocational skills focuses on the inculcation of theoretical knowledge, while the lack of practical operation ability leads to students’ weak practical ability; On the other hand, general vocational skills are not paid enough attention. The so-called training of general vocational skills is only limited to the level of basic vocational skills, while the training of core vocational skills, which is the driving force of sustainable development of students’ future career, is ignored. (3) From the employment situation of graduates: with the number of graduates to be employed accumulating for many years, the number of graduates to be employed is increasing year by year, so the difficulty of solving the total number of college graduates and digesting the increment will further increase. (4) From the perspective of employment distribution of graduates, structural contradictions still exist; On the other hand, there are a large number of job vacancies and the phenomenon of “hard to find talents” in enterprises. The skill, knowledge, concept and regional distribution of labor force produced by the change of economic structure do not match the market demand, which is also called “structural unemployment” in modern economic theory. In the face of the increasingly prominent contradiction between the total pressure and structural employment, the employment situation of graduates is still grim. The talent training mode in Colleges and universities fundamentally determines the quality of talent training and employment. In order to enhance the employment competitiveness of college students and solve the problem of difficult employment, it is imperative to deepen the reform and innovation of talent training mode in Colleges and universities from the end of talent training that is employment oriented.

246

X. Zhang

3 The Problems Existing in the Traditional Talent Training Mode and the New Perspective of the Employment Oriented Talents Training 3.1 Problems in Traditional Talent Training Mode (1) The cultivation of talents tends to be shortsighted. Under the guidance of market, the specialty and curriculum of colleges and universities focus on the level of “technology” and “apparatus”, while ignoring the cultivation of comprehensive literacy and sustainable learning and development ability, which leads to the surplus of skills and lack of motivation, and the lack of adaptation and innovation. (2) The professional curriculum is lack of adaptability. At present, many colleges and universities have some disadvantages such as unreasonable professional setting, lack of systematic consideration and scientific argumentation, obsolete teaching plan and lagging behind the changes of market. In the case of limited teachers or insufficient staffing, some major still blindly set up, blindly recruit students and teach blindly. Due to the phenomenon of setting up classes and setting up posts according to people, the quality of talent training is not optimistic naturally [7]. (3) Practical teaching is in form. Practical teaching plays an indispensable role in deepening, verifying the theoretical knowledge of books or training students’ ability of hands-on and cooperation. However, the survey shows that “the most important part of professional teaching is that the practice and practice are not enough”. Many colleges and universities are in practice teaching or in the form of virtual or casual design, Formalism is serious. 3.2 New Perspective on the Cultivation of Employment Talents (1) Training talents based on computer is the requirement of economic globalization. Computer information, especially the international Internet, constitutes the technical basis of economic globalization. The formation of global information network, on the one hand, greatly promotes the internationalization process of production capital, financial trade, service and technology, accelerates the formation and expansion of world market system, and makes the economic connection and dependence of countries and regions in the world higher than ever before; On the other hand, the rapid development of global information technology has made the world economy globalization, marketization, integration and networking come into being and realized [8]. The world economy presents a new economic form with the basic characteristics of information and network. However, only entering the modern economic era based on information technology and network can economic globalization be realized. The information level of a country and region is an important foundation for participating in economic globalization. A human resource team with high ideological awareness, strong information consciousness and high information quality is a powerful guarantee for participating in economic globalization. The development trend of economic globalization objectively puts forward new requirements for the cultivation of information talents [9].

A New Way to Cultivate Innovative

247

(2) The training of information talents is the requirement of the development of knowledge economy. Knowledge economy is an economy based on the production, distribution and use of knowledge and information. Knowledge economy objectively requires that workers can acquire knowledge effectively and have the ability to apply knowledge creatively. In the knowledge economy based society, social productivity and economic development mainly rely on the knowledge and wisdom of workers. The information and knowledge note improves the quality and skills of the workers, shortens the knowledge and proficiency of the labor subject to the labor object. Through the improvement and innovation of the production management process, production tools, technology and operation methods, the material consumption and energy consumption of the products are reduced, and the reasonable allocation of social resources is realized, thus creating a higher level of social productivity. Mastering modern information technology is the objective requirement of knowledge economy to workers. The human resources with high information quality are the key to the sustainable development of knowledge economy. To cultivate this kind of human resource, we must strengthen the information technology education and the information skill training.

4 The New Way of Talent Training 4.1 Cultivate Students’ Practical Ability through Well-Designed Experimental Scheme Cultivating students’ practical ability is a problem that colleges and universities always pay attention to but can not solve. Today, it has once again become the bottleneck of talent cultivation. The establishment of ERP Experimental Center provides an effective platform to solve the problem of students’ lack of practical ability. In order to give full play to the role of ERP Experimental Center, we introduce ERP as a typical information system in the courses of “information system analysis and design” for undergraduates, “management information system” for postgraduates, and “computer-aided management” for MBA, and carry out computer operation in ERP Experimental Center combined with classroom content. Before the experiment, we carefully designed two sets of experimental programs [10]. An experimental scheme is that each student can take the actual business process of the enterprise as the traction, and according to the business of a specific system, the students can simulate different departments and different jobs of the enterprise, and independently complete the business processing. The purpose is to be familiar with the functions of the system and clarify the processing processes of different types of business. But this design idea also has some shortcomings. The economic events in the enterprise occur in chronological order, and the operation of management software in the enterprise is completed under the cooperation of different departments and different jobs. Different roles have specific work content in the process of system operation. In order to improve the students’ comprehensive practical ability and simulate the actual operation process of the system in the enterprise. In the complete LAN environment, different students can simulate different positions in the enterprise, and each position

248

X. Zhang

has corresponding responsibilities, rights and interests, so that each student can find the corresponding “professional role” feeling. Through the introduction of ERP management ideas in class, through the simulation of ERP system environment in ERP Experimental Center, students can touch it before they step into the society and connect with the market after they go out of school [11]. The establishment of ERP experiment course, through the carefully conceived simulation experiment design, can maximize the mobilization of students’ subjective initiative and achieve the best experimental effect, which can provide reference for the exploration of modern education and teaching methods. 4.2 Take the Employment as the Guidance, Actively Carry out the Education of “Double Certificate System”. “Double certificate system” education can promote the establishment of a new practical teaching system. The so-called “double certificate system” education in higher vocational colleges is a system in which graduates of Higher Vocational Colleges obtain academic certificate, technical grade certificate or vocational qualification certificate at the same time. This is not only the requirement of Higher Vocational education’s own characteristics, but also a reflection of the current social employment needs [12]. The goal of higher vocational education is to cultivate high-level practical talents facing the grass-roots production, service and management. Therefore, whether the practical teaching of higher vocational education can really meet the requirements of personnel training is particularly important“ The proposal of “double certificate system” education will promote the reform of the previous practice teaching system in higher vocational colleges, that is, to change the current teaching situation of emphasizing theory and neglecting experiment, to pay attention to the cultivation of technical application ability, especially the cultivation of relevant vocational skills, and finally to obtain the corresponding vocational qualification certificate or technical grade certificate as the goal of practice teaching, And it can be used as an important basis to test the effectiveness of practical teaching. Take the computer major as an example, first of all, we need to clearly grasp the pulse of the latest professional qualification examination for computer technology major, and have an insight into the different needs of the mainstream society for related majors [13, 14]. Then, we need to selectively locate and select the professional qualification certification corresponding to each major, such as computer network major, current professional qualification certification, etc., as shown in Table 1.

A New Way to Cultivate Innovative

249

Table 1. List of professional qualification certificates related to computer network major Serial number

Name of professional qualification certificate

Certificate issuing unit human resources and social security

1

Programmer (Junior), network administrator (medium/Senior), network planning designer (Senior)

Ministry of human resources and social security, Ministry of industry and information technology

2

Network engineer CCNA. Network security engineer, network senior engineer CCNP (medium/Senior)

Cisco

3

Network engineer H3CNE, network security engineer, network senior engineer h3cse (medium/Senior)

H3C

4

Network engineer dcna, network senior engineer DCNP (medium/Senior)

Digital China

5

Network engineer rcna, network senior engineer rcnp (medium/Senior)

Star net sharp

6

Network technology (Level 3), network engineer (Level 4)

Ministry of education examination center

5 Conclusion With the increasingly updated production technology, in order to better meet the urgent needs of social development for skilled talents, colleges and universities, especially higher vocational colleges, must actively explore some new modes of personnel training, so as to promote the comprehensive coordinated development of students’ professional skills and personal overall quality. Therefore, this paper analyzes the employment status of college graduates, discusses the traditional talent training mode and the new point of view of employment oriented talent training, and gradually promotes the “double certificate system” education, so that students can better adapt to the collaborative needs of the actual work after graduation, and realize the connection with jobs faster. So that they can really become excellent technology application-oriented talents to meet the needs of society. Acknowledgements. 2020 Humanities and Social Sciences Research Project of Chongqing Municipal Education Commission- -Research on Vocational Ability Improvement in the New Era Based on the Comprehensive Development of College Students, Project No. 20SKSZ078.

References 1. Wanbo, Z.: Strengthening curriculum construction and reform to cultivate students’ innovation ability and professional ability. Bus. Cult. 13(13), 1 (2008)

250

X. Zhang

2. Yunyan, W.: Discussion on wu department of vocational skills training and employment of college students. China Electr. Power Educ. 4(4), 1 (2008) 3. Zhenjiang, Y.: Thoughts on strengthening the construction and management of university laboratory. Exp. Technol. Manag. 000(2), 41–42 (2003) 4. Yibin, Z.: A new probe into the cultivation of contemporary college students’ innovative ability. J. Henan Univ. Technol. (Soc. Sci. Edition). 23(23), 100–101 (2017) 5. Xin, Y.: The influence of contemporary social thoughts on college students’ core values. J. High. Educ. 21(3), 118–119 (2021) 6. Feixia, Y.: Research on the construction of contemporary college students’ spiritual civilization based on value identity. J. Jiangxi Electr. Power Vocat. Tech. Coll. 11(11), 1 (2020) 7. Danning, Z.: Research on the construction of contemporary college students’ Chinese spirit from the perspective of value identity. J. Jiangxi Electr. Power Vocat. Tech. Coll. 21(21), 2 (2020) 8. Fengjuan, S., Mingqun, T.: On the necessity and measures to guide contemporary college students to establish a correct outlook on love. Pub. Relat. World 12(12), 2–12 (2021) 9. Boyu, C.: Difficulties and countermeasures of happiness education for contemporary college students. Fujian Tea 28(28), 1–18 (2019) 10. Dongfang, W.: Analysis on the management concept and connotation of contemporary college students’ ideological and political education. Agric. Staff 42(6), 4–11 (2020) 11. Yangyu, X.: Research on the value of struggle spirit of contemporary college students in major epidemic situations. J. Heilongjiang Inst. Technol. (Compr. Edition). 61, 459–469 (2020) 12. Yaqi, H.: Research on contemporary college students’ cognition of news. Today’s Media 41(3), 422–430 (2020) 13. Gaofeng, T.: Research on the current situation of integrity education of contemporary college students based on problem orientation. J. High. Educ. 8(8), 1392 (2020) 14. Ming, L.: Establishing a long-term mechanism of skill competition to lead the growth of high skilled talents. Chin. Wall Syst. 8(99), 1 (2008)

Application of UAV Intelligent Management and Control Platform on Overhead Transmission Lines Inspection An Chang1(B) , Yanhong Liang1 , Mingxi Jiang1 , Xuegang Li2 , Zhenhui Chen1 , and Ruiying Liu1 1 State Grid Tianjin Maintenance Company, Tianjin 300160, China

[email protected] 2 State Grid Tianjin Electric Power Company, Tianjin 300160, China

Abstract. The development of the power grid and the continuous increase of overhead transmission lines require more strictly for operation and maintenance of overhead transmission lines, the traditional manual inspection method cannot satisfy. UAV has been widely used in the inspection of overhead transmission lines, making up for the shortage of manual inspection method. But there’s been some kind of problem in operation process, data management and other way. Through analyzing the current situation of UAV inspection, this paper points out existing problems, and then develop the UAV intelligent management and control platform that will help managers realize all-round and full-process control of UAV inspection work, equipment, resources, data, results. After application, it proves that this platform can significantly improve the operation efficiency and quality of UAV inspection. This UAS intelligent management and control platform has been extensively used in Tianjin, and achieve remarkable results, thus is worthy of promotion. Keywords: UAV inspection · Intelligent management and control · Intelligent defect identification

1 Introduction With the continuous growth of electricity consumption in the whole society, the total installed capacity of power generation had increased by 190 million kWh and the new transmission lines at 220 kV and above was 35000 km long in the past 2020 [1]. More stringent requirements are put forward for power supply security along with the development of power grid. The phenomenon of structural lack of worker in the overhead transmission lines inspection team is very common, and there are situations where the way basing on human inspection frequently gets inadequate inspection and poor inspection effect. The human inspection is difficult to carry out at high altitude, mountain area, or other special area, especially bad weather environment, and it has not enough to satisfy the needs of operation security in the power grid. Therefore, UAV inspection becomes a hot topic at present, fully embodying its convenient, flexibility, being unrestricted by © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 251–260, 2022. https://doi.org/10.1007/978-3-030-99581-2_36

252

A. Chang et al.

environmental conditions, and the data being collected by UAV is more comprehensive, clearer than human inspection [2]. With the rapid progress of application in UAV, it is getting more complex and difficult, for example, managing UAV inspection staff and UAVs, assigning inspection tasks, handling huge amounts of inspection data. Under this background, it needs to be studied that how to realize the intensive management, control and optimal allocation of inspection resources. So, this paper developed the UAV inspection intelligent control platform which has improved the full-cycle closed-loop application capability of the UAV and completed comprehensive digital management and control for UAV inspection work [3].

2 The UAV Intelligent Management and Control Platform There are many types of UAVs and some can be used in fault detection, infrared detection, auxiliary inspection and route exploration work, in addition to routine overhead transmission lines inspection. At the same time, there are significant differences among UAV inspection personnel and the power grid structure is also quite complex. In order to adapt to such situation, the basic resource library was built and management function module was developed based on web environment in this platform [4]. The basic resource library includes the talent knowledge base, intelligent inspection equipment base, the power grid information base and so on, that provides the data support for the following operations. The management function module includes plan management, intelligent command management and inspection results management. Combining with the supporting App, the whole process of autonomous intelligent inspection had been received, from task preparation and distribution, live broadcast, command scheduling, results upload, image classification, defect identification and marking to report generation (Fig. 1 and Fig. 2).

Fig. 1. The UAV intelligent management and control platform

Application of UAV Intelligent Management and Control Platform

253

Fig. 2. The basic resource library and the management function module

2.1 The Basic Resource Library (1) The power grid information base Obtain the point cloud data and image of overhead transmission lines and line access corridor, by the UAVs being equipped with laser radar, visible light, and infrared platform. And then set up a three-dimensional modeling for one transmission line [5]. To be specific, base on the GIS map framework, and through overlapping vectors, BIM, GIM, tilt recording, point cloud and other parameters, the line and its surrounding environment are 3D modeled, so as to establish the power grid resource database. As a result, it will be easy to complete the ledger management and control of the regional power network. Through comparative test analysis, the results are very little different from the test results of warp and weft equipment, only about 3 cm, which had verified the feasibility and reliability of this power grid information base. (2) The talent knowledge base The talent knowledge base supports to manage personnel account information for manager and share knowledge and experience for personnel. On the basis of the person basic information, technical level, valid period of UAV driver’s license and other information being recorded, to carry out the role assignment, authority level and other management, and even the intelligent reminder about the cut-off date of driver’s license (Fig. 3).

254

A. Chang et al.

Fig. 3. The talent knowledge base

3 Intelligent Management and Control of the UAV Inspection in Total Process Next, introduce the application of this UAV intelligent management and control platform, according to the the inspection operation steps, as shown in the Fig. 4.

Fig. 4. The operation flow chart on this UAV intelligent management and control platform

Application of UAV Intelligent Management and Control Platform

255

3.1 The Task Planning and Management Module Based on the working mode of differentiated inspection control of the common service system, complete the compilation and control of the UAV inspection plan, in accordance with the environment, climate characteristics near the line access corridor, line load ratio and inspection regulations [6, 7] in the power grid information base. Task planning is about the implementation and execution of the plan. Different organizational dimensions of enterprises have different degrees of attention to the operation and execution of the planned task in terms of time. In the task planning and management module, make the annual, monthly or daily plan, as needed, manage scheduling and monitor the operational progress of all the projects. The inspection plan is about inspection tasks, transmission line to be inspected, patrol time, patrol personnel and the number and type of UAV, etc. The task list, UAV condition, resource condition of the local power grid, resource required by the task and performance of the tasks are shown clearly display in this module. And based on above information, the manager can timely and comprehensively control the status of the inspection task (as shown Fig. 5).

Fig. 5. The task planning and management module

3.2 The Intelligent Command and Control Module The worker arrive at the designated destination, import the task data including the flight routes to the app, and then perform the automatic inspection operation by one key operation [8]. Meanwhile, by this module, it is convenient to remote monitor and control the control system far away on the local computer, through the 5G-network. So the manager can track the UAV real-time position, view the real-time inspection photos returned or

256

A. Chang et al.

monitor the UAV by real-time video for the manager. In the light of meteorological warning, the manager possess sufficient privileges to intervene UAVs in flight, for instance, controlling UAV to hover, return or resume work from the breakpoint. The module supports the automatic scheduling of inspection tasks and work ticket control, and offers three kinds of commanding and dispatching mode at the province, municipality and county (Fig. 6, 7 and 8).

Fig. 6. The remote monitoring interface during UAV inspection

3.3 Control of Inspection Results (1) Automatic archiving and naming of inspection photos Efficient control of inspection results is the primary goal of inspection. Inspection results are varied, for example, inspection impact, fault identification, defect prediction, tree barrier analysis reporting, model on oblique aerial photography and laser point cloud data of the overhead transmission lines, etc. Among them, the photos, as a frequently-used data type, can be automatically classification by tower. After completing the task, the UAV inspection staff can transfer the photos to the platform to complete the unified control. During the photo transmission stage, the photos can be automatically classified to their respective power transmission towers to reduce the cost and error of manual classification. In addition, you can also rename photos by two ways, that is, rename according to longitude and latitude of points (like Fig. 8) or some renaming template chosen, the former for automatic inspection, the latter for special inspection. (2) Intelligent defect identification sAt the intelligent defect identification stage, a fault automatic recognition technology based on AI has been developed related to deep learning and BP neural network model [9]. First, the image scene is automatically classified using the texture information rich in visible light data. Next, according to the type of image object, utilize

Application of UAV Intelligent Management and Control Platform

257

Fig. 7. Automatic archiving of inspection photos

Fig. 8. Autonomous flight route and renaming template of UAV inspection

convolution neural network model by defect samples training to complete the automatic detection and recognition judgment of inspection image. Then, combine with manual check, comparison and verification, the defects after audit will be brought into defect library for unified management. Select 100 inspection photos (30 of which are defective), test six image reviewers, record their and missed detection data separately, by themselves, and by the intelligent defect identification method. According to the analysis and statistics, when the omission rate of everyone is less than 10%, while using the intelligent identification method, the efficiency of defect identification can be improved by more than 38%, and the omission rate can be controlled to less than 3.3%. It is

258

A. Chang et al.

obvious that 500 kV An Cai I line line 89# tower left phase small side tension insulator cross stretcher side of the 8th glass insulator spontaneous explosion (Figure 9 and Table 1).

Fig. 9. Intelligent defect identification

Table 1. Comparison between intelligent defect identification and the manual one User name

Manual operation

Intelligent identification

Time/Min

Omission/Number

Time/Min

Omission/Number

Identification rate (Time/Total number)

Omission rate omission number/Total number

Li Chen

34

2

20.6

1

↑40%

6.7% → 3.3%

Chen Linlin

50

2

27.3

0

↑45.4%

6.7% → 0

Lin Xuexue

47.4

0

29.1

0

↑38.6%

0→0

Xue Yuyu

42.8

1

26.5

1

↑38.1%

3.3% → 3.3%

Yu Huahua

53.7

0

31.5

0

↑41.3%

0→0

Hua Miao

39

2

24

0

↑38.5

6.7% → 0

Miao Feng

28.7

2

17.4

1

↑39.4%

6.7% → 3.3%

Feng Shan

30

1

17

0

↑43.3%

3.3% → 0

(3) Automatic inspection report generation The module can automatically generate UAV inspection report according to the issued inspection plan, task execution and processing results of inspection data [10]. Thus, summarize the inspection operation, show the defects and treacherous on those towers, and provide detailed data basis for the following defect elimination.

Application of UAV Intelligent Management and Control Platform

259

Fig. 10. Automatic inspection report generation

In addition, the function on defect statistics has been specially exploited, which can be used to evaluate the operation health level of power tower and transmission lines [11–13] (Fig. 10).

260

A. Chang et al.

4 Conclusion To sum up, the UAV intelligent inspection management and control platform is an integrated platform covering the whole process of UAV inspection work, equipment, resources, data and results on overhead transmission lines. It can realize the fullautonomous UAV inspection, and carry out intelligent collaborative management and control of UAV equipment and inspection staffs, by innovative management mode, as a result, the efficiency and quality of inspection are improved significantly in Tianjin power grid. The diversification of inspection staffs, standardization management of inspection equipment, and practicality of the inspection mode and standardization construction of the inspection process will all be achieved, furthermore, the inspection resource control will be more intensive and the allocation be more optimal. In the future, optimize the platform and promote its application to other power company. Acknowledgments. State Grid Tianjin electric power company science and technology project KJ20-1-01: Research and application of all weather autonomous inspection technology of UAV for transmission line.

References 1. China Electric Council. List of statistics of China’s electric power industry in 2020, Power statistics and data center of China Electric Council, Beijing (2020) 2. Zhongxiong, X., Guiwei, S., et al.: Method of UAV autonomous positioning based on encoded sign during power inspection. J. Appl. Sci. 36(5), 845–858 (2018) 3. Training and assessment specifications about UAV inspection operator from electric power industry: T/CEC 193–2018[S]. Beijing, China: China Electricity Council, 2019 4. Liang, W., Xinyu, X., Pengfei, Z.: A method for power line facility detection with virtual data learning. Electr. Des. Eng. 25(21), 1–5 (2017) 5. Guiwei, S., Zhuang, L., et al.: Research progress in unmanned aerial vehicle inspection technology on overhead transmission lines. High Voltage Eng. 46(1), 14–22 (2020) 6. Guihui, C., Xin, Y., Zhongbing, L., et al.: Third party construction target detection in pipeline inspection aerial image based on improved YOLOV2 and transfer learning. Comput. Appl. 40(4), 1062–1068 (2020) 7. Huailin, D.: Application of UAV technology in patrol inspection of oil and gas long-distance pipeline. Sci. Technol. Innov. (07) (2021) 8. Shuai, A.: Application of UAV technology in Power Patrol information management. Wireless Interconnection Technol. (07) (2021) 9. Yueyuan, F.: Application of UAV technology in photovoltaic inspection. Wireless Interconnection Technol. (07) (2021) 10. Yan, Z.: Application of UAV technology in fire communication. Telev. Technol. (08) (2021) 11. Wei, D.: Application of UAV technology in meteorological service. Nanfang Agric. Mach. (08) (2020) 12. Chunyang, X.: Application of UAV technology in cultural relics protection. Surveying Mapp. Spat. Geogr. Inf. (06) (2020) 13. Zhen, N., Zhengqiang, H.: Application analysis of UAV technology in power patrol inspection information management. Power Equipment Manag. (06) (2020)

Application of MATLAB Software in Higher Mathematics Teaching Xiaomin Zha(B) Tongling University, Tongling 244000, Anhui, China [email protected]

Abstract. To explore a teaching form of higher mathematics to adapt to the learning characteristics of college students, and create an efficient teaching classroom. Using MATLAB software powerful processing graphics and animation technology function to assist higher mathematics teaching in higher vocational colleges, using dynamic animation to assist static theoretical knowledge teaching, realizing the combination of theoretical teaching and mathematical experiment demonstration, creating an intuitive image angle to understand the definition and concept of higher mathematics teaching scene, reducing the difficulty of Higher Mathematics teaching, stimulating their interest in learning, and improving the teaching effect, To cultivate the ability of using higher mathematics to solve practical problems and further improve the teaching effect of higher mathematics. Keywords: Matlab · Advanced mathematics · Auxiliary teaching

1 Introduction With the rapid development of science and technology and the deepening of education reform, the use of multimedia teaching in schools has become a trend and necessary [1]. At present, there are many kinds of multimedia software, which provide more choices for educational work to make vivid and interesting courseware. However, the general multimedia software is universal. In the teaching of colleges and universities, many courseware have professional characteristics, so only using the general multimedia software often can not accurately express or express some of the contents of the course. As a compulsory basic course for most majors in Colleges and universities, higher mathematics mainly includes limit continuity, calculus of one variable function, calculus of multivariate function, space analytic geometry, series and differential equation [2]. Due to the abstractness of knowledge points, many students find it difficult to understand part of the content of higher mathematics, and some students gradually lose their confidence in learning higher mathematics because they don’t master the basic knowledge in the early stage. On the other hand, due to the limitation of class hours, teachers should also take into account the completion of teaching tasks and the acceptance of students in class [3]. Therefore, higher mathematics is considered as a difficult course for teachers and students. With the continuous development of science and technology, there are many excellent mathematics software [4]. Teachers can use these software to assist the © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 261–266, 2022. https://doi.org/10.1007/978-3-030-99581-2_37

262

X. Zha

teaching of higher mathematics. According to the characteristics of the course, they can introduce it into the teaching process of higher mathematics, and display some abstract and difficult to understand knowledge through graphics, so as to enhance the intuitive effect and stimulate students’ interest in learning, It is convenient for students to understand the basic knowledge more deeply and lay a certain foundation for students to apply mathematical knowledge to solve practical problems. As an excellent representative of many mathematical software, MATLAB has been widely used in scientific research and engineering technology in recent years because of its powerful numerical calculation function and visualization function. In this paper, we combine several important knowledge points in higher mathematics, discuss the application of MATLAB graphic display function in higher mathematics teaching, hoping to improve the classroom teaching effect of higher mathematics and help students learn higher mathematics better.

2 Introduction to Matlab Matlab is a set of high performance numerical calculation and visualization software developed by MathWorks in 1982. It integrates numerical analysis, matrix operation, signal processing and graphic display, and forms a convenient and well interface user environment. It also includes the tool for solving various problems of toolbox, which can be used to solve specific subject problems [5]. The features of the system are: (1) scalability: MATLAB is easy to expand, which allows users to build M files with specified functions. For an engineer engaged in a specific field, not only the functions provided by MATLAB and the basic toolbox functions, but also the special functions can be constructed conveniently. Thus, it has greatly expanded its application range. There are hundreds of commercial toolboxes that currently support MATLAB. And the toolbox developed by the individual is not countable. (2) Easy to learn and use: MATLAB does not require users with high mathematical knowledge and programming ability, and does not need users to understand algorithms and programming skills. (3) Efficiency: MATLAB statement is very powerful, a statement can complete very complex tasks. For example, FT statement can complete the fast Fourier transform of the specified data, which is equivalent to the function of hundreds of C language statements. It greatly accelerates the efficiency of engineering technicians engaged in software development. According to MathWorks, the matlab source code contained in MATLAB software is equivalent to 700000 lines of C code. Matlab is a scientific computing software, which is mainly used in the analysis and design of matrix operation and information processing. It is convenient to use, simple to input, efficient in operation and rich in content. It also has a large number of function libraries to provide for use. Compared with basic, C and FORTRAN, matlab is used to write programs. The problem is only expressed and described mathematically, There is no need for a lot of tedious programming processes [6]. The new method of simulating optical spatial filtering experiment process by MATLAB software is characterized by that: the parameters of the designed filter can be changed randomly, and the input image

Application of MATLAB Software in Higher Mathematics Teaching

263

can be filtered by amplitude, phase or compound, and the phase information in the Fourier transform spectrum can be extracted, stored and utilized, So we can accomplish some operations which are difficult to achieve in optical experiments. The simulation results of grid filter, low pass, high pass and phase filter are given. This simulation experiment brings great convenience to the design of optical filter and image processing, and also provides a new way for the design of related devices.

3 Introducing Matlab into Higher Mathematics Teaching Higher mathematics is an important basic course for many majors such as engineering and finance in higher vocational colleges. Although teachers attach great importance to the teaching of the course and students also study seriously, most students feel it difficult to complete the course because of their weak mathematical foundation. If some important functions and incomprehensible knowledge in mathematics are demonstrated by means of a media in teaching, they can not only stimulate the curiosity, enthusiasm and interest in learning, but also express the boring and difficult to understand theoretical knowledge in higher mathematics by means of a kind of visual image practice, which is beneficial to students’ understanding and memory, Thus, it can reduce the difficulty of learning, lead the students from passive learning to active learning, and cultivate their ability to learn and innovate in higher mathematics [7]. In order to study the teaching methods that can adapt to the characteristics of students’ learning in higher vocational colleges, Matlab is used to process graphics and animation technology to assist higher vocational college mathematics teaching. A visual image teaching scene combining theory teaching and experimental demonstration is created. This not only reduces the difficulty of students to understand higher mathematics knowledge, but also liberates them from the traditional, boring and single teaching methods of instilling knowledge, and realizes the expression of abstract advanced mathematics concepts and theories by means of image, which is beneficial to students to understand and master mathematics knowledge intuitively and sensibly, and thus to reduce the distance between mathematical theory and application, Highlight the practical value of higher mathematics knowledge and create a teaching scene of students’ learning and teachers’ good teaching. At the same time, students can be trained to be good at solving practical problems with computers and improve their innovative consciousness [8].

4 Drawing graphics with MATLAB 4.1 Research on Function Characteristics with MATLAB Drawing Function Higher mathematics takes function as the research object and limit method as the research method, because function is a mathematical model to describe the dependence of variables in motion. The concept and characteristics of function is the key point of learning function, and it is also the basis of continuing to learn higher mathematics. Students are difficult to understand the parity, periodicity and other characteristics of function, as well as the transformation relationship of function image. In teaching, with the help of the drawing function of MATLAB, teachers can draw related function graphics in the

264

X. Zha

same coordinate system, which can help students understand the function characteristics and master the related knowledge of function [9]. Example: draw the image of y1 = sin (x), y2 = sin (2x) and y3 = sin (x + pi/ 2) on [0, 2π ] in the same window, and mark it with solid line for y1, dotted line for y 2 and plus sign for y 3. The procedure is as follows: x = 0; pi/20:*pi; y1 = sin (x); y2 = sin (2x); y3 = sin (x + pi/ 2); plot(x, y1,‘r‘, x, y2,‘:‘, x, y3,‘ + ‘) legend(‘y1‘, ‘y2‘, ‘y3‘) xlabel(‘x‘) ylabel(‘y‘) The running results are shown in Fig. 1.

Fig. 1. Function image

Using MATLAB to draw the above three relatively simple function images in the same coordinate system, it is easy to compare their parity, periodicity, amplitude and image transformation. 4.2 Application of MATLAB in Space Analytic Geometry The learning effect of space analytic geometry directly affects the limit derivative, integral and differential of multivariate function. When teaching this part, we should pay special attention to the cultivation of students’ spatial imagination. Nowadays, vector and space analytic geometry are drawn by plane images in textbooks, which can’t directly and dynamically show the process of forming quadric surface and the relationship between graphics. It brings many difficulties for students to learn and understand

Application of MATLAB Software in Higher Mathematics Teaching

265

the knowledge of space analytic geometry. Using MATLAB to draw three-dimensional image and three-dimensional vector graph, to build a spatial thinking model is beneficial to students’ understanding of spatial surface, and to find an effective way to assist the intuitive teaching of spatial analytic geometry [10]. 4.3 Animation Drawing of Space Moving Point Trajectory The traditional teaching method can not achieve the teaching demonstration of moving point trajectory, and the teacher can only draw a static plan on the blackboard, so it is very difficult for students with poor spatial imagination to master this part of the content. In order to solve the problem that moving point trajectory teaching in analytic geometry is not visual and intuitive, it is helpful for students to establish spatial thinking. 4.4 Drawing Special Graphics with MATLAB In order to cultivate students’ spatial imagination of three-dimensional graphics, Matlab is used to cut the graphics and draw special graphics, as shown in Fig. 2. Nan constant defined by MATLAB represents the data that cannot be used. When drawing a graph, the function value corresponding to the part to be cropped can be set to Nan, and the part with Nan function value will not be displayed, so as to achieve the purpose of clipping the graph [11].

Fig. 2. Special drawing

5 Conclusion Students are the main body of learning. The purpose of teaching in class is to make students understand and accept the relevant concepts and theorems. In this paper, Matlab is used to solve the limit, differential and integral of function. Curve and surface

266

X. Zha

drawing and series summation, we can see that the use of MATLAB assisted teaching has the advantages of standard, concise, flexible, intuitive and so on. Especially for some abstract mathematical problems, it is not only vivid and convenient to solve by dynamic demonstration, but also conducive to the understanding and acceptance of students, which can not be achieved by the traditional teaching mode. Therefore, the use of MATLAB to assist higher mathematics teaching is conducive to the cultivation of students’ awareness of mathematics application and the enhancement of students’ interest in learning mathematics. Improve the efficiency and level of classroom teaching, promote the development of higher mathematics teaching reform and curriculum construction. Acknowledgements. 1. Teaching and Research Project of Quality Engineering in Universities of Anhui Province“Modular Teaching Reform Research of Higher Mathematics in Applied Undergraduate Universities under the Background of Informatization” (2020jyxm2010). 2. Tongling University Teaching Reform Research and Practice Project “Modular Teaching Reform Research of Higher Mathematics in Applied Undergraduate Colleges”.

References 1. Anping, L.: Application analysis of mathematical software in higher mathematics teaching. Intelligence 22(07) (2019) 2. Zhanfei, Z.: Some experiences in the application of mathematical software in higher mathematics teaching. Comput. Knowl. Technol. 30(30) (2012) 3. Haijun, N.: Application of mathematical software geogebra in higher mathematics teaching. J. Mudanjiang Inst. Educ. 18(01) (2016) 4. Haijun, Z.: Application of mathematics software in higher vocational mathematics teaching. Occupation 44(06) (2012) 5. Xueben, L.: Wonderful use of mathematical software mathematica in teaching. J. Zhenjiang College 54(03) (2009) 6. Manli, Y.: Activating advanced mathematics classroom with mathematical software. Sci. Technol. Inf. 44(13) (2017) 7. Xiaofeng, Z., Yimin, T.: Application of mathematics software in Mathematics teaching -- an example of mathematics experiment. Pract. Underst. Math. 21(13) (2009) 8. Demiao, T.: Discussion on the application of MATLAB in higher mathematics teaching in higher vocational colleges. J. Fuyang Normal Univ. (Nat. Sci. Ed.) 27(1), 79–82 (2010) 9. Fengbo, H.: Advanced Mathematics, pp. 36–37. Higher Education Press, Beijing (2007) 10. Yaoguang, C., Taotao, M., Zhenglin, W., et al.: Proficient in Matlab GUI design, pp. 26–27. Electronic Industry Press, Beijing (2008) 11. Xiaohua, X., Xiaofei, H.: Application of MATLAB data visualization in higher mathematics. J. Zhaotong Univ. 35(5), 4144 (2013)

Hybrid Clustering Algorithm for Cloud Server Information Management Wei Chen(B) Guangzhou College of Technology and Business, Guangzhou 510850, Guangdong, China [email protected]

Abstract. Data clustering is an important branch of data mining. At present, most of the existing data clustering algorithms are limited to dealing with data with only continuous attributes. In addition, a small number of algorithms are limited to dealing with data with only nominal attributes. If only one kind of attributes are processed, data information will be lost under the condition of mixed attributes, which will affect the quality of data mining. How to cluster mixed attribute data is still a challenging field. In this paper, cloud server information management oriented hybrid clustering algorithm research, but also in order to effectively promote the project information management. Keywords: Cloud services · Information management · Hybrid clustering algorithm

1 Introduction With the rapid development of computer network technology, especially with the Internet of computer entering the previous tens of thousands of households, the information application is increasingly widespread and in-depth. The global network and information process have created higher efficiency for human social production, and have a great and far-reaching impact on the development of society. Cloud server is a web-based service, which provides flexible cloud technology that can adjust the configuration of the cloud host [1]. It integrates the LAAS service of computing, storage and network resources, and has the ability to use and pay on demand for the virtual machine rental service. It has been improved in flexibility, controllability, expansibility and resource reuse. Cloud server is a group of cluster servers virtual several similar to independent servers, each server in the cluster has a mirror image of the cloud server, which greatly improves the security and stability of the virtual server. Unless all servers in the cluster have problems, the cloud server will not be able to access [2]. In recent years, the database technology develops rapidly, and the database management system is widely used, and more and more data are accumulated. There are many important information behind these data, so it is necessary for people to analyze the data and to find out the relationship and rules. Data mining technology emerges at the historic moment in this context. In the field of database and information decision-making, it is one of the most advanced research directions. But more and more data are in the form of © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 267–273, 2022. https://doi.org/10.1007/978-3-030-99581-2_38

268

W. Chen

mixed attributes, but the research on the algorithm of mixed attribute clustering is also sufficient. How to further improve the stability, accuracy and running speed of clustering is worth further research [3].

2 Hybrid Clustering Algorithm Data mining is an interdisciplinary subject, including statistics, machine learning, database technology, visualization and information science. The main technologies used in data mining are inductive logic, genetic algorithm, rough set theory, fuzzy theory, neural network, etc. We can not only find interesting information laws and knowledge from data sets through data mining, but also observe, browse and understand from different perspectives [4]. We use the knowledge found in process control, query processing, information management, decision-making, etc. Therefore, it plays an important role in the most advanced field of information technology. 2.1 Background of Mixed Attribute Clustering At present, most of the existing data clustering algorithms are limited by data with only continuous attributes, and a small number of algorithms are limited by processing only the data with nominal attributes, among which the continuous attribute refers to the value of the attribute as continuous value, such as weight and length; The so-called nominal attribute refers to the limited value of the attribute, such as occupation and color. Most data streams in the real world have two properties at the same time, such as network packets. If only one kind of attribute is processed, the data information will be lost under the mixed attribute condition, which will affect the quality of data mining. How to cluster the mixed attribute data is still a challenging field. However, many scholars have done a lot of research on single type of attributes, and there are many existing and excellent clustering algorithms and many theoretical basis. This makes us inevitably form such a way of thinking to study these existing processing methods and extend them to mixed attribute clustering, and then how to promote the existing processing methods to hybrid attribute clustering, What problems should be paid attention to and how to perform have become the main research hotspot of many scholars in this field [5]. 2.2 Research Status of Mixed Attribute Clustering The significance of clustering is to cluster data in order to find the interested categories. For example, in customer relationship management, banks or securities companies conduct risk assessment and customer value analysis on the basis of their personal attributes, assets, transaction behaviors, etc. Most of the real data is a large number of data sets, and the data attributes include two types: numerical attribute and class attribute. The existing algorithms can hardly handle these data sets effectively. The earliest and simplest clustering method was proposed by MAC queen, but it can only cluster the object set of numerical attributes, and it can not cluster the data sets of class attributes and mixed attributes. The value field of class attribute is disordered, so the method of converting class attribute data into numerical attribute data can not always get effective results [6]. Z.

Hybrid Clustering Algorithm for Cloud Server

269

Huang extended the k-means method, proposed K-models algorithm and K-Prototypes algorithm, which can cluster the object sets of class and mixed attributes. However, when clustering the object sets of class attributes and mixed attributes by the above methods, the results are unstable, randomness is large and accuracy is not high enough. Z. Yu proposes a hybrid attribute clustering fusion algorithm. It introduces the clustering system into the mixed attribute data clustering problem. It extends the clustering fusion method, and solves the problem with clustering fusion theory. It has achieved certain effect in the stability, accuracy and running speed of clustering. 2.3 Introduction to Algorithm We represent the approximation between objects by a cost function. The cost function is based on the K-means cost function. In order to calculate the mixed attribute data with numerical and discrete, we improve the cost function. Set a dataset X = {X1 ,X2 ,… ,Xn } containing n objects, and have an object X = [Xi1 ,Xi2 ,… ,Xin ] with m dimension, that is, it contains M attribute values, K is a positive integer. In a broader definition, the cost function is expressed as follows: El =

n  i=1

yil

m 

(xijr − qijr )2 + γ

j=1

n  i=1

yil

m 

δ(xijc − qijc )

(1)

j=1

When r = 0, K-Prototypes algorithm degenerates into k-mean algorithm. The deficiency of K-means can be well compensated by the method of K-Prototypes, so that the classification data can be processed reasonably. However, the algorithm is to select and determine the initial point randomly, and there is randomness in the selection of initial points. This will lead to the difference between the final result of clustering and the real situation [7].

3 Cloud Service Technology 3.1 Overview of Cloud Services Cloud is a metaphor for the Internet. In the past, cloud was often used to represent telecommunication network in the graph, and later it was also used to represent the abstraction of Internet and underlying infrastructure. Narrow sense cloud computing refers to the delivery and use mode of IT infrastructure, which means that the required resources can be easily expanded through the network: generalized cloud computing refers to the delivery and use mode of services, and refers to the service required by the network in an on-demand and easy to expand way. Such services can be it and software, Internet related, but also other services, as shown in Fig. 1. It means that computing power can also be circulated as a commodity through the Internet. By distributing computing on a large number of distributed computers, rather than local computers or remote servers, the operation of enterprise data center will be more similar to that of Internet. This enables enterprises to switch resources to the required applications and access computers and storage systems according to the requirements [8].

270

W. Chen

Fig. 1. Cloud service architecture

3.2 Advantages of Cloud Service One of the advantages of cloud development is scale economy. With the infrastructure provided by cloud computing providers, developers can provide better, cheaper and more reliable applications than single enterprise development. If necessary, the application can take advantage of all the resources of the cloud without requiring the company to invest in similar physical resources. When it comes to cost, because cloud services follow a one-to-many model, the cost is significantly reduced compared to a separate desktop deployment. Cloud applications are usually “rented” and are priced on a per user basis, rather than physical copies of software programs (one per desktop) purchased or licensed. It is more like a subscription model than an asset purchase (and subsequent depreciation) model, which means less pre investment and a more predictable monthly business cost flow [9]. The focus Department likes cloud applications because all management activities are managed through a central location rather than from a separate site or workstation. This allows the stare to remotely access the application via the web. Other benefits include quickly equipping users with the software they need (called “fast supply”), adding more computing resources (auto expansion) when more users cause the system to be overloaded. When you need more storage space or bandwidth, companies just need to add another virtual server from the cloud. This is much easier than buying, installing, and configuring a new server in your data center. For developers, upgrading cloud applications is easier than traditional desktop software. Only the application in the centralized application needs to be upgraded, and the application features can be updated quickly and smoothly, without manually upgrading the individual applications on each desktop in the organization. With cloud service, a change can affect every user running the application, which greatly reduces the workload of developers [10].

Hybrid Clustering Algorithm for Cloud Server

271

3.3 Several Main Types of Cloud Services Cloud computing can be considered to include several types of services: infrastructure as a service (IAAs), platform as a service (PAAS), and software as a service (SaaS). (1) LAAS: infrastructure as a service laaS(Infrastructure- as- a- Service); Consumers can get services from a sound computer infrastructure through the Internet. (2) PAAS: platform as a service PAAS (platform as a service): PAAS refers to the platform of software development as a service and submits it to users in the mode of SAS. Therefore, PAS is also an application of SaaS mode. However, the emergence of PAAS can accelerate the development of SaaS, especially the development of SaaS applications. (3) Saas: software as a service SaaS(Software- as a- Servic); It is a mode of providing software through the Internet. Users do not need to buy software, but rent web-based software from suppliers to manage business activities.

4 Cloud Service Information Management Information system establishment: The software configuration adopts the mode of introducing mature project management system and independent development. At present, most of the popular commercial management software at home and abroad is limited to a specific field, such as financial software, project progress management software, personnel management, etc. [11]. At the same time, the existing mature management system can be fully utilized, and the special management information system for the project can be organized and compiled by itself or entrusted with a powerful software company. According to the characteristics of the project, the special management information system of the project can be prepared by referring to the experience of the same information system. 4.1 Network Monitoring System According to the construction characteristics of this section, the construction points are distributed in different regions and do not have broadband communication conditions such as optical fiber. Therefore, we choose ADSL as the transmission media of video image, voice and control information to realize the video monitoring system. This system has been successfully applied in many project management departments of our company and has achieved good results.

272

W. Chen

4.2 System Functions Based on the hybrid clustering algorithm, the video monitoring management system can realize the transmission of image and voice on the construction site to the monitoring center through the Internet, and the following functions are mainly realized [12]: (1) Real time grasp the scene dynamic. Because of the full network deployment, it can be monitored at any time, anywhere and at any monitoring point through computer network. We can know the construction progress, construction quality, safety status and other aspects of the site at any time, and realize remote voice intercom, correct the illegal operation in time, improve the supervision level and work efficiency [13]. (2) Alarm linkage and emergency treatment. According to the actual situation, alarm equipment can be deployed at the monitoring point, such as smoke sense, temperature sense, infrared, etc. when there is alarm situation, the system can immediately trigger alarm linkage: ➀ text and sound prompt alarm in the monitoring center; ➁ Automatically switch the scene image to the TV wall display; ➂ The relevant monitoring points are stored with video for later reference and can be used as the basis for police treatment. The management personnel can take emergency plan to solve the site problems immediately according to the actual situation on site.

5 Conclusion With the rapid development of database knowledge discovery and data mining technology, data clustering technology, as one of the important technologies of data mining, has been widely used in the practical application fields such as market analysis, financial investment, medical and health. At present, most of the existing data clustering algorithms are limited to processing data with only continuous attributes, and a small number of algorithms are limited to processing data with only nominal attributes. However, there are a large number of mixed attribute data with continuous and nominal attributes in real life. Through the research of hybrid clustering algorithm of cloud server information management, It is very helpful for information management. Acknowledgements. Guangzhou College of Technology and Business 2021 scientific research project, Research on the 2021 Training Strategy of College Students’ Information Literacy under the View of Internet+ (Project No.: KA202119).

References 1. Xue, W.: Talking about the application of cloud computing in Library. Electron. World (07), 3321–3331 (2012) 2. Wang, Y., Li, Y.: An improved fuzzy k-prototypes clustering algorithm. J. Dalian Univ. Tech. 06, 157–160 (2003) 3. Lin, Y., Wenyuan, W.: Summary of clustering fusion methods. Comput. Appl. Res. 12, 14–16 (2005)

Hybrid Clustering Algorithm for Cloud Server

273

4. Lijing, H.: Research on particle swarm optimization clustering algorithm for microblog topics. Henan University of Technology (2016) 5. Yidan, W.: Optimization and improvement of bee colony algorithm and its application in clustering. Changchun University of Technology (2020) 6. Zhimei, L.: Improvement of fireworks algorithm and its application in clustering. Guangxi University (2020) 7. Na, L.: Application of bacterial foraging optimization algorithm in clustering. Shaanxi Normal University (2014) 8. Ronghao, D.: Improved clustering algorithm for large-scale time series data. Beijing Jiaotong University (2017) 9. Pengfei, H.: Research on laplace weighted clustering algorithm. Nanjing University of Aeronautics and Astronautics (2009) 10. Qiming, C.: Research and implementation of clustering fusion algorithm based on voting strategy. Anhui University of technology (2010) 11. Jinsong, C.: Algorithm prediction based on automatic features. Nanjing University of Aeronautics and Astronautics (2020) 12. Xuebin, B.: Research and implementation of multi-objective k-harmonic means algorithm based on swarm intelligence. Shanghai University (2014) 13. Bo, Y.: Application of cloud computing in service monitoring. Mod. Comput. (07), 73– 84 (2013)

Factors Affecting Construction Workers’ Fatigue Based on Statistical Analysis Xin-gang Yang(B) , Xiao-yun He, and Qi-quan Wang College of Safety Engineering, China University of Labor Relations, Beijing 100048, China [email protected]

Abstract. This paper combines ergonomics theory to study the fatigue factors of construction workers from five aspects: worker, working environment, machinery equipment, organization and management and work itself. We use the questionnaire survey method to study the factors affecting the fatigue of construction workers, and use SPSS24.0 to analyze the reliability and validity of the obtained data. AMOS17.0 software performs the confirmatory analysis and obtains the structural equation that affects the fatigue factor of the operation. The model, and therefore proposed a feasible countermeasure. Keywords: Construction workers · Job fatigue · Influencing factors · Structural equation model

1 Introduction With the continuous development of urban construction, the construction industry plays a key role in urban construction and has become the pillar industry of our country in recent years [1]. The construction industry is a high-risk industry, which has the characteristics of labor-intensive production, a large number of industrial accidents occur every year, resulting in heavy human casualties and property losses, affecting the smooth progress of construction and the image of the industry seriously, and even affecting social stability and economic development [2]. According to the relevant statistical data of the construction industry, about 80% of the building injury accidents in China are caused by human unsafe behavior [3], and in addition to the external uncontrollable factors, a large part of the reasons are caused by people’s own psychological and physiological fatigue factors [4]. Therefore, we should be pay attention to the study of work fatigue in construction activities. At present, the main methods for measuring fatigue factors are fatigue EMG measurement method [5], EEG scanning method [6], interview, questionnaire survey and field investigation method [7], and so on. Through carding, it is found that there are many kinds of influencing factors of job fatigue, which can be divided into external factors and internal factors, and the external factors and internal factors are not isolated from each other. Generally, the comprehensive effect of various factors in the two factors has an impact on the work fatigue. According to the train of thought of “manmachine-ring-tube”, the factors causing work fatigue can be divided into four aspects © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 274–279, 2022. https://doi.org/10.1007/978-3-030-99581-2_39

Factors Affecting Construction Workers’ Fatigue

275

[8–11]: the physical and psychological personality characteristics of workers, the working environment and the suitability of work tasks, the degree of ergonomic combination of machinery equipment, and the level of organization and management. In this paper, we will study the influencing factors of construction workers’ work fatigue from five aspects: work itself, working environment, workers, machinery equipment, organization and management.

2 Analysis on Influencing Factors of Fatigue of Construction Workers According to the influencing factors of fatigue of construction workers, a questionnaire was developed by using the measurement standard of Likert five-point scale [12]. Two construction sites in Lanzhou were investigated by questionnaire. A total of 200 questionnaires were sent out and 198 questionnaires were collected. 196 valid questionnaires were obtained by excluding incomplete and invalid questionnaires. 2.1 Questionnaire Data Analysis of Influencing Factors of Construction Workers We use the SPSS24.0 mathematical statistical software to test the reliability and validity of the 196 questionnaires recovered. We get the following data: the reliability of the total table is 0.924; the Bartlett spherical test value of the correlation matrix of 24 items in the questionnaire is Bartlett = 2715.679, p < 0.000; the sampling suitability measure KMO = 0.904. This shows that our questionnaire survey has good reliability and validity. Using the principal component analysis method, we obtain that the five factors of the job itself, operating environment, operating personnel, machinery and equipment, and organization management account for 68.283% of the total variables, which indicates that the factor analysis results are reliable [13]. And after the component matrix analysis after rotation, it can be obtained that the minimum of these five factor loads is 0.642, and the condition of the factor load is ideal. To sum up, the questionnaire has a good constructive validity, from which we can judge that the sample is suitable for factor analysis. 2.2 Index System of Influencing Factors of Fatigue of Construction Workers On the basis of the above research, the index system model of influencing factors of construction workers’ work fatigue is constructed, as shown in Fig. 1.

276

X. Yang et al.

Fig. 1. Index system of influencing factors of fatigue of construction workers

3 Structural Equation Model Analysis of Fatigue Influencing Factors for Construction Workers According to the above five factors affecting the fatigue of construction workers, and the assumptions in [14], we use AMOS17.0 software to evaluate and fit. 3.1 First-Order Confirmatory Factor Analysis First-order verification factor analysis was used to test the relationship between the observed variable and the assumed latent variable [15], and the goodness-of-fit index analysis was conducted. The results are shown in Table 1. Table 1. Model goodness-of-fit index Index

χ 2 /df

RMSEA

TLI

CFI

IFI

Criteria for judgment

0.9

>0.9

First-order confirmatory factor analysis

1.627

0.057

0.933

0.941

0.942

In general, when the chi-square degree of freedom ratio χˆ2/df is less than 2, it indicates that the model has a good fit; when the RMSEA value is less than 0.08, it indicates that the model has a good fit; TLI, CFI, IFI greater than 0.9 means The model fits well [15]. As can be seen from Table 1, the model of confirmatory factor analysis fits well.

Factors Affecting Construction Workers’ Fatigue

277

3.2 Second-Order Confirmatory Factor Analysis The second-order confirmatory factor analysis model is a special case of the first-order confirmatory factor analysis model, also known as high-order factor analysis [15], which means that the latent variable is expressed by other latent variables of the measured index. As a latent variable, it is measured with five latent variables of the job itself, the operator, machinery and equipment, organization management and the operating environment. Table 2. Model goodness-of-fit index Index

χ 2 /df

RMSEA TLI

CFI

IFI

Criteria for judgment

0.9

Second-order confirmatory factor analysis

1.600

>0.9

0.055

0.936

0.942

0.943

It can be seen from Table 2 that the fitting indexes of the second-order confirmatory factor analysis model are better than those of the first-order confirmatory factor analysis model, and the model fitting indexes are larger than the fitting standard. 3.3 Analysis of Empirical Results Through the analysis of first-order verification factor analysis and second-order verification factor analysis, the factor loads of the influencing factors of construction workers’ fatigue are summarized as follows Table 3: Table 3. Factor load summary of fatigue influencing factors for construction workers Primary factor

Factor load

Secondary factors

Factor load

A work itself

0.656

A1 work hours

0.8

A2 work Intensity

0.877

A3 work hazard

0.78

B working environment

0.541

A4 work complexity

0.756

A5 work requirements

0.834

A6 work mobility

0.684

B1 natural environment

0.767

B2 noise source

0.71

B3 Dust source

0.559

B4 Hazard sources

0.752

B5 Waste and garbage

0.749 (continued)

278

X. Yang et al. Table 3. (continued)

Primary factor

Factor load

Secondary factors

Factor load

C Worker

0.809

C1 Physical condition

0.729

C2 Personal expectations

0.822

C3 Sleep status

0.656

C4 Emotional control

0.759

C5 Interpersonal relationships (family, colleagues)

0.769

C6 Operational satisfaction

0.831

D1 Reliability of tools and equipment

0.781

D2 Matching degree between man and machinery

0.847

D3 Comfort of tool and equipment

0.708

E1 Operational objectives

0.811

DMachinery equipment

EOrganization and management

0.715

0.782

E2 Overtime rest system

0.768

E3 Education and training

0.808

E4 Amateur life

0.706

The results show that the order of the influence on the fatigue of construction workers is as follows: worker C > organization and management E > machinery equipment D > work itself A > working environment B.

4 Countermeasure Measures for Work Fatigue of Construction Workers (1) Maintain personal physical and mental health. On the one hand, they should develop good living habits, such as not drinking, reasonable sleep time, balanced diet and so on; on the other hand, they should face the pressure from life, family and work with a positive attitude. In addition, you should also have a regular physical examination, exercise actively, and release stress. (2) Improve the management level of enterprises. Reasonable arrangements for overtime system to ensure that construction workers have sufficient rest time to avoid idleness and other situations; scientific formulation of production goals to avoid excessive work pressure; welfare policies to be implemented to ensure that construction workers can have the resources to study independently, enrich the spare life of construction workers, such as the arrangement of basketball matches, knowledge competitions, social exchange meetings, and so on.

Factors Affecting Construction Workers’ Fatigue

279

(3) Carry out regular maintenance and replacement of machinery equipment. In the process of construction, the higher the matching degree between human and mechanical equipment, the less prone to fatigue, regular maintenance and replacement of machinery equipment to eliminate the hidden dangers of machinery equipment, so that the integration of man and machine. (4) Formulate a reasonable operating system. enterprises should formulate a reasonable and scientific operation system, reduce the wrong working posture and minimize the shift system as far as possible, ensure that construction workers have sufficient spirit and physical strength to carry out professional activities, reduce fatigue work, and improve production efficiency. (5) Improve the working environment. Most of the construction work is open-air work, bad natural environment is inevitable, but can strengthen the on-site management, keep the work site clean and tidy. The introduction of advanced machinery equipment to eliminate or reduce noise; timely removal of waste and garbage, put an end to the construction site mess.

References 1. Cuilan, L.: Problems and solutions in construction project management. Shanxi Archit. 43(36), 231–232 (2017) 2. Hui, J.: Research on optimization methods and strategies for safety costs of construction enterprises. China University of Mining and Technology (2018) 3. Chengping, X.: Research on goal-oriented individual unsafe behavior of construction workers. Chongqing University (2018) 4. Yaohua, S., Xueniang, L.: Research on the evaluation of construction workers’ work fatigue at the construction site. Constr. Econ. 35(12), 130–133 (2014) 5. Murata, A., Uetake, A., Takasawa, Y.: Evaluation of mental fatigue using feature parameter extracted from event-related potential. Int. J. Ind. Ergon. 35(8), 761–770 (2005) 6. Jap, B.T., Lal, S., Fischer, P., Bekiaris, E.: Using EEG spectral components to assess algorithms for detecting fatigue. Exp. Syst. Appl. 36(2), 2352–2359 (2007) 7. Ren Dawei, X., Xiaohua, L.Y., Wenyu, Y.: Research on influencing factors and countermeasures of coal mine underground operation fatigue. Coal Mine Saf. 50(03), 231–234 (2019) 8. Tabachnick, B.G., Fidell, L.S.: Using Multivariate Statistics (5th ed.) Allyn and Bacon, Needham Heights (2007) 9. Jing, D.: Research on the evaluation of the influence of fatigue factors on the operating efficiency in the manufacturing industry. North University of China (2013) 10. Ruishan, S., Kang, L., Jingqiang, L.: Analysis of fatigue status and influencing factors of air traffic controllers. J. Saf. Environ. 18(06), 2241–2246 (2018) 11. Jinwen, C.: A brief talk on flight fatigue performance, influencing factors and related technologies for monitoring. China New Commun. 20(03), 131–132 (2018) 12. Kavelaars, A., Kuis, W., Knookl, et al.: Disturbed neuroendocrine immune immune in inter actions in chronic fatigue syndrome. Clin. Endocrinol. Metab. 85(2), 92–99 (2000) 13. Hair, J.F., Anderson, R.E., Tatham, R.L., Black, W.C.: Multivariate Data Analysis. Prentice Hall, New York (1998) 14. Teng, X.: Comprehensive evaluation of factors affecting online workers’ work fatigue in manufacturing. Anhui University of Science and Technology (2017) 15. Minglong, W.: Structural Equation Model-AMOS Operation and Application, pp. 38–59. Chongqing University Press, Chongqing (2010)

An Empirical Study on the Cultivation of College Students’ Core Competence of Innovation and Entrepreneurship Based on Multidimensional Dynamic Innovation Model Under Genetic Algorithm Yanfang Deng(B) Xijing University, Xi’an 710123, Shaanxi, China [email protected]

Abstract. Aiming at some key problems of College Students’ innovation and entrepreneurship under the mode of school enterprise cooperation, this paper qualitatively analyzes the problems and development trends in the process of College Students’ innovation and entrepreneurship activities from multiple perspectives based on the multidimensional dynamic innovation model (mdmi) under the genetic algorithm, and analyzes the education and development of College Students’ innovation and entrepreneurship activities from three dimensions: the dynamic dimension, the element dimension and the subject dimension, Around the model, the mechanism and Countermeasures for the smooth development of College Students’ Entrepreneurship and innovation activities are improved, and a new pattern of multi-party integration and coordinated development is formed. Keywords: Genetic algorithm · Multi dimensional dynamic innovation model · Innovation and entrepreneurship

1 Introduction The employment situation of college students is becoming more and more severe, with the number of college graduates increasing year by year. In 2018, nearly 8.2 million college graduates have unprecedented employment pressure as shown in Fig. 1 below. In the 21st century, all countries pay attention to innovation and entrepreneurship, but the level of innovation and entrepreneurship in China is low. College students are the main force of innovation and entrepreneurship, which plays a key role in promoting national development. However, compared with developed countries, our college students’ innovation and entrepreneurship ability is weak, which can not effectively promote the national economic development [1]. The lack of College Students’ awareness of innovation and entrepreneurship is the root of their weak innovation and entrepreneurship ability, which leads to their failure to consciously cultivate their innovation and entrepreneurship ability. In addition, China’s higher education only focuses on the education of basic knowledge, but does not focus on stimulating college students’ innovation © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 280–286, 2022. https://doi.org/10.1007/978-3-030-99581-2_40

An Empirical Study on the Cultivation of College Students’

281

Fig. 1. The number of college graduates in China from 2013 to 2018

and entrepreneurship education, which is also an important reason for the weak ability of innovation and entrepreneurship [2]. Today’s world economy is at a low ebb, and the development of all walks of life is restricted, which is undoubtedly a big blow to college students’ innovation and entrepreneurship. Many foreign countries also restrict foreign nationals to start their own businesses, so that college students can not easily try, can not play out the ability of innovation and entrepreneurship. In China, the state vigorously promotes innovation and entrepreneurship to ensure college students’ innovation and Entrepreneurship from the aspects of policy guarantee, capital guarantee and site guarantee, but it has little effect. In the final analysis, the poor innovation and entrepreneurship environment is the main reason to hinder college students’ innovation and entrepreneurship, which leads to the failure of College Students’ innovation and entrepreneurship ability to be improved in practice [3]. In recent years, in order to promote the further development of the world economy and the national economy, the state has put forward the slogan of “mass entrepreneurship” and issued relevant policies on innovation and entrepreneurship, requiring local governments to continuously encourage college students to innovate and entrepreneurship according to their own conditions. In terms of capital guarantee, the state guarantees that college students have enough start-up funds through bank low interest loans, and there are supporting loans in the middle and late stages of entrepreneurship to ensure that college students can successfully start their own businesses [4]. In the cultivation of innovation and entrepreneurship ability, the state calls on Colleges and universities to establish innovation and entrepreneurship colleges and entrepreneurship training bases, and set up innovation and entrepreneurship related courses, so that college students can cultivate innovation and entrepreneurship theory and practical ability. Therefore, the research of this paper is based on the multi-dimensional dynamic innovation model of

282

Y. Deng

genetic algorithm to cultivate the core competence of College Students’ innovation and entrepreneurship.

2 Multi Bit Dynamic Innovation Model Based on Genetic Algorithm In many genetic algorithms, the selection mechanism based on adaptability is adopted, such as gambling wheel selection mechanism, random competition selection mechanism, and expectation model selection mechanism. The probability of individual selection is proportional to the fitness. There may be two problems in the optimization process of genetic algorithm [5]. (1) When there are special excellent individuals in the population, such selection mechanism may lead to the rapid inheritance and diffusion of such individuals in the population, which may lead to local convergence or immature convergence. (2) When the fitness of individuals in the group is very close to each other, this kind of selection mechanism shows random selection without purpose, which makes the convergence process very slow, which often occurs in the later stage of genetic algorithm optimization iteration [6]. Through the analysis of genetic algorithm, this paper analyzes the innovation and entrepreneurship mechanism of College Students under the influence of multi factors based on the multi-dimensional dynamic innovation model under the influence of genetic algorithm. In order to further quantitatively analyze the probability non linear regression relationship between the innovation and entrepreneurship mechanism and the multiple influencing factors, the logistic regression analysis is introduced, The importance model of influencing factors of innovation and Entrepreneurship of college students based on multi factor Logistic regression analysis is established. The modeling process is as follows. Set the test sample to (c1 , c2 , c3 , . . . , cn ) set the second classification observation result (the result of university students’ innovation and Entrepreneurship) as the d-knot, and preprocess the sample with LR classifier after classified learning, and set the processing weight sequence as (q1 , q2 , q3 , . . . , qn ), then the sample and processing weight group can be obtained by linear superposition: C = q0 + q1 x1 + q2 x2 + · · · + qn xn

(1)

Sequence (x) in formula (1) (x1 , x2 , . . . , xn ) represent the n-dimensional characteristics of each sample. On the basis of preprocessing LR classifier, the sigmoid function is used to introduce nonlinear, which is conducive to controlling the output range and ensuring that the data is not easy to diverge in the regression process, as shown in formula (2): f (x) =

1 1 + e−x

(2)

An Empirical Study on the Cultivation of College Students’

283

From formula (2), it can be concluded that the definition field of sigmoid function is (−∞, +∞). Therefore, the key of logistic regression analysis is to solve the weight sequence of (q1 , q2 , q3 , . . . , qn )˚ set up P For the success probability of innovation and Entrepreneurship of college students relative to a certain factor, the probability ratio in probability theory can be obtained by logarithm   p = C(x) = q0 + q1 x1 + q2 x2 + · · · + qn xn ln (3) 1−p On this basis, the parameters of the classifier can be obtained by using maximum likelihood estimation ∂lnL(qk) =0 ∂qk

(4)

In Eq. (4), L(qk) represents the standard maximum likelihood function, qk(q1 , q2 , q3 , . . . , qn ), Newton iteration method can be used to solve the Eq. (4).

3 The Construction and Operation Mechanism Analysis of the New Type of University Students’ Innovation and Innovation Mechanism 3.1 Entrepreneurship Model for College Students – Multi Dimension Dynamic Innovation Model (mdmi) Based on the idea of Timmons’ entrepreneurial model, the paper regards the entrepreneurship and innovation as a highly dynamic and multi-dimensional coordinated system process, and constructs of innovation (mdmi) [7]. Among them, opportunities, resources and teams are the most important driving dimensions (driving dimension) in the process of Entrepreneurship: in the early stage of entrepreneurship, we must pay attention to the exploration and selection of opportunities. In the middle of the entrepreneurship, we should focus on the formation of teams. When the enterprise starts smoothly and gradually enters the right track, it will gradually increase the equivalence to form the influencing factor dimension (element dimension) of entrepreneurship and Entrepreneurship: social environment The improvement of government policies and laws and regulations provides a good soil for the development of entrepreneurship and innovation activities. The diversification of financing channels is conducive to the commercialization of more entrepreneurship and innovation activities. The school’s entrepreneurship education and full cooperation between the school and enterprises provide intellectual and opportunity support for the university students to carry out Entrepreneurship and innovation activities; ➂ The main body participation dimension of government, school, enterprise and social environment (subject dimension): the school undertakes the key link of education and guidance of entrepreneurship activities of college students. However, the support of government policy, the support of enterprise practice opportunity and the encouragement of social environment for entrepreneurship activities can better promote the development of entrepreneurship and innovation activities of college students.

284

Y. Deng

The model fully considers the dynamic dimension, influencing factor dimension and main support dimension of the entrepreneurship and innovation activities, which is an effective way and method to realize the scientific and technological innovation, system innovation, theoretical innovation and career development progress. The development and application of the model will play a role in promoting the innovation and innovation of college students in China [8]. 3.2 Operation Mechanism of mdmi Mdmi model fully reflects the multi-dimensional coordination and dynamic transformation of the activities of innovation and innovation. Through the analysis of mdmi structure chart, the mechanism of internal (multidimensional) operation and interaction (dynamic) of main dimension, element dimension and driving dimension are embodied. The specific analysis is as follows. (1) The basic support function of the main dimension. The related subjects involved in the process of entrepreneurship and innovation of college students, such as social environment, universities, enterprises and government, are the basic support for the development of entrepreneurship and innovation activities. The development of entrepreneurship and innovation activities can not be separated from the support of government policies, the education support of universities and enterprises for entrepreneurship and the atmosphere of entrepreneurship reflected in the whole social environment: social environment provides some vague possibility for the development of entrepreneurship activities, and the education of entrepreneurship in Colleges and universities provides the students with entrepreneurial opportunities. The active participation of enterprises can help students understand the market The government’s policy support for the activities of entrepreneurship and innovation provides practical opportunities for the development of entrepreneurship and innovation activities. The interaction and support between the related subjects provide a possible opportunity process for the transformation of the activity from fuzzy possibility to practical practice [9]. (2) The innovation transformation of factor dimension. The factors of influence realized by the relevant subjects, such as policies, laws and financing channels related to the government, the general education of entrepreneurship related to universities, the development of entrepreneurship competitions, the cooperation between schools and enterprises, business planning and practice, and the cultural environment and public opinion atmosphere related to social environment, etc., affect the proposal of business conception The whole process of the establishment of business concept and business model to the innovation enterprise. From the concept of the proposed to the success of innovative enterprises can not be separated from the role of related factors. To successfully transform the relevant elements into the successful development of entrepreneurial activities, it is more inseparable from the dynamic development of driving dimension [10]. (3) The dynamic development of the driving dimension. Of all the factors that affect the activities of entrepreneurship and entrepreneurship, opportunities, resources and teams are the most important. In the process of entrepreneurship, we need to

An Empirical Study on the Cultivation of College Students’

285

grasp the coordination, integration and adaptability of key elements and elements. In the early stage of entrepreneurship, we must pay attention to the exploration and selection of opportunities. In the middle of the entrepreneurship, we should focus on the formation of teams. When the enterprise starts smoothly and gradually enters the right track, the successful development of the entrepreneurship activities that will gradually increase the demand for external resources must combine the opportunity driven by the dimension, the innovation team and the resource development of the innovation industry, And with the development of entrepreneurship and innovation activities, it shows dynamic changes and balance.

4 Analysis of the Promotion Strategy of the Entrepreneurship and Innovation Activities of College Students In view of the huge pressure on College Students’ employment and the problems in the activities of entrepreneurship and innovation in China, according to the internal operation mechanism and correlation mechanism of the main dimension, the factor dimension and the driving dimension of mdmi, the paper proposes that the main dimension (government, University, enterprise and Society) is the leading factor The promotion strategy of innovation and innovation activities that influence factors and driving dimensions [11]. The government should take full responsibility for guiding and supporting the activities of entrepreneurship and innovation of college students, and take policy measures to encourage the activities of entrepreneurship and innovation of college students, such as: 1) simplifying the procedures of the industrial and commercial and tax departments, and giving administrative fees and exemptions; ➁ The regular college graduates are engaged in the individual business and implement the phased cost reduction; ➂ The personnel agency affiliated to the personnel department shall keep the personnel files for the graduates of independent entrepreneurship for free 2 [12]; ➃ The establishment of special functional departments to coordinate the work of various departments involved in Entrepreneurship and entrepreneurship activities, to implement the preferential policies of the government and improve the efficiency of service and entrepreneurship costs is one of the core factors affecting the entrepreneurship process of college students [13]. The lack of venture capital has become a stumbling block in the way of entrepreneurship and entrepreneurship for college students. And the form of entrepreneurial loan will become the wings to help college students to fly. After the bank has approved effective guarantee for college students with certain production and operation ability or has already engaged in production and operation activities, they can issue special entrepreneurship loan for college students (for college students, undergraduates, graduate students, doctoral students, etc.), and enhance the government’s financial support for entrepreneurship activities of College Students [14].

5 Conclusion This paper first analyzes the multi-dimensional dynamic innovation model under genetic algorithm, analyzes the problems and development trend of the innovation and

286

Y. Deng

entrepreneurship activities of college students from multiple perspectives, and provides a good way for the practice and theoretical research of the entrepreneurship activities of college students, It provides a favorable attempt for the reform of higher education teaching and has achieved good social and economic benefits.

References 1. Yinan, S.: Structural dimension, problem analysis and countermeasures of college students’ entrepreneurial environment. J Xuzhou Normal Univ. (Philos. Soc. Sci. Ed.) 35(6), 117421 (2009) 2. Zhenyuan, L.: Some thoughts on building an innovative society. J. Fuzhou Party School 2, 4448 (2006) 3. Weihui, M., Xiaozhou, X.: Research on the model of college students’ entrepreneurial skills. Res. High. Eng. Educ. 99, 1027–1039 (2012) 4. Zhenggang, Z., Danye, L.: Comparison of Chinese and foreign college students’ entrepreneurship legal systems. Legal Syst. Soc. 83(5), 1370–1376 (2013) 5. Zhihua, S.: China’s entrepreneurship policy barriers and breakthroughs. Frontier 39(3), 509– 518 (2011) 6. Demin, Y.: On the legal guarantee of promoting college students’ entrepreneurship. Employ. China 21(5), 7–21 (2010) 7. Wei, L., Ping, L.: On the innovation and development of school enterprise cooperation order training mode in higher vocational colleges -- based on the analysis of Wu Yi reserve cadre class. Economist 22, 285 (2009) 8. Yinan, S.: Structural dimension, problem analysis and countermeasures of college students’ entrepreneurial environment. J. Xuzhou Normal Univ. (Philos. Soc. Sci. Ed.) 36(12), 320–323 (2009) 9. Monan, Z.: Research on policy design and management model for entrepreneurial economy. Sci. Res. 21(4), 261–264 (2007) 10. Zhongwei, C., Yunzhou, D.: Social capital and improvement of entrepreneurial team performance. Comparison Econ. Soc. Syst. 39(8), 6729–6737 (2007) 11. Jing, T., Wei, Z., Jian, G.: Research on opportunity cognition and entrepreneurial decisionmaking under different entrepreneurial environments. Sci. Res. 179, 214–221 (2007) 12. Min, L.: On the construction of entrepreneurship education mechanism in Colleges and universities in China. China’s High. Educ. 125, 127–139 (2006) 13. Zhenyuan, L.: Some thoughts on building an innovative society. J. Fuzhou Party Sch. 9, 55244–55259 (2006) 14. Xiaogang, H., Xinchun, L.: Entrepreneurial ability and enterprise growth: an empirical Study Based on Chinese experience. Econ. Res. 36(4), 1541–1562 (2005)

The Exploration and Practice of Computer Aided Design in the Course Construction of Art Education Xingyu Feng(B) Hexi University, Zhangye 734000, Gansu, China [email protected]

Abstract. With the rapid development of information technology in China, information technology and computer technology have gradually penetrated into various fields. In the field of art and design, what designers pursue is not only the aesthetic feeling of art, but also the accuracy of design. In recent years, with the emergence of diversified design software, computers have been widely used in art and design, It not only brings great convenience to the designer’s art design work, improves the efficiency of design, but also makes the modern art design show a more unique art aesthetic form. To provide a broader space for art designers. This paper will fully analyze the role of computer-aided art design, and on this basis, put forward the strategy of computer-aided art education curriculum construction. Keywords: Computer · Assistance · Art design · Art education

1 Introduction Art is a kind of typical social ideology reflected and displayed by images, including literature, painting, sculpture, architecture, music, dance, drama, electrics and quyi. Art itself is a kind of culture. To improve the cultural accomplishment of higher vocational college students, more importantly, art aims to improve the realm of life [1]. Therefore, to give play to its humanistic education function, we can improve the cultural accomplishment through the aesthetic activity of art education curriculum, so that students can become a noble person with spirit, realm, mind and education [2]. Using computer to assist art design is a common form of modern art design in China under the background of the rapid development of information technology and science and technology. The main reason is that using computer to assist art design is not only helpful to improve the efficiency of art design work, At the same time, more innovative design techniques can be applied to art design to improve the innovation of art design itself. It can be seen that the use of computer to assist art design plays a vital role in promoting the development of art design. However, the overuse of computers in art design will also increase the dependence of designers on computers to a certain extent, which also requires designers to use computer-aided art design in a scientific and reasonable way [3]. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 287–293, 2022. https://doi.org/10.1007/978-3-030-99581-2_41

288

X. Feng

2 The Significance and Teaching Status of Computer Aided Art Design 2.1 The Significance of Computer Aided Art Design Course Our teaching should be based on social needs to determine the purpose of teaching directly. With the rapid development of science and technology, the society needs a large number of outstanding designers [4]. At present, we can see that almost all the enterprises related to art and design require the job seekers to master the relevant computer software when recruiting employees. If students can’t master computer-aided design well in school, they will encounter many difficulties in their future work, which is difficult to adapt to the needs of employers. Therefore, the opening of computer-aided art design course has practical significance and practical role. First of all, the use of computer-aided design as an advanced means can greatly reduce the labor intensity of the design process, save design time and improve design efficiency. In the teaching of design major in Colleges and universities, the introduction of computer-aided design liberates students from the heavy physical labor of designing and making works, and reduces a lot of time spent in the original hand drawing. As can be seen from the above, CAD has more advantages than the traditional hand-painted form, the arbitrary cutting and fusion of materials; In the process of design, countless modifications are made to improve the function and the perfect color of the design; And the high efficiency brought by computer-aided design make us feel the greatness and extraordinary of the tool of computer. Art design with its assistance greatly saves students’ production time, makes students free more time for design practice, and creates conditions for students to master art design skills better and faster. Therefore, the opening of computer-aided art design course is of practical significance and practical role, as shown in Fig. 1.

Fig. 1. Computer aided art design

The Exploration and Practice of Computer Aided Design

289

2.2 Teaching Status of Computer Aided Art Design Course From the perspective of teachers, there are two kinds of people who are engaged in computer-aided art design teaching in Colleges and universities. One is the computer professional origin, proficient in the menu and command of design software, but does not have the corresponding art professional knowledge and design ability [5]; The other is the teacher of art major who has the corresponding professional foundation to understand the design principle and has independent design ability. Although he can not tell through every menu, command, tool and operation principle, he can teach from the core function of design software from the example. From the teaching level, the latter is superior to the former. In the teaching of computer graphics aided art design in Colleges and universities, the former mainly focuses on the menu, tools, filters, special effects and operation skills of various software. The purpose and task of teaching is to teach students how to use these software to assist art design. The latter pays more attention to guide students to use the characteristics of computer graphics aided design software to carry out creative design. From the students’ level, they have great differences in understanding and using computer-aided art design, and there are also some mistakes in the process of learning. Some students rely on computer to complete design work too much. They pay too much attention to and infatuate with the special effects that software can produce, but ignore the use of the characteristics of CAD software to carry out creative design, so that art can not stop at the computer operation level, but ignore the soul of design creative problem. Some students are on the contrary. They don’t realize the importance of computer-aided art design. When learning these unscheduled application software, it is difficult to raise interest in learning in the face of complex theoretical knowledge and professional vocabulary, especially English version software. In the process of teaching, they have a passive situation, and the requirements for basic mastering and operating these software can not meet the requirements [6].

3 Application of Computer in Art Design (1) the application of computer provides a more convenient drawing method for art design. In the traditional hand-painted design mode, the preparation of materials before art design is very important for the whole design process. Designers need to spend a lot of time purchasing the necessary drawing brushes, rulers, pigments and other materials. The lack of any drawing materials will lead to the failure of art design and affect the final design effect. But in the process of applying computer technology to art design, art designers can directly use the virtual materials provided by computer, and no longer need to spend a lot of time preparing the materials in the early stage. In the process of drawing, art design can design the design design with the help of application computer, and ensure the design quality while improving the work efficiency of art designers [7]. (2) improve the accuracy of art design with the help of computer. Due to the influence of irresistible subjective factors, the traditional hand-painted design mode has some defects in the accuracy of design. In the process of hand drawing by art designers, even if the tools such as ruler are used to measure the work accurately, there will be subtle deviation. Such deviation may be difficult to distinguish by naked eye on

290

X. Feng

the manuscript, But once it is applied in real life, the small error will be magnified infinitely, and have a certain adverse effect on the effect and function of the design product. Therefore, the art designer should introduce the application computer into the art design, and the accuracy of the art works can be improved by using the characteristics and functions of the accurate calculation. (3) it is more convenient to store the works than traditional art design. Traditional handpainted art design mode needs to take manuscript paper as the carrier of art works, and all works of presentation need to be completed on manuscript. Therefore, the storage of art design works is also the storage of design draft. However, due to the need for many changes to the works in the process of art design, the number of handpainted manuscript is difficult to estimate. If we want to keep all the manuscripts reasonably, It needs a considerable storage space and sufficient time for receiving and arranging. Due to the large number of design manuscripts, it is inevitable to lose the manuscript in the process of storage. However, the application of computer can scan the manuscript, and the design results can be stored in the computer permanently, and it is also convenient for designers to extract the works and improve the working efficiency [8].

4 Construction of Art Education Course 4.1 The Construction Ideas of the Course Vocational art design education is based on the needs of diversified talents and professional post ability to meet the social and economic development. It emphasizes the practical ability, meanwhile, it also pays attention to the cultivation of students’ creative thinking ability, and emphasizes the design execution ability of transforming creative ideas into design finished products. The online open course group of computer-aided art design integrates the mainstream two-dimensional software in the field of art design, implements project guide and case teaching, improves the students’ comprehensive ability of computer-aided design, modular and precise customized learning, short-term and efficient, and meets the needs of the learners’ personality development. With the key techniques of case making as the focus of “visual art journey from modeling to effect”, strengthening design thinking, highlighting the characteristics of two-dimensional design software and emphasizing comprehensive application as the main line, the field of software application and visual expression technology are deeply displayed from the perspective of solving practical problems, Three interrelated modules are formed: CorelDRAW creates unique shapes the beauty of Photoshop feeling effect - Illustrator understands the artistic charm. And actively create online cloud class, online interactive answer questions, class integration system, appointment 1–1 and other various forms of guidance, learning tracking, teaching evaluation and feedback. In the course teaching, the project leader, the example explanation, the key skills are taught and the practical problems are solved [9]. 4.2 Contents of Course Construction (1) To construct the teaching idea of open sharing. The open and sharing concept of online open curriculum breaks through the constraints of traditional education. High

The Exploration and Practice of Computer Aided Design

(2)

(3)

(4)

(5)

291

quality open teaching resources are the important content of online curriculum construction. Scientific construction of teaching resources, integration of teaching resources, promoting resource sharing, more reasonable and effective use of resources. It is conducive to promoting the reform of teaching content, teaching mode and teaching method, saving education cost, realizing the open sharing of high-quality teaching resources, promoting the construction of teaching team and improving teaching quality. Reconstruct the content of the curriculum group. Based on the principle of being shallow to deep and easy to difficult, this paper analyzes some problems of computer aided design in art design practice. The example explanation is deep and simple, focusing on the close connection with professional skills and market demands, drawing content and drawing graphics, making signs, typesetting, photo restoration, 2D effect drawing of graphic design products, etc. Students should be trained to master the key technologies of coreldraw/photoshop/illustrator two-dimensional design software, be able to integrate and skillfully apply 2D design software to design various kinds of art works, and flexibly use design thinking to solve practical problems, and make rapid, accurate and exquisite production [10]. Make effective use of the multi-function curriculum platform. The high quality online curriculum platform is an important guarantee for the co construction and sharing of curriculum groups. Teachers can use the platform to broadcast or video micro class videos, discuss the interaction between teachers and students, and build a rich curriculum resource base. For example, the online course platform of learning banking is used in the course group of computer-aided art design, which mainly includes the course objectives, curriculum content, teaching team and curriculum features; Color online activities, online resources and assignments, discussions, examinations and live broadcast, etc. In particular, we should pay attention to the practicability of teaching content, strengthen the cultivation of vocational ability, connect the course content with professional standards, and accurately connect the teaching process with the working process [11]. The teaching organization and implementation with students as the main body. The flexible use of teaching methods should be strengthened, interactive teaching mode should be actively carried out to meet the needs of mass fragmented learning, and the continuous construction of curriculum teaching micro video online testing and homework resources should guide students to use. Follow the basic rules of effective teaching, design teaching activities around teaching objectives, scientifically plan and use online teaching resources reasonably, and clarify assessment and learning incentive measures. The online learning and classroom teaching online and offline combined with the resources platform and live broadcast platform are integrated into various forms of classroom teaching mode. Pay attention to the design of learning tasks and activities, actively carry out case-based, discussion project-based and other teaching modes. Through online test, data feedback, discussion, homework submission and approval, etc., the students can share learning resources, cooperate with each other and communicate problems. The construction of teaching resources with leading level. The paper constructs the online and offline hybrid project-based teaching mode, realizes the docking of curriculum content and professional standards, the integration of teaching projects

292

X. Feng

and actual combat projects, and the docking of teaching process and working process. The construction of online open course group of computer-aided art design can cover the main knowledge and key skills of the course group according to the provisions of the curriculum standard, including teaching video, courseware, teaching plan, exercises and other complete teaching contents, as well as teaching design, teaching implementation, teaching process, teaching evaluation, teaching feedback and other links, It can support the online and offline mixed teaching of rich curriculum teaching resources [12]. (6) Comprehensive and scientific evaluation system of art courses teaching. Combined with the teaching concept of flipped classroom, further construction and improvement of teaching evaluation system, construction and improvement of unit evaluation, classroom evaluation and overall evaluation, etc., and reasonable arrangement of the proportion of evaluation indicators. The teaching evaluation method combining the evaluation methods of the internal evaluation, the outside guidance teacher evaluation and the mutual evaluation of students can be constructed and improved. The teaching evaluation can be more reasonable and can reflect the students’ practical effect. The system of multi-element learning effect evaluation, such as online and offline combination, self-evaluation and mutual evaluation, process evaluation and termination evaluation, is established to promote students’ autonomous learning, process learning and inquiry learning. (7) Pay attention to the feedback of teaching information and the reform of diagnosis. Based on the big data information collection and analysis, make full use of online teaching platform, record and track the teaching content and information feedback of teachers and students in the learning process, fully understand and master the learning characteristics and personalized needs of each student, improve the teaching methods of teachers, promote teaching according to their aptitude and improve the teaching quality. In addition, we should strengthen the construction of teaching guarantee mechanism and conditions of online open curriculum group of computeraided art design, enrich, perfect and have the leading level of teaching resources construction, and build information teaching team [13, 14].

5 Conclusion The construction of computer aided art design course will form open and shared educational resources, further improve professional strength, radiate and drive the development of art specialty group, comprehensively improve the quality of talent training, and produce good talent benefits. The course teaching team uses advanced teaching concepts and unique teaching methods to promote the integration and sharing of online education resources, improve the quality of online education, and gradually form a new trend to adapt to the development of world education.

References 1. Jinsong, C., Xiangdong, Q.: Computer Aided Art Design. Chongqing University Press, Chongqing (2002)

The Exploration and Practice of Computer Aided Design

293

2. Guoda, P.: Some ideas about computer art design teaching. J. Taiyuan City Polytech. (5) (2004) 3. Qin, Z.: Discussion on some problems of art and design education in digital era. Jiangxi Educ. Sci. Res. (8) (2005) 4. Yulin, C.: Using computer painting to cultivate students’ innovative thinking ability. Audio Visual Educ. Primary Secondary Schools (second half of the month) (10) (2015) 5. Xiaoying, H.: Rethinking on computer art teaching. Res. Art Educ. (10) (2012) 6. Haixia, Y.: On student evaluation methods in primary school art education. China Sci. Educ. Innov. Guide (36) (2011) 7. Hailong, J.: Moving information and spreading to art -- a probe into animation teaching strategies in primary schools. New Curriculum (middle) (10) (2011) 8. Shuhui, J., Weimin, W., Shuyu, Z.: Interpretation of K12 media art curriculum standard in Minnesota. J. Distance Educ. (03) (2011) 9. Dandan, W., Kai, G.: On the phenomenon of children’s interest in art. Res. Art Educ. (05) (2011) 10. Research on the effective teaching mode of art appreciation course in senior high school [J]. Lei Zi. Modern reading (EDUCATION EDITION). 2011 (05) 11. Xiaopeng, Z.: Law and verification of effective teaching. J. South China Normal Univ. (Soc. Sci. Ed.). (04) (2010) 12. Deying, Y.: Discussion on Teachers’ teaching experience from the perspective of effective teaching. J. Zhaoqing Univ. (04) (2010) 13. Yingmei, L.: Professional wisdom of art teachers and its cultivation strategy. J. Heze Univ. (04) (2009) 14. Fang, Z.: On the teaching innovation of computer aided design in art design major. Art Sci. Technol. 29(5), 381 (2016)

VR Simulation Technology in Basketball Referee Teaching Yingna Feng(B) College of Physical Education, Jiangxi Normal University of Science and Technology, Nanchang 330013, China [email protected]

Abstract. The rapid development of information technology provides a variety of ways for people to learn. The industrialization level of VR simulation technology is constantly improving, and the application field is constantly expanding, from game entertainment to travel margin, military nuclear air, medical and even education, which provides people with a new choice and three-dimensional experience. VR simulation technology plays an important role in basketball referee teaching and training. This paper explores the practice of integrating VR simulation technology into basketball referee teaching and training system from many aspects. Keywords: VR simulation technology · Basketball referee teaching · Application research

1 Introduction Novel coronavirus pneumonia was severely attacked in 2020. China has also launched a six month online teaching practice, and all kinds of web-based training platforms for teaching and training have been on the shelves. The continuous leap of information technology provides convenience for people to carry out online teaching and online office. However, a large number of experimental classes are delayed or even cancelled because students do not have the experimental conditions at home. Some schools and regions try to combine VR industry with education, introduce virtual reality (VR) technology in teaching and training, and try to integrate this technology into specific curriculum teaching activities [1–4]. VR technology is a kind of virtual three-dimensional space technology which can be realized by computer network system. It can create a virtual environment with real touch, hearing and vision for users. It can simulate the subjective ideas of people, make users feel the situation, and can be unlimited in this virtual 3D space Observe and explore all the affairs in time. This unlimited virtual space has a real feeling, which provides simulation experience for a large number of experimental courses, and can play an immeasurable role in training talents. Figure 1 shows VR basketball foul gesture.

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 294–299, 2022. https://doi.org/10.1007/978-3-030-99581-2_42

VR Simulation Technology in Basketball Referee Teaching

295

Fig. 1. VR basketball foul gesture

2 The Current Situation of Basketball Referee Teaching 2.1 Single Teaching Method In the teaching of basketball referees, the traditional teaching methods are explanation demonstration method and case analysis method. In general, the teacher first explains the demonstration, and then the students practice. In the process of practice, the teacher corrects the mistakes that are easy to make, so it is difficult to exercise the students’ onthe-spot application ability [5]. After that, teachers use case analysis method to explain to students, but in the process of case analysis, using language to describe a variety of cases on the basketball court is often too long, and can not intuitively express the case itself, which leads to students’ inattention. 2.2 More Content Knowledge The theoretical basis of basketball referee mainly includes basketball competition rules and referee method, basketball skills, tactical knowledge and so on. In addition to mastering the rules and judging methods, the referee should have a comprehensive understanding of basketball skills and tactics, and be able to make a correct prediction and judgment of the skills and tactics used by the players on the court, so as to make a timely and accurate judgment [6]. 2.3 The Students’ Theoretical Foundation is Weak Most of the students who participate in the basketball referee learning in Colleges and universities are not basketball special students, do not understand the basketball rules, most of the students have not participated in the regular basketball game, know little about the basketball terminology, and do not understand the basketball rules in depth.

296

Y. Feng

Even if individual students can barely understand the rules, they can not make a quick and accurate judgment for the case analysis [7]. The significance of integrating VR simulation technology into basketball referee teaching system. The integration of VR simulation technology into basketball referee teaching system is conducive to expanding the scale of VR industry and providing a strong guarantee for the growth of VR industry. China’s education development is better, the state attaches importance to the modernization of education, the government attaches importance to the integration of education and science and technology, as well as China’s personnel training. And the traditional concept of emphasizing education also provides strong support for the modernization of basketball referee teaching in China [8]. These are the favorable factors for VR industry to integrate into the education and teaching system, and also create the possibility of sustainable development for VR technology update. In the process of basketball referee teaching, more attention should be paid to students’ innovative thinking. VR simulation technology is helpful to cultivate students’ innovative thinking. In the teaching and training, both academic and practical operation require enough innovative thinking. If you are complacent, you will only lag behind others and can’t keep up with the pace of the times. Talent is always in the first place in the competition of science and technology. Only by using advanced science and technology to cultivate talents can we create more advanced productive forces. Innovation consciousness is one of the important contents of talent cultivation. The application of VR simulation technology can reduce the pressure of students’ basic practical learning, effectively stimulate students’ interest in learning, give students a more intuitive experience of the environment, and at the same time, think about problems in practice and put forward innovative opinions [9]. It is conducive to the optimization of basketball referee teaching system and a step forward to the comprehensive teaching and training project. Teaching and training is a process of continuous optimization, but also inheriting a new process. The ancient education criteria still play a lot of important roles in basketball referee teaching, but the talent cultivation in specific subjects must rely on modern science and technology, and depend on the progress of modern science and technology, so that the talent cultivation can become more modern and high-end. Compared with the traditional physical education teaching mode, simultaneous interpreting of information in VR simulation technology can effectively improve the teaching objectives of basketball referee course. The visual and repeatable characteristics of VR simulation technology can change the abstract text description of basketball competition rules and referee method into vivid and easy to remember video, so that students can master various moving, route change and other referee skills, and reduce the reaction time in the process of execution. Make the students remember deeply and clearly, analyze and judge whether the basketball technical action conforms to the competition rules. In addition to mastering the rules and refereeing methods, students also need to have a comprehensive understanding of basketball skills and tactics, so that they can make a correct prediction and judgment of skills and tactics in the game, improve the level of refereeing, and lay a solid foundation for the promotion of high-level refereeing level [10].

VR Simulation Technology in Basketball Referee Teaching

297

The case practice can strengthen the students’ skill goal of correctly using basketball rules on the spot, enable students to establish the conditioned reflection of violations, fouls and other actions in basketball, and improve the phenomenon of students’ lagging reaction in the process of judgment, so as to avoid the missed judgment and wrong judgment caused by the lagging reaction of students’ referees in basketball games, and even intensify the contradictions between students’ teams, Serious consequences.

3 Practice of Integrating VR Into Basketball Referee Teaching VR technology has the characteristics of immersion, interaction, imagination and perception, which are the main factors that VR simulation technology can be integrated into modern teaching system. Through the combination of resource sharing and teaching practice, we can promote the innovation of network teaching mode in China, and provide a more powerful guarantee for China to deal with emergencies. Basketball is one of the most popular activities among college students, and all kinds of competitions are very frequent. Basketball referee is an essential part of basketball and basketball games. In campus basketball games, student referees are the main force. Strengthening the cultivation of student basketball referees can provide guarantee for large-scale student activities such as school games. Before the implementation of VR simulation technology teaching method, the time for students to master the basic theory is too long and not firm enough, which leads to the actual training time is too short and can not be used correctly. In view of these situations, the use of VR simulation technology teaching, combined with the characteristics of students to carry out teaching, better let students practice training. 3.1 Promoting Quality Resource Sharing Across Time and Space Across time and space to promote the sharing of teaching resources is the objective requirement of China’s education system. China’s regional economic development is unbalanced, modern science and technology, education and other modern resources are concentrated in the eastern region, and it is difficult for the central and western regions to keep up with the development pace of economically developed regions. Similarly, the shortage of resources has become a major obstacle to development. However, with the development of modern information technology, various regions can be closely linked. Through the live network platform, high-quality courses can be set in the form of open courses, and resources can be extended and expanded to lay the foundation for the promotion of VR technology [11]. For example, VR technology can be used to carry out remote video on demand for university library resources and teaching courses, and knowledge learning in the virtual environment. These are not right in the traditional teaching environment. The integration of resources across time and space is an essential link in the network teaching system. In the context of continuing to promote education equity, we should promote resource integration and use VR technology to add new vitality to the development of education industry.

298

Y. Feng

3.2 Combination With Experimental Courses VR technology’s virtual operating environment brings immersive interactive experience is its biggest advantage. As the main body of learning, students need to think rationally through their own feelings. VR technology can provide students with a good environment for independent thinking, autonomous learning and practice. Many experimental courses in Colleges and universities are limited by experimental equipment, experimental sites and experimental objects, so it is difficult to provide students with a complete and independent experimental operation system. But VR technology simulation can solve this series of problems, especially in basketball referee teaching and medical field. In the process of teaching, students often learn more theoretical knowledge and less practical operation, especially in human body planing. The refined VR program can simulate the real human body structure, provide many experimental experiences for medical students, breaking the usual practice that only in the school curriculum or practice hospital can be exposed to the solution experiment. At present, VR technology has been used in the practice of environmental engineering, civil engineering and other engineering majors, showing strong vitality and potential. It shows that VR technology can be combined with other courses to promote the reform of experimental teaching in Colleges and universities. 3.3 Promoting the Innovation of Network Teaching Mode The organization forms of information-based teaching are various, and the network teaching mode needs to be constantly updated. VR technology can simulate a kind of “real classroom” teaching form by building a virtual teaching environment. Teachers can carry out normal teaching and training activities in the “virtual classroom”, and students can carry out “real classroom” learning at home. It can break the closed teaching mode of network teaching and increase the interaction between teachers and students [12, 13]. Can also break through the physical classroom space, equipment restrictions. Let the students complete the learning tasks in the virtual environment, at the same time, they can absorb the excellent experience of the relatively mature game entertainment VR industry, set the learning tasks as game characters, increase the innovation of resource conversion, use the eyes, experience warehouse and other equipment to increase the immersion experience, complete the offline teaching activities, and improve the students’ learning fun, Firmly establish the student-centered teaching concept, and promote the innovation of network teaching mode.

4 Conclusion VR technology is an effective application in basketball referee teaching system, which combines the existing network teaching mode with the entity teaching mode, which can effectively supplement the deficiency between them and play a link role in connecting the two. But VR technology development also has some shortcomings, such as in the experience personnel safety, equipment prices and other aspects of limiting the use of colleges and universities and social education institutions and degrees. The research finds

VR Simulation Technology in Basketball Referee Teaching

299

that the improvement of teaching and training system needs to strengthen the R & D and promotion of VR technology, train the talents with practical and R & D ability, promote the construction of VR technology team, and effectively guarantee the teaching research and innovation in Colleges and universities. We will continue to promote the sharing of high-quality resources across regions, and lay the practical foundation of VR technology education resources; To create a good experimental environment for each student, and to supplement the problem of insufficient resources of online and offline courses; We should continue to promote the innovation of network teaching mode, enhance the interactive characteristics of teaching and training by using the method of virtual reality integration, realize the goal of improving the quality of talent training and improve the basketball referee teaching system. Acknowledgements. Jiangxi Provincial School of Higher Teaching Reform Project No. JXJG20–10-21.

References 1. Pan, J.: Analysis on the optimization of teaching methods of college basketball optional course. Sports World 12(21), 4124 (2017) 2. Ye, C.: Feasibility analysis of the application of micro class in college basketball teaching. Sports 167(22), 511–522 (2015) 3. Fenglin, H.: Application of flipped classroom teaching method based on VR technology in practice teaching of mechanical specialty. China Educ. Technol. Eqpt. 98, 399–409 (2019) 4. Goddard, M., Ruiyang, L.: Immersive media, virtual reality and audiovisual media archaeology. New Art 15(7), 1002–1010 (2020) 5. Ying, L.: Visual maintenance management of equipment based on virtual reality. Forging Eqpt. Manuf. Technol. 204(04), 181–205 (2015) 6. Yuwei, Z.: A brief analysis of the application of immersive communication in virtual reality art design. Sichuan Cem. 12(6), 1094 (2019) 7. Zhang, Y.: VR lacks a situational experience that allows users to really participate. Office Autom. 165(06), 301–320 (2017) 8. Sha, T.: Virtual reality art design strategy based on immersive communication. Grand View Art 4(1), 16–25 (2020) 9. Parkin, S.: Virtual reality. Technol. Entrepreneurship 11(1), 470–482 (2014) 10. Wei, W.: Siggraph Asia 2016 Macau conference marching into virtual reality. Microcomput. Application 80(20), 937–949 (2016) 11. Huimin, W., Tianyang, Z.: Design of virtual reality film and television cabin based on five senses experience. J. Cult. 12(9), 3612 (2021) 12. Yubo, W.: Application and design of virtual reality in smart classroom. Electron. World 237(14), 103–116 (2018) 13. Xinxin, X.: Application of virtual reality technology VR in computer teaching. Math. Educ. Inf. 45(21), 460–473 (2016)

Handwritten Note Recognition Based on Digital Music Classroom Teaching Yunchen Hou(B) Tianjin Foreign Studies University, Tianjin 300204, China [email protected]

Abstract. With the rapid development of computer technology, people pay more and more attention to the application of modern information technology in education and teaching. A large number of teaching software has gradually infiltrated into the teaching of various disciplines. However, the contradiction between the low-speed input of traditional software and the high-speed processing of computer has brought inconvenience to teaching, which urgently needs to transform the traditional keyboard based input into handwritten input in line with people’s daily habits, so as to improve the efficiency of classroom teaching. Based on the metaphor of “pen and paper”, this paper studies the online recognition of handwritten notes in music teaching with the idea of user centered natural interaction, so as to provide a natural and efficient teaching environment for music education. Keywords: Digital music · Classroom teaching · Note recognition

1 Introduction With the vigorous development of science and technology, digital technology has gradually penetrated into the teaching of various disciplines, providing rich teaching resources for classroom teaching. Similarly, as a compulsory course of basic education, music contains a large amount of information and involves a wide range of knowledge, which is conducive to the cultivation and development of students’ thinking and innovation ability, and to the overall development of students’ comprehensive quality [1]. In order to achieve this goal, we need to use modern digital technology to enrich the music classroom teaching means and teaching resources to complete the teaching task. However, the existing music software has brought some inconvenience to the classroom teaching in terms of the presentation of the interface or the complexity of the operation [2]. Generally, keyboard and mouse are the main means of human-computer interaction. This kind of interaction contains a large amount of information, which increases the cognitive burden of users. At the same time, the low-speed information input and the high-speed information processing will produce inevitable discordance; And for those who are used to writing music scores with paper and pen, the wimp interface based on click will be inconvenient to use [3]. In the actual music teaching, music teachers or music workers are used to the writing style of paper and pen. In this way, people can easily understand the content of writing. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 300–306, 2022. https://doi.org/10.1007/978-3-030-99581-2_43

Handwritten Note Recognition Based on Digital Music

301

But such a simple thing is difficult for a powerful computer, which makes it difficult for people to interact with the computer efficiently with their handwritten notes; And because the music includes a variety of symbols, such as basic notes, stops, modifiers and so on, coupled with the different handwriting forms of different users, it will bring some difficulties to the recognition and editing of handwritten notes. Therefore, the research and solution of these technical problems will have important practical significance. The recognition of handwritten notes in this paper is based on the metaphor of “paper and pen”, which can provide music learners with a natural method of score editing. Users can input notes through an input device, and then become a unified representation after processing by computer recognition system, and then complete the input recognition of notes. The research of handwritten note recognition technology is conducive to promoting the development of music education [4].

2 Related Technology of Handwriting Recognition 2.1 Statistical Pattern Recognition Method The basic idea of statistical pattern recognition method is to extract the features of the pattern to be recognized, and combine these features into an n-dimensional vector, which represents the corresponding pattern to be recognized. This recognition method does not describe and analyze the interior of the pattern. It only judges the category according to the position of the n-dimensional feature vector in the feature space [5]. The results show that the closer patterns belong to the same category, while the farther patterns belong to different categories. This recognition method mainly includes statistical judgment method, cluster analysis method, discriminant function method and so on. Among them, the discriminant function needs to be generated by training samples of known classes, that is, learning or training. The sample to be classified is substituted into the discriminant function, and its category is judged according to the positive and negative values. Linear discriminant function is one of the most simple and practical discriminant functions d (x) = w0t + wn+1

(1)

2.2 Neural Network Recognition Technology Neural network is a dynamic system with topological structure and directionality. Its input can be continuous or intermittent. The information is processed according to the two input states [6]. The basic principle of neural network recognition: first of all, it should learn by itself according to the fixed learning rule, and remember the characteristics of the samples in each pattern class by training the learning samples of each pattern; Then, when the recognition samples are detected, the neural network can use the remembered pattern class features to compare with the sample features, so as to determine the pattern class of the samples. Artificial neural network is a nonlinear dynamic system composed of many neurons. The artificial neurons here are mainly derived from biological neurons, which are their simplification and simulation. This kind of neural network system has strong

302

Y. Hou

working ability, which is mainly manifested in the huge amount of parallel computing, distributed storage form of information, self-organization, highly nonlinear and selflearning characteristics. There are two kinds of neural network models: feed forward neural network and feed back neural network. The former is characterized by layering of neurons. There is no information exchange between neurons in the same layer. It is a synchronous calculation between layers. Different from the forward neural network, the feedback neural network does not layer the neurons, but directly operates the whole network, and there is interaction between neurons, so the calculation is carried out as a whole [7]. 2.3 Handwriting Recognition Process Generally, the process of handwriting recognition system includes three stages: handwriting preprocessing, feature extraction and classification recognition. As shown in Fig. 1.

Fig. 1. Processing flow of handwriting recognition system

3 Design and Recognition of Handwritten Notes 3.1 Types of Handwritten Notes Pen gesture mainly uses single stroke or small number of strokes to express feature information and achieve purposeful operation. A stroke refers to the process of a stroke writing: drop, move and pick up. It is characterized by small amount of calculation and easy to be recognized by computer. At present, for the recognition of handwritten notes, some researchers also use gestures to describe the music symbols or music markers in the music score, that is, a note is replaced by a gesture, and the collection of various gestures is the main content of the music score [8]. On the one hand, the design of simple gesture omits the segmentation problem of multi stroke recognition, and at the same time, it can shorten the user learning and operation time and improve the usability of user interface. On the other hand, it can not only ensure the interactive quality of music score, but also use a small amount of calculation to achieve high recognition rate. At present, researchers at home and abroad have designed several sets of pen gesture notes: (1) Buxton has designed some basic notes and gesture symbols of aspect stop. As shown in Fig. 2 (a). (2) Based on Buxton’s design, Andrew forsbury and others developed a relatively complete set of notes gesture symbols in the music Notepad system. Some gesture notes are shown in Fig. 2 (b). (3) According to the geometric shape, frequency and different importance of notes in music score, Liu Xiaoxiang and others designed a set of notes set including 13 gesture commands and applied it in the music score editor supporting pen input. They designed these gesture notes have a common feature, that is, they are all based on a single stroke, and their recognition algorithms have achieved good recognition results.

Handwritten Note Recognition Based on Digital Music

303

Fig. 2. All kinds of gesture notes

3.2 Data Acquisition In this paper, the data collection is based on VS2010 development platform, independent development and implementation of the handwritten notes data collector, the function of the collector mainly uses the inkcanvas control in WPF to write, save, erase and other functions of handwriting[9]. The collector is used on Windows pad. And works with a stylus, which is convenient to collect a large number of users’ handwriting. Inkcanvas is a layout control that allows the use of ink in WPF. Its main purpose is to capture the handwriting input by mouse or stylus. Every stroke written by the user will become an independent stroke object. All the strokes in inkcanvas constitute the strokes collection, which is also the collection mainly used in this paper. The note handwriting collector implemented in this paper is shown in Fig. 3.

Fig. 3. Handwriting collector

3.3 Pretreatment In this paper, the main work of preprocessing is to remove noise and jitter. In the aspect of eliminating noise, track normalization is used to filter out the black noise at the start,

304

Y. Hou

pause and drag pen. Thinning method is used to deal with the noise generated by dense writing tracks. These methods can obtain the direction of the trajectory accurately in real time, with high speed, high efficiency and no loss of useful information. The basic idea of normalization is to scale the coordinate points of handwriting stroke trajectory according to a certain proportion and unify them into a standardized area, so that the noise around the effective points can be transformed into effective points to achieve the purpose of de-noising. Affected by the speed of people’s writing, the captured handwriting strokes will appear loose and compact. Sparse stroke trajectory points will not bring any negative impact on recognition. Because the regions of sparse trajectory are basically in the same direction, and because people’s writing habit is that the writing speed at the corner is relatively slow, the trajectory points at the stroke direction change are not sparse, so the effective stroke trajectory information will not be lost, so the recognition effect will not be affected [10]. Here, we use a stroke trajectory thinning algorithm to refine all the continuous trajectory points that will be filtered, and get whether they are effective stroke information, so that the information of effective strokes will not be lost blindly. The idea of this algorithm is to combine the continuous filtered trace points into one or more oblique direction codes according to the characteristics of these special stroke tracks, and give the weight. In this algorithm, digital sequence is used to represent direction code, and continuous n identical direction codes are filtered. The time complexity of this algorithm is O (n), and the space complexity is O (2). 3.4 Feature Extraction of Note Stroke In this paper, the feature extraction of handwritten notes combines its geometric structure features and statistical features. Based on the design of handwritten note strokes, it can be seen that these strokes mainly include three geometric types: straight line segment, broken line segment and quadratic curve, and are consistent with the recognition idea of single stroke gesture. Each stroke is completed by one stroke. In this way, the selection of handwritten stroke features has a great influence on the recognition results. Computable stroke features have always been the core of single stroke gesture recognition. After a large number of experiments, researchers at home and abroad have obtained many features for different recognition problems, including curvature, density, direction, size, pressure, time and speed. People can choose to add or remove some of the features according to their specific problem situation to improve the recognition rate[11]. At present, the commonly used single stroke recognition algorithm rubine algorithm includes 11 numerical features with obvious geometric characteristics and 2 timedependent numerical features. However, after repeated experimental research, for the handwritten note stroke designed in this paper, these 13 features are not completely suitable, and the recognition rate is relatively low. In order to get a better recognition effect, we select 49 features, which are mainly composed of curvature, density, size and direction, and extract the features from the collected handwritten note handwriting to get the feature database set. Through the analysis of these data, we find the features with large data value difference.

Handwritten Note Recognition Based on Digital Music

305

3.5 Recognition of Note Strokes The online handwritten stroke is obtained by the trajectory of the point between the pen falling and lifting. After lifting the pen, the stroke classification will be completed by the method described below. In this paper, the recognition of handwritten notes is based on the idea of rough classification and fine classification. The extraction of the above important features has laid a good foundation for the classification. According to the eight geometric features determined in the above feature extraction stage, the rough classification of linear strokes and non-linear strokes (including closed and non closed) is completed in this stage, and part of the internal fine classification is completed. The specific identification methods are as follows: (1) First of all, it is necessary to judge the number of points in the sequence collected by the current stroke. If the number of points is less than a certain value, then the stroke is judged to be a point, that is, an attachment point; (2) Calculate the stroke straightness rate distancetolength. If it is greater than the given threshold, it is judged as linear stroke; otherwise, it is judged as nonlinear stroke; (3) If the stroke is judged as a linear stroke, then several linear strokes (including horizontal line stroke, vertical line stroke, left oblique stroke and right oblique stroke) need to be classified in detail: the cosine cosfirstlast value of the angle between the start point and the end point of the stroke is calculated; if it is greater than the given threshold value, the stroke is a horizontal line; Otherwise, the sine sinfirstlast value of the angle between the start point and the end point of the stroke is judged. If it is greater than the given threshold, it is a vertical line stroke. Otherwise, the sloperate value of the line slope is judged. If it is less than 0, it is a left oblique line, otherwise it is a right oblique line [12]. (4) The above three steps complete the classification of linear strokes. If the strokes do not meet the above conditions, they belong to the broken line or quadratic curve. Here, we divide it into closed stroke and unclosed stroke. By calculating the value of distance to length, we can distinguish the two stroke types. If it is less than the given threshold, it is closed, otherwise, it is unclosed; (5) If the stroke is closed, the ratio of the cumulative chord length of the stroke to the angle value in X direction of the outer bounding box of the stroke is calculated. The characteristic value of stroke lengthbboxsize is calculated. If it is greater than the given threshold, the stroke type is treble, otherwise it is solid note prefix 0 (6) If the strokes are unclosed, we need to obtain the eight direction chain code features of the strokes to classify the remaining strokes.

4 Conclusion With the emergence of a new generation of user centered natural human-computer interaction interface and the vigorous development of subject teaching informatization, there are higher requirements for the application of subject tools in teaching, so as to improve the classroom efficiency and achieve the effect of natural and intuitive teaching. But there are many kinds of positional relations between the point and the head of the note, and different positional relations represent different meanings. For example, the punctuation

306

Y. Hou

above or below the head of the sign indicates the broken tone, and the right side of the head of the sign indicates the time value of the added note. In order to better distinguish different situations, we need to further formulate corresponding rules for the position relationship between the punctuation and the head of the sign. Acknowledgements. Philosophy and Social Sciences Special Research Project in Jiangsu Province “Research on Network Public Opinion Guidance Mechanism of Universities” (Project Approval No.2018SJSZ098); 2018 Nanjing Xiaozhuang University Research Project “Xi Jinping Teacher Thought in New Era and Young Teachers” (2018NXY18).

References 1. Wei, G.: Research on digital support platform of music education. J. High. Correspondence Educ. (Philos. Soc. Sci.) 22(5), 37–40 (2009) 2. Sijing, Z.: Problems and reasons of music teaching in ordinary high school. Henan Univ. Sci. Technol. 04(04), 86–88 (2011) 3. Xiaoxiang, L., Shusheng, Z., Baohua, S.: Score editor supporting pen input. Comput. Eng. Appl. 04, 122–124 (2005) 4. Hui, L.: Research on online handwritten document recognition method. Harbin Institute of technology (2010) 5. Xuming, X.: Research on online handwritten mathematical formula recognition. Huaibei Normal University (2010) 6. Xinli, C.: Research on recognition of hand drawn geometric figures. Wuhan University of Technology (2009) 7. Xiaojuan, L.: Research on root extraction algorithm in online handwritten Chinese character recognition. Huazhong University of Science and Technology (2008) 8. Qinglin, F.: Research and implementation of online handwritten Chinese character recognition system based on stroke. Anhui University (2007) 9. Ying, H.: Research and implementation of on-line handwritten mathematical formula recognition system. Guangzhou University (2007) 10. Xiaoliang, Z.: Research on online recognition of hand drawn flow chart. Northwest University of Technology (2007) 11. Haibo, F.: On line handwritten formula recognition based on gesture and two-level classifier.. Graduate School Chin. Acad. Sci. (Inst. Soft.) 2003 12. Xuming, X. Research on online handwritten mathematical formula recognition. Huaibei Normal University, June 2010

Design of Color Music System Based on Feature Classification Yiwen Hu(B) Mianyang Normal College, Mianyang 621000, Sichuan, China [email protected]

Abstract. In this paper, on the basis of traditional music player, color music system design based on feature classification, first of all, the modeling method of music category is studied. Then I extract the features of the samples and label the categories of music. Then, the collected samples are classified, the classification algorithm is analyzed, and the model evaluation is used to evaluate. Then through the establishment of a set of corresponding system of music emotion and color, the overall music system and process are designed. Keywords: Music emotion · Feature extraction · Classification · Color music

1 Introduction In recent years, China’s music market highlights a considerable scale of demand, and also has a certain competitiveness in the international market. Therefore, there are many “color music” players and smart speakers in the market to meet the users’ pursuit of music and art. The traditional “color music” player, while playing music, can change different colors, so that people can enjoy music at the same time, can integrate the visual senses [1]. At the same time, research shows that different colors can cause different emotional changes, such as: blue makes people quiet, red makes people excited, and so on, This kind of device is generally used to play music. Although there are color changes, it doesn’t matter much. There are also landscape lights. While playing music, landscape lights can change at will, but this change is not related to music. It does not have the function of real-time matching of color and music, and there is no correlation between them. Therefore, if people want to appreciate the changes of vision on the basis of hearing, they may not be able to obtain this sense of vision. Some “color music” presents colors randomly with the rhythm of music, and some presents colors with the change of volume. These are not really color music in the true sense, because they are set in advance and change different colors by setting fixed colors [2]. Therefore, in this topic, we will introduce how to make color better express the emotion of music. It can not only bring synaesthesia to personal emotion, but also be applied to landscape lights, stage, musical and other scenes.

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 307–312, 2022. https://doi.org/10.1007/978-3-030-99581-2_44

308

Y. Hu

2 Modeling Music Emotion 2.1 Hevner Emotional Model The most intense feeling music brings is some kind of emotion. This emotion is expressed by the combination of elements in music, which shows us a complex and rich feeling [3]. In the research of music emotion classification, the popular one is Hevner emotional ring. In this model, Hevner is a ring graph, that is, changes from the beginning to the end can be seen as a ring. There are eight components in total, so based on this classification, the music emotion model is a discrete classification model. In Hevner emotional circle, it is divided into eight parts evenly, each part represents a basic emotional category [4, 5]. In each category, we can find that there are multiple words used to describe this category. The meaning of words is similar between adjacent categories, and the meaning of words is not similar between non adjacent categories. Based on this, Hevner emotion ring is often used in the classification of text keyword models. In this emotional ring, there are many kinds of emotions, and the rings are related and progressive. For example, in the classification, happy, happy [6]. These words appear in adjacent categories. For the characteristics that only can be converted between adjacent parts, Hevner has given the verification in the experiment. Hevner emotional model has discrete characteristics, which divides the emotion of a music into eight categories, which conforms to the rules of emotion itself. Therefore, in some other fields, the research on emotion has a lot of applications. But it also has its shortcomings, such as only adjacent types can be transmitted to each other, and when making choices, the audience often focuses on some adjectives describing emotion, and it is very similar, so that the audience may pay more attention to some group or groups adjacent to each other when they choose [7]. 2.2 Classification Method of Music Emotion Through the model we established, the sample set is labeled manually, and then the training data is collected through feature extraction [8]. Because the model we built is a multi classification task, by extracting short-term music features, marking and classifying, this paper mainly introduces the algorithms suitable for classification problems, including softmax algorithm, SVM algorithm and KNN algorithm, especially support vector machine algorithm, which has been relatively mature research, but there is no uniform standard for the selection of kernel functions, We need to analyze the application of the concrete to the practical problems. Then, the advantages and disadvantages of the three methods are introduced. In addition, we also introduce the application scenarios of the above algorithms in detail, which helps us get better learning results in effective training data sets. The flow chart is shown in Fig. 1.

Design of Color Music System Based on Feature Classification

309

Fig. 1. Feature extraction logic structure diagram

KNN algorithm does not show the training process, the model itself is very simple, applied to this study, the most important thing is the selection of K value. At present, for the research of music emotion classification, according to the sample statistics of our selected data set, calculate the category of music emotion, then establish the training set of music fragments, preprocess the music data in the music fragments, then select and extract the music features, finally select and train the model of our sample set, and then test the process, Feature extraction logic structure [9]. 2.3 The Corresponding Relationship between Emotion and Color If people can think of rich colors while playing music, it is particularly important to find the corresponding relationship. Because the development of music and color is not the same, the theoretical basis is also different. If we find this bridge between music and color, it will play a great role in promoting the development of both. Music often appears, what is it, why some music sounds exciting, some sad, why some colors give people a deep impression, can play a great positive role, and some give people a sense of gray, these answers need us to pursue. First of all, we need to understand the physical characteristics behind music and color. As an elegant sound, the essence of music is sound wave. Similarly, we can see many different colors, and their essence is light wave. The principle is that different wavelengths of light show different colors. Usually, as a song, we can hear different sounds due to different vibration frequencies. People with normal hearing can hear sounds in the frequency range of 16 Hz–16000 Hz.

310

Y. Hu

Of course, not all sounds can be regarded as music. Music sounds are regular sounds with fixed frequency and amplitude. Music itself contains a variety of relationships. The most well-known ones in music are melody, sound relationship, composing rules of chords, transformation of melody, etc. if we find a corresponding relationship between music and color, then the color corresponding to the emotion of a song will be determined. We have made statistics. As an audience, the time when emotion is most vulnerable to fluctuation is the melody of the whole music. Through this, we can establish the corresponding relationship between emotion and color. In previous studies, pitch and hue, tone and tone, melody and tone are mentioned. These studies mainly focus on the specific elements of music, but in the study, we found that the audience is dominated by the music emotion, at the same time, more is the overall melody and tone. Therefore, we establish different melodies to express different emotions corresponding to different colors [10].

3 Music Feature Extraction Spectrum is the distribution curve of frequency. The vibration variable produced by any object can be decomposed into different amplitudes and different frequencies. By generating different amplitudes for different vibrations, these amplitudes are arranged according to the frequency, which is the spectrum. In the current scientific research, FFT has become a mathematical analysis tool, in our analysis of the most essential feature of music spectrum, because some signals are difficult to see the characteristics in the time domain, but after changing to the frequency domain, we can quickly find the characteristics. In today’s many scientific research work, Fourier transform is an important analysis tool. We can use FFT to extract the spectrum of a signal, which is convenient for our analysis and judgment. In real society, we can see that many things in the world take time as the horizontal axis. As time goes on, such as the rise and fall of stock prices, the change of people’s height, and the driving trajectory of cars are changing. Through the angle of time axis to study the dynamic changes of audio, this is the so-called time domain analysis. If you look at everything in the world from another perspective, you will find that the world is immutable. This perspective is called frequency domain analysis. For the process of music changing with time, if we want to understand its own characteristics, we need to change the time domain into the frequency domain [11]. Music itself is a kind of vibration. Physics tells us that only vibration can produce sound, so music is a kind of vibration that changes with time. This is an analysis in the time domain. In the frequency domain, we find that the key on the piano can be, for example, an eternal note. Different periodic functions can be regarded as sine waves of different amplitudes and phases. The formula is as follows: +∞ f (t)e−jωt dt F(ω) = F f (t) = 



(1)

−∞

In the analysis of different audio signal sequences, the limited long sequence plays an important role. We can use Fourier transform to analyze the limited long sequence

Design of Color Music System Based on Feature Classification

311

and decompose the change many times, which is faster and more efficient than DFT and reduces the data operation process.

4 Overall Design and Process Microcontroller, as a kind of core object, can be embedded into any object and execute the program according to our pre programmed algorithm. It is the result of the development of large-scale integrated circuits. Each microcontroller includes many circuits and components. When completing the control and arithmetic logic, it has the advantages of small size, low power consumption and low price. With the rapid development of intelligence and artificial intelligence, the current microprocessor has reached 64 bits. The development of microprocessor has gone through several decades, from the initial 4-bit processing length to 8-bit, 16 bit, 32-bit, and now 64 bit. Microprocessors have experienced a period of rapid development. Today, what we call microprocessors are more inclined to the microprocessors of embedded devices. In embedded devices, it is widely used because of its high performance, low power consumption and easy transplantation. In the research of this topic, the microprocessor model we used is stc15w4k58s4. Its main function is to read the data from the memory module, then send it to the decoding module, and then output it to the decoding module. At the same time, the corresponding color system is displayed for the music we have marked. The change in the middle is controlled by FFT random sampling points. You can also connect the mobile phone with the device through Bluetooth, play through the device, and display the effect of color [12, 13]. The system consists of main control module, memory module, decoding module and rgb-led light mixing circuit module. In terms of power consumption, performance and price, we use STC series as our main control module to realize the operation, reading, decoding and playing of audio files, and output different PWM waveforms to show different colors. The flow chart of the whole system is shown in Fig. 2.

Fig. 2. Overall design circuit of the system

5 Conclusion In this paper, we propose an implementation scheme for color music based on the combination of music emotion classification and color, but we also accumulate some problems and improvement strategies in the process of experiment.

312

Y. Hu

1. Music is a complex information. Music has tonality, harmony, chord, melody, beat and so on. We can also analyze the emotion of music according to the tonality or chord of music, so as to put forward more novel ideas and research. 2. To strengthen and improve the collection of experimental data, due to the use of machine learning scheme, so the data set is required, which can help us build a classifier with strong generalization ability. 3. For the realization of the hardware environment, we can further select the chip of the module, and design a more simplified and highly reliable circuit.

References 1. Zengfeng, Q.: Music lighting auxiliary design system based on music feature recognition. Chongqing University (2009). https://doi.org/10.7666/d.y16656168 2. Yan, L.: Color psychotherapy. Women of Chin. Overseas Chin. Version 46(9), 57 (2001) 3. Xiaojing, L.: Research on music and optical interconnection system. Acting Technol. 27(5), 1–16 (2015) 4. Yingying, Q.: Overview of machine learning algorithms based on numerical prediction. J. Anyang Inst. Technol. 80(28–29), 35697–35720 (2017) 5. Ling, W.: Brief introduction of machine learning algorithms under the background of big data. Res. Digital Media 6(6), 15–23 (2017) 6. Xiaolong, L.: Introduction to machine learning. Mod. Econ. Inf. 92, 107152 (2017) 7. Wei, L.: Overview of machine learning. Sci. Technol. Vision 84, 115814 (2017) 8. Zeqi, Y., Fengqin, W., Zuhe, L., Yangyu, F.: An improved nonlinear error pre correction method for digital PWM generator. Comput. Appl. Res. 30(7), 2114–2128 (2017) 9. Xiaojing, L.: Research on music and optical interconnection system. Perform. Arts Technol. 91, 116098 (2015) 10. Yichao, F., Hong, Z., Gaoya, L., Zhiqiang, H., Ruiruirui, Z.: Research and implementation of rgb-led mixed light presentation matching in music playback. J. Harbin Univ. Technol. 1621(1), 012042 (2014) 11. Haiyan, W., Jianhui, L., Fenglei, Y.: Overview of support vector machine theory and algorithm research. Comput. Appl. Res. 11(7), 3227 (2014) 12. Ting, F., Da, J.: Research on music visualization. Film Rev. 18(3), 036024 (2013) 13. Fang, L.: The relationship between color tone and color applied harmoniously for products. Hefei University of Technology, Hefei, pp. 2–10 (2009)

Design and Implementation of Statistics and Analysis System for Volleyball Match Linna Hua(B) Yunnan Open University, Kunming 650500, Yunnan, China [email protected]

Abstract. With the increasingly fierce competition in modern sports competition, the position and role of coaches in on-the-spot command are becoming more and more important. There are many factors in the on-the-spot command of coaches, such as the psychological adjustment of athletes, the grasp of competition rhythm, the flexible use of techniques and tactics, etc. The main problems of sports computing research in the field of volleyball competition are: the data collection can not meet the requirements of real-time, at the same time, for the analysis of massive data, it is difficult to select the appropriate data mining algorithm and establish a suitable model for analysis. With the increasing influence of volleyball, it has become a consensus to use computer technology and other high-tech means to improve the training and competition level of athletes. Keywords: Sports computing · Data mining · Analysis of volleyball match

1 Introduction With the development of computer technology, people think of using computer statistics to analyze the on-the-spot technical and tactical data of volleyball matches, which can greatly improve the speed of recording and the efficiency of analysis, but there are also some problems [1]. First of all, as a team sport, volleyball competition needs the participation of 12 players on the field at the same time. The players cooperate with each other, so the rhythm is very fast. As a data acquisition personnel, it is necessary to record a series of information including team number, action, technical details, start area and end area under the situation of fast changing on the field, which requires high efficiency and brings a certain degree of difficulty to the acquisition. In the world’s popular volleyball game data statistical analysis software datavolleyball, a script description language based on process is used to describe the detailed data of the game, which contributes to the design of the collection scheme [2]. However, the data collection mode of the software is single (support keyboard Collection), and the design of script description language is not efficient enough.

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 313–318, 2022. https://doi.org/10.1007/978-3-030-99581-2_45

314

L. Hua

2 Data Mining Theory 2.1 Data Mining Concept Data mining is a new and business oriented AI research, which was put forward in the 1980s when AI research project failed. Database is one of the most active research areas, and data mining has become one of the focuses of many cutting-edge international conferences, such as VLDB, SDM, pkdd. As the name suggests, data mining is to find useful information from large-scale data warehouse. These information are secret, which is the basis of mining the hidden relationship behind the data [3]. Data mining is a more advanced data processing process than the basic operation of database. It is to express knowledge by pattern after data centralized processing. Advanced processing refers to the process is not completed in one step, but divided into many steps, the interaction between the steps, repeated adjustment to draw a conclusion, is a spiral process. 2.2 Algorithm Design of Association Rules Mining Generally, the basic idea of Apriori can be divided into two sub problems. Discovery of frequent itemsets. All frequent itemsets with minimum support are searched according to the minimum support given by users. The frequent itemsets searched may have inclusion relation. Generally, only the frequent large itemsets not included in other frequent itemsets are searched, This kind of frequent large itemsets is the basis of generating association rules. The generation of association rules. Based on the minimum confidence given by users, the association rules whose confidence is greater than or equal to the minimum confidence are found from the maximum frequent item day set [4]. Suppose that the set B of English teaching situation contains the above constraint association rules, then in the constraint Q. The support (E) of project set under E is as follows:    Support_count E F (1) confidence(E → F) = Support_count(E) Where: m and support_ Count (E) denotes the number of data (the total number of items) and the number of occurrences of e-item set in English teaching situation. In the set B of English teaching situations, B% of the management includes both e with Q. constraints and e with Q; F of the constraint.    Support_count E F (2) confidence(E → F) = Support_count(E) Where: support_ Count (EUF) is the number of times that E and f project sets appear together in management. The above association rules mining algorithm is applied to English teaching situation, which can mine all aspects of the user’s education information, manage the relevant information based on the mining association information, and improve the performance of the system in English teaching situation.

Design and Implementation of Statistics and Analysis System

315

Apriori algorithm is one of the most influential algorithms for mining frequent itemsets of Boolean association rules. The name of the algorithm is based on the fact that the algorithm uses prior knowledge of the properties of frequent itemsets, as we will see. Apriori uses an iterative algorithm called layer by layer search. K-itemsets are used to support searching (K + 1) - itemsets. First, we find the set of frequent 1-itemsets, which is used to find the set of frequent 2-itemsets, and so on, until we can not find the frequent k-itemsets. Each search is a scan of the database. In order to improve the efficiency of generating frequent itemsets layer by layer, an important property called Apriori property is used to compress the search space. Apriori property means that all non empty subsets of frequent itemsets must also be complex [5]. This property belongs to a special classification, which is called anti monotone. It means that if a set cannot pass the test, all its supersets cannot pass the same test, so it is anti monotone because it is monotone in the sense of failing the test.

3 Design of Data Acquisition Scheme 3.1 Script Design Idea The basic idea of script description language is: most of the techniques and tactics used by both sides in volleyball matches have the characteristics of certain patterns. These patterns are represented by non ambiguous codes. At the same time, a series of description methods and inference rules are customized, so that users need to input as little code as possible in the process of recording matches, By using the logic reasoning realized by computer to supplement the remaining code and infer the hidden information, users can get as much information as possible. Intelligent reasoning - through the analysis of volleyball skills and tactics, summed up as many patterns and rules as possible, the user through the use of script description language to describe the game data, input as little data as possible, get as much information as possible, effectively shorten the length of a large number of code [6]. Simplified memory - in order to make users with different professional backgrounds, different age groups and different cultural levels be proficient in the use of script description language as soon as possible, Pinyin abbreviations are used to record competitions. Pinyin, as one of the bases of Chinese language knowledge, is more suitable for Chinese memory habits and can meet the needs of users at different levels. Key record: in the process of script description language recording, due to the fast pace of volleyball match and the ever-changing situation, it is unrealistic to require users to record all data in real time and accurately in a short period of time, which must be recorded selectively. The script description language designed in this topic supports users to record the data that they are most interested in and want, Select the key process with the most reference value and analysis value to record.

316

L. Hua

3.2 Example of Script Parser Analysis Process Script: 5 2.7 5.6y 7 b3s analysis steps are as follows: 1) Field splitting, according to double space splitting, is divided into S1 = 5 and S2 = 2.75.6y 7 b3s. The order of analysis fields is from front to back. 2) Analysis field S1 = 5. 3) Searching S1, no pattern code was found. Therefore, S1 is determined as a single script. 4) Call the single script analysis program to judge whether S1 conforms to the single script rules, and then write the result to the database. 5) Start to determine the default value when writing. Since the default value of single information action is serve, the action here is filled in serve. The default value of the region can be judged and filled. As shown in Table 1. Table 1. Code parsing represents intent Number

Region

Action

5

1

f

Type

Effect

6) By analyzing S21, the front segment and the back segment of the mode are split with B as the dividing line, in which the front segment of the mode is empty. After analyzing the mode, mnum = 3 with mode subnumber is used to judge whether 3 is effective relative to mode B. The result is valid. If the mode effect exists, s is the valid field. Here you can determine that the whole script is valid. If there is an invalid field in the non pattern field, the field can be deleted without affecting the overall validity. The script to write to the data table is initially determined as shown in Table 2: Table 2. Code parsing represents intent Number

Region

Action

Type

Effect

Pattern

A biography

Get started

Y

B

Second biography

Adjustment

Y

B

Attack the ball

Spike attack

S

B

4 The Design of Statistics and Analysis System of Volleyball Match on the Spot On the basis of the above analysis, the detailed system design and implementation are started.

Design and Implementation of Statistics and Analysis System

317

4.1 System Design Objectives The goal of the system design is to realize a volleyball match on-the-spot technical and tactical statistical analysis system which integrates the functions of data acquisition, data statistics, data analysis, data management and video management. Through this software, coaches can record and analyze the game data by computer, so as to provide technical support for coaches’ strategy making. Applying data mining algorithm to deeply mine a large number of data, this paper proposes a data mining algorithm which is more suitable for sports computing [7]. The main algorithms to be applied are: applying Markov process principle to data mining, looking for the state transition process which has the greatest impact on the system reliability in the state from serving to scoring. The association rules algorithm is used to find the association information between two or more actions to help coaches make strategic deployment [8]. The application of classification and prediction technology to athletes in the game of different technical movements and technical and tactical combination of classification, while establishing a prediction model, given a player or the whole team in the past game for a specific tactic of technical and tactical information, predict their future face a certain tactic of countermeasures. 4.2 System Architecture Design The system consists of data collector, data processor and user. Data collector: responsible for collecting the technical and tactical data of the game, it includes two methods: mouse click and script input. Mouse click: collect the technical and tactical data of the competition by clicking the mouse button; Script input: through the keyboard to enter the game technical and tactical script to collect the game technical and tactical data. Data processor: responsible for comprehensive statistical analysis of various technical and tactical data collected, including data statistics and technical and tactical analysis [9]. Data statistics: realize the routine statistics of the game technical and tactical data, such as service success rate, attack success rate, etc.; Technical and tactical comprehensive analysis: combined with the opponent’s situation, using data mining technology for comprehensive analysis. User: the inputer can collect the technical and tactical data of the competition and query the results of various statistical analysis. 4.3 System Function Structure Design The function of the system mainly includes four parts: data management, data acquisition, data analysis and processing, system management. In addition, it also involves the application of video positioning technology. Data management is mainly the management of team information and player information, data collection is mainly through the mouse collection and keyboard collection of two collection schemes to collect data, data analysis and processing is through the massive data mining, so as to get some coaches interested in information, including the function of data statistics and analysis [10]. Video management mainly involves some content of video positioning.

318

L. Hua

5 Conclusion This paper puts forward the solution of data collection and analysis, and realizes the statistical analysis system software of volleyball match. The application of a variety of data mining algorithms and techniques suitable for sports data analysis can help coaches find the information hidden in the data, which can not only be identified through experience and observation of the original data, but also have important reference value for the strategic decision-making of the game, so as to achieve the purpose of directing the game through scientific basis. In the volleyball match, if we can make a reasonable prediction of the opponent’s actions and tactics, we can achieve a state of “knowing ourselves and the other” and occupy the favorable situation in the match. Therefore, it is very necessary to analyze the opponent’s tactics in the game and formulate the corresponding counter attack tactics.

References 1. Han, J.: Micheline Kamber, Data Mining Concepts and Technologies, China Machine Press, Beijing (2005) 2. Rud, O.P.: data mining practice, China Machine Press, Beijing (2003) 3. Florida, O.: Data mining and knowledge discovery: theory, tools, and technology. In: Proceedings of SPIE. 11, pp. 259–264 (2000) 4. Agrawal, R., Imielinski, T., Swami, A.: Mining association rules between sets of ltems in large databases. In: Proceeding of Very Large Data Bases, pp. 207–216 (1993) 5. Jianfang, Z.: Application of data in sports news reporting. Chin. Rep. 35(2), 299–316 (2003) 6. Huiqun, Z., Jing, S., Guoren, W., Yuan, G.: Component based software reliability model. Small Microcomput. Syst. 57(4), 1177–1187 (2002) 7. Huiqun, Z., Guoren, W., Yuan, G.: Abstract model of software architecture. J. Comput. Sci. 3(3), 26–34 (2002) 8. Jian, S., et al.: Research and design of on-the-spot statistical system for volleyball matches. J. Shandong Inst. Phys. Educ. 37(2), 37–43 (2006) 9. Hui, Z., Xiaodong, L., Yue, F.: Application of computer video technology in table tennis match analysis. J. Shanghai Inst. Phys. Educ. 10(3), 229–256 (2005) 10. Shenyang, G.: Chinese beach volleyball 2008. Chin. Volleyball 6(4), 993–1002 (2005)

The Teaching Practice of Art Courses in Digital Media Major Haipeng Jiang(B) Qinghai Nationalities University Academy of Fine Arts, Xining 810007, Qinghai, China [email protected]

Abstract. Under the background of digital era, digital media art professionals have become the hot spot of social demand. This paper studies the teaching practice of art courses in digital media major. With the continuous development of science and technology, the social demand for talents in digital media major is also increasing. In order to further strengthen the technical development of digital media industry and adapt to the current market demand, digital media art major needs to keep pace with the times, This paper studies the digital media art major. By analyzing the problems in the teaching of digital media art major and combining with the teaching practice experience in recent years, this paper optimizes and co ordinates the professional courses from the three aspects of course type grouping, course arrangement flow and teaching content project, so as to improve the teaching quality, To achieve the goal of training high-quality application-oriented innovative talents. Keywords: Digital media · Teaching practice · Art Courses

1 Introduction With the rapid development of the current scientific force, China’s requirements for digital media specialty also have a new height. In order to meet the needs of the current society and market, it is an important task to strengthen the digital media professionals. The Ministry of education has clearly established the digital media specialty in relevant documents, and classified it into the cross specialty category under the engineering category, corresponding to the original digital media art specialty, digital media technology specialty, film and television art technology specialty, digital game design specialty, and also stipulated that the specialty can obtain the corresponding engineering degree or art degree [1]. Digital media art major has strong cross operation. Some courses of this major should be adjusted as soon as possible to strengthen the application value of this major, which will also directly affect the talent training of digital media major in Colleges and universities. Digital media technology is also the main skill training content of the current digital media art major. Digital media technology includes digital information processing technology, computer technology, digital communication technology, network technology, etc., and a variety of technologies will be cross trained in the course teaching, forming a unique comprehensive teaching content. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 319–324, 2022. https://doi.org/10.1007/978-3-030-99581-2_46

320

H. Jiang

Virtual reality is a new digital media technology with the birth of computer technology, and the application of this technology can bring convenience to many industries and fields, and also promote the development trend of new digital media technology [2]. And virtual reality has formed a mature industry, so the virtual reality curriculum system should be designed and taught as an important course, and the relevant digital media professional educators should think deeply, master the development trend of this technology, and teach according to the situation.

2 Thoughts on Curriculum Design of Digital Media Art Major To cultivate professional knowledge and skills to adapt to the needs of social, economic and cultural development in the new era, master the basic theoretical knowledge and system of digital media art, and comprehensively use the knowledge and skills to analyze and solve practical problems; Understand the development status of digital media industry and cultural media industry, have strong cultural and artistic literacy and research ability, and have international vision and innovation consciousness; Innovative professionals who can engage in digital media art planning, design, creative research in media communication institutions, professional design institutions and colleges involving new media design, animation design, game design, 3D printing, etc. Based on the actual situation of colleges and universities, adhere to the basic direction of the combination mode of production, study and research, learn from and take a variety of measures to improve the quality of personnel training [3]. After several rounds of professional teaching practice and teaching discussion, it is found that the following three aspects need to be further optimized and adjusted. 1. The overall planning of curriculum arrangement is not strong and the coherence is not enough. The process of digital art production is long and has many links. The curriculum design should be based on the actual production process, which requires high consistency of teaching content. The teaching and practice content of the early course is the basis of the follow-up course. This lack of attention, so that the content of each course before and after cohesion is not close enough, coherence is not strong, integration is not enough [4]. 2. In the unit teaching time, the course content span is large, and the learning difficulty is increased. Compared with the courses of traditional art and design, the courses of digital media art are diversified and comprehensive. There are traditional basic courses of fine arts modeling and composition courses of visual communication design; There are also film and television professional synthesis editing courses, animation courses. Learning several different types of courses in a semester will directly affect students’ learning efficiency and effect. 3. The students are lack of consciousness of works, project design, production ability and experience. Digital media art major requires high comprehensive ability of students [5]. The course assignment and graduation project require the use of audiovisual elements to complete the work in an individual or team way, which has higher requirements for students’ design ability, execution ability and cooperation ability. Because of the limitation of objective conditions, most students have little chance

The Teaching Practice of Art Courses in Digital Media Major

321

to participate in business projects and lack of training projects in the process of professional courses learning, so the course learning only stays in the stage of passively completing the course assignments. This is the bottleneck for local colleges to cultivate high-quality digital media art. The following Fig. 1 shows the implementation process of the course teaching.

Fig. 1. Implementation process of curriculum teaching

3 The Content of the Course Optimization Design of Digital Media art Major The optimization plan of digital media art course aims at cultivating digital art professionals, taking the implementation process of classroom teaching as the core, and briefly summarizes three basic aspects: (1) the curriculum type is grouped (2) The course sequence is flow-based (3) The content of the course is project-based. 1. group of course types The courses offered by digital media art majors are various. In the course of curriculum group, the following factors are considered: (1) the nature of the course, compulsory or optional courses, basic courses or core courses of major (2) The corresponding project types of the course are digital illustration, cartoon, picture book or animation and image (3) The course corresponds to the specific links or stages in the actual project process, whether it is in the early stage, the middle stage or the later stage (4) The difficulty of the course is whether the content of the previous

322

H. Jiang

course is further or the new content is taught; Is it a single skill operation learning or a comprehensive design practice [6]. According to the factors analysis of the above curriculum groups, combined with the training scheme of digital media art specialty and the basic requirements of graduation design, in addition to general courses and centralized practical courses, the professional courses are processed in groups, forming three major curriculum groups (1) Basic courses group of subjects. Teach the basic knowledge of modeling, design, computer design and digital media art theory, improve modeling ability and computer operation ability, and understand the basic theoretical knowledge of this specialty (2) Digital film and television production course group. Teach photography, video, performance, film and television shooting editing, post film synthesis, voice voice collection and editing, and cultivate the ability of image design, editing and production (3) Digital animation course group. Teach the knowledge of the process and operation technology of comic and animation works design and production and peripheral derivative development, and cultivate the ability of digital art works creation and the quality of team cooperation [7]. Curriculum grouping recombines courses according to the types, each course group has its own key teaching content, and emphasizes on the ability training and quality improvement of students, and strengthens the overall planning of the course. 2. process of curriculum arrangement “After determining the courses required to cultivate students’ ability, the “work process” scheme is also introduced in practice training. During the study period, the students have fully understood the animation production process and mastered the knowledge of animation creation and design According to the actual work flow of project design and production, the order of course learning in the same group is established. Taking the digital animation project process as an example, the whole process is divided into three stages [3]: the preliminary planning and design, the medium-term production and the post editing and adjusting output. Each stage also includes several key links. The process of digital animation course module is set as script creation and design - Modeling Design - shot script design - two-dimensional animation design - three-dimensional animation design. This process is balanced by three aspects: the conventional production mode, the type of animation and the difficulty of learning. The whole course module process needs two semester to complete the teaching. The order of other courses group teaching is arranged according to the process of relevant project design and production.

4 Implementation of the Optimization Design Scheme of Digital Media Art Course The implementation of the optimization plan of digital media art course is an important link to train the applied innovative talents to meet the needs of the development of digital industry. In order to better reflect the characteristics of optimization scheme grouping, flow and project, the author makes adjustment and Optimization in four links: teaching team building, curriculum content planning, teaching form integration and teaching effect evaluation.

The Teaching Practice of Art Courses in Digital Media Major

323

1. set up teaching team of course group and give full play to the advantages of team members. The teaching team members of the curriculum group are composed of two parts: professional teachers and external teachers. The external teachers are the first-line design and production personnel with rich experience in relevant local enterprises, and the head of teaching team is the teachers with outstanding professional ability. The head of the teaching team is responsible for the arrangement of the curriculum division of the team members, coordinating the teaching work of the external teachers, and controlling the overall control of the group curriculum teaching. The teaching team should be reasonably set up to integrate the teaching ability, experience and the first-line project work experience of the external teachers, so as to realize the cooperation between the school and enterprise in the teaching practice and ensure the quality of the curriculum teaching. 2. determine the project content of the curriculum group and integrate the school enterprise resources. The projects of the digital media arts major curriculum group are usually from the following aspects; (1) The professional design events and exhibitions of college students include various domestic college students design events, domestic well-known animation festivals and animation exhibitions; (2) The entrustment and cooperation projects of enterprises, institutions and government propaganda departments; (3) The declared innovation and entrepreneurship projects of national, provincial, municipal and school level college students; (4) Students create projects individually and in teams [8]. In the theme of the project, in line with the basic direction of serving society and serving the development of local industry, cultivate students’ sense of social responsibility and humanistic spirit, and highlight the following three aspects of guidance; (1) The theme of traditional culture and Haisi culture of Southern Fujian Province; (2) Red culture propaganda in Fujian Province; (3) Publicity of local public welfare activities. Through the project teaching content, the teaching goal of “learning for practical use” is highlighted. The course teaching process is designed, emphasizing “promoting teaching by competition” and “combining school and enterprise”, and promoting classroom teaching with specific projects [9]. 3. integrate curriculum resources and integrate online and offline Teaching With the advent of 5g era, professional teachers should actively integrate into the new trend of “Internet+” teaching mode. On the one hand, we should strengthen the integration and optimization of curriculum resources. The platform network resources are very rich, and the fragmented content is systematically processed to build a resource system suitable for students to accept [10]. Teachers collect excellent online curriculum resources such as text, image, video and so on closely related to the teaching content at home and abroad before class, and integrate the teaching objectives, core knowledge and skill points of the course.

324

H. Jiang

5 Conclusion The current scientific and technological innovation is very fast, many new technologies need a large number of talents to join, promote the development and innovation of industry and specialty. Digital media art specialty in Colleges and universities is the source of talents for studying digital media. Universities should strengthen the teaching ability of digital media art specialty, and constantly cultivate more talents with higher artistic quality and computer technology. After teaching practice and experience summary, the optimization design scheme of digital media art course is gradually mature and perfect, and certain results are achieved, Gradually achieve the goal of steadily improving the professional teaching quality, meeting the talent needs of local related industries, and training and delivering high-quality digital art creative talents.

References 1. Ling, M.: The development status of digital media art major in domestic universities and its enlightenment to us. High. Educ. High. Vocat. Res. 8, 198–200 (2011) 2. Min, X.: Research and practice of applied talents training mode of animation specialty. Shandong Soc. Sci. 33(12), 331 (2015) 3. Changliang, F.: Introduction to virtual reality technology. Inf. Comput. (Theoret. Ed.) 11, 60–61 (2009) 4. Yijia, X.: Research on Artistic Beauty and Technological Beauty in Virtual Reality System. Shandong University, Jinan (2009) 5. Wenjun, Z., Qiquan, Z.: International trend of teacher education curriculum reform. Educ. Res. Rev. (middle school education and teaching). 14(6), 1059–1065 (2016) 6. Lianghua, M., Min, L.: Research on the model of interdisciplinary higher art education. J. Fine Arts 14(8), 587–596 (2016) 7. Research on Problems and reform and development strategies of art education practice in Colleges and universities [J]. Chen Miao. Art education. 14(5), 177–184 (2016) 8. Chuxi, Q.: Innovative development of art education in the era of big data. J. Aesthetic Educ. 30(1), 119–129 (2016) 9. Tianyang, L., Lei, Z., Pengyong, Y.: On the cultivation of students’ comprehensive quality in professional art teaching in modern colleges and universities. Beauty Times (II). 125(04), 820–830 (2016) 10. Nianhua, G.: Comparative study on public art education and professional art education in colleges and universities. Res. Art Educ. 11(1), 107–113 (2014)

English Translation Skills of Food Packaging Based on Computer Li Ju(B) School of Foreign Studies, Dalian University of Technology, Dalian 116034, Liaoning, China [email protected]

Abstract. Food packaging language style concise, focusing on the expression of product related information. There are many mistakes in food packaging translation, such as dead translation, grammatical errors, nonstandard terminology, replacing English with Chinese, and insufficient cultural care. Newmark proposed communicative translation and semantic translation, and his translation theory is in the forefront of the times in the combination of theory and practice. Nida’s dynamic functional equivalence theory emphasizes content equivalence. This paper discusses the translation skills of food packaging English based on computer, aiming at improving the quality of food packaging English translation. Keywords: Computer · Food packaging · English translation

1 Introduction Product packaging plays an extremely important role in the process of product sales. Products are consumer centered and meet the psychological and practical needs of consumers. Therefore, product packaging to enhance market awareness, in order to arouse the desire of different consumers to buy. With the export of our products and the influx of foreigners, it is urgent to translate the product packaging into English. At present, there are English translations on the packaging of most domestic goods, but there are many errors in the translation of product packaging, which not only affects the image of products and manufacturers, hinders the sales of products, but also becomes a huge obstacle for products to step out of the country and go to the world. On the one hand, the failure of many product packaging translation reflects the uneven level of packaging translators in China. On the other hand, it also shows that packaging translation needs the support of certain translation theories [1]. With the development of science and technology, there are a large number of professional terms. International communication in many fields is inseparable from English translation, and English translation terms are used more and more frequently. Professional terms are not commonly used in daily life, the number of terms is increasing every day, and professional English translators can not fully grasp the interpretation of terms. Therefore, based on computer technology, an efficient search system for English translation terms has gradually emerged, which makes reasonable use of Internet data and is suitable for professional translators and ordinary people [2]. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 325–330, 2022. https://doi.org/10.1007/978-3-030-99581-2_47

326

L. Ju

2 Composition and Language Characteristics of Food Packaging Food packaging belongs to product packaging, and the language used has the common features of general product packaging language. In addition to using certain color and shape to express the characteristics of food and enhance its attraction, the text description of food should also include the corresponding product name, ingredients, nutritional components, specifications, net content, eating method, storage method, shelf life, production date, place of origin, storage method, etc. Matters needing attention and other relevant information are objective, knowledgeable, practical and appealing. Brand naming generally adopts the combination of notes, morphemes and syllables [3]. The creation of artistic conception and atmosphere, abnormal brand naming, the pursuit of brand association meaning and the high attention of cultural diversity are the advantages and Countermeasures of brand communication experts in brand naming and brand image building since globalization [4]. Product description is generally about the use of products and the use of text information, mainly reflects the characteristics of the product and use information. There are many kinds of products, including food functions, ingredients, methods of use, precautions, performance specifications and so on. The purpose of product manual is to make general consumers understand product information and attract consumers’ attention to a certain extent. Therefore, food packaging language text emphasizes professionalism in terms, often using some professional vocabulary, sometimes also using some derivatives, compounds. In Chinese, active sentences are often used, but passive sentences should be used as much as possible when translating into English, which mainly depends on the differences of thinking habits between the East and the West. The way of expression is to be concise and to the point. When translating into English, it makes the consumers resonate and get emotional recognition [5]. At the same time, it often uses some modal verbs to make the tone more euphemistic, so as to make the transmission of food information more warm and harmonious, make it easier for people to accept, and get more satisfactory food marketing effect.

3 Common Translation Errors in Food Packaging 3.1 The Phenomenon of Dead Translation is Serious Due to the translator’s limited translation level or weak sense of responsibility, there are many dead translation and literal translation, especially for the products produced by small factories. Produce the date see the bottom the cover to print. It can be changed to “production date: printed on the tin cover”. The product name of a certain brand “onion pancake” is directly translated into: shallot bloom pancake, “onion” corresponds to “shallot,” “flower” translates into “bloom” and “pancake” translates into “pancake”. This is a typical dead translation “It is acceptable to translate pancake into pancake, but it doesn’t make sense to translate scallion into shallot bloom. People with a little common sense know that “scallion” is chopped scallion, not scallion flowers” It is more appropriate to translate “chopped shallot pancake” into “chopped shallot pancake” [6].

English Translation Skills of Food Packaging Based on Computer

327

3.2 Grammatical Errors The translator’s English level is very low, grammatical errors are difficult to avoid for them. Business cooperated with herdsman, which has set up a large scale of breed has. It’s cultivated the supply of raw material. Product description is about the introduction of product information, which describes the factual state of the product. The use of non finite attributive clauses in translation is obviously improper. It has cooperated with herdsmen and set up a large scale of breed has, which guarantees the supply of raw material. 3.3 The Terms are not Standardized and Unified There is no unified regulation on packaging translation terms in China, which leads to a large number of translated terms. For example, there are many translations of shelf life. For example, the shelf life of a certain brand of ShaQima is translated as date of minimum durability, the shelf life of a certain brand of pistachio is translated as shelflife, and the shelf life of a certain brand is translated as quality guarantee period [4]. 3.4 Replacing English with Chinese A brand of yak meat is made by 100% Kangba style yak jerky, which inherits the ancient law of Tibetan. The translation is: 100% kangbafengchuangchengzangiagufamizhi. Address: dongguanxiacaiyuanzi, Kangding County, Ganzi Prefecture, Sichuan Province. Add: Sichuan Shenggang, Zhou Kangding, Xiang Dong, Guan Xia, Yuan Zi. In fact, this part of the translation is not difficult to deal with, as long as a little look up the dictionary can simply solve. If you look at the translation of the address, it’s even more wrong. The translator obviously does not know that the order of English address writing is different from that of Chinese address writing, and the order is just the opposite [7]. If the product is sold to foreign friends, others will have a fatal misunderstanding of a series of place names of the product. 3.5 Insufficient Cultural Care If a product wants to go out and sell to foreign consumers, we must consider their special circumstances. First of all, we should let foreign consumers understand the packaging words. Second, we should pay attention to the differences between the two languages and cultures. The translation should fully respect the psychological acceptance of consumers. Still take a brand of Taiping Houkui tea as an example. Those who are familiar with Chinese tea culture know that Houkui tea is beautiful in shape and has the reputation of “two knives and one shot”. Every shot has two leaves with one sprout together and is like “two knives press from both sides, with a gun in the center”. Obviously, “two knives and one shot” does not take care of the cultural customs of English speaking countries at all“ “Knives” and “gun” appear in the explanatory text of products, especially tea, which makes people have no desire to drink tea [8].

328

L. Ju

4 Computer Based English Translation Skills 4.1 Computer Intelligent Proofreading of English Translation The development of Internet technology promotes the birth of a large number of English translation software. It is more convenient for people to get English translation results. According to its own algorithm settings, English translation software gives English translation results by searching the whole web of semantic words. The overall architecture of this English translation computer intelligent proofreading system is shown in Fig. 1. The work module, English translation module, English translation proofreading module, search module, user module and behavior log constitute the main part of this system.

Fig. 1. General architecture of intelligent computer proofreading system for English translation

English translation computer intelligent proofreading system is actually a process of English translation. By translating English sentences and replacing the incorrect parts in the original translation results, intelligent proofreading can be realized and the correct English translation results can be obtained as much as possible. According to the characteristics of the sentences to be proofread, the system searches the relevant translation information in the Internet and stores it in the working module. The function of the work module is the basis of intelligent proofreading of English translation. On this basis, the intelligent proofreading of English translation is completed. When the proofreading command is issued, the work module will receive the search link from the translation module [9]. The English translation module will sort the translation results according to the similarity by analyzing the lexical features of the sentences to be proofread, and finally select the most practical translation results. 4.2 Interactive Relationship Handling Skills in Translation In the process of the development of functionalist translation theory, no matter in which stage English translation is confined, it is inseparable from the exchange and interaction between the two cultures. In fact, no matter English or Chinese articles, as long as they are translated, there will be many communicators involved. It is inevitable that there will be corresponding interaction between communicators. This requires that attention should be paid to the treatment of interactive relationship in the process of translation,

English Translation Skills of Food Packaging Based on Computer

329

so as to improve the level and ability of translation. It can also be seen that in order to ensure the quality of translation, it is the translator’s thoughts and feelings that play a key role. By dealing with the interactive relationship of translation through feelings, the translation ability can be improved. 4.3 Translation Skills of Interpretation and Free Translation The translation skills of interpretation and free translation are one of the important English translation skills based on the functional translation theory. In the development of English language translation, cultural background and context are very important. Although some translators don’t know all the words in English articles, they can infer the emotion and meaning of the original text through their own understanding of the culture of the source country, so as to complete the translation work. For interpretation, the most important point is to express the ideas clearly in the original English text without too much requirement for sentence structure; Free translation pays more attention to faithfulness, mainly because there are a certain number of idioms in Mandarin and English. Therefore, only by understanding the similarities and differences between Chinese and Western cultures can we fully translate the meaning of the original text [10]. 4.4 Flexible and Informative Translation Skills Flexible and informative translation skills is one of the key skills of English translation based on functional translation theory. The first is flexible translation skills. Some English words or sentences may not be translated literally. At this time, the translator should have a certain flexibility and be willing to express them through other similar sentences or cultures. The second is informative translation skills. In translation, the understanding of the original text should not only stay on the surface, but also excavate other information contained in the original text, such as the author’s information, and then skillfully convey these information to achieve high-quality and high-level translation.

5 Conclusion Product packaging text translation has an important impact on product sales and corporate image. Newmark’s communicative translation theory and Nida’s functional equivalence theory are of great significance to product packaging text translation. There are many mistakes in the translation of food packaging in China. Only by constantly exploring and improving the computer-based translation skills of food packaging can we improve the quality of Chinese translation of food packaging.

References 1. Junping, L.: General History of Western Translation Theory, p. 152. Wuhan University Press, Wuhan (2009) 2. Wenbo, J.: Functionalism of Applied Translation. China Foreign Translation Press, Beijing, p. 88 (2007)

330

L. Ju

3. Wei Xiaoping’s Perspective on Chinese English translation of Chinese Food Instructions from the Perspective of Functional translation Theory. Jilin University of Finance and Economics, Jilin (2012) 4. Ronghui, H.: Cross Cultural Perspective Transformation and Translation Skills in English Translation. Central University for Nationalities, Beijing (2012) 5. Shizhuo, Y.: On the Construction of English Chinese Translation Writing, p. 75. Shanghai International Studies University, Shanghai (2012) 6. Fang, L.: On the translation skills of allusions in english literary works. Ind. Technol. Forum (21) (2020) 7. Yingji, L.: On the translation strategies of allusions from the perspective of english literary works. Overseas Engl. (01) (2020) 8. Li, Z., Gong, Q.: On English translation skills based on literary allusions. Campus Engl. (22) (2019) 9. Shuyang, G.: On the translation of allusions in english literary works. Young Writer (08) (2018) 10. Yahua, M.: On the translation skills of allusions in english literary works. Drama House (24) (2019)

The Construction Mode of Virtual Experiment System Based on Modern Educational Technology Yanxia Kang(B) Chuxiong Normal University, Chuxiong 675000, China [email protected]

Abstract. Virtual experiment system is the product of the combination of modern educational technology and practical teaching theory. Based on the comprehensive analysis and systematic summary of the construction technology of virtual experimental system on the Internet, this paper divides the file construction mode of virtual experimental teaching system suitable for higher vocational colleges into four types: simulation demonstration type, system simulation type, virtual operation training type and real measurement type, and gives the corresponding document construction scheme, implementation ideas, applicable occasions and application examples. Practice has proved that the construction of online virtual experiment system based on modern educational technology is of great significance to the effective vocational colleges. Keywords: Modern educational technology · Virtual laboratory · Network · Construction mode

1 Introduction The application of modern educational technology in theory teaching is relatively mature, but the application in practice teaching is relatively backward. Higher vocational colleges mainly train technical application-oriented high skilled talents and management talents who work in the production construction management service front line. The practical teaching hours should account for more than half of the total teaching hours, so the practical teaching link is very important, Therefore, the application of modern education technology to establish all-round (in class and after class), multi-level (virtual and real), multi-mode (demonstration and Design) of higher vocational education practice teaching.

2 Establishment of Virtual Experiment Teaching Process Model The virtual experiment teaching process model is a teaching model based on the actual experimental teaching process, students’ cognitive process and practice process, and the original law of experimental teaching. The model is composed of user interface presentation, experimental scenario setting, experimental process simulation and simulation, experimental results summary and evaluation [1]. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 331–335, 2022. https://doi.org/10.1007/978-3-030-99581-2_48

332

Y. Kang

2.1 User Interface Rendering In the virtual experiment system, the experimental items must be displayed through the user interface for the experimenter to browse non-linear, and the experimenter must interact with the virtual experimental system through the user interface. Therefore, it is the most important problem for virtual experiment system to construct a harmonious and friendly man-machine interface which is easy to operate and close to the physical prototype [2]. Through the interface of virtual experiment, the experimenter should not only feel in the situation of solving practical problems, but also realize the sense of achievement in the process of finding experimental problems and seeking solutions to practical problems. The authenticity of the virtual experiment system can enrich the real experience of the experimenter in the virtual situation. Its intelligent performance is to track the students’ experiment in the process of the experiment, and timely put forward the guiding suggestions for the experimental operation. 2.2 Setting up the Experimental Scene The virtual experiment system should collect the existing knowledge level, technical background and experimental requirements of the experimenter, and display the experimental purpose and requirements, experimental principle, background and environmental information and other information according to the specific situation of the experimenter, set up the experimental content, simulate the experimental scene and experimental objects. Through the natural artificial scene technology, the experimenter can have a “immersive feeling”. 2.3 Simulation and Simulation of Experiment Process In the process simulation and simulation stage of virtual experiment, the experimenters observe the experimental phenomena, analyze the experimental results, process the experimental data, experience the experimental process, and according to the feedback information, reorganize the experimental strategy, clarify the experimental problems, and test the hypothesis and experimental scheme of the experimenter, which will help to improve the students’ reaction ability to the experimental process and the sensitivity to causality. This process must solve the problems of consistency of experiment content, cooperation of experiment module, interaction of experiment process and real-time response of experiment. Summary and evaluation of experimental results through virtual experiment, the experimenter can analyze the process of the experiment, summarize their feelings of the experiment, and judge their mastery of the theory and the improvement of their ability to analyze and solve problems [3]. At the same time, the virtual experiment situation is compared with the real experimental environment, and the virtual experiment is connected with the practical application, so that the experimenter can apply the problem-solving methods mastered in the virtual environment to the actual environment.

The Construction Mode of Virtual Experiment System

333

3 Construction of System Simulation Virtual Experiment System System simulation refers to the use of computer powerful data processing ability, through the mathematical model to reproduce the actual system, get the relevant data and experimental results, provide the necessary model reference for the optimization design of the real system. The structure of system simulation virtual experiment system is basically the same as that of simulation demonstration experimental system, but the experimental platform tools and application occasions are quite different. Software platform of system simulation virtual experiment systemThe software of virtual experiment platform is the key to the development of system simulation virtual experiment system [4]. EDA (Electronic Design Automation) software is commonly used in electronic engineering and electronic system. EDA technology is a new type of electronic design technology, which uses computer and EDA software as tools to complete the whole process planning and design, simulation analysis, circuit synthesis and system integration of all kinds of circuits from component level to unit circuit level, system level to physical level. At present, the EDA software for simulation mainly includes Multisim (EWB), MATLAB, PSpice, system - ˇ EW, ut.

4 Construction of Real Measurement Virtual Experiment System 4.1 Key Technologies of System Development Virtual instrument technology virtual instrument is a new type of instrument produced after the introduction of computer technology into the field of instrument, and formed the concept of “software is instrument”. In terms of composition, virtual instrument is usually composed of computer, virtual instrument software and hardware interface module. The hardware interface module includes plug-in data acquisition card (DAQ), data communication interface, GPB interface card, VX control interface card and other interface cards. In terms of application, the virtual instrument uses the powerful graphic processing function of PC computer to set up the virtual instrument panel with friendly interface [5]. The operator controls the operation of the instrument through friendly graphical interface and graphical programming language, and completes the data collection, analysis, judgment, display, storage and data processing of the measured object. At present, LabVIEW, Lab Windows/cvhpvee and so on are the main software for developing virtual instrument.In the simulation, the following is set Per = 0.4, Qer = 0.1, wer = 1, Ver = 1

(1)

4.2 System Development Ideas (1) The experimental object shall be represented by visual three-dimensional object, which shall be the simulation of real object. (2) Through these visual experimental objects, the interaction between students and virtual experimental environment can be realized. (3) The design of experimental objects shall highlight the experimental objectives, the relevant experimental scenes shall be described in detail, and the scenes other

334

Y. Kang

than the experimental objectives shall be mainly described in abstract. In this way, the virtual experimental object and students can set and adjust the operation object by clicking and dragging the mouse, simulate the real experimental process, and observe more intuitive and practical experimental phenomena, so as to achieve the purpose of intuitive, intuitive and fast teaching, as shown in Fig. 1.

Fig. 1. Composition and structure of virtual experiment system on network

4.3 Analysis of Application Situation and Application Status of the System The virtual experimental system of simulation demonstration is suitable for the fields of physics and chemistry, mechanical and mechanical HVAC and environmental engineering, computer hardware system structure and basic software theory. The CA learning system and virtual demonstration system of mechanical mechanism and mechanical parts developed by Songmin, associate professor of mechanical foundation education and Research Office of our university. The typical real measurement virtual experiment system consists of six parts: client, web server, database server, instrument control application server, hardware experiment platform and programmable experimental equipment [6]. The main function of web server is to provide EB access service, user authentication management, open interactive environment and dynamic web page processing. The main function of application server is to control and manage experimental instruments, collect and process experimental data, and extract experimental scene image information. The main functions of database server are user account management, dynamic web page generation and so on Storage and management of experimental data [7]. The virtual experiment system adopts the programmable instrument module produced by HP company with GPB (eee488) interface card and supports standard general command. Through LabVIEW software development platform, the user’s work is to send command string to Hao instrument with different GPB port address, control the corresponding instrument to complete the given function, and then collect the test data through the data acquisition card, Data analysis and processing.

5 Workflow of Virtual System (1) BAIXIAN lists all available experimental items on the homepage of the virtual laboratory, displays the specific contents of the experimental items, and provides the relevant instrument settings. (2) when the user selects a specific experimental project, he first uses the experimental content provided by the system to preview the experiment, and then starts the experiment [8]. Users can set up the experimental instruments according to the specific requirements of the experiment, so that the working state of the experimental instruments can meet the requirements of the users. (3) after receiving the information submitted by the users, the web server of the virtual laboratory uses the client request

The Construction Mode of Virtual Experiment System

335

compiled software running on the server to translate the user’s request into the corresponding instrument control instructions, (4) the LabVIEW application program starts the corresponding instrument equipment, and configures the instrument according to the user’s requirements, and then begins to collect the relevant data of the experimental circuit selected by the user.

6 Conclusion State Councilor Chen Zhili emphasized that the development of modern educational technology and modern distance education is an extremely profound reform in the field of education, which requires not only the construction of infrastructure, but also the construction of software, It is even more necessary to change the concept of education and the mode of personnel training, as well as the work points of the Ministry of education in 2004. Great efforts should be made to research and develop digital laboratory and virtual laboratory system [9]. The establishment of online open laboratory system shows that, Based on Modern Educational Technology (especially computer simulation, network technology, multimedia technology, virtual instrument technology and virtual reality technology), the economic, advanced and practical construction of the virtual experiment system is of special significance for higher vocational colleges, especially for Vocational Colleges with high skilled talents and managerial talents. There are many colleges and universities, complete professional categories, strong school running strength and strong technology application ability [10]. As long as the operation of “school school cooperation”, “school enterprise cooperation”, “school research cooperation” and “combination of production, teaching and research”, it is sure to achieve fruitful application results in the field of virtual laboratory construction, which is now multi win.

References 1. Zhiting, Z., Zhixian, Z.: Modern Educational Technology. East China Normal University Press, Shanghai (2003) 2. Tingcai, W., Deshen, Z.: EDA simulation experiment of electrical and electronic technology. China Machine Press, Beijing (2003) 3. Genlin, J., Haiyuan, C.: Web Programming. Beijing Electronic Industry Press, Beijing (2002) 4. Anan, L.: Liu Junhua virtual instrument graphical programming abew course. Xi’an University of Electronic Science and Technology Press, Xi’an (2000) 5. Zhaoqian, W., Wenyang, W., Hongyan, G.: Process control virtual experiment system based on force control software. Lab. Res. Explor. 21(8), 2216–2227 (2017) 6. Simeng, L., Xue, Y.: Research on adaptive adjustment mechanism of virtual experiment system. J. Jilin Univ. (Inf. Sci. Edition). 93(11), 13319–13331 (2012) 7. Meixian, S.: Research on classification of virtual experiment system. Mod. Educ. Technol. 84(2), 141–152 (2011) 8. Zhiting, Z., Zhixian, Z.: Modern Educational Technology. East China Normal University Press (2003) 9. Junhua, L., et al. (eds.).: Virtual Instrument Graphical Programming Language LabView Course. Xi’an University of Electronic Science and Technology Press, Xi’an (2001) 10. Huaichen, C. (ed.): MATLAB and Its Application Guide in Science and Technology Courses. Xi’an University of Electronic Science and Technology Press, Xi’an (2000)

Module Construction of New Artificial Intelligence System Based on Visual Communication Yingtian Mei(B) Hainan University, Haikou 570228, Hainan, China [email protected]

Abstract. Aiming at the low efficiency of visual communication in traditional artificial intelligence system, a new design of artificial intelligence system based on visual communication is proposed. Firstly, the requirements and structure of the new artificial intelligence system module are analyzed, and the visual creation system based on artificial intelligence technology and human-computer cooperation mode is proposed. Then, the basic structure of the visual design creation system based on the multi domain subset neural network expert system is created, and the working principle and use process of the system are analyzed. Finally, the future discussion and test of the system are implemented based on this system. The experimental results show that the new artificial intelligence system designed in this paper can meet the actual needs and bring people interesting and optimized visual living environment. Keywords: Visual communication · Artificial intelligence · Intelligent system · System creation

1 Introduction In the process of human observation of the world, vision plays an important role. According to the relevant research, 80% of the information obtained by human using the external world is carried out by using visual organs. In recent years, the researchers have focused on the combination of human vision using machines and computers. At present, this aspect has become the latest subject. It can not only be used as tracking, identifying and verifying the target of human eyes, but also realizing robot navigation [1]. In the process of modern industrial automation, many applications such as measurement and inspection are involved. Such applications are continuous mass production, which has higher requirements for appearance quality. Before this kind of intelligent and repetitive work is based on the realization of artificial detection, which improves the labor cost and management cost. Therefore, people begin to integrate the reliability and rapidity of computer into it, and effectively combine abstract ability with human vision, and the concept of machine vision appears. Artificial intelligence system is mainly used in public security, fire control, monitoring and other fields, so its recognition efficiency is particularly important. In the process © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 336–342, 2022. https://doi.org/10.1007/978-3-030-99581-2_49

Module Construction of New Artificial Intelligence System

337

of work, the recognition efficiency of AI system is still relatively low, which limits the further development of artificial intelligence in China. Therefore, a new artificial intelligence system optimization design based on visual communication is proposed. The image is collected and synthesized by the artificial intelligence visual recognition module, then the re synthesized image is transmitted by light sensor, and the image position is accurately obtained by GPS. Through the way of experimental demonstration and analysis, the effectiveness of the new artificial intelligence system based on visual communication optimized in this paper can improve the recognition efficiency in the process of work [2].

2 Visual Communication Design and Artificial Intelligence Design 2.1 General Visual communication, as its name implies, is visual and communication, and it conveys certain information to the public with visual symbols. Visual symbols refer to all visual images with recognition that can be distinguished by human eyes, such as text, painting, icon, interface, etc. Communication is a process of information transmission, which is the process of transmitting information to the receiver of information through symbols, words and pictures. The work of visual designer is to organize and optimize the visual effect and accurately transmit information. Visual communication designers work in a wide range, including logo design, VI design, poster design, layout design, book binding design, packaging design, UI design, multimedia design brand planning and creativity. Artificial intelligence, known as AI by the public. Artificial intelligence is a science that studies and develops and simulates human intelligence by means of technology. Artificial intelligence has been widely used in all walks of life, such as Internet, medical treatment, finance, manufacturing, etc. the most familiar fingerprint unlocking, face recognition, picture verification and intelligent home in our life are mature applications developed by AI [3]. AI will also replace some low-end posts while improving life. AI design is to collect materials by means of technology, judge the adjustment, determine the plate, revise and finalize the draft. Firstly, use big data to collect large amounts of materials, refer to the most popular design plate, then determine some quantitative and variable parts. The design can not be separated from its original, and online operation is generated in batches. The difference between design and art lies in its commercial nature, and visual communication design carries the information, economy and artistry. Compared with designer design, AI design simply lists the existing design forms, arranges pictures by mechanical calculation. Facing the simple and repetitive design requirements, human beings cannot compare with computers. But in the design of new fields and some distinctive cultural attribute design and creative design, artificial intelligence is obviously not able to meet the needs [4]. 2.2 Change of Design Carrier Whether it is alphagd, or the “Luban” design system of Ali group, or the online design operation platform similar to maker stickers, it is challenging the traditional visual design

338

Y. Mei

work. Under the influence of the Internet multimedia era, visual design becomes more intelligent and diversified, and the new technology liberates the plane visual design, and develops a new design form under the restriction of technology. Visual design has experienced several stages, such as commercial art, arts and crafts, printing art design, decoration design, graphic design, etc. in the early stage, it has become a design which takes visual media as the carrier and uses visual symbols to express and convey information. In the Internet era, the carrier of visual communication has changed dramatically. Visual design is not only designed in plane, but also in various carriers. The rapid development of modern commercial society increasingly requires the rapid, timely, low cost, easy to use and widespread communication of design [5]. From the early visual designers’ Great Exhibition on paper to the booming development of Internet economy, the interface interaction design of various intelligent machines, from small apple watch, Google glasses to automobile operating system, new media advertising and even automatic production circle, national journals database of social sciences academic journals have been studied.

3 Analysis of New Artificial Intelligence System The new artificial intelligence system is based on the combination of Internet networks, and integrates the new modern information and communication science and technology, the new professional and new technology in the application field and the new intelligent science and technology. It can make the people, environment and information in the physical space and information space connect each other, and also can effectively provide intelligent resources and capabilities, A new intelligent service interconnection system with on-demand service at any time. The architecture of the new AI system is shown in Fig. 1.

Fig. 1. Architecture diagram of new artificial intelligence system

Module Construction of New Artificial Intelligence System

339

The structure level of the new artificial intelligence system mainly includes: 1) New intelligent resource product layer. It mainly includes the combination of software and hardware resources in the system, as well as professional ability and products. 2) New intelligent perception layer. Through IOT technology, terminal technology and perception technology, all kinds of IOT software, hardware and network are connected with each other, which can effectively realize the interconnection and perception of capabilities, products and resources, and realize the resources, capabilities, packaging and product call of new artificial intelligence system. 3) New intelligent application layer. This layer mainly provides intelligent, interconnected, personalized and flexible application modes for national economy, people’s livelihood and security. 4) Platform support layer of new intelligent system. It is mainly for intelligent service, platform operators and intelligent service users to provide basic components of artificial intelligence system. 5) People and organization. It mainly includes new artificial intelligence system and human and organization in the whole life cycle. This system can effectively realize the perception, analysis, learning, control and decision of all kinds of information in the whole system and life cycle. In addition, it can effectively optimize the funds, data, people and management in the system and the whole life cycle, thus forming intelligent, networked and digital products [6].

4 Design of New Artificial Intelligence System Based on Visual Communication 4.1 Idea of Man Machine Cooperation Mode The visual communication process of the new artificial intelligence system is shown in Fig. 2. In the process of using the intelligent human-computer collaborative visual creation system, after the designers fully grasp the project through the preliminary research, the designers use the human-computer interaction interface of the intelligent visual design creation system to realize the analysis of professional fields and make choices and instructions. This system analyzes the audience through big data, so that after the analysis results are reflected in the human-computer interface, the designers can transfer the clear information to the intelligent human-computer cooperative visual creation system, and realize the high intelligence activity elements after receiving the information [7]. Through the camera to obtain information, into the system creation state, with expert experience and design knowledge to realize the design, and then make the designer realize the design iteration link, that is to realize the overall screening and creative adjustment of the basic visual design scheme, until the final design scheme is completed. This is the process of intelligent human-computer cooperation, which can improve the design efficiency. The whole human-computer cooperation is based on the artificial intelligence technology and the comprehensive ability of designers. For the whole creation process, in addition to human designers can not replace the link, as far as possible through artificial intelligence technology to achieve high quality, efficient design.

340

Y. Mei

Fig. 2. Flow chart of visual communication of new artificial intelligence system

4.2 Lens Design In the visual communication system, the lens is a part that directly contacts the object to be measured, which is equivalent to the lens of people’s eyes. The human light can make the external scene image in the photosensitive surface of the camera. The quality of the lens has a direct impact on the overall performance of the machine vision system. Therefore, the reasonable selection and installation of the optical lens can ensure the clarity of the image and get the visual signal [8]. In the process of optical lens selection, the size of lens imaging surface is required to meet the needs of camera. CCD exists in general lens rules, but not all lenses can realize the matching of CCD cameras with different sizes, otherwise it will lead to tunnel effect. Secondly, according to the user’s requirements, it is required to calculate the focal length of the lens through the distance and reserved space in the actual working process M =

Di Hi = H0 D0

(1)

D0 =

F(1 + M ) M

(2)

F=

D0 · M 1+M

L = Di − F = M · F

(3) (4)

Where: m refers to the magnification; H refers to the image height; H refers to the height of the object; Di is the image distance; D0 is the object distance; L refers to the lens range; F is the focal length of the lens. Field of view, aperture, viewing angle and well depth refer to other physical parameters of the lens, which are connected with each other. The shorter the minimum working distance, the larger the field of vision, the larger the aperture, and the shorter the depth of field [9]. In addition, the matching of lens interface type and camera installation is particularly important. Generally, in the process of lens selection, the image quality is measured, that is, the good degree of aberration correction, mainly including the closer the working distance is, the better, which is affected by the installation environment; The smaller the lens distortion, the better, the smaller the aberration, which plays an important role in the measurement system; The larger the field of vision, the better [10].

Module Construction of New Artificial Intelligence System

341

4.3 Image Acquisition Card In the process of machine vision hardware construction, image mobile card is the main part, which can effectively control the camera to take pictures, and control the digital video information. It belongs to the bridge of image collection and processing. The cost of applying it to machine vision system is relatively high, but it can reduce the hardware cost of the system and improve the performance price ratio. It has a close relationship with the camera, using the camera FireWire interface, does not need the image card. The image card is selected by the system function developed by the user. The camera types supported by the image card include output mode and scanning mode. The image card and the selected camera match each other. In addition, the data flow should be able to meet the requirements of image signal transmission. This paper uses Beijing computer to develop image mobile phone card.

5 Conclusion Each component of the machine vision system is connected with each other. Through the lens, image collection card and system platform matching, a good machine vision application system can be obtained. Through this system, the difficulty and intensity of manual detection can be reduced, the quality and speed of product detection process can be effectively improved, and the system information can be effectively integrated, which can effectively meet the needs of different industrial users’ measurement, detection and control tasks. Acknowledgements. In 2019, Anhui Province Quality Engineering Teaching Research Project “JAVA Program Design” Teaching Application Research Based on the Integration of flipped Classroom and OBE, Project No.: 2019jyxm064; 2019 Anhui Province Quality Engineering Teaching Team “Teacher Teaching Innovation Team”, Project No.: 2019cxtd045.

References 1. Qinaimei, D.: Design of specific scene recognition system based on artificial intelligence vision. Mod. Electron. Technol. 40(10), 28–30 (2017) 2. Shuhong, L.: Artificial intelligence recognition simulation of local contour information of complex background image. Comput. Simul. 35(08), 361–364 (2018) 3. Honglingchao. Research on the design characteristics of visual communication under mobile Internet. Sci. Technol. Commun. 33(04), 217–223 (2013) 4. Yi, R.: On the optimization design of visual communication of urban architectural space. Archit. Eng. Technol. Des. 16, 10–11 (2016) 5. Peng, Z.: Taking vision as a breakthrough to promote the innovative application of artificial intelligence. Robot Indus. 1(04), 456–461 (2019) 6. Gross, A.: Application of artificial intelligence in visual inspection of drugs. Process Indus. 1(02), 40–55 (2020) 7. Yueting, Z., Siliang, T.: Visual knowledge: a preliminary study on intelligent creativity (English). Front. Inf. Technol. Electron. Eng. 38(05), 335–351 (2021)

342

Y. Mei

8. Cheng, C.C., Lili, J., Cheng, H.: Visual language navigation: creating high IQ robots. Sci. Chin. 19(16), 1343 (2020) 9. Leiquan, W., Chunlei, W., Xiaofei, G., Bing, S.: Construction of intelligent vision experiment platform for artificial intelligence course group. Comput. Educ. 32(10), 1019–1026 (2018) 10. Guolong, Q., Xiaoqing, G., Jing, W.: Research on visual interaction empowerment effect of artificial intelligence education application. Open Educ. Res. 5(04), 7–11 (2021)

On the New Mode of University Enterprise Cooperation in Undergraduate Education in the Information Age Kai Wei(B) Jilin Animation Institute, Changchun 130012, Jilin, China [email protected]

Abstract. With the national goal of “learning for all” and “lifelong learning”, as well as the change of life and learning style brought by modern information technology, the demand for knowledge has changed fundamentally, and the pattern of undergraduate education based on academic qualifications has also changed significantly. Undergraduate education not only cultivates people who are employed, but also innovative and highly skilled talents. The best mode of running a school is to let the school and the enterprise cooperate and train talents together. Combined with the analysis of the basic characteristics of continuing education in the information age and the current situation of university enterprise cooperation, this paper analyzes the existing problems, and explores the establishment of a longterm cooperation mechanism between universities and enterprises, so as to explore a development path in line with the actual needs for undergraduates. Keywords: Promotion of information technology · School enterprise cooperation · Undergraduate education

1 Introduction In June 23, 2014, general secretary Xi Jinping made an important instruction on Vocational Education for 417 words. General Secretary Xi pointed out: “we must firmly grasp the direction of service development and occupation promotion, deepen the reform of the system and mechanism, innovate the occupation education models at all levels, adhere to the integration of production and education, and school enterprise cooperation, and adhere to the combination of learning and working. We should guide all sectors of the society, especially industrial enterprises, to actively support vocational education and strive to build a vocational education system with Chinese characteristics”. The construction of vocational education system with Chinese characteristics is inseparable from the innovation of vocational education mode [1]. With the continuous promotion of information technology, knowledge and technology have become the main driving force of enterprise development. People’s demand for knowledge and technology has changed fundamentally. Self improvement, ability reconstruction and lifelong learning have become the basic needs of enterprise employees. With these fundamental © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 343–350, 2022. https://doi.org/10.1007/978-3-030-99581-2_50

344

K. Wei

changes, the pattern of undergraduate education based on academic qualifications has also changed. Undergraduate education pays more and more attention to the universality of education objects, the openness of education field, the lifelong nature of education process, the richness of education content, the diversity of education methods, etc. [2]. To explore the way of school enterprise cooperation in Higher Vocational Education with Chinese characteristics, deepen school enterprise cooperation and improve the teaching quality of vocational education, we must establish a long-term cooperation mechanism of deep integration between schools and enterprises. It is of great significance to improve the level of personnel training in Higher Vocational Colleges and strengthen the ability to serve the economy and society.

2 The Concept of Undergraduate Education and School Enterprise Cooperation 2.1 Undergraduate Education Undergraduate education is the intermediate level of higher education. It belongs to the first stage of the third level of UNESCO International Standard Classification of Education (awarding university first degree or equivalent certificate). It is the main part of higher education, which is composed of three levels of higher education, college education and graduate education. Generally, high school graduates or those with the same educational level are recruited. Implement general education at this level and basic and professional theory, knowledge and skill education in a specific field. The length of schooling is generally four years, and for some majors such as medicine, it is five years or more [3]. According to certain plans and requirements, students study related courses (including experiments, internships, social surveys, etc.) and receive some scientific research training (such as graduation thesis and graduation project). Those who have completed all the courses specified in the teaching plan and passed the examination or assessment and are allowed to graduate will be granted a bachelor’s degree or a bachelor’s degree or a first professional degree [4]. The implementing agencies are universities and specialized colleges. 2.2 School Enterprise Cooperation is a Mode of Cooperative Education Cooperative education is the combination of classroom learning and work learning, students will apply theoretical knowledge to work practice, and then bring the difficulties encountered in the work back to the classroom, by teachers to help them do further analysis and thinking. School enterprise cooperation makes full use of the two kinds of educational resources of school and society, and realizes the training goal of high-quality skilled talents on the basis of all-round and multi-level close cooperation between school and enterprise [5].

On the New Mode of University Enterprise Cooperation

345

3 Analysis on the Characteristics of Undergraduate Education in the Information Age 3.1 Continuing Education is Characterized by Digitization, Networking, Intelligence, Multimedia, Personalization and Virtualization Because of the use of information technology, continuing education has changed, and because of the inherent characteristics of information technology, continuing education presents different characteristics from traditional education. (1) The carrier of knowledge dissemination presents digital characteristics It is a fundamental change in continuing education after the use of information technology to transform the traditional paper, blackboard, video or recording as a means of knowledge dissemination into digital information processed and transmitted by computer, and to digitize the text, symbols, graphics, sound, video and other media. In today’s information age, the acquisition, transmission and processing of knowledge have developed to digital direction. Practice has proved that the digital processing of knowledge information has the characteristics of high fidelity, large storage capacity, fast transmission speed and wide audience (2) The learning environment presents the characteristics of network In the information age, continuing education and science and technology are developing at the same time. The combination of computer technology and communication technology brings human beings into a new network environment. People’s learning is more and more dependent on terminal devices such as computers, mobile phones and laptops. Information technology connects many computer systems with independent processing ability distributed in various places through telecommunication lines and corresponding equipment, The sharing of educational resources is realized [6]. The network communication of digital knowledge and information has become more and more convenient and efficient. E-mail, remote login, exchange forum, remote reply and so on also go deep into people’s life and learning. (3) The course resources present the characteristics of multimedia In the information age, continuing education is characterized by the integration of high-quality curriculum resources and the establishment of digital curriculum resources to meet the needs of learners. Digital course resources are presented in the form of multimedia, which integrates text, graphics, images, sound, animation and simulation. Multimedia course eliminates the uncertainty of information, and participants can choose the course presentation form suitable for their own needs. (4) Education methods and learning plans present personalized characteristics In the information age, continuing education takes personalized learning as the center, which fully embodies 5 W, that is, no matter who, anytime and anywhere can freely communicate with anyone else in the world in any form. Moreover, in the information age, the participants of continuing education can choose their own courses according to their own needs at any time, and arrange their own learning plans.

346

K. Wei

3.2 In the Information Age, Continuing Education is Characterized by Openness, Sharing, Interaction and Cooperation In the past 10 years, China’s modern distance education has made remarkable achievements in school network, resource construction, teaching mode and quality assurance. Continuing education has given full play to the advantages of information technology, trained a large number of talents for China’s economic construction, and played an important role in building a learning organization and promoting the construction of a learning society. With the development of information technology, the teaching content and organization mode of continuing education have achieved innovative development, showing the characteristics of openness, sharing, interaction and cooperation that adapt to the times [7]. (1) Openness and sharing In the information age, the openness and character of continuing education are complementary; Yes. Openness refers to the openness of educational objectives, curriculum resources, teaching modes and management; Sharing refers to the sharing of high-quality courses, advanced models and achievements. Practice has proved that only under the premise of opening can sharing be realized, and only under the mechanism of sharing can opening be further promoted. The experience and achievements of the pilot project of Modern Distance Education in China fully demonstrate the characteristics of continuing education in the information age. (2) Interactivity and collaboration Information technology provides a highly information-based and network-based education service environment for continuing education, which makes continuing education more open to enterprises and the society. It also makes use of various modern distance education technologies, such as TV teaching and network mathematics, to expand the education audience, and effectively solve the contradiction between work and study [8]. Face to face centralized learning discussion gradually reduced, replaced by the use of network interaction function, the use of collaborative learning places under the virtual environment, the establishment of “communication” between teachers and students, the “discussion” between students. This kind of “communication” and “discussion” established by information means are not limited by time and space, nor by the participants. As long as they can solve problems and provide suggestions with reference value, they can be used to communicate with each other. At the same time, they can also establish a database of similar cases for other people’s reference. Interaction and cooperation fully reflect the organizational characteristics of continuing education in the information age.

4 Analysis on the Problems and Causes of School Enterprise Cooperation in Application Oriented Universities Now most application-oriented universities have realized the importance of school enterprise cooperation in the cultivation of application-oriented talents, and have made bold attempts in practice. However, there are still some problems, such as conservative teaching and management, insufficient institutional support, and weak awareness of active service to enterprises [4].

On the New Mode of University Enterprise Cooperation

347

4.1 The Existing Practice Training can not Meet the Training Requirements of Applied Talents Many colleges and universities attach great importance to the practical teaching link of practice and training, and have established experimental practice and training bases with enterprises. However, there are not many enterprises that can accept training students on a large scale. The practice time is short and the arrangement is not reasonable. The arrangement of teaching plan in many colleges and universities is: students of various majors have no less than two internships in enterprises. Some students have arranged a week’s probation in the first semester to help them understand the professional nature of their major by visiting several enterprises. The whole internship adds up to about one semester. The time of practice is short, and the time of practice is not reasonable. Due to the lack of necessary basic knowledge, it is difficult to intuitively understand the production and management process of enterprises. And during the internship, the operation opportunities are less. The school attaches great importance to students’ production practice, hoping that students can obtain practical work experience in production practice, but enterprises are not willing to provide special technical personnel and production equipment for students’ productive operation, so internships are often based on visits [9]. In order to provide students with practical opportunities, the school can only set up engineering center or simulation laboratory, practice lost its original significance.. 4.2 The Combination of Graduation Project and Enterprise Practice is not Close Enough Colleges and universities attach great importance to the graduation design of students. In order to ensure that the topics chosen by students are related to the actual tasks of enterprises, many schools even issue a number of documents to strengthen management. There are strict quality and management procedures to control the topic selection instructor, graduation design site, thesis defense and other aspects, and the whole process of students’ graduation design also has tracking management. Although the schools have made great efforts and achieved certain results, there are still some deficiencies, mainly in two aspects - the students’ graduation design can be applied in enterprises very little. Through the investigation, because enterprises think that the level of graduates is limited and can not meet the actual needs of enterprises, graduation design is often not adopted by enterprises. On the other hand, students’ graduation design can hardly be completed in enterprises. According to the investigation, most of the graduation design of applicationoriented undergraduate college students can only be completed in the school’s training room (Laboratory) on the basis of collecting relevant information because of time. 4.3 The Awareness of Service Enterprises Should be Strengthened Many application-oriented undergraduate colleges still continue the idea of unilateral closed school running of vocational education for many years, and the consciousness of actively going out to serve enterprises is not strong, so it has little influence on enterprises.

348

K. Wei

In addition, the school’s training teaching is not enough, and students’ mobile phone participation in practice is relatively small, which makes the current Application-oriented Undergraduate Colleges and universities cultivate talents and the needs of enterprises have a certain gap, and has a certain restrictive effect on the in-depth cooperation between schools and enterprises.

5 The Key Measures of University Enterprise Cooperation in Undergraduate Education in the Information Age First, to lead by project, to build core competitiveness by team, to strengthen the deep integration of school and enterprise by strategic cooperation. Through striving for projects, such as the introduction of off campus enterprises, the establishment of productive training factory; Run the school into the industrial park and connect with the industrial cluster; Promote “order training” and improve “post practice”; It is necessary to build a school enterprise Cooperation Council, expand the social influence of the school and so on, form a team, integrate the innovation resources of application-oriented undergraduate colleges, establish the strategic cooperation between industry and University, further strengthen the cooperation in technology development, and further narrow the differences between school and enterprise in operation mechanism and culture [10]. Second, actively adapt to the needs of enterprises, win-win cooperation, and promote the close connection between the talent training system of Application-oriented Universities and enterprises. With the guiding ideology of “government leading, school main body, industry guidance and enterprise participation”, all parties concerned in the society make joint efforts to determine talent training objectives, develop curriculum (teaching material) system, build “double qualification” teachers, build training base and vocational education system. In addition, the application-oriented universities should emancipate their minds, improve their understanding, stand in the perspective of creating value for enterprises, tap their potential, strengthen their own service ability, and make talent training the common responsibility of the whole society. Third, the government should provide relevant policy support to the undergraduate colleges and universities. Under the premise of following the law of market economy, it should guide the undergraduate colleges and universities to face the enrollment market and employment market, face the students and enterprises, and cultivate high skilled professionals close to the market demand, so as to enhance the ability of the undergraduate colleges and universities to serve the economic and social development. In addition, the government should establish rules and regulations as soon as possible, which can not only guarantee the cooperation between schools and enterprises, but also clarify the responsibilities, obligations and rights of enterprises to participate in education, so as to guide enterprises to participate in the whole process of vocational education and talent training. The Trinity diagram of school enterprise cooperation in the information age is shown in Fig. 1

On the New Mode of University Enterprise Cooperation

349

Fig. 1. Sketch of trinity talent training mode

6 Conclusion School enterprise cooperation is an important measure to promote the healthy development of undergraduate education. In the information age, there is no fixed mode of school enterprise cooperation, and there is no mature mode that can be used for reference by different regions, different industries and different majors. In this paper, through the exploration and Research on the new mode of information-based school enterprise cooperation to carry out undergraduate education, the establishment of a long-term mechanism of school enterprise cooperation will continue to meet the needs of enterprises for highly skilled talents, promote students to master more technology, have higher skills, make greater contributions to the society and win more respect from the society; At the same time, it will promote the sustainable and long-term development of application-oriented universities.

References 1. Jinsong, N., Weiping, W., Ting, N., Wenbin, W., Yun, H.: School enterprise cooperation: from a community of interests to a new pattern of governance. Vocat. Educ. Forum (12) (2018) 2. Guoxia, W., Xu, Y.: Application of CIPP evaluation model in practical teaching evaluation. China Educ. Technol. Equipment. (02) (2018) 3. Linlin, C., Huiming, S., Xian, Z., Jun, Z., Ling, X., Tianhao, Z.: Research on the practice system of computer professionals in independent colleges based on school enterprise cooperation. Softw. Eng. (07) (2017) 4. Ran, W.: Practical research on the talent training mode of school enterprise cooperation. Educ. Teach. Forum (26) (2017) 5. Chengning, H., Jie, S.: Construction and practice of applied undergraduate software talent training mode under school enterprise cooperation. Sci. Educ. Guide (late) (06) (2017) 6. Yue, F., Jichao, H.: Reform and practice of software development curriculum based on school enterprise cooperation. Fujian Comput. (04) (2017)

350

K. Wei

7. Shiping, Y., Chaoxiang, C., Ping, X., Jianlong, D.: exploration on the curriculum system construction of applied computer software specialty facing ability needs. Teach. Chin. Univ. (04) (2017) 8. Qiao, S., Shaofeng, L.: School enterprise cooperation and applied computer talent training. Electron. Testing (17) (2016) 9. Lingxia, L., Jian, L.: Research on the training mode of school enterprise cooperative applied talents of computer specialty. Financ. Theor. Teach. (03) (2016) 10. Jun, X., Xiaofang, W., Chao, L.: Teaching reform of software testing course for computer specialty in application-oriented universities. Comput. Educ. (06) (2016)

Construction of Risk Warning Model in Financial Market Based on Artificial Intelligence Technology Han Yu(B) Yangtze Normal University, Chongqing 400816, China [email protected]

Abstract. In the present stage of development, only the effective prevention and treatment of major financial systemic risks can effectively promote the healthy development of the financial industry. In the analysis of this paper, the construction of its risk early warning model is mainly based on the current financial market and based on artificial intelligence technology, so as to solve the potential risk problems and promote the healthy development of the financial industry. Keywords: Artificial intelligence · Financial markets · Risk early warning model · Credit efficiency

1 Introduction With the rapid development of the economy, a large number of information technology has been applied in the financial field, such as big data, cloud computing, artificial intelligence and blockchain technology, which have comprehensively promoted financial innovation, so as to launch many financial business modules, products and processes. This way can more comprehensively promote the development of the financial industry. However, in the face of the increasingly complex financial industry, it is also more necessary to use AI technology to realize the construction of the risk early warning model in the financial market.

2 Research on Financial Risk Early Warning 2.1 Financial Risk Early Warning Risk early warning refers to the process of dealing with the warning situation, warning signs, warning sources and their change trend directly related to the risk through a variety of analysis tools, comprehensively reflecting the risk status and giving a warning before its outbreak, so as to deal with it well. The earliest risk early warning appeared in the military field, and then gradually applied to all levels of natural and social sciences. Risk early warning in the economic field originated in France and the United States in the early 20th century. Both countries © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 351–355, 2022. https://doi.org/10.1007/978-3-030-99581-2_51

352

H. Yu

introduced risk early warning into the economic field with index early warning system [1]. Risk early warning in the economic field can be divided into two categories, namely, micro economic early warning and Marco economic early warning. The former usually refers to enterprise early warning and the latter refers to macroeconomic operation early warning. Financial early warning mechanism is an organic system constructed by analyzing the objective economic characteristics of alarm information, warning signs, alarm sources and change trends directly related to financial risks, establishing a scientific index system and selecting appropriate prediction methods [2]. The main functions of financial early warning mechanism are as follows: (1) analyze the risk composition of national, regional or financial system with obvious externalities, and analyze the risk exposure in real time to provide basis for economic decision-making. (2) Provide a priori information for financial supervision, facilitate the adjustment and planning of the supervision system and reduce the supervision cost. (3) Analyze the sensitivity of a country’s financial system to the international financial crisis in order to establish a firewall in advance to avoid financial panic. 2.2 Financial Technology Promoting the Change in Traditional Risk Management In the past development, the credit service field under the traditional model is often faced with more serious problems in information, credit, channels and cost. For example, in the development of traditional banking services, basically the construction of outlets as the foundation, so it will lead to business, will be too dependent on the service object salary flow, credit report, social security proof information data, only for a comprehensive analysis of its data, can find some exposure fit users. In such a traditional operation mode, the risk control ability that can be realized cannot overwrite all the service objects. In the past survey, it was found that China’s risk control means in the traditional form only occupy about 15% of the total number of people, so many credit services are affected by many aspects and cannot carry out service work smoothly and steadily [3]. At the same time, in the construction of the credit risk control model, the cycle of optimization and iteration is also relatively long, so that it cannot meet the social development and reform at the current stage. Therefore, in order to adapt to the next stage of social development, will actively the user experience as an important guidance, and strengthen data analysis, the Internet as an important means of development, actively use the technology of artificial intelligence, expand service wiring, realize the full use of resources, to build a good financial technology service system, let financial organizations in form, have diversified characteristics, improve operation efficiency at the same time, also the cost of operation.

3 Prevention Mechanism of the Model Construction For any financial enterprise, in order to achieve sustainable development under the current mode of economic development, it is necessary to comprehensively improve the use degree of its own technology, so as to promote the integration of heterogeneous data

Construction of Risk Warning Model in Financial Market

353

sources and the construction of holographic portraits, so as to comprehensively improve the level of risk prevention and control under the new situation [4]. Secondly, the use of financial technology, also more comprehensive for the present stage of data construction, provides a more comprehensive solution, to better in the future development, can use the existing data, realize the capture and analysis of various data, achieve good risk model construction, improve the enterprise risk control effect. 3.1 Penetrable Risk Control In the specific operation, the first thing is necessary to collect the user’s behavior data, and then can achieve the penetrating risk management effect. At the present stage, in the development of the financial industry, it is often faced with various problems, such as rat warehouses, internal trading and some criminals to control the market. Therefore, it is necessary to timely grasp all kinds of information and data in the market, and achieve a comprehensive analysis, so as to timely intervene and take targeted measures to avoid these problems having a great impact on the market and control the impact scope of risks. 3.2 Increase in Foul Costs You can use to constantly increase the cost of breach of law, so that after some users violate the promise, you can timely give the corresponding punishment. At present, under such control, it is also necessary to comprehensively improve the prevention and control efforts of discovery. After the use of artificial intelligence technology, we can make good use of good algorithm ability, find some potential problems, and achieve good control and processing [5]. Secondly, such the application of artificial intelligence technology can avoid the influence of human factors, leading to the potential risk problems not to be found in time, and have a greater impact on finance.

4 MS-VAR Model Construction and Analysis To realize the early warning of financial risk is to effectively analyze the possible future economic development based on the past economic data, so as to timely discover some potential crises, and then fully protect the monetary authorities, can carry out some forward-looking economic policies, and fully avoid the occurrence of the economic crisis. 4.1 Model Design The MS-VAR model used in this paper is a reasonable division of financial time series data for good processing. In the process of building the model, once the timely jump appears in the planned value, the model will change. Therefore, we can use maximum likelihood estimation in the process of analysis, and analyze the changes of the current value taking variables. With the improvement of the order and the increase of the number

354

H. Yu

of variables, the operation amount of the model will show a large growth trend.Therefore, it is necessary to optimize the algorithm to effectively effect the early warning [6]. In the evaluation of financial risk, it can be basically divided into three different types: low risk, medium risk and high risk. In the process of low-risk early warning, it is shown that the financial system at the present stage is relatively safe. In the event of a medium risk warning, the moderate risk status is affected. Therefore, monetary policy needs to make certain adjustments, pay attention to the trend of economic development, and make sufficient preparations. And after the early high risk warning, said that such a situation has a high risk of explosive. Early warning of high risk is an important means to effectively control risk hazards at this stage [7]. 4.2 Empical Research

Table 1. List of risk indicators Single month year

Share index (S)

Monthly closing price of the Shanghai composite index

Asset price index

Housing price index (H)

National housing climate index

Industrial added value (IAV)

In this analysis, based on the currency stable value, the degree of bank risk and the asset price fluctuation, we can construct a financial risk early warning method. It is found in the table above that the two show a one-to-one correlation between currency stability and bank risk. Effective rationality of data only after considering correlation, data availability and various crisis warnings [8] which is shown in Table 1. 4.3 Risk Index Construction For economic activities, there will involve many fields, so that in the practical analysis, only the use of a single index of the economic system changes in targeted analysis. Therefore, it is necessary to construct an index system with multiple influencing factors, conduct comprehensive early warning financial risk analysis, to provide sufficient reasonable basis for economic policy。 First, we can pay attention to the judgment of the impact degree of the currency value after the currency crisis. The evaluation theory system based on the monetary crisis can have a direct impact on its exchange rate, and also accordingly on the foreign exchange reserves [9]. Therefore, in the present stage of development, it is important based on historical sequence data, and using the MS-VAR model, to achieve targeted analysis. On the other hand, in the process of development, it is also necessary to achieve a comprehensive stability analysis for the historical data of different variables.

Construction of Risk Warning Model in Financial Market

355

4.4 Data Analysis In the analysis of the constructed early warning model, the risk ability of its finance can be judged from the smooth moving probability diagram of the model. Among them, the samples taken in this article are found to be basically in medium risk and low risk areas, so it indicates that there are no serious risk problems in long-term financial development. For the use of this artificial intelligence technology, can often well help financial institutions, in the process of carrying out some personal loans, to realize the accurate evaluation of customer credit, so the effective guarantee business will not be seriously threatened. Secondly, it can also make traditional financial institutions comprehensively improve their work, and use artificial intelligence to build a customer information model, so as to achieve a comprehensive reputation evaluation, which greatly reduces the investment of risk costs. For example, in the past, the development of Suning Financial, has made use of anti-fraud knowledge map to build a relationship network, to effectively play the monitoring, collection and analysis, build a more reasonable relationship network, for many potential risk problems, targeted evaluation, to avoid serious impact on some fraud problems [10]. Summary: To sum up, in the future development, in order to promote the stable development of the financial field, it is necessary to actively use artificial intelligence to realize the modeling of risk early warning, so as to comprehensively improve the risk early warning ability, control the impact caused by risks to the greatest extent, and protect the economic interests of all parties.

References 1. Gao, X., Zhang, H., Zhang, W.: The impact of the introduction of AI on the efficiency of commercial banks. Sci. Econ. Guide 29(16), 48–50 (2021) 2. Lei, D.: Research on the application of artificial intelligence in banking payment. Natl. Circ. Econ. 03, 150–152 (2021) 3. Tube, Y.: Analysis of the application status and future requirements of artificial intelligence in the financial field. J. Shenzhen Inst. Inf. Technol. 19(01), 57–61 (2021) 4. Garden, S.P.: Advantages, risk and regulation of artificial intelligence in financial market. Finan. Theory Teach. 01, 8–13 (2021) 5. Dong, X.: Research on Financial Risk Early Warning Mechanism. Economic Management Press, Beijing (2004) 6. Xu, H., Xu, C.H.: Review of financial risk early warning model. Econ. Trends 11, 131–134 (2010) 7. Shi, J.: Formation Mechanism and Prevention of Financial Crisis. China Finance Press, Beijing (2001) 8. Liu, L.: Hongxian Financial Risk Theory, History and Reality. China Development Press, Beijing (2000) 9. Liu, Z.: Review of Foreign Methods for Early Warning Financial Crisis. World economy 7, 16–21 (2000) 10. Zhang, Y., Sun, G.: Theoretical analysis and empirical analysis of financial crisis early warning system. Int. Finan. Res. 10, 32–38 (2003)

Application of Virtual Network Technology in Computer Network Security Jianjun Zhang(B) Baotou Light Industry Vocational Technical College, Baotou 014030, China [email protected]

Abstract. With the continuous development and update of computer technology, computer network security has gradually attracted people’s attention, especially the application of virtual network technology, which plays a huge role in computer network security. Virtual network technology in computer network security has always been the central topic of experts’ discussion, so this paper will discuss virtual network technology in computer network security. Through the use of virtual network technology, the security and stability of the network environment can be guaranteed. Moreover, virtual network technology combines users and information, not only makes the transmission data hidden, but also ensures the stability of the Internet in the process of operation. Keywords: Computer network security · Virtual network technology · Application research

1 Introduction The computer has become an irreplaceable important thing in today’s society, its own role has been gradually amplified by the relevant experts, virtual network technology is the core part of virtual network, it is a kind of private network technology based on public network. Through the use of virtual network technology, the security and stability of the network environment can be guaranteed. Moreover, virtual network technology combines users and information, not only makes the transmission data hidden, but also ensures the stability of the Internet in the process of operation [1]. Today’s computer can be applied in many aspects of the content, and not only has prominent auxiliary characteristics in work, but also can effectively improve people’s quality of life in life, so the computer is not only a tool, it has been gradually intelligent, and is expected to move forward in a new direction. But in the process of development, there will always be a lot of troubles and obstacles. The Internet can play the role of the computer to the extreme, and at the same time, it can directly reveal all kinds of disadvantages of the computer. The problem of computer network security is another new challenge brought by Internet to the development of computer [2]. Virtual network technology in computer network security is one of the hot topics of experts’ research.

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 356–361, 2022. https://doi.org/10.1007/978-3-030-99581-2_52

Application of Virtual Network Technology

357

2 Characteristics and Application Status of Virtual Network Technology The reason why virtual network technology can play a huge role in computer network security is inseparable from its various advantages. Virtual network technology improves the security performance of computer network by using different ways. Enterprise financial management, enterprise information access and university library management have benefited a lot. In addition, virtual network technology also has the ability of high efficiency and simplification, which not only reduces the use of funds and the laying of dedicated lines in the traditional mode, but also solves the problem of difficult professional line laying. In addition, the requirements of virtual network technology for equipment are quite low, and it also has good capacity expansion performance, so it can greatly reduce the expenses of schools, enterprises and information carriers, and also make virtual network technology become a strong technical soft power for enterprises to build core competitiveness. Because of these characteristics of virtual network technology, virtual network technology has high application value [3]. Virtual network technology with many ways to use, simplified ability, low equipment requirements and good expansion performance, the application value in computer network security is also quite high. The management can control the whole computer network through the use of virtual network technology, so that the computer network security work and the control of user rights can be effectively realized. In a word, because of the advantages of virtual network technology, its application value is also greatly improved, and the security performance of virtual network technology under the support of current computer network technology is also improving day by day [4]. These characteristics also provide more possibilities and space for the further development of virtual network technology.

3 Influencing Factors of Virtual Network Technology in Computer Network Security In the computer network security, virtual network technology through the combination of enterprise information and broadband technology, makes the security of enterprise information and resources get the maximum guarantee, also makes the virtual network technology play a huge role in the computer network security. The influencing factors are shown in Fig. 1 below.

Fig. 1. Influencing factors of virtual network technology

358

J. Zhang

3.1 Influencing Factors of Unauthorized Access Unauthorized access refers to the illegal and criminal behavior that visitors get personal or enterprise computer access rights by writing programs and changing programs without permission and authorization of users, enter computer internal network programs, view and plagiarize important confidential documents such as data and resources. Its main purpose is to change the program to obtain access rights and access rights and other special permissions, and some illegal visitors will damage the entire system of the user’s computer, resulting in the paralysis of the system, resulting in the loss of huge property. 3.2 Natural Factors of Influencing Factors There are many kinds of natural factors, such as common natural disasters, equipment aging problems after a certain period of service, electromagnetic radiation and other natural factors. This kind of force majeure often causes direct damage and damage to the computer, but there are also some factors that only play an indirect role. The computer itself is a machine object afraid of water and fire, so natural factors are often the content requirements that need to be more careful. 3.3 Influencing Factors of Computer Virus When it comes to computer viruses, we will not feel strange, life we are more exposed. Computer virus mainly destroys and changes the degree of the computer itself, especially destroys the important data and information inside the computer, which makes the computer unable to use and operate normally, as well as the unrecognized non conventional error codes on the instructions. Chi virus once made people panic for a period of time. It can directly destroy all the system files on the disk, and further infect all the logical drives on the disk. This virus starts from the main boot area of the hard disk and gradually infects the garbage virus in the hard disk until all the data in the disk is damaged [5]. Its destructive power is far more than these, it will also damage the BIOS in the motherboard, so that the CMOS parameters return to the factory set state. If the user’s CMOS is flashrom, the motherboard can no longer be used, so this virus is very destructive, we should pay attention to it. There are not only Chi virus, but also Yai virus, Christmas virus, funlove virus and so on. 3.4 Influencing Factors of Trojan and Backdoor Trojan horse program and backdoor is a kind of hacking technology, which is the earliest computer hacking technology. At that time, hackers often used backdoor technology to illegally infringe on the computer for many times. Its main destruction program was to control the system administrator first, let him remove the blocking authority, and make himself invisible, which could not be easily found by the system administrator, reducing the time for the illegal intruder to steal information. Later in the development, people also called this trojan horse Trojan horse. This kind of remote control technology is one of the backdoor technologies. Hackers can use this technology to control computer programs remotely, and it has some illegal authorization and concealment [6]. Trojan horse generally includes basic control programs and server programs.

Application of Virtual Network Technology

359

4 Application of Virtual Network Technology in Computer Network Security 4.1 Application of Virtual Network Technology Between Enterprise Cooperative Customers and Enterprises In enterprise cooperation, enterprise customers and enterprises share a lot of data. However, for the sake of data security, enterprises will not rest assured that their cooperative customers can access all the data inside the enterprise. In order to solve this contradiction, enterprises can use virtual network technology to store the data to be shared with enterprise customers in the data sharing folder, and use information firewall to partition the data that is inconvenient to leak inside the enterprise. In this way [7], the cooperative customers can access the data shared with the enterprise after logging in the virtual network client, and protect the internal data of the enterprise from loss. 4.2 Application of Virtual Network Technology Between Remote Branch Departments and Enterprise Departments In order to maximize the sharing of enterprise information resources in the network, enterprises use virtual network technology in computer network security to connect local branch enterprises in the LAN. Because of this, the application scope of virtual network technology between remote branch departments and enterprise departments is also defined as enterprise virtual LAN, This kind of LAN use is related to cross regional and transnational business model. In virtual network technology, hardware based virtual network technology is more common. It not only has high speed encryption, but also the encrypted key is not easy to damage, so its efficiency is relatively high [8]. 4.3 Application of Virtual Network Technology Between Remote Employees and Enterprise Network Virtual network technology regards the enterprise headquarters as the central connection point of virtual private network, and sets a firewall with network virtual function inside the enterprise, which is regarded as the gateway of the enterprise’s computer network. In this way, if the mobile business outlets and office users want to enter the firewall equipment, they must log in through the virtual network client. In this way, the security of computer network is greatly improved. In this way, the information and resource sharing between remote employees and other enterprises can be realized by letting purchasing personnel and enterprise sales personnel pass in information in the enterprise system together. Therefore, this application of virtual network technology is also known as remote access virtual network technology. It not only has high security, but also has the advantage of low cost. 4.4 Application of Virtual Network Technology in Computer Network Information With the rapid development of China’s economy and enterprises, the current traditional computer security management mode has been unable to meet the development needs of

360

J. Zhang

enterprises. Therefore, in the management of computer network security, it is necessary to simplify and refine the information management of enterprises, organically connect the information management systems of various departments of enterprises, break the space limitation of traditional enterprise information system, and realize the goal of enterprise pipeline information synchronization [9]. Through the application of virtual network technology, the information access is wider, breaking the constraints of traditional space, and enterprise information management can be more effective. Do it safely.

5 Application Effect and Development Prospect of Virtual Network Technology With the continuous development of broadband technology and enterprise information technology, virtual network technology with its own advantages also has a considerable space for development. With the continuous development and maturity of virtual network technology, the security, stability and reliability of virtual network technology have been improved [10]. In computer network security, virtual network technology has been indispensable, and with the downturn of China’s telecommunications industry, virtual network technology has become the highlight of emerging industries. Nowadays, the market share of virtual network technology in the market is rising. The products of virtual network technology are constantly gathering. Among all kinds of products of virtual network technology, the software virtual network products effectively combined with firewall and composite virtual network devices have gradually become the hot spots in computer network. Therefore, in quite a long time, virtual network technology will be widely used in computer network security, and will become a new hotspot in computer network security.

6 Conclusion The popularization of computer application is well known. It can not only bring convenience to people’s life and work, but also create favorable conditions for the development of the Internet. The sharing development mode of information resources has gradually moved towards the conventional development process. However, the network security problems have emerged. Illegal access, computer virus invasion and the “rampant” of some network hackers have become the core hot topics of today’s network security problems. At the same time, it also brings new challenges to experts in this field. Often this part of the problem is difficult to root out, has caused great trouble to customers, and the virtual network technology in computer network security is the important measure to solve these problems. In the computer internet security, it can effectively improve the efficiency of resource sharing among various users, reduce the waste of cost, and improve the computer network security. Therefore, only by fully studying the virtual network technology in computer network security can we really speed up the future development process of computer network security.

Application of Virtual Network Technology

361

References 1. Li, C.: Application of virtual network technology in computer network security. Inf. Comput. (Theor. Edn.) 12, 114–115 (2015) 2. Ma, L., Liang, H.: Research on the application of firewall technology in computer network security. Comput. Knowl. Technol. 16, 3743–3745 (2014) 3. Zhang, Y.: Research on the application of virtual private network technology in computer network information system. Inf. Comput. (Theor. Edn.) 9, 152–153 (2014) 4. Mo, X.: Research on Application of intrusion detection technology in computer network security. Comput. CD Softw. Appl. (18), 68–69 (2012) 5. Xia, W.: Exploring the application of computer network security technology in network security maintenance. Digit. Technol. Appl. (07) (2021) 6. Zhang, Y.: Thoughts on the application of computer network security technology in network security maintenance. Digit. Med. Res. (01) (2020) 7. Zhou, N.: Thoughts on the application of computer network security technology in network security maintenance. Inf. Comput. (Theor. Edn.) (02) (2020) 8. Xiong, L.: Application of computer network security technology in network security maintenance. Netw. Secur. Technol. Appl. (04) (2020) 9. Li, X.: Exploring the application of computer network security technology in network security maintenance. Electron. World (08) (2020) 10. Jin, S.: Interpretation of the application of computer network security technology in network security maintenance. Sci. Technol. Innov. Guide (08) (2020)

Music Teaching Practice of Preschool Major in Normal Universities Based on Mixed Teaching Mode Yuan Zhang(B) Nanning Normal University, Guangxi 530022, China [email protected]

Abstract. In recent years, with the vigorous development of China’s education, early childhood music education has become a hot issue of early childhood education, which puts forward better requirements for the preschool education major of normal universities. The preschool education major of normal universities also presents a variety of development trends. However, there are many problems in the music teaching of the preschool education major of normal universities, The music quality of graduates is far from the requirements of employers. Therefore, based on the mixed teaching mode, this paper studies the pre-school professional music teaching in normal universities, in order to achieve the goal of cultivating comprehensive and applied music teachers in preschool education. Keywords: Mixed teaching mode · Pre school major · Course teaching

1 Introduction With the vigorous development of China’s education, people pay more and more attention to quality education. The key to the improvement of the quality of the new generation of talents lies in education and the improvement of the quality of their trainers and teachers. Preschool teachers shoulder a special mission. Their quality and ability are related to the development of a person’s preschool period and even his whole life. The reform and development of preschool education has become the top priority [1]. How to cultivate high-quality new preschool teachers to adapt to the development of basic education in the new century has become a problem that our preschool education professionals should seriously consider and constantly innovate. It can be said that innovation is the main driving force and characteristic of today’s social development. Today’s world is an era that needs innovation. Innovation needs talents, and innovative talents need the cultivation of innovative education. A fundamental factor in the implementation of innovative education is the setting of innovative curriculum [2]. As we all know, in the background of basic education reform, curriculum is the carrier of education and the embodiment of its training objectives. Curriculum will directly affect and determine the quality level of students.

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 362–369, 2022. https://doi.org/10.1007/978-3-030-99581-2_53

Music Teaching Practice of Preschool Major in Normal Universities

363

2 The Status and Teaching Status of Music Course in Preschool Education 2.1 The Status of Music Curriculum in Preschool Education Music is an important part of human social life and an indispensable element in children’s life, learning and growth. At present, our country is vigorously advocating qualityoriented education. Comrade Jiang Zemin once said that “quality-oriented education starts with children”, because whether children can receive high-quality education in early childhood will determine their life-long development, and the cultivation of highquality talents is inseparable from art education with rich humanistic connotation. Music education plays an important role in shaping children’s good psychological quality, improving children’s psychological development level, improving children’s psychological development level, and improving children’s quality So that children have a stable and positive mood, cultivate a strong will and good character has a unique significance [3]. I remember someone said that “music condenses human wisdom”, and Hugo succinctly said that “there are three keys to open the treasure house of human wisdom, one is mathematics, one is literature, and the other is notes”, which shows that music plays an extremely important role in children’s growth. The content of music education in kindergartens is expressed through singing, rhythm activities, music games, song appreciation, percussion activities and other forms, which requires students to fully master the solid music foundation and music skills in order to be competent for the music teaching in kindergartens. This shows that music curriculum is in an extremely important position in preschool education [4]. 2.2 The Current Situation of Music Teaching in Preschool Education (1) Music curriculum construction lags behind and lacks pertinence. Preschool education major mainly cultivates teaching and research-oriented practical talents, children’s toy design and development talents and other children’s educators, and provides qualified students for graduate education. However, in the actual teaching, many colleges and universities have biased understanding, one-sided emphasis on the theoretical link, and wrongly put the focus on the cultivation of scientific research talents. The cultivation of music skills has not attracted enough attention. Even if attention is paid, it only stays in the oral attention, and no positive and effective measures are taken, resulting in students finishing three or even four years of preschool education, You can only write, not do [5]. At present, there is no music textbook for undergraduate or junior college students in China. (2) There is a serious shortage of teaching hours. At present, the number of pre-school education classes in normal universities is generally 40–50, which is only the total amount of two classes per week. Facing many students, it is very difficult for a teacher to complete the teaching task in two classes. In music teaching, there are two classes a week, including basic theory, vocal practice, solfeggio, children’s song writing, singing and so on. In the limited class hours, students can not even guarantee the basic technology consolidation time, and the time to accept new knowledge is particularly hasty. In piano teaching, this contradiction is more acute.

364

Y. Zhang

In the limited class hours, teachers face many students to teach and correct the technology, analyze and guide the music performance, improvise accompaniment, and one-to-one elaborate carving. The difficulty of teaching can be imagined. (3) Students’ practical ability is poor. The students of preschool education major, like other ordinary college entrance examination students, are recruited by the school through the national culture college entrance examination, and the music practice activities they once participated in are no different from ordinary students. After entering the school, even after a certain degree of music ability training, many students are still shy to perform on stage, often because of tension, lack of experience and can not perform music works well, lack of teaching practice ability, and the logic of speaking class is chaotic [6]. (4) The teaching staff is irregular. Due to the continuous expansion of enrollment in Colleges and universities and the shortage of music teachers, schools often appoint teachers according to the courses offered, which seriously ignores the professionalism of teachers. Many teachers have become “all-round teachers” who can teach basic theory, solfeggio, vocal music, piano, children’s song writing, impromptu accompaniment, conducting and music appreciation courses at the same time. In addition, there are many music teachers, many of them are in charge of classes, and they take on several different courses at the same time. Even some teachers whose educational background and level do not meet the requirements of normal universities also take up the teaching of preschool education. These aspects have seriously affected the cultivation and improvement of students’ music quality. Curriculum arrangement is divorced from the actual level of teachers and students, resulting in more students flinch from music related courses, unable to successfully complete their studies.

3 A Summary of Hybrid Learning The development of society and information technology has changed the way we communicate and learn, which inevitably changes the way we think. The form of communication and the management of information challenge our cognitive ability and the teaching paradigm of traditional classroom. The development of Internet promotes the popularity of distance education, and brings new learning form online learning. People define online learning as the process of learners using the Internet to obtain learning materials and complete the learning process through interaction with teachers and other learners [7]. One of the most important problems faced by online learning is whether students can get better learning effect than traditional classroom teaching. The increase of students and the diversification of population structure, as well as the development of lifelong education and information technology, have brought opportunities for the emergence of new teaching models. The president of Pennsylvania State University in the United States thinks that hybrid learning is “the only recognized development trend in higher education today”. Hybrid learning combines the advantages of traditional teaching and network teaching, which can effectively make up for their shortcomings, and thus has been favored by the society and the education community. Hybrid learning (BL)

Music Teaching Practice of Preschool Major in Normal Universities

365

is a combination of traditional face-to-face teaching and modern information technology, and is being applied to teaching more and more. Some scholars predict that hybrid learning will become a “regular mode” in curriculum teaching [8]. The elements of hybrid learning can be represented by hexagon formed by two triangles. As shown in Fig. 1, the status of these six elements in hybrid learning is equally important. The six elements are divided into two systems, which support and integrate each other, reflecting the characteristics of hybrid learning.

Fig. 1. Six elements of Blended Learning

In the information-based learning environment, great changes have taken place in people’s learning style. Information learning is different from traditional learning methods. Learners’ learning not only depends on Teachers’ teaching and textbook learning, but also uses information platform and information resources to carry out negotiation and cooperative learning between teachers and students. Through the collection and utilization of resources, they can explore knowledge, discover knowledge, create knowledge and display knowledge [9]. After the implementation of blended learning, the main elements of blended learning, including teachers, students and learning materials, have also changed, as shown in Fig. 2. The construction of blended learning mode is an effective teaching mode in terms of teaching form, which breaks through the traditional single classroom teaching mode and improves teaching means; in terms of teaching content, it expands students’ horizons, expands students’ learning scope and enriches students’ learning content; in terms of teaching content, it expands students’ learning scope and enriches students’ learning content; In terms of learning style, it breaks the boundaries of time and space, changes the cognitive style, and makes the “student-centered” white master learning a reality.

366

Y. Zhang

Fig. 2. The change of basic elements in Blended Learning

4 Research on Music Teaching Practice of Preschool Major in Normal Universities Based on Mixed Teaching Mode The author has recognized the new situation and task of music education in Preschool Major. According to the actual situation of students, we think the reform of music teaching in preschool specialty is imperative. The teaching mode based on hybrid learning will provide a new way of thinking for the deepening reform of music course of Preschool Major. 4.1 The Mixture of the Leading Role of Teachers and the Main Position of Students In the teaching mode, the combination of the teacher’s leading role and the student’s main position is from the perspective of teachers and students. It emphasizes the leading role of teachers in classroom teaching and the main position of middle school students in the learning process. It is a teaching mode of “leading - combining the main body”. In the beginning of teaching process, teachers should be relied on to stimulate students’ interest in learning and help students form learning motivation. In the teaching process, teachers should also rely on teachers to combine the new knowledge, new concepts and the original cognitive structure of students about the knowledge they are learning to form meaningful learning. Therefore, the teacher’s leading role should be emphasized in these stages. Students are the main body of information processing and the active constructors of knowledge meaning. Only by giving full play to their initiative and enthusiasm can students get effective cognition. This initiative participation creates good conditions for students’ initiative and enthusiasm, so that students can truly reflect the cognitive main role [10]. In the music course of Preschool Major, we should change the traditional teaching mode which takes the teacher as the center as the leading role of teachers and the main position of students, so as to realize the optimization of teaching effect.

Music Teaching Practice of Preschool Major in Normal Universities

367

4.2 The Mixture of Classroom Teaching and Network Learning The pre-school music curriculum is practical and the teaching content involves a wide range of students. The differences of the students’ knowledge of music in preschool are obvious. We should not only meet classroom teaching, but should use information technology to create a new teaching environment, such as the application of network to the practical courses to provide a good platform, therefore, we should build a website of pre-school professional music courses, provide all teaching resources of the course, including the material library, experimental guidance, and so on Teaching cases and extended knowledge. In the limited classroom teaching, teachers systematically explain the theoretical content, and use typical cases to emphasize the key and difficult knowledge. Under the arrangement and guidance of teachers, students can learn by themselves or cooperate through the network courses, and Practice on the computer, strengthen their understanding and mastery of the course content, and expand some knowledge according to their own abilities. In the mixed teaching of classroom teaching and online learning, the proportion of classroom teaching and online learning, and when and how to mix, are dominated by teachers. According to the characteristics of music courses in preschool, teachers should use the method of intensive speaking and practicing in mixed teaching, and use a part of time system to explain, case demonstration and then let students practice synchronously. In the course of class or after class, students will be assigned the task of autonomous learning. During the process of autonomous learning, teachers will guide and assist students to complete the learning plan. The music course of Preschool Major combines classroom teaching and network learning organically, complements and promotes each other. It can comprehensively cultivate students’ ability of getting on the machine, analyzing problems and solving problems, autonomous learning and cooperative learning, and meeting the learning needs of different majors and different levels of students. 4.3 The Mixture of Autonomous Learning and Cooperative Learning Students’ autonomous learning can be carried out before or after class through teaching materials, notes and other teaching resources, or through the network independent retrieval of relevant resources or according to the guidance of the network curriculum. Cooperative learning mainly refers to the traditional teaching environment of group discussion, communication and online theme exchange based on the network environment. The quality of students’ autonomous learning and cooperative learning will directly affect their learning effect. How to guide students to integrate various learning methods, give full play to the enthusiasm of students’ learning, enhance the students’ participation consciousness and cultivate the spirit of teamwork are also important issues for mixed teaching.

368

Y. Zhang

4.4 Mixing Process Assessment and Summary Evaluation The emphasis of music course assessment of Preschool Major lies in the cultivation of computer knowledge and ability. Therefore, the form of assessment should be diversified. It can not only examine the basic theory, but also test the operation skills. At the same time, a comprehensive design course design is arranged after each pre-school professional music course, and included in the total score of the semester. These measures train and train the students’ practical operation ability and improve their comprehensive application ability. The summative evaluation of semester should include process assessment, curriculum design and final examination. Meanwhile, competition should be carried out to promote students’ learning, so as to evaluate students’ comprehensive ability and improve the assessment mechanism. For example, the annual computer skills competition, including pre-school professional music knowledge, office automation application, database application system design, program design and other skills competition, is held to show students’ quality and promote the improvement of students’ comprehensive application ability.

5 Conclusion In short, the music curriculum of preschool education major should conform to the principle of professional characteristics, improve the proportion of music curriculum in the talent training program, based on the mixed teaching mode, scientifically construct the subject system, optimize the source of students, pay attention to the teaching effect of teaching practice, and improve the quality of teachers, so as to steadily improve the music quality of students, Only in this way can the preschool education major in normal universities develop faster and better to meet the objective needs of the society for new preschool teachers in the new era. We have reason to believe that in the eyes of children, a teacher who is good at singing and dancing is far more popular than a teacher with mediocre music skills. Acknowledgements. Guangxi Higher Education Undergraduate Teaching Reform Key Subject “Practice and Research on Teaching Reform of Music Course in Pre-school under Mixed Teaching Mode” JGZ132 2020.

References 1. Yawen’s, J.: New Music Curriculum and Demonstration Teaching Case. Northeast Normal University Press, Changchun (2003) 2. Liu, Y., Wu, M.: Analysis of the current situation of music education in preschool education major of Normal University 3. Lu, Z.J.: Application and practice of hybrid teaching mode in teaching reform of higher vocational education. Mod. Vocat. Educ. 11 (2018) 4. Wang, X.: Experience Music Education for Preschool Children. Anhui literature and Art Publishing House, Hui Fei (2009)

Music Teaching Practice of Preschool Major in Normal Universities

369

5. Du, Y.: Research on teaching practice ability of students majoring in music education. Art Rev. 07 (2017) 6. Zong, D., Li, W.: Cultivation of teaching practice ability of students majoring in music education in normal universities. Voice Yellow River 03 (2013) 7. Liu, Y., Xi, W., Huang, X.: Research on “double tutor” guidance based on the cultivation of normal students’ teaching practice ability. Educ. Teach. Forum 01 (2019) 8. Zhang, W.: Research on the cultivation of normal students’ teaching practice ability – Taking X University as an example. J. Northwest Inst. Adult Educ. 02 (2019) 9. Yin, B., Wu, J.: Ways to improve the teaching practice ability of students majoring in politics and education under the core quality. J. Hubei Univ. Econ. (Human. Soc. Sci. Ed.) 09 (2018) 10. Tian, L., Shi, L.: Research on strategies to improve normal students’ teaching practice ability. J. Harbin Univ. 06 (2015)

Optimal Trajectory of Manipulator Torque Based on Two Population Cuckoo Algorithm Duoxing Zhao(B) Liaoning Vocational College, Liaoning 112099, China [email protected]

Abstract. Aiming at the energy consumption of joint torque of manipulator, a dual population cuckoo (DCS) algorithm is proposed to optimize the energy consumption of joint torque. Firstly, the trajectory of the manipulator joint space is planned by using the quintic polynomial interpolation method; Secondly, the sum of the joint torques of the manipulator is taken as the objective function in the optimization process of the DCS algorithm. Under the constraints of angle, angular velocity and angular acceleration, the DCS algorithm is combined with the quintic polynomial interpolation method to plan a joint torque and the optimal trajectory. Keywords: Robot arm · The torque is optimal · Two population cuckoo algorithm · Trajectory planning

1 Introduction Trajectory planning is mainly considered from time optimization and moment optimization, among which time optimization has made a lot of achievements. The research of torque optimization is of great significance in prolonging the service life of the machine and saving energy. The torque of the robot joint is closely related to the energy consumption of the robot. To minimize the energy consumption of the robot is to minimize the sum of the torque of each joint. Torque optimal trajectory planning is to plan the trajectory of robot with the goal of optimal torque of each joint under various constraints such as angle, angular velocity and angular acceleration. Riazi s et al. [1]. Proposed a variety of optimization methods composed of different cost functions to minimize energy consumption; Kim et al. Used genetic algorithm to find the optimal energy trajectory; Lou Junqiang and others proposed the combination of genetic algorithm and polynomial interpolation method to suppress the vibration of flexible manipulator, so as to obtain the optimal vibration suppression trajectory with minimum vibration energy. Gao Xin and others combined the joint torque and particle swarm optimization algorithm to optimize the joint torque of the manipulator. Compared with the traditional path planning and joint torque two norm optimization method, the maximum joint torque can be reduced by a certain proportion [2]. The experimental results verify the feasibility of the particle swarm optimization algorithm. Because particle swarm optimization is easy to produce premature convergence, it is easy to fall into local optimum in torque optimization. Cuckoo search (CS) is a natural heuristic algorithm developed by Yang © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 370–375, 2022. https://doi.org/10.1007/978-3-030-99581-2_54

Optimal Trajectory of Manipulator Torque

371

of Cambridge University and DEB of Raman Engineering University in 2009 [3]. Its main advantages are less parameters, simple operation, random search path optimization and strong optimization ability. Its overall performance is superior to particle swarm optimization (PSO) and genetic algorithm (GA) Smart home and other fields have also been widely used. Cuckoo algorithm has a strong global search ability, but it lacks in convergence speed and local search ability. In this paper, an improved cuckoo algorithm, double population cuckoo algorithm, is used to improve the convergence speed and local search ability, and the algorithm is used to optimize the joint torque of the manipulator [4].

2 Traditional Cuckoo Algorithm and Improved Algorithm 2.1 Traditional Cuckoo Algorithm Cuckoo search algorithm is a natural heuristic algorithm combining cuckoo brooding behavior with Levy flight. Cuckoos are typical nest parasitic birds, that is, they lay their eggs in the nests of other birds, and let the owners of the nests hatch and raise cuckoos. In order to reduce the probability of their eggs being found by the nest owner, cuckoos will lay their eggs in similar nests, but they may still be found by the nest owner [5]. When the nest owner finds cuckoo eggs in his nest, he will destroy or discard the cuckoo eggs, and then rebuild the nest. Levy flight is a kind of walking mode in which short distance walking with small step size alternates with occasionally large step size walking, rather than simple random walk [6]. The iterative equation of Levy’s flight strategy is as follows: Xit+1 = xit + (α ⊕ L(β)), i = 1, 2, 3, ...n

(1)

Where Xit+1 represents the updated feasible solution; Xit represents the feasible solution of the previous generation; α represents the step control quantity; L( β) Represents the step size random search path. L(β) = 0.01

δ·μ 1

|v| β

(2)

Where, μ, v is a random real number with normal distribution; X represents the best nest location at present. 2.2 Two Population Cuckoo Algorithm Cuckoo algorithm has good global performance, but the algorithm is deficient in convergence speed and local search ability [7]. In this paper, the traditional CS algorithm is improved by using the two population cuckoo algorithm. The convergence speed and local search ability are improved by changing PA parameters. Its working principle is shown in Fig. 1.

372

D. Zhao

Fig. 1. Flow chart of two population cuckoo algorithm

The two population cuckoo is used to optimize the torque of the manipulator. 1) Initialize 2n bird egg positions randomly, save n bird egg positions in each array, and record the array as X1 and X2 . Each egg position is regarded as the unit time variable t required by the quintic polynomial interpolation method; 2) The angle q, angular velocity q and angular acceleration q of the manipulator at each moment are obtained by the quintic polynomial interpolation method, and the torque value t of each joint is calculated with q, q and q as parameters. 3) According to Eq. (3), the final optimization objective function fitness is obtained with the minimum total joint torque, and the value of the objective function is saved in the corresponding array Y1 and Y2 ; fitness =

n 

τi + α1 q + α2 q + α3 q

(3)

i=1

4) Initialize the values close to infinity as Yg1 and Yg2 respectively, compare the values of Ymin1 , Yg1 and Ymin2 , Yg2 in each population, save the minimum value and position of Y1 and Y2 , and replace Yg1 and Yg2 with the minimum value. 5) Carry out Levy flight, get the position of bird eggs after flight, and calculate the corresponding array values of objective function Y1 and Y2 respectively; Find out the minimum value Ymin1 and Ymin2 of array Y1 and Y2 respectively, and compare Ymin1 , Yg1 , Ymin2 and Yg1 in their populations. The minimum values after comparison are saved to Yg1 , Yg2 respectively; 6) The two populations have different probability Pa1 and Pa2 select the eggs to be found. If it is found, it is necessary to randomly change the position X of the eggs and modify the corresponding objective function value. Find out the minimum value Ymin1 and Ymin2 of the array Yg1 and Yg1 respectively, compare Ymin1 , Y2 and Ymin2

Optimal Trajectory of Manipulator Torque

373

and Y1 in their respective populations, and save the minimum value after comparison to Yg1 and Yg2 respectively; 7) When m iterations, Yg1 , Yg2 . The minimum value of the two is assigned to Yg1 and Yg2 ; 8) To judge whether the end condition is reached, if the end condition is met, jump out of the cycle, the result is the sum of the optimal torque of each joint, so as to obtain the path path path satisfying the optimal torque; Otherwise, step 4) - 7 [8] is executed.

3 Algorithm Simulation 3.1 Simulation Object Taking the six degree of freedom lr4–560 industrial robot manipulator as the research object, the virtual simulation is carried out, and the corresponding coordinate system is established according to the D-H coordinate system rule (as shown in Fig. 2). The initial angle of the manipulator is θ = 0°, θ2 = _ ninety °, θ3 = 0°, θ4 = 0°, θ5 = 90°, θ6 = 0° Table 1 corresponds to the D–H parameter table.

Fig. 2. Establishment of lr4–560 coordinate system

In Table 1, di = move from Xi–1 to x along the Z i axis; The distance between the two; θi = The angle from X i–1 . to x around the Z i axis; ai−1 = The distance from Z i−1 to Z i along the Xi–1 -axis. α i−1 = the angle of rotation from Z i−1 to Z i about the Xi–1 -axis.

374

D. Zhao Table 1. D–H parameter table θi

di

ai–1

Joint 1

θ1

0

0

Joint 2

θ2

0

20

Joint 3

θ3

0

260

αi−1 0 −90° 0

3.2 Simulation Results Through the MATLAB simulation experiment, the iteration number is 50 times, and the optimal solution of the total joint torque of the manipulator can be obtained. As shown in Fig. 3, the three different algorithms have obvious effects on the optimization of the optimal solution of the total torque of each joint. The abscissa is the number of iterations of the population, and the ordinate is the fitness value of the total torque of each joint [9]. When the number of iterations of DCS algorithm is 4, the unit time t = 0.53 s, the total torque has reached the optimal solution, and the total optimal torque is about tbex = 1040 nm. Under the same conditions, the total sum of optimal moments of CS algorithm is about tbes = 1190 nm, and that of PSO algorithm is about OS = 1210 nm. According to the above data comparison, compared with CS algorithm, the total energy consumption optimization of joint torque is about 12.6%. Compared with PSO algorithm, the total energy consumption of this method is about 14%. DCS algorithm has obvious torque optimization effect and fast convergence [10].

Fig. 3. Optimization process of PSO, CS and DCS algorithm

4 Conclusion In this paper, a double population cuckoo algorithm is proposed to optimize the joint torque of a 6-DOF manipulator. Cuckoo algorithm has a good global performance,

Optimal Trajectory of Manipulator Torque

375

the overall performance is better than particle swarm optimization algorithm, but the algorithm is lack of convergence speed and local search ability. The simulation results show that the dual population cuckoo algorithm can improve the convergence speed and local search energy to a certain extent, and the effect is better than the traditional cuckoo algorithm and particle swarm optimization algorithm.

References 1. Lou, J., Wei, Y., Li, G., et al.: Study on vibration suppression trajectory planning of flexible manipulator based on genetic optimization algorithm. Vibr. Impact 35(11), 1–6 (2016) 2. Gao, X., Du, M., Wu, H., et al.: Joint torque optimization method of space manipulator considering on orbit motion reliability. Acta Astronautica Sinica 37(7), 784–794 (2016) 3. Zhang, X., Wang, X.: Survey of cuckoo search algorithm. Comput. Eng. Appl. 1, 8–16 (2018) 4. Yang, X.S., Deb, S.: Engineering optimisation by cuckoo search. arXiv preprint arXiv:1005. 2908 (2010) 5. Song, Q., He, X., Guo, X.: Improvement of cuckoo algorithm based on chaotic sequence. J. Basic Sci. Text. Univ. 03 (2017) 6. Zhou, H.: Location solution of e-commerce logistics center based on cuckoo algorithm. Mall Modern. 17 (2015) 7. He, X., Zhang, L., Tang, Q., Zhang, Z.: A cuckoo algorithm for solving multi variety and small batch cell division. Mech. Des. Manuf. 01 (2021) 8. Liu, C., Liu, X.: Prediction and analysis of tunnel deformation based on improved cuckoo algorithm and optimized support vector machine. Surv. Mapp. Eng. 02 (2020) 9. Wang, X., Nie, T.: Research on particle filter optimized by improved cuckoo algorithm. Comput. Eng. Appl. 12 (2020) 10. Xue, Y., Deng, H.: Improved cuckoo algorithm based on dynamic grouping and Gaussian perturbation. J. Chongqing Normal Univ. (Nat. Sci. Ed.) 02 (2018)

Evaluation of Government Emergency Management Capability Based on Internet of Things Under BP Neural Network Hang Zhao(B) Chengdu Vocational and Technical College, Chengdu 610041, China [email protected]

Abstract. The systematic, standardized and legal management of the government in response to frequent emergencies is an important part of promoting the modernization of government governance capacity. Combined with the research results of emergency management evaluation at home and abroad, this paper uses WSR system method to build the evaluation index system of government emergency management ability, which is composed of four first level indicators and 54 s level indicators. BP neural network algorithm is used to eliminate the interference of human factors, and to establish a scientific, systematic and comprehensive evaluation index system A comprehensive evaluation model is used to evaluate the government’s emergency management ability. Through the practical application of Changsha municipal government emergency management ability evaluation, it is proved that the evaluation method has strong operability, strong operability to the overall data, and can scientifically, objectively and effectively carry out comparative analysis and comprehensive evaluation of horizontal intergovernmental emergency management ability. Keywords: Emergency · The government · Emergency management capability · BP neural network · Comprehensive evaluation

1 Introduction At present, China is in a critical period of social governance transformation and comprehensively deepening reform, and the modernization process has also developed to a new stage. Promoting the modernization of national governance capacity and accelerating the construction of a government ruled by law have become the general goal of comprehensively deepening reform. At the same time, all kinds of emergencies such as catastrophic floods in Ningxiang County, Hunan Province, explosions in Tianjin port, stampede on the Bund of Shanghai and h7n9 avian influenza epidemic in Jiangsu Province occur frequently [1]. The existing government emergency management system and management ability are facing new severe challenges. In emergency, how can the government reasonably and scientifically use its power to deal with emergencies? Do you have the ability to eliminate the consequences of emergencies? What is the effect? The solution © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 376–382, 2022. https://doi.org/10.1007/978-3-030-99581-2_55

Evaluation of Government Emergency Management Capability

377

of these problems becomes the key to improve the government’s emergency management ability. Therefore, the accurate analysis of the current situation of frequent emergencies in China, the construction of a reasonable index system, the inspection of the government’s emergency management ability, and the evaluation of the current government’s emergency management level have certain guiding significance for improving the government’s response and governance ability to emergencies, and realizing the systematization, standardization, legalization and normalization of emergency management [2].

2 BP Neural Network Artificial neural network is a new subject developed rapidly in recent years. It is a new type of information processing system. From 1943, W. Pitts and W. s. moculloch studied and proposed M-P neuron model to today, artificial neural network has developed rapidly. Its application has penetrated into biology, electronics, mathematics, physics, construction engineering and other disciplines, and has a broad application prospect. At present, neural network has been widely used in signal processing, pattern recognition, data compression, intelligent control and other fields. BP neural network is a multi-layer neuron structure, which is connected between layers, but not connected in layers[3]. The network learning algorithm is based on gradient descent error back propagation algorithm. (BP algorithm) it has been proved theoretically that the three-layer BP network with nonlinear transformation function can approximate any nonlinear function with any precision. However, in complex applications, BP neural network is easy to fall into “over fitting”, resulting in the calculation results deviate from the reality, thus affecting the reliability of the model. Therefore, measures must be taken to avoid it. The structure of BP neural network is composed of DE.Rumelhart In 1985, PDP (parallel distributed processing) group proposed a neural network model, which eliminates errors by error back propagation, and has three levels: input layer, hidden layer and output layer, as shown in Fig. 1. In the training, the error between the output value and the expected value is calculated to solve the generalized error of the output layer unit, and then the error is back propagated to get the generalized error of the hidden layer unit, and the connection weight between the output layer and the hidden layer and the input layer and the threshold value of the hidden layer and the output layer are adjusted until the system error is acceptable. In this case, the weight and threshold will not change. Thus, the unknown information of similar projects can be detected [4].

378

H. Zhao

Fig. 1. Topological structure of BP neural network

3 Construction of Evaluation Index System of Government Emergency Management Ability 3.1 Design Idea of Index System In order to evaluate the emergency management ability of our government more accurately, the selection of indicators must have scientific basis rather than groundless. A reasonable index system should meet the basic requirements of integrity, effectiveness, feasibility, stability, coordination and combination. At the same time, it should also have reasonable construction methods: constructing index from time dimension refers to the five stages of constructing, modifying, perfecting, using and updating the index; To construct indicators from the method dimension, we need to consider the source methods of each indicator, such as analysis and induction, expert discussion, etc.; The construction of indicators from the logical dimension should follow the logic of thinking on the basis of each stage of the time dimension. The main method is the system method of physics, reason and humanity (WSR) [5]. 3.2 First Level Index Design Idea In order to ensure the systematicness of index selection, this paper uses WSR system method for index selection. The physical analysis first ensures the integrity of the index system. From the physical level, emergency management has the periodic law of prevention and preparation in advance, response in the event and recovery after the event. Therefore, the physical index of government emergency management ability refers to the prevention, preparation, response, recovery and learning ability of government emergency management institutions and personnel. In order to ensure the effectiveness of the index system, it is necessary to analyze how to arrange the organization, personnel and equipment of emergency management in our country. The main content of emergency management in China is “one case, three systems”, “one case” refers to the emergency plan, and “three systems” refers to the management system, operation mechanism and legal system of emergency work [6]. Combined with the physical and logical analysis

Evaluation of Government Emergency Management Capability

379

Fig. 2. The basic process of the first level index construction of government emergency management ability

of the government’s emergency management ability, in order to ensure the feasibility of the index system, starting from the human theory, considering the different emphasis of the work in different emergency stages, the pre prevention and preparation stage focuses more on the construction and improvement ability of the legal guarantee system, institutional mechanism and method system of the organization; In the response stage, we should take into account the adaptability of decision-makers and executors, the ability to use the existing system and mechanism, the initiative of human factors, and how the government emergency management system and operation mechanism play a role in the process of emergencies; In the post crisis recovery and learning stage, people are

380

H. Zhao

the center to recover their physical and psychological damage, to restore or reconstruct their economic and social environment, and to modify and improve the original management organization, personnel, method system and institutional mechanism based on the problems in emergency management [7]. Therefore, by using the WSR system method, the legal guarantee, method system, flexibility and inspection and improvement of the organization are selected as the first level indicators of the government’s emergency management ability, as shown in Fig. 2. 3.3 Secondary Index Design Ideas In order to select the appropriate number of representative and practical indicators, so that the overall indicators and the various levels of indicators are interrelated and restrict each other as a whole, the selection of secondary indicators also uses the WSR system method. Based on the analysis of the physical, logical and human factors in each stage of government emergency management, according to the different emphasis of each level of indicators, Referring to the functions of law and authority, action procedure, material management and financial management in the emergency management readiness assessment procedure developed by the Federal Emergency Management Agency of the United States, and the indicators of laws and regulations construction, information collection ability, and policy support for relevant damaged industries and enterprises proposed by Chen Sheng et al., Luo Li’s early warning information management system, information early warning support system, information collection technology, information collection scope and accuracy of early warning information, Zhu Jiangbin’s summary and evaluation ability, work improvement ability and other indicators, and Wang Wei’s and Wang Hongde’s government support system, mechanism and legal system, And other government emergency management ability evaluation index research results, combined with the characteristics of emergency and emergency management, as well as the main content of “one case, three systems” of government emergency management, 54 secondary indexes are determined [8]. 3.4 Evaluation Index System of Government Emergency Management Capability Following the WSR system method, on the basis of ensuring the integrity, effectiveness and feasibility of the index system, and based on the characteristics of emergency and emergency management, the evaluation index system of government emergency management ability is divided into three levels: target level, first level index and second level index. Among them, the target layer represents the emergency management capability of the government; The first level includes four indicators of the same level: legal protection, method system, flexibility, inspection and improvement; The second level index layer contains 54 indicators of the same level [9].

Evaluation of Government Emergency Management Capability

381

4 Construction of Emergency Management Capability Evaluation Model Based on the Application of Internet of Things Under BP Neural Network 4.1 Model Construction This paper adopts a three-layer network model of government emergency management capability evaluation, in which the evaluation index of emergency management capability is the input layer, the evaluation result of emergency management capability is the output layer, and the middle layer is the hidden layer. In this paper, we choose P as the input layer variable, t; As output layer variables, 1.3 The specific steps are as follows: (1) The number of neurons in input layer and output layer was determined. The number of input neurons n is equal to the number of secondary indicators. In this paper, there are 54 secondary indicators in the evaluation index system of emergency management ability, that is, n = 54. There is only one evaluation result, that is, the number of output layers m = 1. (2) The number of neurons in the hidden layer is determined. In this paper, the hidden layer is selected as one layer. When determining the number of neurons in the hidden layer, we can refer to the empirical formula  s = 0.43 nm + 0.12 m2 + 2.54 n + 0.77 m + 0.35 + 0.15 (3) As well as trial and error method, test model evaluation ability and other methods. According to the empirical formula, s = 13 is preliminarily determined. In order to reduce the error, the number of hidden layer neurons will be adjusted according to the number of samples in the learning and training process of sample data. (4) Selection of activation function and setting of initial value of weight. After debugging the model, it is found that the number of neurons in the hidden layer is replaced in turn, and the training functions trainlm, traingdx and traingd are used for comparison[10. No matter how the hidden layer neurons are transformed, the training error of trainlm function is the smallest. The function selection of this paper is: the hidden layer is Tansig function, the output layer is purelin function, and the training function is trainlm function. The setting of weight is generally random number, and it should be relatively small; At the same time, in order to shorten the network learning time, the initial value range of network connection weight should be set reasonably, and the general value range is [−1,1]. 4.2 Network Training Using MATLAB software, the preprocessed training samples are used to train and learn the BP neural network model. The hidden layer function is Tansig, the output layer function is purelin, the training function is trainlm, the maximum training times is 1 000, the training target error is less than 0.001, the learning rate is 0.1, and the weights and thresholds are random numbers. As the network itself constantly adjusts the connection weights between each unit, when the training reaches a certain number of times, the training image of BP neural network converges, the target error reaches the specified error range, and the neural network can produce a given output, that is, the end of training.

382

H. Zhao

4.3 Model Validation After the training, the corresponding network connection weights and the required government emergency management ability evaluation model are obtained. In order to ensure the accuracy of the model, the test samples are used to optimize the model and test the training effect of the training samples. After many times of learning, training and debugging, the error between the test output of the model and the test sample output is basically less than 0.001. Save the connection weight at this time, that is, the government emergency management ability evaluation model for emergencies can be applied. On this basis, all samples can be input into the model to carry out a comprehensive evaluation of the government’s emergency management ability.

5 Conclusion Neural network method can not only set the model for comprehensive evaluation, find the overall level of horizontal government emergency management ability between different departments, but also build a model to evaluate a single level index. Through the comparison of various indicators between horizontal governments, we can find the shortcomings of some indicators in some areas The comparative evaluation and its improvement have guiding significance. In this paper, the scientific principles and technology are applied to the government emergency management. The scientific and objective BP neural network comprehensive evaluation method has the advantage of processing a large number of data. At the same time, it also avoids the human interference and complexity of the traditional evaluation method. It provides a new way for the evaluation of government emergency management ability in China.

References 1. Chen, S., Liu, S.: Comparative empirical study on government emergency management capability and performance: based on the perspective of wenchuan earthquake and lushan earthquake victims. Disast. Sci. 31(3), 160–164 (2016) 2. Peng, S., Fang, Z.: joint optimization of BP neural network learning algorithm. J. Circ. Syst. 3, 26–30 (2000) 3. Zhang, Y.: Factor decomposition and index evaluation: discussion on government’s public crisis information early warning ability. Lingnan Acad. J., 22–25(2011) 4. Zhang, Y.: Study on the evaluation of government emergency material support capability. J. Nat. Disast. 21(1), 78–84 (2012) 5. Huo, J., Sui, M., Liu, Z.: Quantitative analysis of overall performance evaluation index of integrated supply chain. J. Tongji Univ. (Nat. Sci. Ed.) 30(6), 733–737 (2002) 6. Wang, X., Li, J., Li, F., et al.: Study on life cycle assessment indicators and quantitative methods of electromechanical products. J. Shandong Univ. (Eng. Ed.) 39(5), 73–78 (2009) 7. Xu, K., Zhu, M., Lin, C.: Summary of research on Internet architecture evaluation model, mechanism and method. J. Comput. Sci. 35(10), 1985–2006 (2012) 8. Zhao, Y., Zhou, W., Dowling, M., et al.: Evaluation of innovation capability of knowledge intensive service industry clusters based on rough set theory. Soft Sci. 23(4), 46–49 (2009) 9. Xuerui, T., Yuguang, L.: Using grey relational analysis to analyze the medical data. Kybermetes. 33(2), 355–362 (2013) 10. Yu, J., Shen, L., Tang, D., et al.: Performance evaluation of fault diagnosis system based on Bayesian network. J. Beijing Univ. Aeron. Astronaut. 42(1), 5–40 (2016)

Author Index

A Aadan, Saciid Ahmed, 11 Abdullahi Ali, Suleiman, 11 Abidemi, Sarumi Usman, 19 Almomani, Abdelrahman, 30 Altıparmak, Hamit, 1 Al-Turjman, Fadi, 19, 30 C Chang, An, 251 Chen, Fengchao, 59 Chen, Wei, 267 Chen, Xiaoping, 180 Chen, Zhenhui, 251 Cilmi, Bashiir Ahmed, 11 D Daniel, Sekyere-Asiedu, 19 Deng, Yanfang, 280 Ding, Ning, 121 Duan, Lingyan, 73 F Fang, Yi, 128 Feng, Xin, 53 Feng, Xingyu, 287 Feng, Yingna, 294 Feng, Yuying, 220 G Gao, Shasha, 134 Geedi, Mohamed Ahmed, 11

H He, Jianhao, 142 He, Xiao-yun, 274 He, Yipeng, 59 Hou, Yunchen, 300 Hu, Dongsheng, 149 Hu, Wei, 154 Hu, Yiwen, 307 Hua, Linna, 313 J Jiang, Haipeng, 319 Jiang, Mingxi, 251 Ju, Li, 325 K Kaba, Serife, ¸ 1 Kang, Yanxia, 331 Kirtil, Hasan Sencer, 40 L Li, Bo, 59 Li, Hongbo, 220 Li, Jianan, 103 Li, Xuegang, 251 Liang, Weipeng, 81 Liang, Yanhong, 251 Lin, JiZhi, 167 Liu, Jinxin, 128 Liu, Ruiying, 251 Lu, Chengbo, 59 Lu, Shuang, 238

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 F. Al-Turjman and J. Rasheed (Eds.): FoNeS-IoT 2021, LNDECT 130, pp. 383–384, 2022. https://doi.org/10.1007/978-3-030-99581-2

384

Author Index

M Mei, Fang, 89 Mei, Yingtian, 336

Wei, Na, 226 Wu, Ye, 175, 238 Wu, Yonggang, 232

O Oghenetega, Omoraka Gershion, 19

X Xiang, Chenqi, 162 Xin, Minghai, 167

Q Qin, Ya, 96 Qiu, Xiaoqiong, 81 S Seyyedabbasi, Amir, 40 Shao, Yi, 175 Song, Ying, 180 T Tang, Rong, 73 Tang, Tao, 201 W Wang, Dongsheng, 187 Wang, Haishu, 194 Wang, Lin, 201, 207 Wang, Qi-quan, 274 Wang, Tong, 214 Wang, Xiaodong, 220 Wang, Zhibo, 214 Warsame, Mohamed Khalif, 11 Wei, Kai, 343

Y Yan, Bai, 109 Yang, Xin-gang, 274 Yang, Zhenmin, 220 Yu, Han, 351 Yu, Miao, 238 Yu, Xuesheng, 238 Z Zeng, Lingqiong, 114 Zeng, Qingtian, 68 Zha, Xiaomin, 261 Zhang, Bo, 59 Zhang, Jianjun, 356 Zhang, Xinyin, 244 Zhang, Yuan, 362 Zhao, Duoxing, 370 Zhao, Hang, 376 Zhao, Ruifeng, 59 Zhong, Xiaolei, 238 Zhou, Lide, 59