Table of contents

Volume 750

2020

Previous issue Next issue

2019 International Conference on Cloud Computing and Information Science (CCCIS 2019) 27–29 December 2019, Shenyang, China

Accepted papers received: 17 January 2020
Published online: 23 March 2020

Preface

011001
The following article is Open access

Preface/introduction

CCCIS 2019, the 2019 International Conference on Cloud Computing and Information Science was held in Shenyang, China from December 27th to 29th, 2019. The goal of CCCIS 2019 is to provide a platform for cloud computing and information science and industry professionals to showcase their research results and development activities in cloud computing and information science. It offers delegates the opportunity to exchange new ideas and application experiences, establish business or research relationships, and find global partners for future collaborations.

011002
The following article is Open access

List of Committe Members are available in this pdf.

011003
The following article is Open access

All papers published in this volume of IOP Conference Series: Materials Science and Engineering have been peer reviewed through processes administered by the proceedings Editors. Reviews were conducted by expert referees to the professional and scientific standards expected of a proceedings journal published by IOP Publishing.

Information Science

012001
The following article is Open access

The basic task of a college counselor to stand up to people is to contact more college students, and it is also an irreplaceable middle force for mental health education in colleges. Looking at the mental health education of college students in our country, college counselors lack the necessary psychological knowledge and attach little importance to mental health education, which leads to a great reduction in the role of mental health education practice. The purpose of this article is to build a web-based psychological health education system for college counselors, to provide psychological health education services to college counselors, and to improve the mental health education of counselors. This article will build a web-based mental health education system for college counselors based on a systematic approach so that computer networks and web technologies can be used to improve the level of mental health education services for college counselors. The system is composed of two subsystems, an online expert-type mental health knowledge system and an online psychological counseling system. The experimental results show that the college counselors' learning on this system has strengthened the psychological common sense of college counselors, improved the counselors' ability of self-cognition, self-evaluation, and self-balance, and also improved the counselors' Ability for mental health education.

012002
The following article is Open access

The English Corner has always been an important foundation for college English learning. However, with the development of social development and the updating of modern methods, many college students have more and more forms of communication, and this form of face-to-face English communication has been increasingly ignored. As an important foundation for developing students' independent learning and innovative skills, the university is the second English part of English acquisition and an important training place in addition to regular courses. Student learning breaks the rich teaching model of traditional teachers, but not many students practice English. The purpose of this article is to study the English corner through virtual community technology. In this paper, the fuzzy weighted evaluation method is used to obtain the weight allocation results of the virtual learning community knowledge sharing evaluation index system, and this is used as a quantitative basis for the fuzzy comprehensive evaluation method to evaluate the actual virtual learning community. And through the design and development of corresponding questionnaires, the virtual community and the application of the case "virtual English corner" related questionnaire surveys to obtain data, fuzzy comprehensive evaluation method to process the data. Finally, it is concluded that in the evaluation of the effectiveness of learning using the "virtual English corner", the analysis finds that the ineffective is zero, 26.6% think it is very effective, and 93.7% think it is above intermediate level (3 points and above). It can be seen that the community members surveyed are quite satisfied with the effectiveness of the "Virtual English Corner" learning. We believe that the "Virtual English Corner" provides an online platform for effective learning.

012003
The following article is Open access

, , , , and

This paper combines the design and development of student management system and integrates project-based teaching based on working process into the course of Oracle database technology. It guided by the working process and regarding the project as the carrier, and in accordance with the principle of "task-driven, practice-connected, work-integrated and strengthening ability", combing the online and offline teaching integrates with "teaching, learning and doing", fully arouses students' learning enthusiasm and initiative, and enhances their comprehensive ability and sustainable development ability.

012004
The following article is Open access

, and

The article analyzes the knowledge sharing process and behavior of teachers in the network professional community through social network analysis and content analysis. A semester of interactive data is selected as a sample in the college WeChat group. It analyzes social network structure of network professional community knowledge sharing and the interactive relationship from the aspects of community map, density, centrality, cohesive subgroups, core-edge, etc. The article analyses that, teachers' knowledge sharing in departmental WeChat group presented the characteristics about complexity of shared subjects, unity of shared knowledge, missing interactions and sharing potential.

012005
The following article is Open access

, and

Hurst parameter estimation is the key issue for long range dependent system modeling and data prediction. Dynamic Hurst parameter estimation of data with impulse noise is difficult. In this research, the Dynamic Hurst parameter of multi-fractional signal is estimated using sliding windowed R/S method and generalized Hurst exponent. Simulation results show that sliding windowed R/S method and generalized Hurst exponent can effectively analyze the Hurst parameter of impulse noise contaminated signals.

012006
The following article is Open access

and

With the national emphasis on environmental issues is gradually increasing, more and more experts and scholars on the environmental art design system of more and more research. The requirement of environmental art design system is getting higher and higher. Traditionally, two-dimensional images are used to describe environmental art geography, and the environmental information obtained lacks intuitiveness and interactivity. The purpose of this paper is to realize the social sharing and service of environmental art information so that the public can conveniently enjoy the risk warning service of environmental information. Starting from the framework reconstruction of system construction, this paper takes the Web framework pattern as the basic framework of system realization, and creates different entity models and terrain models in virtual environment through Creator modeling software. After collecting the original environmental data, the edge processing of the environmental data is carried out to produce the 3D environmental design system. In the process of 3D virtual reproduction of the environment, Vega driver software was used to shape the Web 3D scene of the environment, and the Marine environment module in Vega was used to realize dynamic and static environment simulation and simulation effect. The experimental results show that the display effect of the environmental art design system constructed in the Web mode is more realistic, intuitive, interactive and satisfactory.

012007
The following article is Open access

and

With the continuous maturity of Internet and computer technology, it has had a profound impact on people's lives. At present, the Internet also plays an extremely important role in education. Its application in teaching promotes the transformation of teaching mode and breaks the limitation of traditional classroom teaching. Especially in recent years, in order to adapt to the teaching reform, cultivate learners' awareness of independent learning and improve learners' comprehensive learning ability, people have established various types of independent learning platforms based on the Internet. However, as far as the existing learning platform is concerned, it still pays too much attention to the role of teachers, and the personalized needs and interactivity of users of the independent learning platform are not reflected. The purpose of this paper is to explore the design of the Web3.0 environment independent learning platform and strive to build an independent learning platform that ADAPTS to the development of The Times. This paper first gives an overview of Web3.0, and then designs and analyzes the independent learning platform. Then it proposes the specific implementation of the independent learning platform, and tests the platform with the help of data fusion algorithm. The experimental results of this paper show that the research and development of the Web3.0 environment independent learning platform can meet learners' personalized needs, promote learners' independent learning and effectively stimulate learners' interest in learning.

012008
The following article is Open access

and

The landscape design as the human living space geographical composition is very important part of ecological system, the existence of regional landscape not only provides residents with a versatility, layout, balanced, open outdoor public space of free activities, whereas in the past the landscape design of the system is designed in accordance with the local geographical factors, more is not fully consider various comprehensive factors. The purpose of this paper is to properly introduce the existing technology based on distributed theory such as remote sensing positioning and data analysis to optimize the landscape design system. By using the data sensing module of Hadoop landscape design system and the distributed coding technology for genetic algorithm, the application of 3D landscape design is carried out. Its characteristic and innovation is the fusion of distributed storage and cluster, the design of big data dynamic storage system, analysis of its operation depends on the analysis and algorithm technology, compared with the final system operation effect. Experimental results show that the landscape design system based on distributed very well to the geographical location, topography, the surrounding environment, traffic conditions, historical and cultural factors, such as analysis, determine the theme of the landscape planning and design positioning, functional partition and content of ecological landscape, through the analysis of the landscape planning and design, take its long, avoid its short, problem solving, superposition of advantages, for a more reasonable and high quality to complete the landscape planning and design is of great significance.

012009
The following article is Open access

Although smart phones have greatly changed people's way of learning, it will also affect classroom teaching if it is not used normally. At present, this paper proposes an innovative teaching mode, which can connect classroom learning and extracurricular learning through mobile communication platform. The O2O teaching mode not only solves the problem of improper use of mobile phones, but also expands the breadth and depth of students' autonomous learning. First of all, this paper analyzes the teaching organization of O2O teaching mode in the aviation transportation geography course. Then, this paper puts forward some problems in O2O teaching. Finally, some suggestions are put forward.

012010
The following article is Open access

Digital media technology is one of the most important information technology, which plays an important role in video technology. At present, video technology is the focus of the development of new generation electronic technology. Therefore, we must optimize the video technology, which will improve the visual effect of video. However, there are many problems in traditional video technology, such as poor visual effect and long running time, which need to optimize the video technology in the digital media technology environment. By analyzing the overall structure of the video technology structure, we can analyze the digital media processor, which will optimize the video technology. First of all, this paper analyzes the characteristics of digital media technology. Then, this paper analyzes the optimization technology of video technology. At last, this paper introduces the application of video technology.

012011
The following article is Open access

With the rapid development of science and technology in China, the development potential of science and technology enterprises in China has gradually increased. Under the background of Internet finance, how to provide better service for science and technology finance has become a new research topic. By providing personalized services, we can optimize the regional financial ecological environment, which will alleviate the financing problem of small and medium-sized technology-based enterprises. Therefore, science and technology finance can improve the ecological system of science and technology enterprises. First, this paper analyzes the main background of the current technology finance platform. Then, according to ZhongGuanCun science and technology financial service platform model, this paper constructs a service platform model suitable for other regions. Finally, some suggestions are put forward.

012012
The following article is Open access

Through the investigation and study on the autonomous learning of music major students in the network environment, the characteristics of generality and individuality of music major students in autonomous learning under the network environment are analyzed in this paper, and some problems are identified. After research, solutions to these problems are proposed to guide students of music majors to use scientific and advanced online learning styles to learn music theory knowledge and skills, make up for the insufficiency of traditional teaching methods and achieve the purpose of promoting and improving learning efficiency.

012013
The following article is Open access

Data filtering is the first step in the utilization and development of big data, that is, obtaining value data from massive data resources, building system operation database, and realizing the mining and sorting of value data. However, restricted by the infinite big data environment and limited data acquisition ability, almost no technology can obtain all the value data. In this paper, a series of indicators are proposed to evaluate and enhance the data filtering algorithm.

012014
The following article is Open access

and

With the development of Internet technology and mobile information technology, the era of big data is coming. Technological innovation drives the transformation of marketing mode. In the era of big data, more efficient marketing mode has changed consumers' habits of obtaining information and consumption. At present, China is vigorously promoting the construction of e-ticketing network system. The introduction of big data integrated marketing concept has a positive reference value for the transformation and upgrading of traditional e-ticketing network platform and the cultivation of performance industry market.

012015
The following article is Open access

This paper focuses on the service mode change of University Library in the era of big data. Through the analysis of AHP, this paper holds that although university library belongs to the most traditional information management unit, it also experiences the information revolution. University library is playing a more and more important role in scientific research and teaching.

012016
The following article is Open access

In recent years, science and technology have been developed rapidly. Computer network technology has also presented a rapid development trend, which is gradually popularized in people's lives. Computer technology has been extensively used in people's production and lives, with a visible impact on all walks of life. In an administered society, the role of management in enterprises has become increasingly apparent. How to reform and develop business management are questions to be considered. The application of computer network technology has a significant impact on enterprises. To gain a place in international society, enterprises have to consider the influence of computer network technology. In this paper, mainly the characteristics of computer network technology and business management itself are analyzed to understand further the survival status of enterprises and the issues they face in the future, thereby providing guidance for enterprises in their future business management practice.

012017
The following article is Open access

, and

The digital teaching resources represented by MOOCs (Massive Open Online Courses) have great potential to subvert traditional classrooms. Excessive digital teaching cannot promote teaching effectively. Hence, the Internet is used as a medium in this paper to analyze the advantages and disadvantages of online learning of the MOOC platform and the classroom teaching comprehensively. The principle of complementary advantages is adopted to explore the establishment and application of teaching mode for biology teaching courses. In specific practice, the online teaching contents of the online platform account for 35%. The feedback information after one round of application suggests that the teaching effect of mixed courses is good, and students are generally willing to accept the mixed course teaching mode.

012018
The following article is Open access

In this paper, the sand group 9 of the second member of Shahejie Formation in the second area of Shengtuo oilfield is taken as the research area. Combined with the geological and development dynamic conditions, the core well analysis and test data, oil test data and production test data are used to fully mine the identification ability of logging data for oil and gas reservoirs, establish the interpretation model of porosity, permeability and saturation in the research area, determine the lower limit standard of effective thickness, and improve the accuracy of reservoir interpretation The accuracy lays a foundation for the remaining oil to tap the potential.

012019
The following article is Open access

In today's world, the use of big data is almost everywhere. It has been widely used. Under the background of big data, how to carry out supply chain management based on big data technology and obtain scientific and effective valuable information has become an urgent problem for enterprises. This paper first analyzes the influencing factors of big data in the application of supply chain, and then studies the effective application of big data analysis in supply chain management.

012020
The following article is Open access

College Chinese is an important basic course offered by colleges and universities. How to make students of different majors learn this course effectively is a challenge for teachers. This paper expounds how to improve the learning efficiency by innovating the teaching mode, breaking the traditional learning mode and promoting each other under the support of information technology environment. This paper puts forward the teaching mode of students' autonomous learning, teachers' guidance and students' cooperative learning, and cultivates students' learning ability and innovative spirit.

012021
The following article is Open access

With the rapid development of China's economy, electronic information technology plays an increasingly important role. New electronic information technology, as the backbone of supporting our national economy, plays an irreplaceable role in ensuring the high-quality development of science, technology and society. The new electronic information technology has the advantages of fast operation speed, high safety and reliability, high working efficiency, strong universality and simple operation. Therefore, in order to better play the role of the new electronic information technology in the society, this paper studies it to better serve the modern industry and facilitate the long-term development of the society. New electronic information technology plays an important role in transportation, engineering management, aerospace and other industries, especially in the application of avionics system.

012022
The following article is Open access

The high-tech, which is led by the computer network technology, has accumulated in many years. It is bursting into a vigorous air, which has injected new blood into the spirit and material of the whole world, bringing about the development of the industry and the development of the integration, and at the same time promoting the no-drop process of some of the traditional industries. The management of ideological and political work is a work that needs long-term persistence, continuous updating of content, form and method. At present, in view of the characteristics of ideological and political work, we have used scientific and technological means such as wireless network, local area network and international Internet to strengthen the management of ideological and political work, and have made success in the application. This paper discusses some views on the use of computer network technology to strengthen the management of ideological and political work in the computer era.

012023
The following article is Open access

With the deepening of economic globalization and the accelerating progress of science and technology, the market competition is becoming more and more fierce. In order to gain a place in the market, enterprises must deepen the research and analysis of marketing methods. Based on the current situation of marketing in China, this paper makes a detailed study on the development trend of marketing.

012024
The following article is Open access

Based on 631 articles about "computer-aided translation" collected in CNKI from 1988 to 2019, this paper makes statistical analysis on teaching by drawing keyword co-occurrence network with relevant software. Translation technology, translation software and their applications are summarized. On this basis, some suggestions are put forward for the future research of cat.

012025
The following article is Open access

With the development of economic globalization and market economy, in order to adapt to the increasing demand of business development, group enterprises urgently need to establish a financial centralized management and control platform with perfect functions, so as to create a value headquarters. This paper first analyses the necessity of establishing the financial management information system of the group enterprise, then introduces the function of the group financial management information system, and finally gives the construction method of the group financial management information system.

012026
The following article is Open access

In this paper, a series of researches are carried out on the development of rural tourism informatization under the concept of China's Intelligent Tourism at present. Firstly, the relationship between the development of Intelligent Tourism and tourism informatization is expounded, then the current situation of China's rural tourism informatization is analyzed, finally, the main factors affecting the development of rural tourism informatization are put forward, and the solutions are discussed.

012027
The following article is Open access

English is an Indo European Germanic language. It is made up of 26 letters. The English alphabet originates from the Latin alphabet, while the Latin alphabet comes from the Greek alphabet and the Greek letters are from Phoenician letters. It is also a broadly adopted language in the overall world. English includes around 490000 words, plus around 300000 technical terms. It has the largest vocabulary. Also it is the official language of many states, for example the European Union, many international organizations and Commonwealth countries.

012028
The following article is Open access

Big data of health care is an important basic strategic resource of the country. The application of big data of medicine is of great significance for clinical medicine research, scientific management and the transformation and development of medical service mode. Based on the common data model (conmon data mode1), the data is cleaned, stored and reconstructed, and the clinical data center system is established for clinical and scientific research analysis. Mainly from the system architecture design, key technology, implementation steps to introduce the system design and implementation, and from the safety and reliability of the system design.

012029
The following article is Open access

In recent years, interior wall painting has become a trend and can be seen everywhere. With the pursuit of people's spirit and culture, the art of interior wall painting also puts forward high requirements for the artistic literacy of designers. The application of computer technology in interior wall painting design can quickly realize the effect display, save a lot of time and provide more thinking time for designers. At the same time, it also connects designers, owners and construction parties, and creates infinite possibilities for interior wall painting design methods.

012030
The following article is Open access

and

At present, the conversion rate of scientific and technological achievements in China is extremely low, only about 3%, and information asymmetry is one of the reasons why it cannot be ignored. (Ministry of industry and information technology data). The computer information system is the best solution to solve the information asymmetry. This paper discusses some feasible methods for realizing scientific and technological achievements by means of computer technology.

012031
The following article is Open access

Taking the non-English majors as the research object, the traditional college English teaching mode is combined with computer, network, multimedia and other advanced technologies to form a new teaching mode, that is, relying on the computer network platform, building English network course resources, developing an objective and feasible multiple evaluation system, so as to realize the purpose of students' autonomous learning. The experiment shows that the new teaching mode, which is composed of classroom teaching and online autonomous learning, is effective.

012032
The following article is Open access

In order to better meet the learning needs of distance open education, researchers at home and abroad have carried out a lot of research on the subject of learning support services for a long time, but there is no standard to follow up. With the continuous development of Distance Open Education in China, the original learning support service system has exposed some limitations. Based on the practice and exploration of Shanghai Open University, this paper analyzes the existing and existing problems in the teaching process of Distance Open Education by means of questionnaire survey, and proposes to design the learning support service system from five dimensions (five-dimensional system) of teacher resource support service, teaching resource support service, teaching process support service, educational facilities support service and education management support service. Through the study of the operation process of five-dimensional system in distance open education, the concept of "learner centered" learning support service system is constructed, and the operation effect of learning support service system in innovation of teaching mode, integration of educational resources, and adaptation of learners' personalized needs is expounded.

012033
The following article is Open access

Nowadays, big data thinking and technology have gradually infiltrated into the daily management and service of university library. The university library should innovate the service concept, cultivate the big data thought consciousness, adopt the mining technology, provide the accurate and personalized service, build the exchange platform, enhance the user experience service, the extensive application of the data resources provides the strong support for the University Library Reader Service Reform and innovation, and provides the new development thought for the reader service innovation and development. This paper studies the challenges faced by the reader service of University Library in the era of big data, and puts forward suggestions to improve the reader service level of university.

012034
The following article is Open access

With the development of information technology, it is possible to extract and apply big data, and it is also the first time that the samples and the whole of scientific research are combined and become the same concept. This study takes big data as the starting point, and deeply discusses the key and difficult problems of Freshmen in the process of online audio-visual. The conclusion is conducive to the smooth progress of online audio-visual curriculum reform, and also has certain guiding significance for students' learning and teachers' guidance.

012035
The following article is Open access

This paper focuses on the specific application of Web Service Technology in Heilongjiang national tax information service exchange platform, and discusses the level division of the platform and data transfer technology. This technology has positive significance for the national tax management of Heilongjiang Province.

012036
The following article is Open access

Following the development of globalization, various industries not only in their own country, but also in the whole world, the relationship between peers is closer, the scale of technology exchange, experience exchange, research results exchange is gradually expanding, the gap of applied English talents is increasing, and more demands are put forward for the training and teaching of specialized English skilled personnel. Under the vigorous expansion situation of MOOC and SPOC, this paper introduces the concepts and processes of MOOC and SPOC, and discusses the relationship between them and their respective characteristics and advantages. The author finds that it is this post-MOOC era that provides a rich approach and a new platform for ESP teaching experiments in colleges and universities.

012037
The following article is Open access

In view of the defects of traditional teaching in teaching concept, teaching subject and teaching evaluation, this paper puts forward a design scheme of online and offline Hybrid Teaching Platform Based on "Internet +". The practice shows that the design and application of hybrid teaching platform can effectively improve the interaction between students and teachers by making full use of online and offline teaching resources.

012038
The following article is Open access

and

The deepening of education reform and the running of Internet technology almost go hand in hand, in contrast, the traditional mode of education and teaching in the era of more new means to use, its shortcomings are being exposed bit by bit. Therefore, emerging teaching models based on MOOC has become a research hotspot. on the basis of a large number of investigation and research, this paper briefly expounds the concept of mooc, and then analyzes in detail the online and offline mixed education mode under the background of mooc, and discusses the design of computer mixed teaching link in depth, and finally draws the conclusion that the computer mixed education mode has a promoting effect on teaching.

012039
The following article is Open access

Most students and even some mathematics teachers think that advanced mathematics is one of the most obscure courses in Basic courses in higher education. For students, it is difficult to understand advanced mathematics, especially the concepts of calculus, derivative and limit. By using computer technology to restore the simple iterative process of data without these methods, students can understand the principles of higher mathematics more intuitively.

012040
The following article is Open access

The network school originates from the Internet economy, also can be said to be the Internet and the education teaching fusion result. In the period of social transformation and upgrading, the demand for social education is particularly obvious, and online schools are more popular than formal education. With the help of the network, it is flexible and changeable to realize the organization of network distance education. Through the network platform teaching, students cannot know teachers and teachers cannot see students, even thousands of miles apart, do not affect the normal teaching work.

012041
The following article is Open access

, , , and

With the rapid development of economy and the continuous improvement of people's living standards, the Chinese dream of building a moderately prosperous society in 2020 will come true. At present, people's concept and pursuit are also changing imperceptibly. It is especially obvious in people's normal consumption of agricultural products. People are not worried about basic food and clothing problems, but more about the pursuit of "green, safety and health" of food quality. As China is a large agricultural country, there are many kinds of agricultural products, many employees selling agricultural products, weak awareness of agricultural product safety, blind pursuit of immediate interests, interest edification, and weak legal knowledge. With the rapid development of Internet technology, it is an inevitable trend to combine the Internet with the security of traditional agricultural products. Therefore, it is necessary to establish a set of agricultural product tracking and tracing system based on RFID technology in the Internet + era. Through the traceability system of agricultural products, the production records can be stored and the flow direction of products can be traced.

012042
The following article is Open access

, and

Since the data mining technology came into being in the early 1980s, with the development and popularization of computer technology, it has promoted its application in the business field. It is helpful for enterprises to mine information and knowledge related to business decision-making from the explosive growth of data, and improves the pertinence and effectiveness of decision-making. It has been paid more and more attention by enterprises. This paper expounds the basic concepts, methods and tools of data mining, analyzes the important role and significance of data mining technology in improving the competitiveness of enterprises, and probes into the application of data mining technology in enterprise management.

012043
The following article is Open access

Language is the main way of human social communication, language ability in people's life learning and social work has a very important role that is a basic ability one must have as well as be trained from a child. Language is the main tool for people to communicate with each other, it is the carrier of all kinds of information transmission. Language is one of the main ways to inherit culture, which is an important force to promote social progress and development. The cultivation and development of language ability affect everyone's status and development prospect in society in the future. Therefore, great attention should be paid to the cultivation of language ability. To cultivate and develop language competence, we must first understand the current situation of language mastery and evaluate language competence.

012044
The following article is Open access

, , and

Water ecological data is an important part of national geographic information data and an important reference data to protect national environmental protection. China's water ecological data has a long history, but historical reasons also lead to a certain lag in the management of water ecological data. In this paper, some problems of water ecological data are found in the research of AHP, and the corresponding countermeasures are put forward. It is believed that in the near future, water ecological data will be further supported by big data technology for in-depth data mining, so that its application scenarios are more, and it can better guide national construction.

012045
The following article is Open access

A large number of words in the English language are derived from Greek myths, which can be roughly divided into seven categories: basic vocabulary, psychological vocabulary, astronomical vocabulary, geological vocabulary, biological vocabulary, fixed phrases and idioms, modern trademarks and advertising language. Based on deep learning, this paper conducts a classification study of English vocabulary. By introducing Greek myths, we can further master and use English vocabulary and appreciate the charm of English culture more.

012046
The following article is Open access

and

With the advent of the era of big data, Internet + has been included in national strategies, bringing unprecedented opportunities and challenges to all walks of life. Higher education is no exception. Internet + education is a major subject that requires a lot of effort to think about in foreign language teaching in colleges and universities. As an essential carrier of network information resources, iPad features massive information, mobile convenience, and robust interaction, which is quite suitable for the teaching of various courses. In this paper, the possibility of using the iPad in Japanese literature translation courses to enrich the teaching modes and concepts is explored.

012047
The following article is Open access

and

In order to fully study the CIM reward model risk sharing process of the whole process of engineering consulting services, this paper analyzes the three common outsourcing modes of engineering consulting by AHP, and analyzes the work flow by black box data flow. Finally, this paper believes that the policy analysis and case study of response engineering should be strengthened before the risk analysis of specific projects under CIM reward model can be made.

012048
The following article is Open access

While MOOC brings opportunities, it also poses challenges for traditional university education. This paper mainly investigates the influence of MOOC on the traditional university classroom and teaching management in China, and discusses the corresponding strategies for some problems.

012049
The following article is Open access

and

In this Internet era, rural areas in China are involved in this golden age of ecommerce rapid development as the result of the policy of achieving rural revitalization and common prosperity. However, because of the limited factors in human sources, technology and transportation, rural ecommerce development is slow. To help remote rural areas out of dilemma in e-commerce development and establish its connection with the outer world, this paper analyzes the positive and negative factors in rural areas in the process of developing rural e-commerce. By making a case analysis of the e-commerce development in one of Chinese rural area Jingxi, a successful model in rural e-commerce development, this paper has proposed an e-commerce mode that fits Chinese rural areas, the application of which is hoped to facilitate Chinese rural e-commerce development.

012050
The following article is Open access

The production, circulation and consumption of grain have a direct bearing on the vital interests of the people and the state. Since ancient times, food security has been the foundation of economic development, social stability and national self-reliance. Therefore, food security and food security must be effectively guaranteed in order to promote the sustainable development of the national economy. According to the introduction of the industry, in China, there are still threats to food security factors. First of all, due to the low comparative benefit of grain planting, farmers are less and less motivated to grow grain, which directly limits the improvement of China's grain supply capacity. This paper mainly studies the design and implementation of food security traceability system based on Internet of things technology. This paper combines Internet of things technology to design food security traceability system for food security problems. The "household settlement card system" based on RFID technology enables farmers to swipe their credit CARDS to sell grain by issuing them to grain farmers free of charge. Farmers sell grain, subsidies management more convenient. Grain sales and subsidies can be directly deposited into the bank account associated with the settlement card of farmers, so as to avoid farmers carrying large amounts of cash and facilitate farmers.

012051
The following article is Open access

, , , and

Nowadays, mobile shopping has gradually become a way of people's daily consumption. Based on TAM, this paper constructs a theoretical framework model of influencing factors of consumers' adoption of mobile shopping. Through empirical test, the following conclusions are drawn: (1) subjective norms and performance expectations positively influence perceived ease of use, rather than perceived usefulness; (2) perceived entertainment positively affect both perceived ease of usefulness and perceived ease of use; (3) perceived risk and perceived cost have no significant impact on perceived ease of use and perceived usefulness; (4) perceived ease of use and perceived usefulness positively affect consumers' mobile shopping intention.

012052
The following article is Open access

In recent years, when carrying out educational activities, modern information technology and Internet technology have been integrated with each other to form a variety of educational information platforms, which have gradually replaced the traditional education and teaching methods. Using Internet thinking to improve the application level of education informatization is helpful to improve the quality of education and is of great significance to comprehensively promote the quality education of students. English is an important subject in student learning activities. English learning can improve the comprehensive ability of students, promote the healthy development of students, and enable students to better meet the needs of society. In order to improve learning efficiency, optimize the learning platform, and meet the needs of users, it is imperative to establish a 5G English education information platform. 80% of people in the current society are expecting the arrival of 5G platforms. Considering that in a high-density scenario, the number of terminals is large and the traffic is intensive. If the event scheduling method is still used to process data packets, there will be problems of too many event generations and too long processing time. Computing packet processing architecture. This architecture divides the time axis into multiple time slots. Based on the length and generation time of each data packet, the source terminal number of each data packet is mapped to the corresponding time slot position. By calculating the effective signals and interference in each time slot The strength of the signal is used to obtain performance indicators such as system capacity and throughput.

012053
The following article is Open access

, and

With the rapid development of social economy, the real estate industry has become an important part of China's national economy. In recent years, due to the increasingly exposed drawbacks of extensive management within real estate enterprises, it is particularly urgent for enterprises to implement refined management. Through the analysis of the entire process of real estate project development, this paper recognizes the key factors affecting the refined management level of real estate projects and establishes a refined management evaluation model based on Fuzzy Analytic Hierarchy Process (FAHP). The practical engineering case is taken as an example to verify the feasibility and reliability of the model. Moreover, this model provides a certain reference for the establishment and optimization of the subsequent refined management model as well.

012054
The following article is Open access

, and

Under the education concept of new era, colleges and universities need to focus on cultivation of students' mental health besides the necessary quality education. Effective planning and decision-making of mental health education help students establish correct outlook on life and values, with great significance on their comprehensive development. With the rapid development of science and technology, data mining technology has been gradually applied to cultivation of students' mental health. The work focused on the application of data mining in mental health education of students. Through rational application of data mining technology, the current models of mental health education for college students were further improved to provide reference for future mental health education.

012055
The following article is Open access

and

Nowadays, the speed of data generation is growing rapidly. The analysis and mining of data on enterprise websites can bring business value to enterprises. There are many ways for users to access a website. What the real-time analysis system of user behavior from the perspective of big data needs to do is to collect all the access ways of users, and finally get a real-time dynamic effect map through technical storage, statistics, analysis. Through the analysis of the effect map, we can know which way users visit the website and which way is the main one, so as to serve as a reference for enterprise product promotion. In particular, because the resulting renderings are dynamic and real-time, with the passage of time, the amount and percentage of each access mode will change, from which we also can know the change trend of access mode, so as to adjust the promotion strategy in time.

012056
The following article is Open access

and

The rapid development of the Internet and other new technologies has obviously caused a fatal blow to the traditional tourism model, the original tourism model and service platform can no longer attract the attention of the customers without active transformation. On the other hand, new tourism service platforms such as Meituan, ctrip and tuniu, which mainly rely on new Internet technologies, are developing rapidly. Against this background, more and more Internet technologies favor APP development software focusing on individual consumers, while web-based travel service platforms are increasingly weak. The main purpose of this paper is to develop a web-based tourism service platform to meet the consumption and interaction needs of a larger consumer group. In terms of methods, this article selects the Mysql as the database storage platform, graphical interface with Myeclipse as development tools, the construction of the site focus on combining Hibernate + Spring + Struts assembly technology, in terms of the choice of architectural patterns, in this paper, using the MVC pattern is more convenience, Tomcat6.0 version, server mode is used in order to ease the pressure on the server. The experimental results show that the tourism service platform designed in this paper has strong operability and convenience, which greatly improves the efficiency of tourism information transmission, saves the cost of publicity and improves the work efficiency.

012057
The following article is Open access

Now it has entered the era of big data information, with a large number and various types of information resources. The same situation exists in colleges and universities, and the traditional information resource optimization method is difficult to deal with massive data, and the cost is very high. The optimization of information resources can help schools and other units to develop better. In view of the above problems, this paper proposes to optimize the resources through the establishment of university digital archives. This paper first analyzes the basic connotation of digital archives in the new era, and then puts forward the effective path of the establishment of digital archives in colleges and universities under the big data environment. Finally, the paper analyzes the function of digital archives in resource optimization. The results show that the establishment of digital archives in colleges and universities has been widely praised by teachers and students, and the utilization rate of resources has been significantly improved, with an increase of 38.2%.

012058
The following article is Open access

Brand marketing is an important marketing strategy. Through marketing, it enables customers to recognize the brand and products of the enterprise, which can greatly improve the brand awareness of the enterprise. At the same time, it improves the customer's concern and demand for products, so as to achieve good and sustainable profit growth for the enterprise. In order to gain a good competitive advantage, an enterprise must build a high-grade marketing concept. In marketing, the marketing network is not the bigger the better, but to make full use of brand symbols, so as to build an invisible marketing network in the hearts of the public and deliver products to the hearts of consumers. Through brand marketing, consumers are willing to pay for products, and to recognize enterprises and brands. In today's Internet era, enterprises should pay more attention to the information construction of brand marketing system, and integrate Internet thinking into brand marketing strategy, so as to further improve the marketing effect.

012059
The following article is Open access

and

Successful animation works of art are closely connected with the script creation in the early stage of production. The purpose of animation script creation is to lay a solid theoretical foundation for animation works of art, and to summarize the basic concepts and skills of animation writers. Through innovative and exploratory research on the integration of animation script creation and modern concept, the cultural connotation and audience popularity of animation works of art can be improved to inject new impetus into animation works of art.

012060
The following article is Open access

In recent years, with the continuous progress of science and technology, the available space in the ocean has become more and more extensive. The rapid development of the marine economy has also directly driven China's economic development, and has made great contributions to the growth of China's GDP. The exploitation of natural gas, natural gas and other resources has greatly increased China's non-renewable resource reserves, and has made great contributions to China's resource problems. However, it is difficult to process the monitoring data of the marine economic operation so that good resource utilization cannot be achieved, which has become a difficult problem in China and a major social problem. The purpose of this article is to study the monitoring and evaluation of marine economic operations in an information environment. This paper combines information technology to study the problems encountered in the monitoring and evaluation of marine economic operations and analyzes the marine related industrial structure, thereby reflecting the advantages of monitoring and evaluating marine economic operations in an information environment compared to previous advantages, reducing The storage is not complete, the huge data is difficult to mine and the impact of the timeliness of the data. Fully share the marine economic monitoring operation data in various regions to facilitate the monitoring and evaluation of the marine economy, so as to maximize resource utilization and benefits. The experimental results show that information technology can solve the difficult problem of marine economic operation monitoring data collection, processing, analysis and evaluation, and realize data sharing in various regions, so as to achieve accurate evaluation of marine economic operation.

012061
The following article is Open access

In the context of the Internet, various information transmission methods are more convenient. The network is open and can share resources. Therefore, "Internet +" provides a new way of teaching in the field of education. In the process of law education in colleges and universities, teachers should make full use of the Internet to create a variety of teaching methods for students. Efficient use of information technology to promote continuous innovation and change in higher education models, creating a network and digital higher education system, laying the foundation for a harmonious society of learning at any time, anywhere, and everyone, and training innovative talent. The purpose of this article is to explore its application in the reform of law classroom teaching methods through computer information technology. This article establishes a legal resource database, creates a virtual legal classroom, and makes an electronic bulletin board to propose changes to legal education. It is concluded through experiments that under the teaching method of computer technology, students have improved significantly in all aspects of law. Under the traditional teaching method, students have only improved a small part in law study, and even declined in some aspects. Compared with traditional teaching methods, the effect of teaching methods under computer technology is relatively significant. In the former, it improved by 4.09 points on average, but the latter regressed by 4.02 points, and the former communicated a lot more than the latter. In terms of homework assignment, the latter overtimed about three times.

012062
The following article is Open access

and

In the network technology increasingly popular, especially mobile platform technology and Internet of things technology rapid development of modern society, the original information platform has been a huge challenge. Their development also puts forward higher requirements and opportunities for the construction of technical assistance platform in the development of higher education. The purpose of this paper is to model the framework of the auxiliary platform of physical education based on campus network from the perspective of software architecture construction, and to provide methodological guidance for the construction of this kind of auxiliary platform. In order to facilitate the development of physical education teaching platform in higher education, this paper, relying on the campus network, applies the wireless platform and the Internet of things technology, and puts forward the idea of constructing a new auxiliary platform for higher physical education based on campus network, which provides a new model for realizing informatization and modernization of higher physical education teaching. The research structure of this paper shows that, compared with the traditional physical education teaching mode, the method proposed in this paper is oriented to the actual classroom teaching, and technically has the self-name of database and background resources, realizing dynamic framework and real-time data, which is an important innovation to the original teaching platform.

012063
The following article is Open access

The combination of cognitive science and linguistics has been a matter for nearly a decade or two, which results in the birth of a new marginal subject-cognitive linguistics, indicating a new development trend in language research. Modal verbs are highly grammatical, framed verbs that have relatively prominent cognitive features in language. Over the past two decades, Chinese modal verbs have received considerable attention from many different perspectives. Studies thrived, focusing on its formal aspects, such as the semantic features, modality, primarily syntactic features. By contrast, the delineation for its cognitive system is rarely seen. From the perspective of cognitive science, this research to some extend presents the cognitive process the psychological representation of modal verbs in conceptualizers' mind.

012064
The following article is Open access

and

In the design of information medical treatment service platform, which is patient-centered, information technology is used to connect waiting areas, doctors' offices, payment collection offices, and medical technology departments. The touch screen and buttons are used to control the device, and it has a voice intercom function, which can conveniently realize the communication between various departments of the hospital. The information is transmitted wirelessly, and the receiving end can convert the information into voice information for convenient operation. It can be connected with a PC to establish a human-computer interaction action information service platform.

012065
The following article is Open access

With the continuous advancement of new urbanization in China, the problems of "agriculture, rural areas(RA) and farmers" in China have been gradually solved effectively, and on this basis, the development of rural tourism has also been rapidly promoted. New urbanization and rural tourism(RT) promote each other. On the one hand, the construction of new urbanization promotes the generation of RT; on the other hand, the development of RT promotes the further construction of new urbanization. However, there are also a series of problems in the development of RT in China. The purpose of this paper is to analyze the sustainable-development of RT, construct the relevant theoretical analysis framework, and provide theoretical guidance for the sustainable-development of RT. This paper starts from the concrete connotation of the sustainable-development of RT, comprehensively analyzing the connotation of the sustainable-development of RT from different dimensions, and constructing the theoretical analysis framework by means of index weight calculation. The experimental results show that the connotation of the sustainable-development of RT is extremely rich. To truly realize the sustainable-development of RT, it is necessary to construct the theoretical analysis framework of the development model of RT in order to provide positive and beneficial guidance for the sustainable-development of RT.

012066
The following article is Open access

and

In this paper, based on the empirical mode decomposition (EEMD) method, considering the frequency dependent characteristics of the pressure response, the borehole strain observation data of Daixian station in Shanxi Province and the pressure observation curve of synchronous observation are decomposed, and the eigenmode function (IMF) sequences of different frequency bands are obtained. Then, on the same narrow frequency band of IMF, the one-dimensional regression analysis of borehole strain observation value and pressure change is carried out respectively, and the frequency dependent pressure response coefficient is obtained, which realizes the refined pressure correction of borehole observation data. The results show that this method can effectively deduct the influence of air pressure, and the frequency distribution characteristics of air pressure response are clear.

012067
The following article is Open access

, and

The national central city is the "spire city" in China's urban system planning, which plays an important role in leading regional scientific and technological innovation. In this paper, DEA-Windows model is used to analyze the efficiency of science and technology innovation in 9 National Central Cities in China from 2013 to 2017. The results show that the overall level of science and technology innovation efficiency in national central cities is increasing year by year, but the average value is only 0.7369, and there is still a large space for improvement; in terms of spatial differences, 4 cities, Beijing, Chengdu, Chongqing and Wuhan, had effective status in the calculation period, while the other cities had no effective status, and the efficiency of scientific and technological innovation was also significantly different in 9 cities.

012068
The following article is Open access

The progress of information technology promotes development technology and the innovation of original media's development. The use of computer technology in film and television media has brought unprecedented changes to the original information publishing methods. not only it enriches the content of film and television communication, but also improves the quality and speed of film and television media content.combining years of teaching experience, the author discusses and analyzes the application of computer technology in film and television media.

012069
The following article is Open access

, , and

This paper presents the application of information technology in employee training of the State Grid Corporation of China (SGCC). It focuses on the construction and function of online learning platform, the development of Corporate Massive Open Online Courses (MOOCs), and employees learning method. The Corporate MOOC platform is built on the enterprise cloud server and plays a critical role in the construction of enterprise culture, the publicizing of enterprise policies, the recruitment and training of employees, and the appraisal and promotion of employees' abilities. The Knowledge Integration Center organized staff teams to build competency models and create MOOC contents based on industry skill requirements, maintain consistency between MOOC contents and competency models, and place them on a cloud-based MOOC platform. By using digital technology, instructional services are supplied to employees and assessment systems have been built, and assessment systems make great contributions to employee recruitment, training, appraisal and promotion. The Corporate MOOCs provides a good opportunity for those employees who can't leave their jobs to learn at their own pace and have a positive relationship with the improvement and innovation of employees' abilities.

012070
The following article is Open access

During the construction process of construction projects, the cost budgeting work is an important guarantee for the entire project construction. Due to the influence of the social and economic market and the error problems caused by the related cost staff during the work process, these external factors will affect the construction project. The overall cost budgeting work has had a serious impact. The internal cost of construction projects has received the full attention of the company's internal management staff. It is mainly aimed at common problems and loopholes in cost work, which is manifested as the phenomenon of over budget in engineering. In this case, serious problems such as out-of-control costs in building construction will also arise, and eventually the overall economic benefits of construction enterprises will decline. Based on the above background, the purpose of this paper is to study the reasons for the over-budgeting of construction costs and their control strategies based on big data analysis. This article mainly addresses the problem that traditional anomaly data detection methods cannot detect anomalous data that is related to the description of the list. This paper proposes to use a list classifier and use the clustering center obtained by K-means clustering as a label. This kind of abnormal data is detected, and the experimental results of the proposed method are compared with traditional methods. Among them, the accuracy of the method of using the list classification method to detect abnormal data of the integrated unit price is 0.9107, while the accuracy of the traditional distance-based method is 0.8304. The experimental results show that the method proposed in this paper using the inventory classification method to detect abnormal data of the integrated unit price is more accurate than the traditional method, and can solve the problem of over-budgeting of construction costs to a certain extent.

012071
The following article is Open access

and

Big data computing model refers to various high-level abstract models extracted and established from the diverse big data computing problems and requirements according to big data's different data characteristics and computational characteristics. In order to improve the data quality, a method of adding semantics to the data is proposed to help users identify big data's pattern. In this way, we can make use of the semantic value of the data, detect big data, and propose a big data computing model through the semantic analysis of the data. The paper presents research on big data computing model based on semantic data analysis technology.

012072
The following article is Open access

Pipa playing is an artistic and comprehensive performance, which requires students to actively dabble in many aspects of knowledge, especially to strengthen the research and exploration of aesthetics and literature. Therefore, in the process of pipa playing, students need dual emotional experience guidance and emotional expression. The practice shows that it is an important condition for the success of pipa performance to have standardized, generous and stretched pipa playing movements. This paper expounds in detail the skills of pipa playing, and strengthens the embodiment of students' emotional expression by using various teaching methods, in order to improve students' playing literacy in an all-round way.

012073
The following article is Open access

and

Nowadays, people's reading methods have undergone great changes. More and more readers choose to read electronic information to meet reading needs. Therefore, a large number of reading mobile applications have emerged. This article describes the user experience theory and analyzes the types of reading mobile applications in the market. Taking iReader, Kindle, and QQ reading as examples, they compare their similarities and differences in user experience design.

012074
The following article is Open access

and

The 19th National Congress of the Communist Party of China stressed the new urbanization strategies, pointing out the promotion of the development from traditional urbanization to new urbanization, which contains the development characteristics as urban and rural overall development, industry interaction, economical and intensive land and harmonious development. It aims to solve the issues relating to agriculture, farmers and rural areas with the strategy of rural vitalization which takes rural tourism as the starting point to drive the development of rural economy, and then realizes the new urbanization. The purpose of this paper is to study the problem characteristics and corresponding classification of rural tourism in Guangdong and establish the sustainable development model of rural tourism in Guangdong. This paper starts from the perspective of rural revitalization, takes the new urbanization as the background, combines the theoretical basis and the realistic environmental factors, extracts the development appeals, existing main problems and causes of rural tourism in Guangdong, and classifies them by combining the characteristics of resource types and other factors. On this basis, combining with the successful experience of rural development at home and abroad, this paper puts forward the selection of the pedigree of sustainable development mode of rural tourism in Guangdong, and the differentiated and targeted design responding to control countermeasures and safeguard mechanism of sustainable development of rural tourism in Guangdong in the context of new urbanization. The experimental results show that the establishment of the sustainable development model of rural tourism can effectively alleviate the existing problems in rural tourism, promote the development of new urbanization and realize the strategy of rural revitalization.

012075
The following article is Open access

With the continuous development and progress of human science and technology, interactive 3D multimedia technology is gradually integrated into classroom teaching. Nowadays, the application of 3D multimedia technology mobilizes students 'enthusiasm for participating in the classroom and students' initiative for classroom learning. It concretely presents the content that is difficult for teachers to express in the classroom, and improves the pertinence of teaching. This article mainly studies the effectiveness of 3D multimedia technology in optimization in college teaching. This article analyzes the specific applications and effects of 3D multimedia technology, including its basic concepts and application advantages in human anatomy practice teaching. The experiments in this article found that after applying 3D multimedia technology to achieve 3D reconstruction, the motion clarity of the viewing operation process during surgery was greater than 45%, and the highest viewing degree without 3D multimedia technology was 27%. It can be seen that the 3D multimedia teaching mode has a significant effect on improving the quality of teaching.

012076
The following article is Open access

In order to obtain accurate and fast fault information from circuit vibration signals, a method of extracting fault functions based on degradation conditions under limited and improved bandwidth experimental conditions is proposed. The fault analysis of the circuit fault is carried out through the multi-carrier conveyor relationship.

012077
The following article is Open access

and

With the implementation of internationalization, the quality of English education has become more and more important. How to assess English Teaching Quality of contemporary college students has become one of the research hot spots. The widespread application of big data analysis is to solve the current English Teaching of college students. Evaluation issues provide new directions for resolution. Construction of College English TQA System Based on Big Data Analysis. It is based on the construction of big data of college students 'English teaching quality, by constructing a model, visually presenting the college English teaching quality trajectory, so as to understand the students' learning situation more intuitively. Aiming at the complex changes in the quality of English teaching, this paper designs a big data analysis model of English teaching quality for college students in order to obtain high-precision evaluation results of English teaching quality. This paper uses big data analysis technology to build a college English TQA model, and experimentally verifies the reliability of the model established in this paper. After experimental verification, it is found that the big data analysis of the college English TQA model proposed by this paper has an evaluation accuracy of 90.22% This fully demonstrates the reliability of the model and provides a good reference value for the evaluation of teaching quality.

012078
The following article is Open access

After heat treatment, the 175 crankshaft of automobile engine is extremely prone to serious bending phenomenon (the straightness is more than 2um), and the flexure of the crankshaft when the fine rod is bent and cold. This paper has developed the corresponding 175 crankshaft after heat treatment. The reheat is corrected again, and the corrected 175 crankshaft is shot blasting, and the internal stress is further eliminated. The special inspection tool is used to inspect the vertical parting line of the 175 crankshaft in 90 degree range, and the test result is 100% qualified and the deformation amount is controlled within 2um, and the secondary heat treatment is verified. The practicality and effectiveness of shot blasting processing technology.

012079
The following article is Open access

Information education is of great strategic significance to promote educational innovation and improve talent training in higher education. It is a necessary choice to realize the sustainable development of education, and it is the core competence of teachers in the information age. At present, the researches on teachers' informationized teaching ability mainly focus on the meaning, structure and ability elements, and there are few explorations on the evaluation methods. Through the research of previous literature and related theories as well as Delphi method, this paper analyzes the index composition and weight distribution of teachers' informatization ability, and constructs the evaluation model of teachers' informatization ability by using fuzzy evaluation method to realize the qualitative and quantitative evaluation of teachers' informatization ability. The purpose of this paper is to provide some references for teachers' ability evaluation and promotion, and also to provide a basis for schools and regions to formulate teacher training plans and school informatization development plans.

012080
The following article is Open access

Computer technology has paved the way for a country's modernization. Under the leadership of the central government, the "Internet +" national strategy is deeply rooted in the hearts of the people. At the same time, in the context of computer technology, music classrooms and teaching methods have also changed. New music teaching methods have appeared in the infinite development of Smart Class as they have broken the traditional method of music teaching in the classroom and arranged the relationship between music teachings. This paper analyzes the unique advantages and problems of introducing new music teaching into the intelligent teaching environment, and puts forward some suggestions and solutions. I hope that more people in the field of music education can keep up with the times and make full use of new network technologies, thereby rapidly improving traditional teaching methods, improving teaching efficiency, and increasing the number of music talents in China.

012081
The following article is Open access

This paper researches on the role of new medium in tourist destination marketing. Firstly, the definition and necessity of new medium are analyzed. The paper focuses on the advantage analysis of new medium compared with traditional medium from the perspective of information flow. Further build a cooperative operation pattern between new medium and tourism destination. Finally, based on new medium, the paper analyzes the process of tourist destination marketing.

012082
The following article is Open access

With the progress of science and technology and the continuous development of social economy, the traditional manual production is gradually replaced by modern equipment production. As the most important part of modern equipment, bearing is the guarantee of normal operation of modern equipment. In order to ensure the normal work of the bearing, it is necessary to conduct real-time measurement and control of all aspects of the bearing performance. The purpose of this paper is to promote the establishment of bearing test bench under PLC control technology, to realize data collection and monitoring of bearing performance, to promote the scientific nature of bearing test, so as to continuously improve bearing technology and help the development of social production. Firstly, PLC control technology is briefly introduced in this paper. On this basis, a specific scheme is proposed to realize the measurement and control system of bearing performance test bench, and the reliability of the system is tested by system equilibrium model algorithm. Experiments in this paper show that the system can realize real-time monitoring of bearing performance and ensure the scientificity and accuracy of bearing performance test.

012083
The following article is Open access

With the advent of the "Internet +" era, the Beautiful China has entered a new era of industrial integration and innovation. MOOC teaching mode, as an inevitable product of the development of education informationization, leading the faster development of education and teaching. Among them, the music MOOC is the biggest innovation in the teaching mode of universities in the new situation. The arrival of the "MOOC" era has had a profound impact on music teaching. Based on the author's years of teaching experience, this paper analyzes the current development of college music MOOCs in the network age and discusses the future development trend of music MOOCs.

012084
The following article is Open access

, and

The distribution of loess in China is concentrated in the Midwest, which is a typical structural soil. Its structure is extremely special, and its sensitivity to water is also unique. The strength and deformation characteristics of this kind of unsaturated soil have a great influence on the stress it bears. This study starts with the same stress ratio loading of loess with different moisture content and corresponding remolded loess, aiming at the changes of the structure of unsaturated soil under different stress ratios. Based on the comprehensive analysis of structural potential parameters of unsaturated soil under the condition of poor stress, the appropriate hardening parameters are constructed, and the corresponding elastic-plastic constitutive model is established. At first, the corresponding test scheme is designed, and then the test results are analyzed. Finally, the specific analysis is carried out from the constitutive model of stress elastic-plasticity of unsaturated soils.

012085
The following article is Open access

The relationship between scientific research and teaching is a focal point in the development of higher education. In different environments, the relationship between scientific research and teaching has different characteristics. With the continuous development of society and economy, the teaching and research in universities are facing new demands. The former elite education model is facing unprecedented challenges, and the relationship between teaching and research is being re-examined. At present, the research on the relationship between scientific research and teaching is mainly based on questionnaires. This paper USES big data analysis to design a model of the relationship between teaching and scientific research, and further empirical analysis of the relationship between the two. The aim is to deal with the relationship between teachers' teaching ability and scientific research output correctly, promote the coordinated development of scientific research and teaching, provide a more favorable environment for the benign development of higher education, and further promote the development of colleges and universities in China.

012086
The following article is Open access

, , , and

The so-called incremental power distribution network is a newly added power distribution network serving the public. At present, the enhanced power distribution network is often used in industrial parks with voltage levels of 220KV, 110KV and below. The basic conditions for the construction of the incremental power distribution network are in line with the provincial planning of power distribution network, which avoids conflicts such as repeated construction and a cross power supply between the incremental power distribution network and the provincial power distribution network. This paper studies the ways to plan the power distribution network in the industrial area under the liberalization of incremental power distribution business to provide reference for relevant practitioners.

artificial intelligence

012087
The following article is Open access

With the promotion of AI to national strategy, it will have a profound impact on various industries in China. Colleges and universities should follow the trend of the times, seize the pace of the "Ai" era, and apply "Ai" to the service platform of colleges and universities. The purpose of this paper is to study the application of artificial intelligence in service platform. First, the paper analyzes the technology of artificial intelligence, puts forward the way that artificial intelligence can build university innovation service platform, and defines the construction method of University wechat innovation service platform. Using the method of questionnaire, based on the theoretical analysis and network survey, the questionnaire is designed. The users of the regional university library are selected as the survey objects, and the questionnaire is distributed within the scope of the University. The experimental results show that in the investigation of the reasons for the readers' infrequent use of the library's personalized services, according to the investigation of all the problems that may lead to the readers' infrequent use of the library's services, 48.2% of the readers expressed that they did not understand the library's information resources; 38.85% of the readers thought that the library's services were lack of personalization and pertinence and were open Communication with new media platform is also the inevitable direction of the development of University Libraries and service systems in China.

012088
The following article is Open access

With the rapid development of modern science and technology today, a variety of emerging technologies representing advanced productivity can not only greatly improve the effect of equipment automation, but also promote the overall quality and level of manufacturing equipment, and even to the greatest extent to avoid the occurrence of safety accidents caused by human factors. Recently, in the mechatronic pump industry has emerged with the development of artificial intelligence technology color, the complexity of its internal structure and the precision of electronic control system has even reached a jaw-dropping degree. Artificial intelligence technology involves a wide range of knowledge, and has a very high degree of complexity and technology, the use of mechanical and electronic industry will certainly promote the whole industry to a higher stage of development. It can be expected that if ai technology can be applied continuously and stably in the mech industry, then the integrated drive system is expected to achieve the goal of high turnover and low cost, and will achieve value compensation in terms of economy and efficiency by improving operation characteristics and saving energy.

012089
The following article is Open access

and

With the continuous progress of science and technology, People's Daily life is also toward the direction of intelligent development, intelligent technology embodies in every aspect of people's lives. As an important part of people's life and production, indoor lighting also gradually reflects the intelligent factors. Indoor lighting has gradually realized automatic brightness adjustment, that is, with the help of natural light brightness changes to adjust the brightness of indoor lighting. The purpose of this paper is to realize the automatic adjustment of indoor lighting through the design of indoor lighting circuit for automatic brightness adjustment. This article first to automatically adjust the brightness has carried on the summary of the basic circuit, secondly from circuit control principle, material selection and use of all aspects, such as the design of main circuit to automatically adjust the indoor light circuit design are discussed in detail, finally by means of indoor lighting brightness calculation method to automatically adjust the brightness of the reliability of the circuit design for testing. The experiments in this paper show that the design of indoor lighting circuit with automatic brightness adjustment is reliable and can realize the automatic adjustment of indoor lighting according to the ambient light.

012090
The following article is Open access

, and

Aiming at the phenomenon of blind selection during the course selection of college students under the credit system, the paper puts forward the most preferred course selection recommendation algorithm and the recommended course selection algorithm based on comprehensive evaluation of curriculum. The most preferred course selection recommendation algorithm uses 0-1 integer programming model to give the minimal courses and the maximum credits; the comprehensive evaluation of curriculum based on considering the students' learning ability and learning interest gives he curriculum evaluation coefficient, students according to the curriculum evaluation coefficient can objectively and accurately select elective courses for their own development ability. These two elective courses conform to the actual situation of students' elective courses, and can effectively guide students to select courses.

012091
The following article is Open access

, and

Wireless sensor networks(WSN) are one of the hot topics in current information technology research. With the diversification of wireless sensor network applications and the gradual maturity of node positioning technology for static networks, mobile node positioning technology. In order to find a method for optimizing the positioning accuracy of wireless network nodes based on artificial intelligence technology and improve the positioning accuracy, a large-scale simulation experiment is performed in this paper. After constructing a probabilistic model and conducting a large number of simulation experiments, a series of random variable samples are obtained. After statistical processing of these simulation samples, a solution to the problem is found accordingly. By comparing the average positioning error with the ML algorithm, it is found that the SA-L algorithm using artificial intelligence method has less dependence on the density of beacon nodes, improves the accuracy of network node positioning, and is more suitable for node positioning of WSN. Research shows that artificial intelligence technology can improve the accuracy of network node positioning and provide a lot of reference for the development of wireless networks.

012092
The following article is Open access

Since the founding of the People's Republic of China, from MAO zedong to xi jinping always adhere to the cultural construction in the important position of national construction, adhere to the leadership of the party for cultural construction, adhere to the guidance of marxism for cultural construction, adhere to the "use of the past for the present" "foreign for the use" construction of new socialist culture. In cultural construction, it is urgent to develop the theme creation related to culture. At the same time, with the gradual development of artificial intelligence, VR (virtual reality) has gradually entered people's vision, and VR has also been combined with innovation in various fields. The purpose of this paper is to study the mechanism of combining VR and painting technology on the premise of subject creation. In this paper, from the perspective of theme creation, with the strategy of "VR +" as the background, combined with the realistic background and the related theoretical research, to promote the development of VR painting technology as the research object, from the possibility and necessity of VR painting technology development two aspects of analysis, combined with literature analysis in VR painting theme creation technology can be from what respect to innovate and improve, on the basis of this puts forward Suggestions of technical innovation and development of VR painting and plan, in the hope of theme creation VR painting technology development to a higher level, for the development of VR broaden the field. The experimental results show that VR painting technology can alleviate some difficulties in theme creation, promote the innovative development of theme creation, realize the new development of cultural construction, and enable more new art forms to sprout in cultural construction.

012093
The following article is Open access

With the vigorous development of computer technology, artificial intelligence technology has also been greatly improved, and its application in sports competitions has become more and more widespread. The basketball game is a fierce rivalry under the team. In addition to testing the physical fitness of athletes, the ability to independently coordinate and plan athletes needs to be tested. Artificial intelligence has great application value in basketball games. Applying artificial intelligence technology to field decision-making in basketball games, real-time display of basketball game field data in real time, assisting coaches in field analysis and decision-making, can provide targeted training goals for daily training, and has strong application value. In this paper, an artificial intelligence assisting system for basketball game field decision-making is constructed to explore the application of artificial intelligence technology in basketball games. This paper tests the system proposed in this article through simulation experiments. The test results show that in the module test, the module error rate is 0.5%, the reliability is high, the module functions can be basically realized, the system responds quickly, and the security is high. The results of this paper will provide a good paradigm role for the application of artificial intelligence in sports competitions.

012094
The following article is Open access

and

With the development of computer and network technology, teachers' continuing education has also developed from traditional training to social networked training. The large-scale, open and online education in online training has transformed teacher training activities from a single form to a complex one. Higher requirements have been put forward on the construction of network training platforms and the setting and design of courses. According to the current status and development trend of computer technology, the development of research platforms is mainly based on the open technology and high integration, and the most advanced and mature mainstream technologies and products based on high-level application development. Under the premise of high security and reliability, the research platform is easy to use, maintainable and scalable. The purpose of this article is to design and implement a web-based teacher distance learning platform. This article uses .NET technology as the site development technology to develop the website, and uses Oraele9i database and object web dynamic web technology to build the database, and builds three modules of system management, teacher management, and student training. Experiments were conducted on a certain school through the establishment of a platform and the setting of school curriculums. After learning through the training, it was found that after participating in the training, students were satisfied with "the students are satisfied with the network training process", "whether the training content meets the needs of the students", "network training platform" Satisfaction of resources "and" Whether the process of activities in the training process are satisfactory "are all above 88%.

012095
The following article is Open access

With the development of society, digital image, the product of the development of digital technology, is more and more used in multimedia image art. With the rapid development of science and technology, in the 21st century, the use of digital image in art works has been very popular, showing a blowout trend. Digital technology is integrated into image art in a way of mutual integration. How to make digital image play a very good auxiliary role in art works? It makes the finishing point, but it doesn't make the works dazzle and lose one thing or another. The purpose of this paper is to explore the role of digital image processing in the image art under the background of big data, so as to combine the Internet of things application technology and update the existing mode of art performance. In this paper, we will use the research method of specific analysis to compare the data and come to a conclusion. The research results show that image communication plays an important role in promoting the spread of economy, culture and daily life. In the process of image communication, creativity is essential. In the current industrial development, creative industry, as a new industrial form, can organically combine with other industries, and effectively promote the rise and development of other industries.

012096
The following article is Open access

In this era of information and intelligence, it seems that painting graphics have been seriously marginalized, which also produced how to better develop painting technology in the modern society, this is not only the responsibility of all painters, but also the common cultural inheritance that all human beings need to face. Today's prevailing digital image technology has had a profound impact on the field of artistic creation, and oil painting has suffered an unprecedented blow in this process. The purpose of this paper is to explore how to make use of modern digital image technology to make the creation of traditional optimization not only retain the traditional flavor, but also keep pace with the pace of The Times. This paper introduces the origin and development of oil painting, introduces the application of digital image technology in the field of painting, and puts forward some strategies to improve the quality of oil painting by preprocessing oil painting with image processing technology. The research results show that in the process of oil painting creation, we should regard oil painting as an extension of imagination, so we can fully enhance oil painting creation with the help of modern technology, or even directly use modern image technology to spray. In other words, under the influence of realism, although the creation of oil painting is largely limited, using image processing technology to create oil painting is a very feasible creation scheme.

012097
The following article is Open access

With the development of information technology and the continuous improvement of development level, artificial intelligence technology has also made better development. There are more and more application scenarios of artificial intelligence technology in computer networks, and it also plays a key role. Aiming at the shortcomings of traditional computer network routing methods such as slow iterative convergence and high resource occupancy, this paper proposes an artificial intelligence routing method based on optimized PSO. Based on the principle of the PSO algorithm, a mathematical model for optimal link optimization of a computer network is constructed, and local optimization is performed for the shortcomings of the classic PSO algorithm. The optimal path labelling function is given to the particles, and the optimal network is identified by continuously updating the current position and current speed. Link topology and travel path. Simulation results show that the proposed artificial intelligence method has faster iterative optimization speed, lower network delay, lower hardware resource occupancy under the same number of nodes and network structure, and can improve and improve the foundation of computer networks.

012098
The following article is Open access

This paper takes SCM of arm31 as the core to upgrade the function of intelligent seat for the elderly. To ensure that the SCM system can directly take over the system to form an automatic risk change out when the seat is in a dangerous state such as uncontrolled sliding and excessive three-axis inclination. At the same time, the system uses iFLYTEK voice recognition module to realize the voice control of the seat, and the system uses the vital signs related app of the contracted hospital to realize the automatic alarm function of the hospital. The use of the seat can effectively improve the daily out safety of the elderly. It is very important to improve the quality of life of the elderly.

012099
The following article is Open access

Intelligent technology, which began to appear and gradually developed in the second half of the last century, is now in the forefront of science and technology and is the benchmark of the level of computer in a country. With the rise of intelligent technology, the network tends to be more and more open, the attacks are more and more intelligent, and there is a lack of security defense technicians. After the intelligent technology has been widely used in spam processing, illegal intrusion detection, expert system and other network security defense, the network security defense has become more secure and reliable than ever, and the security has been well guaranteed.

012100
The following article is Open access

In view of the irreplaceable effect of waterway transportation on domestic economic and social development, the artificial intelligence technology and the ship communication technology are deeply integrated to create a modern intelligent ship to adapt to the increasingly high pursuit of modern transportation capacity. This paper analyzes the current situation of ship manufacturing and transportation, and discusses the feasibility and preliminary application description of the artificial intelligence technology that can be used in ship communication design. Finally, a new prospect for the application of intelligent technology in the field of fully intelligent ship technology is presented.

012101
The following article is Open access

and

AI teaching is an important part of Internet + education and intelligent education, and also an inevitable trend of the times. Through the automatic language and language sense recognition processing technology, the robot can sense the life scene and voice emotion of infants, and automatically recognize and play functional music. Artificial intelligence develops rapidly and is widely used in various fields. Music robot with certain neural network can understand music, analyze music and create music. In the field of professional music education, all kinds of new interactive teaching music intelligent system based on music artificial intelligence technology will be a new mode of perceiving music, cognitive music, creating music and music education.

012102
The following article is Open access

Artificial intelligence technology is a new industry, which affects the world in a unique way. In the 21st century, artificial intelligence has reached the peak of stage, which has become the representative of emerging technology. In the financial field, artificial intelligence has been fully applied, which improves the prosperity of the financial industry. However, artificial intelligence technology also increases the instability and risk factors of financial industry. This paper first analysis the application of artificial intelligence in the financial field. Then, this paper puts forward some security problems. Finally, some suggestions are put forward.

012103
The following article is Open access

In the era of artificial intelligence, no user has ever disclosed personal privacy data to a certain party. The current AI software can fully integrate the fragment information of a user on different site platforms, and finally complete the portrait of the user. In order to prevent personal privacy leakage under the condition of AI, this paper studies the technology of personal privacy protection from the perspective of social engineering. It is found that by fully splitting the personal account group, i.e. using multiple mobile phone numbers and account binding status, and avoiding the use of the registration free login function, personal information is split into multiple or even more than ten user information by AI. At this time, these information will be discarded by AI due to incomplete information, so as to achieve the effect of protecting personal information.

012104
The following article is Open access

In the process of its development and application, the computer network has created the virtual network space, and as the relationship with the computer network is becoming more and more close, the improvement of the security defense of cyberspace ability is becoming more and more urgent. The use of artificial intelligence technology in cyberspace security defense can not only accept and process a large number of Internet information quickly and efficiently, but also improve the security defense of cyberspace and prevent the infringement of illegal elements, which is a matter of great concern to every user. Based on the analysis of the characteristics of cyberspace security defense and artificial intelligence technology, this paper discusses the application of artificial intelligence technology in cyberspace security defense with examples.

012105
The following article is Open access

Microgrid technology can solve the large-scale access problem of distributed energy, the key problem to be solved is how to realize multiple distributed electricity. In the work, the integrated control method for droop control and droop control is adopted to realize the microgrid without communication lines. The seamless switching of two modes of grid connection and isolated operation improves the stability and reliability of the system and realizes the control of distributed power supply.

012106
The following article is Open access

, , and

With the development of robot technology and industrial automation, the manufacturing mode based on robot and intelligent equipment has been started. Intelligent tracing Automatic Guided Car (AGV) is a typical application of industrial robot. Based on MK60DN512ZVLQ10 (K60), an embedded system for electromagnetic sensing and infrared obstacle avoidance is designed. Based on the 32-bit single-chip microcomputer K60 produced by NXP, an embedded tracking system for intelligent cars is designed and implemented, which is based on electromagnetic sensing and infrared obstacle avoidance. According to the electromagnetic track laid in advance, the arrangement structure of the inductance coil and the core tracking algorithm and program are designed according to the track elements, and the automatic tracking and obstacle avoidance functions of the car are realized under the condition of no human operation. This design adopts low-cost inductance coil, which is convenient to change the track path in different environment, instead of the high-cost and hard-to-switch track path in the past, and provides a reference plan for intelligent control such as unmanned driving.

012107
The following article is Open access

, , and

With the development of electric power enterprises, the types and quantity of storage management materials are also increasing. With the rapid increase of warehousing frequency, warehousing management is very complex and diversified. The traditional manual warehouse operation mode has been difficult to meet the rapid storage management, which will seriously affect the operation efficiency of enterprises. By improving the intelligent warehouse management system, we must use RFID application technology, visualization technology, etc., which will improve the efficiency of material management. By reducing the cost of material management, we will achieve the optimal management of warehouse materials. Firstly, this paper analyzes the development trend of storage management and RFID technology. Then, the whole idea of system design is established.

012108
The following article is Open access

, and

With the gradual formation of big data environment and Internet + social environment, the library and information work has undergone tremendous changes. Big data work has become the main body of Library and information work. This paper focuses on the analysis of the content of Library and information work and the responsibilities of librarians, and studies the working methods and personal development mode of Librarians in the big data environment. In the near future, library and information major will be in front of us with a new face. Library and information management personnel should constantly enrich themselves, constantly accept challenges, and actively adapt to the change of work content and work methods.

012109
The following article is Open access

With the development of society, people have higher and higher requirements for the convenience of life. Therefore, it is of great practical significance to study the remote control system of household appliances based on single chip microcomputer. This paper first introduces the common scheme of remote control technology of home appliances, then analyses the module of remote control system of home appliances based on single chip microcomputer, and finally gives the design scheme of remote control system of home appliances based on single chip microcomputer.

012110
The following article is Open access

BIM is not only a 3D model, it provides information about the physical and functional components of the structure to support its construction and management throughout its life cycle. VR is not only to provide immersive simulation, it can also be called an integrated collaborative design platform, which will completely change how architects use BIM Technology. The application of R technology in the field of architecture and BIM system will further visualize the causes and results of architectural design. Multi disciplines can also start to intervene from the beginning of design, integrate various factors in the design process for consideration, maximize the expression of design intent, and enable users to experience it personally.

012111
The following article is Open access

With the development of science and technology, mechatronics production technology has been widely used. However, for many people who are not exposed to the technical system, or will think that Mechatronics is only a technical mode. Mechatronics is an integrated technology, which needs many links. It means that with the development of microelectronics, sensors and other technologies, mechatronics can also make great progress. Before analyzing the key technology of mechatronics, we should first make clear its composition structure to eliminate some people's misunderstanding. Mechatronics refers to the integration of different important mechanical and electrical work links, with microprocessors and mainframe as the control center, and orderly coordination of work in each link.

012112
The following article is Open access

Information interaction design leads the healthy development of smart city Information interaction design intersects with various disciplines and is related to "a kind of conscious information control activity". It is committed to the reasonable control and arrangement of information, "it pays close attention to the whole process of information expression, processing, retrieval, identification and communication activities", so as to achieve the effective, convenient and accurate information transmission.

012113
The following article is Open access

The calculation method for the form similarity of English words is carried out. An algorithm where the upper limit of string similarity parameters can be set is used for automatic extraction of words with similar spellings from a specified vocabulary range. The frequently confused words with similar spellings screened can enrich the English lexical knowledge base after duplicate removal and classification. The frequently confused word knowledge base is of application value in the fields of textbook writing, vocabulary training design, dictionary compilation, and real word misspelling correction.

012114
The following article is Open access

Given the problems of low work efficiency, misplaced delivery and pick-up time, difficulty to build brand image, etc. in the logistics industry, a design scheme for intelligent pick-up terminal based on the mobile Internet is proposed. Firstly, the current status of the last mile delivery in the logistics industry is introduced. Various problems in the distribution are identified. Subsequently, the system architecture, hardware block diagram, and software flowchart of the design are described. The design has implemented intelligent distribution, which can improve logistics distribution efficiency and establish the brand image effectively.

012115
The following article is Open access

Artificial intelligence has developed rapidly and is widely used in various fields. Music robots with specific neural networks can understand, analyze, and create music. In this paper, based on the artificial intelligence technology, human music intelligence is analyzed through big data to explore and discuss the construction of various new interactive teaching music intelligent systems in the field of professional music education with music artificial intelligence technology as the platform, seeking a new mode of music perception, cognition, creation, and education.

012116
The following article is Open access

and

With the steady progress of China's urbanization process, the smart city construction is also rising quietly. At the same time, the advent of the big data era has also provided new ideas for the construction and development of smart cities. In this paper, mainly the corresponding strategies for the construction and development of smart cities in the era of big data are proposed through the understanding of the features of smart cities and the positive role played by big data in the smart city construction.

012117
The following article is Open access

Forty years of reform and opening up, China's economic development has achieved world-renowned achievements. At the same time, the power system has also developed rapidly and the degree of automation has continued to increase. The development of power system and power grid infrastructure, computer software and hardware, and communication technology are also inseparable. This article describes the current situation of power development in China, combining three aspects of power system dispatching automation, substation automation, and distribution network automation, and looks forward to its development direction.

012118
The following article is Open access

, and

In order to improve the effect of knife-holding training and reduce the requirement of experimental environment, an intelligent tutor system for knife-holding training is designed and studied. The system can simulate the anatomy working scene, and has the function of intelligent recognition of scalpel holding technique and movement. It can also automatically complete the whole experiment teaching process, such as knife-holding training task layout, precise monitoring of training process, multimedia interactive training guidance, training result evaluation, educational administration management and so on. The experimental results show that the new design concept and practice method of the system are of great significance for reference and popularization.

012119
The following article is Open access

, , , and

Accurate prediction of oil production is difficult because there are so many factors affecting production. In this paper, new screening rules are used for principal component analysis and factor screening, the support vector machine is used to complete subsequent learning and prediction work, and Gaussian regression is selected to determine the dividing line of prediction results. The results show that the model is more accurate in predicting Wells with production below 2000 cubic meters, and more accurate in predicting Wells with production above 2000 cubic meters.

012120
The following article is Open access

, , , , and

The design of the smart flowerpot is based on STC89C52 single-chip microcomputer, which uses photosensitivity and photoelectricity, that usually used in the environment detection sensor, to perform the real-time monitoring of flower growth, in order to maintain the environmental parameters suitable for flower growth inside the flowerpot, and guarantee a stable and healthy living environment for plants and evaluate the health status. The overall system adopts a modular design, and takes the measurement of soil temperature and humidity sensor module as an example for detailed design. The smart flowerpot has the advantages of simple and stable operation and convenient debugging.

012121
The following article is Open access

, , , , , and

As a major agricultural country in the world, agricultural modernization has always been one of the most important problems to solve. With the development of science and technology, China's agriculture has evolved from traditional agriculture to smart agriculture [1]. In order to improve the level of agricultural modernization, an intelligent agricultural detection system is designed, which combines embedded real-time processor with various sensors to realize the collection of underlying agricultural information, data transmission through local area networkand monitoring of real-time environmental data information to monitor crops growth. The results of the system show that the system can greatly improve the agricultural production efficiency [2].

012122
The following article is Open access

With the continuous development of mobile communication and Internet technologies, the development and research of software applications based on mobile Internet have also entered the blowout development stage. At the same time, the shortcomings of traditional PC desktop applications, which lack portability, have been gradually enlarged. What has emerged are the rapid development of Web applications and mobile applications, and the emergence of new concepts such as mobile office. To this end, this article studies the design and implementation of a railway transportation dispatching system based on mobile Internet technology. On the basis of the existing office supervision method of the railway supervision company and the on-site supervision method of the supervision engineer, based on the MQTT protocol, it implements the active push of messages, develops basic supervision and to-do tasks modules. During the design and development of this system, the Web end will apply the current popular responsive web development technology to enhance the user's interactive experience on a variety of different platforms. This system uses an object-oriented analysis method to design the architecture of the railway transportation dispatching system. After a detailed design analysis, a complete set of railway transportation dispatching solutions is proposed.

012123
The following article is Open access

In recent years, with the rapid development of sports in our country, the national importance of sports is also increasing. In order to further improve the level of physical education in our country, we began to pay attention to the teaching of physical stunt. Sports stunt is difficult and dangerous. These characteristics determine that sports stunt teaching should improve teaching efficiency as much as possible. Therefore, the decomposition and identification of sports stunt is particularly important. The traditional sports stunt teaching can not identify the movements accurately, which brings some difficulties to the sports stunt teaching. Video recognition technology provides a new means for the teaching of physical stunt and greatly improves the teaching effect. This paper first gives an overview of video recognition and sports stunt, analyzes the advantages of video recognition technology in sports stunt teaching, and analyzes its feasibility based on data feature screening algorithm. It not only promotes the further integration of video recognition technology and teaching, but also deepens the research on this aspect.

012124
The following article is Open access

and

Network security refers to the protection of the hardware, software and data of the network system caused by accidental or malicious reasons caused by damage, change, leakage, so that the system can run continuously, reliably and normally, and the network service is not interrupted. Firewall technology is the main means to solve the network security problem. Firewall technology is an applied security technology based on modern communication network technology and information technology. By using audit records in intrusion detection system, intrusion detection system can identify any undesired activities, so as to limit these activities in order to protect the security of the system. Therefore, only by taking a variety of preventive measures and formulating strict confidentiality policies and clear security policies, can we ensure the confidentiality, integrity and availability of information in real time, and provide a strong security guarantee for the network.

012125
The following article is Open access

With the continuous evolution of information technology, China has entered the information age, the use and promotion of smart phone is the inevitable trend of information evolution, but also an important sign of the information era. With large quantities of uses of smart phones, a large number of mobile apps have appeared, and different APP types have emerged. Currently, mobile apps have been applied in various fields, and gradually promoted to the field of sports education(SE), and various sports apps have emerged. The purpose of this paper is to chase down the problems existing in the use of sports APP in college SE by studying the use of smart phone sports APP in college SE under the background of informatization, so as to achieve the deep fusion of sports APP and college SE, and continuously promote the quality of SE. Firstly, this paper gives an overview of sports APP and college SE, and carries out use experiments of sports APP on the basis of information intelligence algorithm, analyzes the use situation of sports APP in college SE, and puts forward relevant use strategies on this basis. The experimental results show that the use of sports APP in college SE promotes teaching efficiency, but there are some problems at the same time, which must be paid enough attention.

012126
The following article is Open access

With the development of China's smart city construction, the construction of smart city has set off an upsurge in various regions. However, because the construction of smart city is not yet mature, most of the cities have high similarity in construction and lack of individual characteristics. The key work of smart city construction is information construction, unifying the evaluation index system of smart city's information construction level, and selecting a scientific evaluation model Type and method must be the core of the information construction of smart city. This paper introduces the relevant content of the information construction level of smart city and the background and significance of measurement research and constructs the measurement model of the information construction level of smart city. The author selects 13 smart cities as research samples, uses MATLAB statistical software to train and study the sample data and measures the information construction level of smart city. It is found that the information construction level of smart cities in developed areas is high.

012127
The following article is Open access

, , and

With the rapid development of power communication network, power production and operation put forward higher requirements for the stability of power communication network. The power environment system can collect the operation status of communication power supply, equipment and other related alarm information as the basis for troubleshooting. However, due to the failure of a device, there will be some columns of linkage alarm, which increases the difficulty of fault location. In order to solve the above problems, this paper uses the method of big data association rules to carry out data deep mining, and makes in-depth analysis on the location and prediction of power environment fault alarms. Through the correlation between power environment alarms, this paper puts forward the analysis and prediction method of power environment alarms, and realizes the prediction of power environment alarms through the analysis of big data association rules. Based on the in-depth analysis of the Apriori algorithm, this paper designed an improved Apriori algorithm which is suitable for power environment alarm prediction, and greatly improves the efficiency of the algorithm.

012128
The following article is Open access

, , and

Optimal conditions for microbial missile degradation of emulsified oil were predicted using the response surface method designed by Box-Behnken. The effects of the concentration of sodium alginate (SA), the concentration of calcium source (CaCO3), the calcium ion chelator (CaCl2), and the pH value on the degradation efficiency of oil pollution were investigated using calcium alginate gel as a matrix. The results show that the model fitting accuracy R2=0.9739, the concentration of SA, the concentration of calcium source, the concentration of calcium ion chelator and the pH value have a great influence on the response value of the degradation rate of emulsified oil. The model predicts that the optimal reaction conditions are SA concentration of 21.27 g/L, calcium source concentration of 29.71 g/L, calcium ion chelator concentration of 32.33 g/L, and pH is 8.56. The predicted degradation rate of emulsified oil reaches 71.50%. The model was further verified by experiments. The average value of the four experimental degradation rates under the optimal conditions was 71.61%, and the deviation was 0.11% compared with the predicted value. This proves that the method can be used to optimize the process parameters of microbial missiles to degrade the emulsified oil, provide optimized solutions for the treatment of actual oily wastewater.

012129
The following article is Open access

and

With the advancement of computer technology, virtual laparoscopic surgery has also developed rapidly on this basis. Following satisfactory clinical results achieved by 3D visualization technology, 3D printing technology, and mixed reality technology, human-computer interaction technology in virtual environments has real-time interaction. The advantages such as performance and real-time dynamic visualization have gradually entered everyone's field of vision, and have gradually been used in many medical fields. At present, human-computer interaction technology in virtual environment has been widely used in laparoscopic surgery training at home and abroad.

012130
The following article is Open access

Aiming at the information management problems of machine tool information, remanufacturability evaluation information, parts information, processing technology and remanufacturing design information in the process of used machine tool remanufacturing, a web-based machine tool remanufacturing management system was developed. The system can flexibly and efficiently manage all kinds of information data in the process of machine tool remanufacturing, and satisfy the function of user's remanufacturing evaluation and design. The system is mainly consisted of the four functional modules and related model databases including machine tool information management, estimation of remanufacturing cost, assessment of remanufacturing process resource environment property and remanufacturing processes management. The implementation of the system effectively helps enterprises to solve the problem of information processing in the whole remanufacturing process, and realizes the standardization of the process.

012131
The following article is Open access

and

In order to solve the current localization algorithm big background interference affects calibration methods exist damage, physical contact with the workpiece material on the surface of the problem, hand-eye calibration was proposed based on strong orientation and three visual guidance system. First, deepen the Hessian matrix, using Gaussian filter, using the maximum inhibition precisely determine the feature points and direction, in order to construct surf feature points description, finish strong positioning operator based on surf, to remove the background and the ambient light interference, the purpose of accurate positioning center of the target with Angle. And then put forward three points calibration method, calculation scale rotation matrix and translation matrix parameters, complete the Robot world coordinates and binding mapping camera image coordinates. Finally, program implementation algorithm and system, the experiment results showed that compared with the current workpiece material transfer system, this system has higher goal orientation and calibration transfer success rate.

012132
The following article is Open access

, and

In recent years, with the rapid development of computer technology, virtual reality products showing a flourishing trend. It brings people into an immersive, interactive virtual reality world, we will apply it to the desig of students's art exhibition App. Art college students will create many valuable works of art. Under the situation of the country's vigorous promotion of innovation and entrepreneurship, we design a VR art exhibition marketing app to promote and sell students' excellent art works through online display, which can motivate students to create and collaborate independently, improve their professional skills, and enable They engage with society as early as possible to increase employment. The online exhibition sales app for college students' art uses network technology to show the functions of the real exhibition hall in the form of digital virtual reality. It uses the information structure of the Internet, and combines the work and business of traditional physical exhibition halls with marketing activities on the Internet to build the information exchange bridge required by exhibition halls. This app uses Unity 3D technology in conjunction with HTC Vive devices to design and implement a virtual pavilion. The model was created using 3DS MAX software, the material texture was drawn using Substance Painter software, and the interface UI was produced using Adobe Photoshop software to ensure a high degree of simulation of the virtual pavilion[1].

012133
The following article is Open access

and

Network technology continues to advance, cloud computing technology develops the internet provides us with a variety of data services, and the development of online shopping has gradually matured, E-commerce platform has become the most mainstream shopping place now, rich network data provides a lot of useful information for e-commerce, but the current data mining technology of e-commerce platforms is not mature enough, unable to meet the growing demand for online shopping.

This article is to solve the problem of how to better apply cloud computing technology and data mining technology to e-commerce platforms, analyzes the current status of data processing in e-commerce platforms, combining the research results of domestic and foreign scholars, combining data mining technology with specific applications in e-commerce platforms, after research analysis, finally summarized the advantages and disadvantages of applying data mining technology to e-commerce platforms, and how to solve the disadvantages, guidance on the application of data mining in e-commerce.

012134
The following article is Open access

, and

E-commerce personalized recommendation system needs to be able to respond to user page requests in real time and provide recommendation services for users according to different recommendation models chosen by users. In this paper, based on the fusion method of intelligent ontology and big data mining, the semantic access preference of the user is captured by the user interest acquisition algorithm of the semantic cluster, and the current session of the user is matched with the acquired user preference to obtain the recommendation set. The paper presents personalized recommendation method of E-commerce based on fusion technology of smart ontology and big data mining.

012135
The following article is Open access

and

This paper uses the patent data of China HowNet and the SOOPAT patent database, uses patent maps as an analysis method, and uses life cycle theory and Logistic models to analyze and process key patents related to domestic and foreign educational robots and to make the key to domestic and foreign educational robots. The life cycle prediction research of the technology shows that the key technical fields of educational robots in the world have passed the nascent stage, and the key technologies of educational robots such as artificial intelligence, interactive technology, and manipulators are rapidly developing and are in a high-growth stage.

012136
The following article is Open access

, , and

The course design of "Urban Fruit Production" was guided by the systematization theory of working process. The course content was based on the job requirements of fruit production management positions in modern urban agriculture, integrating various exemplary works such as fruit tree seedling, sightseeing orchard design, management of urban orchards, and informatization management into a series of work tasks. Then the corresponding learning scenarios were designed according to the six-step method. The instructors organized action-oriented teaching activities and allowed students to learn in a "real" working environment. The students learned to master key skills in urban fruit production management and improved their overall competencies by completing the working tasks.

012137
The following article is Open access

The rapid development of economy drives the transformation of information technology. With the advent of the era of big data, the demand for artificial intelligence is increasing, which also provides a broad space for the development of artificial intelligence. At present, artificial intelligence is gradually applied to education and teaching, artificial intelligence learning plays an important role in the field of artificial intelligence science development, and provides a good reference in scientific research. In order to effectively integrate university mathematics education into artificial intelligence, it is necessary to effectively combine the inner development of university mathematics education with the essential characteristics of artificial intelligence, to promote the innovative development of university mathematics education, and to give full play to the positive influence of artificial intelligence. In this paper, the author analyzes the development characteristics of artificial intelligence in the big data environment, and combines it with the university mathematics education to propose innovative teaching research, which aiming at promoting the intelligence of education and teaching in China and promoting the innovation of teaching mode.

012138
The following article is Open access

5G (the Fifth Generation Network) refers to the fifth generation mobile communication network. 5G has three important advantages: large bandwidth, low latency, and large connections. At present, 5G is being implemented in 4K / 8K coding and other technologies in remote consultation, remote monitoring, emergency rescue, remote surgery, and remote teaching scenarios, and has achieved good application results. We can foresee that the future of professional course teaching will be closely integrated with 5G technology, and the informationization of medical course teaching will also continue to increase. To further promote the construction of medical education and information technology. This paper mainly studies the development of distance education system for professional courses based on 5G network. In this paper, the system test in the student results query, class results query, time answer query, student information query and teacher information query test, the connection failure times were 22, 11, 9, 6, 9 respectively, and the successful connection success rate was 99.78%, 99.89%, 99.91%, 99.94%, 99.91%, the database connection success rate is high, and the system can be used.

012139
The following article is Open access

and

With the continuous development of global technology, the number of smart cities is also increasing. The development of these cities is also accompanied by constant emergencies. Big data technology provides us with a way to optimize the city's emergency dispatch system. In the context of smart city, it has become a trend to combine big data technology to construct emergency dispatching system. The key points of this article are the interrelation of emergency call areas and coordinated dispatch between smart cities. This paper studies possible games between different cities and proposes optimization methods. According to the processing process of material demand information flow, an emergency dispatching system framework of four parts, namely the requirements layer, the information layer, the session layer and the send layer, is constructed to provide reference for the practice of emergency management.

012140
The following article is Open access

This paper mainly introduces the significance, methods and technical measures of power system energy saving, through reasonable selection of electrical equipment, reasonable calculation of load, voltage loss, and the correct and reasonable design of distribution system to achieve the purpose of energy saving.

012141
The following article is Open access

, , , and

A new PSO algorithm based on extended escendant strategy was proposed. The dynamic change of the landslide displacement time series is nonlinear and uncertain. Combine extended escendant strategy PSO with the Elman neural network, and establish a landslide displacement prediction model based on EESPSO-ENN to realize the dynamic prediction of landslide displacement. Taking the Baishuihe landslide in the Three Gorges Reservoir area as an example, select the monitoring data of ZG93 from 2013 to 2016 as training samples and test samples for training and prediction. Comparing the prediction results of EESPSO-ENN with the BP neural network and SVM method, the results demonstrate that the EESPSO-ENN model has a small prediction error and its prediction effect applied in the Baishuihe landslide is better than BP neural network and SVM method. The validity of EESPSO-ENN was verified.

012142
The following article is Open access

, , and

Objective: To explore the amount of information contained in gesture symbols and its relationship with cognitive load, and to provide theoretical guidance for gesture interaction design based on semiotics. Methods: Firstly, a user-defined method was combined with oral analysis to collect gestures and establish a corresponding semantic knowledge base. Based on the knowledge base, the icon algebra theory is used to redesign the gesture symbols. Then through experiments combined with the NASA-TLX scale to measure the user's cognitive load, and through data analysis to explore the relationship between the amount of information contained in the gesture symbol and it. Conclusion: The amount of information contained in gesture symbols has a significant correlation with the user's cognitive load and response time. As the amount of gesture symbol information increases, the user's cognitive load and response time also increase accordingly. Based on this, a regression equation of user cognitive load and information amount of gesture symbols is established, which provides theoretical support for the design of gesture symbols based on semiotics.

012143
The following article is Open access

, , and

Oil spill identification is an important means of investigation of oil spill through analysis and comparison of suspicious oil spill source. This paper proposed a GC/MS fingerprint fitting method based on genetic algorithm (GA) to identify the source of oil spill. In this method, dominant characteristic peaks were selected from the 3d fingerprint of the standard and stored in the prevailing characteristic fingerprint database (dominant database). Recessive characteristic peaks were screened out from the periphery of the dominant characteristic peaks of the sample and stored in the recessive characteristic fingerprint database (recessive database). Then a set of characteristic peaks was selected from the dominant library by GA to correct the characteristic peaks in the samples and automatically identify the similarity between the standard and the samples. Simulation calculation compared with experimental analysis results showed that the method to build a detailed identification of oil spill fingerprint was accurate and reliable. The method to identify the fingerprint peak can be clearly and accurately reflect the properties of the sample, which can be used for rapid automatic calculation of chromatographic fingerprint similarity, so as to strengthen sea spill accident discriminant scientific theory in identification, traceability and the application of legal liability.

012144
The following article is Open access

With the continuous development of wireless network and Internet technologies, research on the application technology of wireless computer networks in intelligent driving has also entered the blowout development stage. The purpose of this paper is to study the application technology of wireless computer networks in intelligent driving. This paper also proposes an optimization solution for wireless vehicle networking in view of the many disadvantages of the traditional traffic law enforcement management system. This article first briefly introduces the concepts of the Internet of Things, the Internet of Vehicles, and wireless systems, analyzes the necessity and feasibility of the fusion of the two technologies, and then proposes a framework for the integration of wireless computer network technology and Internet of Things technology. Various innovative applications of the Internet of Vehicles based on this architecture in intelligent transportation are analyzed and demonstrated. Wireless networked car networking has demonstrated its superiority to a certain extent in the application of several special scenarios, alternative analysis of ETC systems, and optimization of traditional traffic law enforcement management. At the end of this paper, a GA algorithm based on wireless networked vehicle networking applications is proposed. Through the results of the algorithm, it is concluded that the system performance and economic performance of wireless vehicle networking are superior. According to the experimental results, the system developed in this paper can not only solve the vehicle congestion situation, but also reduce the occurrence of traffic accidents.

012145
The following article is Open access

and

This study combines virtual reality technology with laparoscopic surgery training, based on the immersion, interactivity and imagination of virtual reality technology to provide doctors with new solutions for laparoscopic surgery, and quickly improve the use of laparoscopic surgical instruments by interns. The mastery of the laparoscopic surgical procedure is applied to the teaching, training and assessment of the intern, so that the intern can carry out the surgical training under the experience of being as close as possible to the real surgery, and improve the clinical technical level.

012146
The following article is Open access

and

The economic development and the improvement of people's living quality promote the development of tourism. The acceleration of urbanization has given birth to rural tourism industry. Guangdong has a relatively high economic level and is rich in rural tourism resources which are of rural characteristics. As a result, rural tourism in Guangdong started earlier and has begun to take shape. However, in the context of new urbanization, there are still a series of problems in the development of rural tourism in Guangdong, which restrict the sustainable development of rural tourism in Guangdong. In order to promote the further development of rural tourism in Guangdong, it is necessary to carry out in-depth research and analysis of its reality. Taking Guangdong rural tourism as an example, on the basis of remote sensing and GIS technology, with the help of such research methods as Gini index, geographic concentration index and geographical connection rate, this paper analyzes the space characteristics and resource types of rural tourism in Guangdong and discovers the problems existing in its sustainable development.

Cloud Computing

012147
The following article is Open access

and

With the continuous progress of network information, the traditional way of information transmission is replaced by social network, and gradually become an important way for people to obtain various types of information. In social networks, network users can spread and receive information to the maximum extent within a reasonable range and conduct interpersonal communication on this basis. The basic data of social network is generated by the original information published by network users, and the transmission of basic data is realized through the forwarding of other users, that is, the effective transmission of social network information. The purpose of this paper is to predict the trend and law of network information dissemination by means of modeling and forwarding prediction of social network information dissemination, so as to promote the positive role of information dissemination. In this paper, the relevant definitions involved in social network are analyzed. On this basis, PCA algorithm is used to accurately analyze the network information data. Then, specific analysis is made on the establishment of the transmission model. The experiments in this paper show that the establishment of the social network information dissemination model is conducive to promoting the accurate prediction of information dissemination and realizing the positive dissemination of network information.

012148
The following article is Open access

In the era of "Internet plus", the traditional marketing strategies of enterprises need to be adjusted, including the combination of advanced technology for marketing and innovative development of marketing strategies. Innovative marketing strategy is an opportunity and challenge faced by the development of enterprises. Seize the development opportunity and actively innovate marketing strategy to improve their own marketing level and enhance their core competitiveness. The purpose of this paper is to study the marketing strategy of support vector machine based on time series. In this paper, from the perspective of machine learning, in order to "Internet +" era of development as the background, according to the reality and the related theoretical basis, method innovation enterprise marketing strategy as the research object, build support vector machine (SVM) based on time series of marketing strategy framework, and starting from the actual situation of the framework of empirical analysis, in the hope of enterprise marketing strategy can fully embody the dynamic real-time dynamic. Enterprises use support vector machine (SVM) based on time series to predict and analyze marketing strategies, which can well deal with emergencies, deal with risks in time, solve crises faced by enterprises, contribute to the rapid development of enterprises, and promote the steady forward development of enterprises.

012149
The following article is Open access

, and

Network business traffic data has obvious self-similar characteristics, and its modeling and predictive analysis should also adopt self-similar models. Short correlation models, which cannot accurately describe their self-similarity, is mainly adopted in traditional network traffic data modeling. Therefore, It is necessary to research long correlation models. In addition, network traffic data also has certain pulse characteristics, which leads to inaccurate data modeling. In this research, alpha stable noise is added in FGN time series to simulate network traffic data, and the simulated data is analyzed by improved FARIMA model. Finally, the improved FARIMA model is applied to the BC-p Aug89. TL data modeling and predictive analysis. The analysis shows that the improved FARIMA model has a better prediction effect on network traffic and is of great significance for the application of network traffic prediction.

012150
The following article is Open access

and

With the rapid development of China's electricity industry, the electricity consumption is also changing with a certain trend. Therefore, it is necessary to study the trend of the power consumption statistics for the whole society in China. In this research, according to 2016-2017 electricity consumption data of China Energy journal and Zhejiang electric power journal is analyzed by R/S analysis method. Hurst indexes are estimated to study the self-similarity properties in different times. The results show that the R/S analysis method can effectively analyze the time series data of electricity consumption, and the calculated Hurst index can better reflect the self-similarity trend of the electricity consumption of the whole society in the future.

012151
The following article is Open access

, , and

Since the beginning of the 21st century, with the popularization and application of electronic information technology in the power system, the power system information network security has begun to attract the attention of all walks of life, especially the power enterprises. To ensure the safety of electric power information network is not only the need to ensure the safety of industrial production and residents' daily electricity consumption, but also the internal demand to ensure the stability, development and prosperity of national economy. In the electric power industry, the information security of the electric power system is directly related to the production, operation, management and operation of the electric power enterprises. When these information data are illegally violated, it will bring adverse effects to the electric power enterprises. It can be seen from this paper that the network security of the telecommunications industry accounts for a large proportion of 18.7%. Therefore, information security is the important protection content of power enterprise network security. The emergence of information hiding technology, a good realization of the power network information security protection, this paper will be information hiding technology as the focus of research, analysis of its application in the power network security.

012152
The following article is Open access

and

The most common algorithm in data mining is cluster analysis. Cluster analysis algorithm has been widely used in many fields, especially in data analysis, market research and pattern recognition. K-means clustering algorithm(KMCA), as one of the common algorithms in clustering analysis, occupies an important position in clustering analysis and has relatively more applications. However, in recent years, with the deepening of the application of clustering analysis algorithm, it is found that there are a series of problems in KMCA, which directly affect the accuracy of data analysis results. On this basis, a bionic optimization algorithm, particle swarm optimization algorithm, is generated, which makes up for the shortcomings of KMCA. The aim of this paper is to establish the optimal algorithm for data analysis by means of the research on the improved hybrid clustering algorithm of particle swarm optimization and k-means. The experimental results show that the algorithm can effectively integrate the advantages of particle swarm optimization algorithm and KMCA, which not only improves the speed of the algorithm, but also guarantees the accuracy of the results.

012153
The following article is Open access

Since the beginning of the new century, the emergence of new technologies like bamboo shoots after a spring rain, they have a strong potential in the future landscape design application in this field. These hardware and technology are widely used in the research of intelligent building, intelligent residence and virtual landscape. Augmented reality (AR) technology projects virtual information into the real world, realizing the real-time superposition of real environment and virtual objects simultaneously. The purpose of this paper is to explore whether it is possible to expand and improve the spatial environment of landscape design through augmented reality (AR) technology, so as to improve the quality of landscape design, and the different applications of augmented reality (AR) technology and virtual reality (VR) technology in landscape design. Based on the rural development and the rapid development of information technology as the research background, adopt the method of historical research and preliminary experiment, selected the domestic a place as a visual programming examples, summed up in the process of rural revitalization of traditional landscape visual planning may exist in the design of the main problems, and on this basis, introduces how to use including biological feedback information collection, geographic information collaboration platform, such as augmented reality technology to the current landscape visual design process optimization and simulation test. The research results of this paper show that the new technology has a certain effect on improving the existing visual planning and design methods, and the specific application of AR technology in various fields also makes the future development trend of AR more clear.

012154
The following article is Open access

, and

In the traditional cloud computing environment, the power network load balancing scheduling method cannot adaptively track the time-varying coupling characteristics of load data, and the power data center is not efficient in processing massive data, so it is increasingly unable to meet the multi-service quality requirements of power users. The purpose of this paper is to improve the load balancing of power network, improve the efficiency of power network balance scheduling and power resource balance allocation in cloud computing environment. At the research method level, this paper analyzes the application status of data center and cloud computing task scheduling, and starts from the task scheduling demand analysis of cloud computing data center to determine load balancing and QoS as the technical goals of task scheduling. According to the parallel model framework of MapReduce, the task execution process is studied, and the design scheme of power cloud data center is given in view of the problems of low resource utilization, poor scalability and high energy consumption cost faced by the existing power data center. The experimental results show that the network load balancing scheduling method proposed in this paper can meet the multi-qos demand of power users to the maximum extent, effectively improve the efficiency of power data center operation, and achieve better load balancing effect than the traditional scheme.

012155
The following article is Open access

, , , , and

With the development of computer technology and communication technology, computer network will increasingly become an important means of information exchange, and permeate into every field of social life. However, the network has the potential threat and the reality existence each kind of security question, therefore we must take the strong security policy to ensure the network security. The purpose of this paper is to study the network computer security hidden trouble and vulnerability mining technology. In this paper, the types of security hidden dangers are analyzed, and the vulnerability detection technology Fuzzing technology is deeply studied. Then, the inspection and test time is analyzed for the existing vulnerability detection tools. The experimental results prove that vulnerability detection technology can protect network security with high efficiency of vulnerability detection. In this paper, three vulnerability detection tools WS Fuzzer, Web Fuzz and Webvul Scan were used to analyze the detection time of open source system, personal blog, shopping mall and forum. The average detection time was 1.9s, 8.7s, 20.5s and 59.7s, respectively. It can be seen that the vulnerability mining technology has a certain practical role.

012156
The following article is Open access

, , and

With the rapid development of the Internet and the expansion of the network scale, while the network brings unlimited convenience to people, the problem of network security has become increasingly prominent. Network security has become one of the main factors hindering the development of the Internet. In the operation of power network systems, in order to ensure network security, many security technologies are also being continuously applied. In the traditional network security defense technology, passive defense technology is used, all its defense measures are static and all rely on network administrators to implement equipment and manual configuration. In the new network era, the illegal attacks on power network information systems have become more and more frequent, at the same time, hackers' offensive methods will also be updated and become more sophisticated. Therefore, traditional network security defense technologies have been unable to resist or even cannot withstand. Based on this, this paper focuses on new active defense technologies, analyzes its application in power information network security, and proposes defense of power information network security based on attack detection using honeypot technology suggestions.

012157
The following article is Open access

, and

The extraction of subjective features such as the authority, purpose, and opportunity of power network operators has outstanding subjectivity. It is difficult to accurately quantify subjective features due to the subjective factors of operators, resulting in fuzzy subjective features. Traditional algorithms use subjective features to detect internal threats to the power grid. Once subjective factors interfere, they will cause the defects of fuzzy main features, leading to a decrease in the accuracy of threats to the internal power grid. This paper focuses on the detection of power grid internal threats based on a hierarchical feature cloud computing model. This paper proposes a power network internal threat detection method based on the hierarchical feature cloud mapping model; calculates the hierarchical mapping relationship based on the internal threat features to complete the internal threat detection of the power grid; experiments prove that the algorithm avoids subjective factors being affected by subject characteristics, and The ambiguity of features reduces the missed detection rate to below 15.3%.

012158
The following article is Open access

In recent years, China's earthquakes have occurred frequently, and various problems have occurred in many coal mining areas. Geological information is informatized, which helps geological researchers to study information data, analyze the geological situation, and make corresponding countermeasures. The extensive application of information technology in geological surveys will greatly improve the modernization level of geological surveys. At present, the geological survey informationization work has entered the era of big data. How to break the limitation of independent management of the geological survey database and effectively integrate and share the massive geological survey data that has been accumulated, now it has become an ardent concern and urgent for geological survey informationization workers. Hope to solve the problem. The emergence and maturity of cloud computing technology provides a feasible solution to this problem. The research purpose of this paper is based on the research of information data in geological informationization of cloud computing. This article starts with geological information data, analyzes the characteristics of geological data, explains the necessity of geological informationization, builds a cloud computing information management platform, Geological information is realized in the function, and the research and analysis of the geological information data are performed. After simulation experiments, the cloud computing geological information platform built in this paper has high accuracy, and the error is not more than 5%, which verifies the feasibility of the platform.

012159
The following article is Open access

The wide application of information technology in geological exploration will greatly improve the modernization level of geological exploration. At present, geological survey information work has entered the era of big data. How to break the limitation of independent management of geological exploration database and effectively integrate and share the accumulated massive geological exploration data has become a problem that the geological exploration information workers are eager to solve. The emergence and maturity of cloud computing technology provides a feasible solution to this problem. Firstly, from the perspective of public welfare and social service of geological exploration data, this paper summarizes and analyzes the application requirements of cloud computing in geological exploration work by studying the theoretical basis and relevant examples of cloud computing technology. Use Microsoft azure, SQL azure and other related products of Microsoft cloud computing platform azure to achieve the corresponding needs, research and clarify the relationship between geological exploration data and specific applications in geological cloud computing; use VMware vSphere virtualization platform to share existing and available hardware resources, and at the same time, research and build geoscience cloud storage mode based on virtualization technology to realize the sea Reasonable storage of quantitative geological exploration data; establishment of development environment with SDK provided by azure as the core for the development of application program of geological exploration data cloud computing; realization of data storage in the cloud for the purpose of integrating and sharing the achievement data of national mineral resource potential evaluation, and virtualization application of geoscience software.

012160
The following article is Open access

With China's entering the information age, science and technology have entered all aspects of our lives. However, from the perspective of the current coal industry, there are still problems in the safety supervision system, such as the scarcity of personnel, heavy workload and low level of information, which have been unable to adapt to the continuous development of the current society. Based on the above background, the purpose of this paper is to study the application of cloud computing in coal mine safety production. This paper is based on the network technology platform and the SaaS architecture of management. It uses the mode of centralized management and distributed processing to form an integrated coal mine safety supervision information system, so as to solve the safety problems in coal mines. This paper provides a complete and feasible scheme for coal mine safety production monitoring. At the same time, the platform itself is a general monitoring platform with excellent expansibility. Wireless sensor network can carry a variety of different sensors, realize more monitoring functions, access server can realize a variety of access means, which is conducive to the transparency and standardization of coal mine production information. All of these are conducive to strengthening our country. At present, the coal mine production monitoring level, the monitoring platform has a wide range of application prospects.

012161
The following article is Open access

, and

With the rapid development of communication technology in power networks, data communications are facing traditional network security risks. The information encryption algorithm is a key part of power network communication security. How to ensure the acquisition of confidential data is one of the key factors for the normal operation of the power grid system. The study of encryption algorithms is of great significance to the power grid communication security. This paper mainly researches the information encryption algorithm in the power grid communication security model. The experimental simulation results in this paper show that for the key pair generation time, the SM2 algorithm can generate a 256-bit key very quickly, which is 130 times faster than the RSA algorithm in generating a 1024-bit key, and the 2048-bit key in comparison 730 times faster. Therefore, under the same security level, the encryption and decryption efficiency of the SM2 algorithm is significantly higher than that of the RSA algorithm, and with the increase of the security strength, the superiority of the SM2 algorithm is more prominent.

012162
The following article is Open access

The traditional basketball training is basically guided by the coach's experience and theoretical basis, combined with the general performance of the athlete. Although this method has a certain effect, it depends too much on the coach's experience level and often does not get the expected results. Aiming at the rigorous and unstable problems of the traditional method, this paper proposes the design of a basketball sports data analysis system based on cloud computing. Through cloud computing deployment, athlete data is uploaded to the cloud, and then the data is stored and managed, and task scheduling is processed and analyzed. In the experiment, the sports data of 2 athletes were compared with the average level of 300 athletes. The results show that athletes X and athletes Y are below average in skill and endurance level, and need to strengthen targeted training in subsequent training to make up for their own shortcomings.

012163
The following article is Open access

and

In recent years, VR virtual reality has gradually become a hot topic in society. As a medium integrating computer technology, imaging technology and human-computer interaction technology, VR virtual reality brings both a new interactive narrative method in the evolution of media and New means of communication in the era of text change. The purpose of this article is to analyze the current situation of the application of VR virtual reality in film and television post-production, and analyze the predicament of VR virtual reality in film and television post-production in order to help film and television post-production. In this paper, through a questionnaire survey and random selection of 50 students for digital image synthesis majors who have participated in digital film and television special effects production in a university, the survey results are collated and analyzed. 94.69% of students believe that VR virtual reality is in film and television post-production. The application makes the work more colorful. The application of VR virtual reality technology in the late stage of film and television has promoted the development of diversified creation and the development of film and television post production. At the same time, the application of VR virtual reality technology has improved the efficiency of film and television production, reduced the cost of physical setting, and saved resources.

012164
The following article is Open access

The Internet of Things is developing rapidly. Many devices around us are connected through the Internet, and humans have entered the era of the Internet of Things. However, while many devices are connected to the Internet, it also provides more attack surfaces for hackers, so the security issues of the Internet of Things are becoming increasingly prominent. This paper uses asymmetric encryption algorithms and blockchain technology to build a key-based security architecture. In terms of information security transmission, this article uses ECC (Elliptic Curves Cryptography, Elliptic Curve Cryptography) and DH (Diffie-Heilman key exchange, Diffie-Heilman key exchange) as encryption tools for the entire architecture, not just for Encrypted communication between IoT devices is also used for encrypted communication between IoT Internet of Things (IoT) devices and Raft service clusters, thereby ensuring the privacy of sensitive information and the efficiency of data communication. In terms of information security storage, this article uses the blockchain data structure and consensus algorithm to achieve reliable storage. Considering the real-time nature of the Internet of Things, the Raft consensus algorithm is adopted. This consensus algorithm has strong consistency in the existing blockchain consensus algorithms, which is more in line with the requirements of the final consensus consensus algorithm of public chains such as POW. The blockchain data structure is used to store the public key data content submitted by each IoT device. The hash pointer in the blockchain data structure guarantees the integrity and difficulty of change of the stored data.

012165
The following article is Open access

and

On the basis of big data, cloud computing and algorithm updating, artificial intelligence has achieved a qualitative leap from theoretical exploration to application research. For product design, the opportunity and assistance brought by artificial intelligence make the design method more meta and the design purpose more novel. The purpose of this paper is to explore the application of cloud computing in product design. First of all, the advantages of cloud computing in home product design and application are summarized from three aspects of security, comfort, ease of use and economy. Secondly, the key technologies of cloud computing in product design are deeply studied, and the significance of cloud computing technology in data analysis of healthy life is discussed. Finally, taking the design of intelligent children's table lamp as an example, through the collection of competitive brands and user visits to obtain experimental data, the experimental results show that after most consumers buy, the main body of using the product is primary school students, the age range is between 7-13 years old. Most children work at night for more than 2 hours, and long-term night work has a continuous negative effect on young people who are still in the stage of eye development. Therefore, the health intelligent lamp plays a great role in children's eyes and sitting posture.

012166
The following article is Open access

Nowadays, the realization of government functions has been more and more inseparable from the network, at the same time, the public also hope the government to provide more and more convenient and fast related services, interactive functions can also advance with The Times. At the same time, the government wants to make public services more efficient. In the context of big data and cloud computing, the openness and sharing of government-owned data has an extremely important impact on the society. In the process of government management, the traditional management way already can't adapt to the needs of a large number of data exchange, but now the government management slightly to the research of innovative technology still lags behind, the rise of cloud computing provides a new way for the government management innovation, this article to introduce the cloud computing government management for research purposes, to provide a new way for the government management reform.

012167
The following article is Open access

There are many types of music, and due to the increase of music creators and the development of the Internet, there have been a large number of music. Identifying songs in the music library is conducive to the management and operation of songs, and helps listeners to choose their favorite music. Aiming at this problem, this paper proposes a song recognition method in a music library based on cloud computing. This paper first analyzes the advantages of cloud computing technology, and then proposes a song feature recognition method. Based on the similarity matrix of musical notes, a criterion for selecting note features is given to identify songs in a music library. Finally, the song feature recognition method is combined with cloud computing technology for song recognition. Experiments show that compared with the musical note recognition method with feature weights and the musical note recognition method based on invariant feature extraction of musical notes, the song recognition method in the cloud-based music library proposed in this paper has higher recognition accuracy and faster recognition speed.

012168
The following article is Open access

, , , , and

The Internet brings people so much convenience, but also with a variety of viruses, network attacks and other security issues. Vulnerability mining technology is the core technology to solve the security of application software. According to different test objects, it can be divided into source-oriented vulnerability mining technology and binary code vulnerability mining technology. In recent years, software vulnerability mining technology still has many defects, involving dynamic tracking, symbol execution, path constraint collection and solutions. The purpose of this paper is to enable people to safely and safely use the Internet, maintaining the security of network application software has become the core issue of network security. In this paper, by introducing the improved genetic algorithm, the STP solver in KLEE and the improved genetic algorithm and model constraints are implemented to solve the nonlinear constraints in parallel. The solution module of genetic algorithm and model constraint is designed, and the parallel solution module in KLEE and the abstract resolution layer of KQuery are implemented. Finally, the parallel solution module is called by KLEE to generate test cases. The results show that the improved genetic algorithm can solve the nonlinear constraint conditions that cannot be solved in the original model, and generate test cases that can cover the path of the nonlinear constraint conditions, effectively improving the test cover path and test efficiency. Finally, the improved genetic algorithm constraint model is applied to memory leak detection.

012169
The following article is Open access

At present, in the research of the value evaluation of science and technology enterprises, most scholars adopt market method, income method, real option method and other basic research methods. These commonly used methods have some limitations in the application of evaluation. Therefore, from the perspective of BP neural network, the author discusses the applicability and validity of BP neural network in evaluating the value of scientific and technological enterprises, and provides a reference for relevant investment decision makers of scientific and technological enterprises.

012170
The following article is Open access

The reason why top universities pursue SPOC is that it perfectly adapts to the exclusiveness and high achievement values of elite universities, and helps universities achieve their goal of improving teaching quality. SPOC is the real value of online education in university campus.

012171
The following article is Open access

and

With the rapid development of modern network technology, technology not only changes people's life, but also breeds a variety of new problems. With the popularization of network application technology, various kinds of harmful means are emerging, and network security problems emerge in endlessly, among which information network security is the most prominent. This paper mainly describes the development and response methods of information security threats, analyzes the main attack modes and the evolution of information security threats, and analyzes the development direction of vulnerability detection technology that threatens the root of information security. Aiming at the security problem of school network, through analyzing all kinds of hidden dangers of network security, the best way is the hierarchical security solution. According to the implementation of the network security deployment cycle, security strategies are proposed from the network planning, network management and the use of network individuals.

012172
The following article is Open access

Although reservoir seismic inversion technology has achieved some results in reservoir prediction and description, but due to the complex seismic geological conditions and the lack of in-depth and systematic research on the application conditions of the technology, to a certain extent, it has affected the wide application of the technology. Based on the classification and description of the current inversion methods, through the theoretical model and the inversion processing practice of a large number of data, this paper studies and summarizes the applicable conditions of several inversion methods, expounds some key problems existing in the application of inversion technology, and puts forward corresponding solutions.

012173
The following article is Open access

and

Autonomous vehicles (self driving automobile), also known as driverless vehicle, computer-driven vehicle, or wheel mobile robot, is a kind of intelligent vehicle which realizes driverless through computer system. In the 20th century, it has a history of several decades, and in the beginning of the 21st century, it shows a trend of close to practicality. Autonomous Vehicles rely on the cooperation of artificial intelligence, visual computing, radar, monitoring devices and global positioning system, so that computers can automatically and safely operate motor vehicles without any active human operation.

012174
The following article is Open access

The bridge and shipbuilding industry have been troubled by the issues of increased production costs and delays due to the welding residual stress and deformation. It is of great practical significance to study welding residual stress and deformation. In this paper, the FEM software Marc is used to carry out numerical simulation of plate pass welding, and the welding temperature field and residual stress distribution after welding are obtained. The simulation calculation results are qualitatively analyzed.

012175
The following article is Open access

, , , and

To improve the prediction accuracy of the coal seam gas content in the unmined areas, based on the analysis and study of the main geological factors affecting coal seam gas content, fuzzy mathematics is used as a means of expressing and processing inaccurate data and fuzzy information and neural network as a way to solve the problem to combine fuzzy mathematics with neural network organically and establish a coal seam gas content prediction model based on LSTM neural network. The results of this study show that the LSTM neural network model can not only solve the problems of difficulty to express fuzzy information quantitatively and determine the learning samples, etc., but also extract the non-linear relationship between the coal seam gas content and its various influencing factors accurately. According to the instance operation verification, the prediction accuracy is improved by 4.84% ∼ 25.79% compared with that of the neural network model. The effect of application to the prediction of coal seam gas content is more ideal. It has a good application prospect and can provide a theoretical basis for implementing scientific mine gas management and preventing various gas accidents.

012176
The following article is Open access

, and

With the advancement of economic globalization, set energy production, supply and use of integrated energy system has become the current social indispensable material base, its advantage is to utilize the energy such as natural gas, wind energy, solar energy is transformed into each other basic conditions, based on the use of renewable function between the electric energy development model, in order to reduce harmful emissions and effectively promote the consumption of energy storage, supply and its efficiency for the development goals, finally realizes the comprehensive optimization of energy system operation and development. However, the practice based on integrated energy scheduling can not achieve the best expected results, and there is a paradox between the theoretical basis and the fact. Therefore, based on the study of integrated energy system scheduling optimization, combined with different research status at home and abroad, this paper proposes a runoff algorithm to realize the economic operation mode of energy system, in order to solve the problems in the implementation process of integrated energy system scheduling, and promote the development trend of high efficiency and stability.

012177
The following article is Open access

The rapid development of science and technology has brought a strong impact on people's traditional habits, among which there is no lack of subversive impact. Even in language communication, the progress of computer technology has been involved and achieved a place. Although computer-aided translation software cannot replace translators to complete translation work independently, it plays an important role in translation work. It not only greatly simplifies the work of translators, lightens the burden for translators, improves their work efficiency, but also helps translators to make faster progress in translation, which can be described as half the result. Through the discussion of the help of computer translation technology, computer aided translation software and computer translation software to translators in translation and learning, as well as the application of computer aided translation technology, the author studies the computer aided translation technology in the background of information age.

012178
The following article is Open access

As one of the important means to realize the energy revolution, the new energy vehicles have become the most popular transportation workers. As the core part of the electric vehicle, the performance and stability of the electric drive determine the quality of an electric vehicle.

012179
The following article is Open access

Freehand brushwork is the quintessence of Chinese culture and a business card of Chinese culture in the international cultural market. However, domestic games seldom use freehand brushwork style to make real-time dynamic rendering of game pictures. The basic reason is that the picture structure of freehand brushwork is complex, there are many elements, and the terminal computing power and rendering cycle cannot achieve more than 30 frames of game pictures per second Dyeing effect. Through the analysis of this paper, through simplifying the model and optimizing the rendering logic, we can realize the dynamic rendering of freehand ink painting style animation.

012180
The following article is Open access

This paper describes the existing concepts of IoT and briefly explains author's understanding of IoT. Based on characteristics of intelligent building technology in the era of IoT and its effect on the field of intelligent building, on the basis of a brief description of the current situation of IoT developing in China, it explains the application and development of IoT technology in the field of intelligent building, indicating IoT Technology has a huge developing opportunity in the field of intelligent building, and the time of IoT has reached.

012181
The following article is Open access

With the continuous development of computer network, its network drawbacks are also increasingly prominent. There are more and more computer network attacks caused by computer network hackers and viruses, which have gradually attracted the attention and attention of government departments, military agencies and national security departments. In order to effectively improve the security of computer network, various computer network attack and defense technologies are constantly updated, and the network attack and defense simulation methods are proposed for the characteristics of network attack and defense technologies Analysis and experiment provide a platform for development. In this context, the computer network modeling and simulation method is born. Applying the modeling and simulation method to the network attack and defense security of the computer can effectively avoid the damage of the computer network. At the same time, this modeling and simulation method also has certain repeatability, flexibility, and does not consume a lot of time, which can effectively ensure the network security of the computer. This paper mainly analyzes this computer modeling and simulation method, in order to promote the computer network security.

012182
The following article is Open access

, , and

Information system integration information needs safe and effective data. Ensuring the stability and integrity of data is a crucial step to realize the information integration of information system. As for data integrity, there have been a lot of studies in the academic field. Most of the research directions are based on the macro perspective, discussing what is integrity, how to guarantee technology and other theoretical studies that need to be discussed from a holistic perspective, belonging to the qualitative research provided for information integrity of information system integration, while quantitative research is a little insufficient. This research focuses on quantitative research, the Bayesian prediction algorithm compared with other prediction algorithm, the Bayesian prediction algorithm is used to calculate the integrity transition probability of quantitative evaluation model, in order to get the parameter value, to demonstrate that the Bayesian algorithm is more suitable for forecasting the integrity of the information system integration evaluation, data is used to demonstrate the Bayesian prediction algorithm for information system integration information integrity evaluation more efficient and applicable.

012183
The following article is Open access

This paper focuses on the analysis of data preprocessing and data periodic regression under the condition of complex data. It includes a linear data projection technology, a nonlinear data projection technology, a data periodic regression technology and a more intuitive data visualization display technology after data periodic regression. Through the above technology, we can make the complex data more intuitive display, and show the details of the relatively dense part of the data.

012184
The following article is Open access

As a complex system composed of a variety of mechanical and electrical equipment, the fault of electric vehicle is also complex and diverse. The fault causes of electric vehicles have the characteristics of fuzziness or randomness. As an important part of the electric vehicle, the power battery pack is one of the main fault sources of the electric vehicle, and it is also the focus of fault diagnosis. Therefore, this paper first analyzes the battery fault of electric vehicle, and then introduces the knowledge base and classification method of fault diagnosis model, and finally studies the fault diagnosis model and algorithm of electric vehicle based on decision tree.

012185
The following article is Open access

Translation should not only be accurate, but also be based on the culture of both languages. This paper expounds the essence of translation, discusses the skills of translation and the complementary role of machine translation in English-Chinese translation in the present era of computer network development.

012186
The following article is Open access

, , and

RADIOSS is a powerful and stable explicit non-linear finite element analysis (FEA) solver in Altair HyperWorks. In this paper, the seismic time history analysis of communication equipment based on RADIOSS solver was taken as the research object. In the numerical simulation, three methods were applied in the computational efficiency enhancement: the non-timestep control method, the traditional mass scaling technology, and the advanced mass scaling technology (AMS). Calculations prove that the AMS technology in RADIOSS can not only improve the solution efficiency, but also guarante the calculation accuracy in antiseismic time history analysis.

012187
The following article is Open access

Aiming at many defects of human eye and computer vision system, based on the principle of multi-channel independent imaging, a method for fast determination of moving trajectory of moving target based on compound eye vision system is proposed. The principle, structure and algorithm of the traditional vision system and the compound eye vision system are compared and analyzed, and it is concluded that the compound eye vision system is superior to the traditional human eye and the computer vision system in the aspects of large wide angle, reaction speed and pixel. The SIFT method is used to extract image features quickly from different images, and the compound eye vision system is used to optimize the motion trajectory.

012188
The following article is Open access

and

With the progress of social economy and the rapid development of transportation industry, in the face of the rapid growth of urban road traffic data, this paper puts forward the design scheme of intelligent traffic analysis system based on Hadoop. In this paper, HBase distributed database is used to store urban road static RDF data, hive data warehouse is used to store urban road traffic data, and MapReduce programming model is used to store massive and heterogeneous urban road traffic data The urban road traffic data are analyzed, and the whole scheme is verified by the prototype system.

012189
The following article is Open access

Computer is widely used in school teaching. The scale of computer room seriously limits the consistency of students' use of computer, so that the learning content and experimental content cannot be effectively preserved. In view of this situation, many teaching and teaching units are building computer software experimental cloud system based on OpenStack, in order to provide students with independent operation, safe and reliable learning space without increasing the human and financial burden of the computer room. In this paper, the design of computer software experimental cloud system based on OpenStack platform is analyzed, which can be used as a reference for developers.

012190
The following article is Open access

In China, the "New and Old Kinetic Energy Conversion" was proposed as the latest national development idea, and it was quickly concerned by relevant researchers. Cloud computing - Big data service enterprises, as a representative of new technology innovation enterprise, have become the leading force to promote the new and old kinetic energy conversion. In this paper, the deep dynamic sources of the two kinetic energy conversions are analyzed in details, and the new and old kinetic energy conversion dynamics are subdivided from the national, industrial and enterprise levels. On the basis of the prior research, this paper combines the actual situation of cloud computing-big data enterprises, and finally determines 68 dynamics factors of new kinetic energy replaces traditional kinetic energy of cloud computing-big data service enterprises based on three levels and eight categories.

012191
The following article is Open access

This paper reviews the core technology system of machine translation under the condition of multimedia technology, and holds that the key links of machine translation are "sentence element" extraction, corpus selection, word selection, word order adjustment, sentence evaluation, etc., which can be realized by machine learning neural network. Corpus maintenance is not only the core work of MT, but also the key to determine the quality of Mt.

012192
The following article is Open access

With the development and popularization of electric vehicles, it is of great significance to study the off-line detection equipment of pure electric vehicles. This paper first analyzes the principle and scheme of the test system, and then designs the test system. Finally, through the verification of the test system, it is proved that it can read and clear the fault code, and speed up the detection speed of the electric vehicle, which not only ensures the quality of the product, but also is conducive to the rapid maintenance of the maintenance personnel.

012193
The following article is Open access

With the increasingly urgent demand for environmental protection, electric vehicle as a non-polluting means of transportation is becoming more and more popular, and has become the focus of research. This paper first analyzes the current demand of electric vehicle for power exchange, then introduces the operating cost of electric vehicle for power station, and finally analyzes and discusses the battery charging strategy in the power station.

012194
The following article is Open access

Highly deviated directional well technology has the advantages of drilling through longer shale gas reservoir section, detecting and controlling gas bearing area in a large range, and greatly improving gas production of single well. Based on the preliminary work of vertical well and pre exploration well, through the optimization design of well bore structure, well trajectory, BHA, drill string mechanics, drilling fluid, cementing and other technologies, the drilling engineering design scheme of high angle directional well in accordance with shale gas exploration in high steep structural area is optimized, and the formation pressure profile and bit selection scheme are established to form a set of drilling technology for efficient development of shale gas The technology system can be used for reference for the exploration and development of shale gas and coalbed methane in other areas in the future.

012195
The following article is Open access

, and

In recent years, with the rapid development of computer technology and continuous technological progress, it has been widely used in various industries. In the field of construction, the state advocates the development of industrialized construction and vigorously promotes prefabricated buildings. BIM (Building Information Modeling) technology is integrated into advanced computer technology. With its powerful information management and interaction capabilities, the application of prefabricated building structure design has received increasing attention. The article expounds the application and development of new prefabricated buildings and BIM technology, proposes the application of BIM technology to prefabricated building structure design methods, and analyzes the theoretical basis and main technologies that can implement the method in detail. In the end, it has prospects for its development and application in the construction industrialization.

012196
The following article is Open access

and

In this paper, the development of new textbooks is taken as the first step, the modern information technology is used to establish a multidimensional stereoscopic teaching mode of "Cloud platform-assisted learning + students' autonomous learning", which has effectively improved the teaching effect of the Japanese audio-visual course. This paper is aimed to explore new ideas for building the digital course of "Audio-Visual Japanese' based on the General Education Curriculum" cloud platform, to improve students' Japanese listening and speaking skills effectively, and provide a reference for practical teaching and research in this field.

012197
The following article is Open access

In order to protect the digital image, people have come up with many methods, digital image encryption is one of the most important means. Based on the features of chaotic mapping and the strong correlation between adjacent pixels of images, an image encryption algorithm inspired by chaos theory is proposed. In the specific operation process, chaotic mapping is used to perform chaotic encryption on the displaced image using. The image encryption algorithm is easy to operate, safe and stable, and has been confirmed by many successful examples.

012198
The following article is Open access

Based on Web data mining technology to discuss with the security of network information. This paper herein first briefly introduces the Web data mining technology. Then it analyzes how to construct the network information security model under the condition of Web data mining. Finally, the network security model is discussed by using Web data mining technology which may provide reference for readers.

012199
The following article is Open access

and

The "1+1" school-running model of the Robot Industry College integrates vocational and technical teachers' colleges with high-quality enterprise resources, giving full play to the advantages of both schools and enterprises, and will train more qualified personnel. This article starts with the cooperation goal and cooperation content, and imagines the cooperation mode of the Robot Industry College.

012200
The following article is Open access

, , , and

According to the grey system theory, this paper selects some logging parameters that are sensitive to the fluid properties of coalbed methane reservoirs, predicts the fluid properties of unknown coalbed methane reservoirs by using grey correlation analysis method, determines the correlation factor and correlation degree between the evaluation index of fluid properties of coalbed methane reservoirs and actual data, and quantitatively describes the categories of unknown fluid properties according to the correlation degree. By analyzing various logging data and comparing the identification result with the gas test conclusion, the accuracy rate is as high as 95%, which can accurately judge the gas-bearing property of the reservoir. This shows that the grey correlation prediction is feasible, with high accuracy and ideal effect.

012201
The following article is Open access

China's information technology has been rapid development, cloud computing technology has been widely used in many fields. The informatization level of accounting major is one of the important factors influencing the development of enterprises. There are some problems in the traditional way of accounting work, such as low efficiency, data error and so on. Based on this, this paper puts forward the research of accounting information transformation based on cloud computing technology. This paper first analyzes the existing problems in the development of accounting informatization, and further expounds the advantages of cloud computing technology in the construction of accounting informatization, and then puts forward the transformation scheme of accounting informatization based on cloud computing technology. The results show that the scheme proposed in this paper is helpful to enhance the development strength of the company, and is widely praised by the accountants.

012202
The following article is Open access

With the advancement of the times, network technology has gradually replaced manual operations; intelligent management has saved time and effort, and can ensure the efficient operation of enterprises. Information agencies We must be proficient in the application of logistics management information technology, which is also an inevitable result of the development of society to a certain historical stage. The arrival of the conference changed the face of the whole society. People have long been inseparable from smartphones and computers, and industries are increasingly dependent on information technology. As an important part of social and economic development, logistics enterprises bear the responsibility of freight transportation. Under such a development background, only by adopting scientific management methods scientifically and continuously making progress can we promote the sustainable development of enterprises. This article uses modern logistics and logistics information methods to explain the role of information technology in logistics information management. Introduce some design requirements of logistics information management system. Analyzing the problems of logistics management informatization and the reasons for the lack of modern logistics management informatization, it is concluded that logistics enterprises must pay more attention to logistics management informatization and apply it widely. Improve the relevant standards and levels of information technology, strengthen the supervision and management of information construction, and high-quality information technology.

012203
The following article is Open access

, , , and

Precise oil price forecasting is important and challenging. Long short term memory (LSTM) neural network is suitable to predict oil price, but the complexity of time series data limits the accuracy. Decomposition technique is an effective way to extract features from time series data. Variational mode decomposition (VMD) has been proved to be a good decomposition technique to generate discrete number of components. To reduce computation and improve prediction accuracy, relative entropy (RE) is used to criteria to recombine components. In this paper, based on VMD, RE and LSTM, we proposed a novel oil price forecasting model, named hybrid VMD-RE-LSTM model, considering the advantages of LSTM and VMD. The case results showed the forecasting ability of the hybrid VMD-RE-LSTM model is better than EEMD-LSTM model and LSTM for oil price forecasting.

012204
The following article is Open access

The cloud environment is extremely complex, dynamic and changeable. How to use cloud services efficiently to create economic benefits for enterprises and even society is a matter that most scholars and manufacturers pay close attention to at present. Therefore, the resource allocation of cloud computing becomes the focus of research. The purpose of this paper is to further study the resource allocation algorithm of cloud computing infrastructure services. Firstly, the IAAs mode in three main application modes of cloud computing is introduced in detail. Based on the understanding of optimization theory, the resource allocation algorithm of cloud computing infrastructure services with continuous optimization algorithm is established. The experimental results show that the number of iterations of the three algorithms is generally on the rise with the increase of the number of task nodes. In general, the number of iterations of ant colony algorithm is less than that of genetic algorithm, and the performance of continuous optimization algorithm is better than that of both, which shows that it can promote the overall efficiency of the algorithm.

012205
The following article is Open access

and

Decision table is a kind of special and important knowledge representation system. In this paper, rough set theory is used to discretize data and reduce data and rules. From the definition of resolution matrix, it can be seen that the shorter the length of an item in the resolution matrix, the greater the effect of this item on classification. And the more frequently the item appears, the more important it is decision tree. Construction of decision tree is a cyclic recurrence process. The paper presents clustering reduction method analysis of rough set and decision tree based on weight matrix analysis.

012206
The following article is Open access

The color composition is a designer to design must pay attention to the problem, the traditional color composition mainly through the form of printing, this way due to backward technology, appear very big error, often makes the constitute of the color affect the accurate color performance, thereby affect the colour of the designer cognition and learning. With the rapid development of information technology in China, computer-aided design emerges as The Times demand, and is gradually applied to the parts related to color composition. The purpose of this paper is to make an in-depth study of the new manifestation of color composition in computer-aided design, to help designers establish a new cognition of color composition, and to promote the further development of design work. Firstly, this paper gives an overview of the computer-aided design and color composition of computer aided design. With the help of color reduction algorithm, experiments on the color composition of computer aided design are carried out. Through the analysis of the experimental results, several new manifestations of the color composition of computer aided design are obtained. The experimental results show that computer aided design (cad) gives a new expression to color composition.

012207
The following article is Open access

and

With the rapid development of Internet, cloud computing, Internet of things and other new technologies, information is growing exponentially, and human society has entered a new stage of fragmented knowledge. Fragmentation is flexible, random, and contains rich information, but fragmented information is fragmented, disordered, incomplete, large in size and fast in updating, so it is difficult to form effective knowledge. To resolve the problem of extracting and mining fragmented knowledge, firstly, this paper studies the fragmented knowledge map and he integration method of fragmented knowledge. secondly, we study the integration method of fragmented knowledge, from the aspects of incomplete and redundant fragmented information; Finally, we put forward several points of fragmented knowledge processing methods Key scientific issues and challenges.

012208
The following article is Open access

, and

As a core technology of future mobile communication networks, network slicing can provide users with end-to-end, customized, and isolated network connections. Thereby it is of great significance for improving network resource utilization and improving user experience. F-RAN, as a solution for 5G access network, has features such as low latency, support of mobility, and content awareness. Through the analysis of traditional network slicing control and service management and combined with the distributed computing and cache capabilities provided by the F-RAN architecture, this paper proposes a new type of network slice process. Different from traditional network slicing procedure, such procedure can respond to delay-sensitive services and reduce the fronthaul network load, and it could be used as a solution for network slicing in the F-RAN architecture.

012209
The following article is Open access

This paper mainly proposes a virtual machine placement algorithm, which uses the principle of graph segmentation. This algorithm can reduce the energy consumption of cloud services, Experimental simulation shows that compared with MBFD and TAVMP algorithm, this algorithm has a significant improvement in cup utilization, device energy consumption and SLA violation rate.

012210
The following article is Open access

and

With the development of technology, all parts of the world have gradually entered the 5G era. The advent of the 5G era enables "cloud computing" to complete the processing of tens of thousands of data in a short period of time, helping users to perform data mining and achieve powerful network services. In order to solve the current problems of agricultural product supply, marketing and logistics in China. This paper uses the literature survey method and data analysis to analyze the role of cloud computing technology in data mining. And apply this technology to e-commerce platforms. The application of this technology to e-commerce platforms can promote the development of agricultural e-commerce. It can be seen that under the influence of cloud computing technology, agricultural e-commerce is about to enter a new era.

012211
The following article is Open access

Big data bring revolutionary changes to education in the Internet +education era. This paper analyzes the current teaching situation of higher vocational English teaching, and proposes Cloud teaching mode based on the MosoInk Cloud Class platform. The teaching practice shows that Cloud teaching mode can stimulate students' interest in autonomous learning, transform passive learning into active learning, and make teaching fun, simple and efficient, improve the students' language skills.

012212
The following article is Open access

, and

With the continuous development and progress of information technology, the Internet of Things has been practically used in many areas of people's lives. The Internet of Things technology, as a collection of connected things, has storage and computing capabilities, which greatly meets the needs of society and people. Cloud computing is an important foundation for the long-term exhibition of the Internet of Things technology. It combines the products of parallel distributed computing technology, network storage virtualization technology, load balancing traditional computer network technology and other technologies, and its computing method is a comprehensive computing the way. This article is based on China's cloud computing IoT patent application data as the analysis object. It conducts qualitative and quantitative analysis on patent-related trends, related technology composition, and applicant rankings. It reflects the current status of the development of IoT technology and is beneficial to domestic R & D institutions in the field of networking find research blind spots and choose appropriate research directions on their own.

012213
The following article is Open access

, and

In this paper, the fluid flow around a cylinder is taken as an example to study the different characteristics of fluid flow. Gambit is used to build a 2D model of the watershed and its cylinders, and divide the mesh and define the boundaries. The flow model was constructed with Fluent, the steady-state flow in this flow state is simulated and calculated. And draw the velocity vector of the steady flow of the fluid, use the velocity vector to clearly show the double vortex behind the cylinder. Finally, through Carmen vortex street flow simulation and other parameters, the single vortex frequency is calculated and compared with the single vortex frequency calculated by Fluent to verify the correctness of Fluent's calculation.

012214
The following article is Open access

, and

During the shooting process of the camera, the problem of overexposure or underexposure often occurs, leading to the loss of important information in the picture. In response to this problem, this article first restores the camera's light response curve by taking multiple images with different exposures for the same static scene, combining the principle of least squares and the B-spline function fitting method, and obtaining the pixel values and exposure in the image the mapping relationship between them, and then fuse the scene photo images of different exposures into a high dynamic range image. Secondly, the synthesized high dynamic range image is deal with by Matlab program, and the exposure time is 8s, 1/2s, 1/30s, and 1/500s to reconstruct the image. Finally, experimental results show that the effects of the synthesized high dynamic range image and reconstructed exposure image are significant.

012215
The following article is Open access

In recent years, with the promotion and application of artificial intelligence technology in all fields, English has also had a lot of attention and automatic grading areas, but not much in the text of the characterization of breakthrough, the traditional technology based on latent semantic analysis of the text said, more latent semantic analysis technology can extract thematic information, and information is ignored. The purpose of this paper is to better reflect the content of the text, evaluate the English level more accurately, and improve students' English level better. This paper proposes a text representation method based on word vector clustering and a text representation method based on vector space model. A TF-IDF algorithm based on word vector is proposed. It is verified that the quadratic weighted Kappa value of the prediction results of the multi-model fusion algorithm based on word vector is better than the first place in Kaggle international English composition scoring competition, which verifies the effectiveness of the algorithm.

012216
The following article is Open access

, , and

Cultural heritage is the crystallization of the wisdom of peoples of all countries. Its value is inestimable, and countries and regions around the world have reached a consensus on protecting cultural heritage. The digital museum uses virtual reality technology, three-dimensional scanning technology, computer network technology and other display technologies to present the physical museum in a three-dimensional manner in the network application in the real world. The challenges facing the construction of digital museums mainly come from two aspects: Technically, digital museums can be regarded as a combination of a large-scale distributed information resource database and a multimedia broadband network, and a unified platform resource for cultural heritage natural resource information sharing and services. In terms of management, there are a series of problems in the management of digital museums in all stages of data collection, storage, transmission, and display. Based on the above background, the research content of this article is the protection and activation of cultural heritage based on cloud computing platform. This article analyzes the technical problems facing digital museums. Based on the in-depth study of Hadoop cloud computing, a digital museum construction plan based on Hadoop and a distributed multi-QoS parallel routing algorithm based on TCP / IP are proposed. This paper mainly adopts multi-QoS distributed parallel routing algorithm to improve the data transmission efficiency, thereby improving the query response speed of the system. This paper analyzes the theoretical foundation of Hadoop and the feasibility of building a digital museum, and builds the module implementation of the digital museum. Finally, the construction of Hadoop experimental environment is introduced. Simulation results show that compared with traditional algorithms, the improved algorithm can balance network load and improve network resource utilization. The performance analysis of the system verifies that the model proposed in this paper meets the requirements of security and integrity.

012217
The following article is Open access

and

The implementation of internationalization makes English education more and more important. In colleges and universities, English is an important basic course. With the popularization of cloud computing, more and more universities are applying cloud computing to English teaching. Cloud computing provides new ideas and methods for college English education. In view of this, this paper proposes a study of cloud-based college English real-time online education. This article first describes the impact of cloud computing on college English education, and conducts research through controlled experiments and questionnaires. The experimental results in this article show that after an experimental period, the students in the experimental group have made significant progress, especially in the listening level. The listening level of the students in the experimental group has increased by 57%. In contrast, the control group has improved, but Obviously lags behind the experimental group. In addition, students also have a good opinion of real-time online education. Although the advantages and disadvantages of real-time online education, the advantages outweigh the disadvantages in general, and most students say that this education method is more novel and attractive. The research results of this paper provide a new idea for the future teaching model of college English education and have good reference value.

012218
The following article is Open access

In order to improve the ability of no-search mathematical programming under limit analysis, and guide big data to optimize classification, a non-search mathematical programming model based on limit analysis model is proposed. The non-search mathematical programming of hyperbolic differential equations in the limit analysis model is analyzed, which provides a mathematical theoretical basis for solving the stability control problem of the system. The hyperbolic differential equation is constructed and the characteristic decomposition of the linear programming model is carried out by using adaptive limit analysis method. The searching delay two-degree-of-freedom control method is used at the load balancing point to adaptively optimize the searching delay parameters of the limit analysis model. In this paper, the hyperbolic differential equations in the limit analysis model are obtained, and the theorems of non-search mathematical programming are given. The mathematical analysis shows that the hyperbolic differential equations in the limit analysis model have the characteristics of non-search mathematical programming. The given theorem of non-search mathematical programming is reliable, and the characteristic solutions of differential equations are stable convergence, which can guide the stability control and improve the control accuracy and reliability. The simulation results show that the algorithm has better convergence and shorter time cost under the limit analysis.

012219
The following article is Open access

Safety is the top priority in railway development. At present, the rapid progress of economy and science and technology makes the speed of China's railway operation and the density of the railway network are increasing, which have a direct impact on China's railway safety. The research on railway safety detection technology can quickly realize the detection and elimination of related safety hidden dangers and prevent the occurrence of safety accidents, which not only ensures the safety of people's lives and property, but also is conducive to the establishment of a harmonious and safe railway environment in China and can promote further economic development. The emergence and development of information technology provides a relatively new technical means for railway safety detection, which can realize the rapid progress of detection technology. Based on the information technology and with the help of the security location algorithm, this paper briefly analyzes the problems encountered in railway safety detection, and puts forward the specific components and Suggestions of railway safety technology. On the one hand, it promotes the improvement of railway safety detection technology and ensures the safety of railway operation. On the other hand, it provides a certain theoretical basis for future research.

012220
The following article is Open access

, , and

In view of the disadvantages of paper notes that are not easy to save, not conducive to record, and easy to miss information, this fast personal note-taking software is designed with simple and efficient operation interface, which can cross different platforms. The system chooses B/S architecture, Spring + Mybatis framework in the background, and HTML + JS + Ajax technology in the foreground. MySql is adopted in the database to realize data storage. It mainly includes six functional modules: Notebook module, Note module, Recycle bin module, Collection module, Activity module and User module. Through the cloud note system, it is convenient for teachers to prepare lessons, record key teaching points, and collect students' homework. Students are easy to record knowledge points in class. It can improve both work and learning efficiency.

012221
The following article is Open access

, and

In the smart grid environment, the state data has the characteristics of wide area, panorama, mass and reliability. The traditional storage hardware uses disk arrays and the database management software uses the relational database system. Due to the poor system scalability, high cost and low reliability, it is difficult Adapt to requirements. Based on the above background, the purpose of this article is to study the research of cloud computing-based smart grid monitoring data analysis technology. Aiming at the problem that the power equipment condition monitoring data is getting larger and larger, and traditional storage methods cannot meet the condition monitoring big data storage problem, a cloud platform-based condition monitoring data storage system is designed. Using the distributed file system HDFS and Hbase databases to store status monitoring data, this paper designs a clustering algorithm based on the density cluster structure, DBCLustering, based on the shortcomings of traditional density clustering algorithms. This algorithm first builds the core reachability relationship of the data nodes The index structure CR-Tree is then used to extract a sorted linear table about the reachability relationship of the data. Finally, the clustering results are output according to the results of the linear table. In order to solve the problem of insufficient computing power of the stand-alone version of the algorithm, a clustering algorithm for condition monitoring data based on Spark-RDD-DBClustering algorithm is proposed. This algorithm realizes the parallel application of DBClustering algorithm under Spark platform, and improves the algorithm's ability to process large-scale data.

012222
The following article is Open access

, and

In order to overcome the current image matching algorithms, which mainly use the distance information between pixels to achieve feature matching, ignoring the variance information between images, resulting in more false matching in the matching results, this paper designs an image matching method based on Laplacian feature constrained coupling variance measure. Firstly, Harris operator is introduced to extract image features roughly. On the basis of rough extraction, Laplacian feature of pixels is used to optimize the extracted image features to obtain more accurate image features. Then, the gradient feature of the image is used to calculate the direction information of the image. Based on the gradient feature, the neighborhood of the feature points is established, and the Haar wavelet value in the neighborhood is obtained to obtain the feature vector. Finally, the regional variance model is used to measure the variance information of the image, and it is introduced into the process of image feature matching. The variance information is added on the basis of Euclidean distance measurement of feature points to achieve image feature matching more accurately. RANSAC method is used to purify the results of feature matching, eliminate mismatching and complete image matching. The experimental results show that compared with the existing matching algorithms, the proposed algorithm has better matching performance and higher accuracy, which accuracy maintained above 90%.

012223
The following article is Open access

, and

Complex deep neural network architecture such as AlexNet has great success in image classification, natural language processing and other applications. The choice of network architecture has proven to be critical. And researchers begin to design more and more complex networks in order to obtain better performance. However, designing complex networks manually often consumes a lot of computing resources and time, so the automated Neural Architecture Search(NAS) has attracted more and more attention in recent years. Currently, NAS have shown great potential in designing new architectures with high performance and high efficiency. Thus, first of all, this paper briefly introduces the development context and different directions of NAS. But compared to other NAS surveys, this paper focuses on One-shot-NAS methods. Among different methods of NAS, One-shot-NAS can achieve better performance in less time. Through comprehensive comparison and analysis, we apply a novel categorization on One-shot-NAS methods that are based on DAG, Hypernetwork, and network transformation respectively.

012224
The following article is Open access

In view of the problem that mobile network video transmission is prone to traffic congestion, the key information identification is carried out to improve the mobility of mobile network video transmission. A key information recognition method for mobile network video transmission is proposed based on Gaussian Mixture Model (GMM-HMM). The key information after feature separation is input into the neural network classifier to detect and process the key information of mobile network video transmission, and the key information identification of mobile network video transmission is completed. The simulation results show that the proposed method has strong anti-jamming ability, high probability of accurate recognition and good convergence of GMM-HMM Model, which improves the recognition efficiency.

012225
The following article is Open access

With the advent of the "Internet plus" era, there is a huge gap in the demand for "mass entrepreneurship and innovation" talents in the field of fine arts. Therefore, the government has put forward the concept of "mass entrepreneurship and innovation" to put forward the direction for solving the employment problem of graduates. Based on the characteristics of fine arts majors, this study analyzes the opportunities and challenges from the perspective of "Internet plus", which is of practical significance for strengthening students' entrepreneurial ability, building entrepreneurial platforms, innovating educational concepts and promoting the three-dimensional reform of entrepreneurship education in colleges and universities. In this paper, the fine arts class specialized students' innovative undertaking education present situation and the status quo of the double gen talent training and analyzes the existing problems, in view of the double and the ways for the cultivation of the talents were discussed, and the "Internet +" thinking and "double gen" oriented puts forward the optimized university fine arts class specialized personnel training mode of specific measures. Through the "Internet +" self-employment questionnaire survey and individual interviews of art majors, reliable and real data are collected, and the advantages and problems of art majors in "Internet +" entrepreneurship are found out by combining literature analysis with empirical research.

012226
The following article is Open access

, , , , and

With the development and expansion of enterprise groups, large enterprise groups are gradually moving towards multinational groups. Such enterprises have many subordinate units, frequent business exchanges, business types and business scopes all over the world, and there are frequent work exchanges around the world. In particular, the decentralization of funds makes the management of funds difficult. The management risk of funds is also relatively high with the characteristics of the group companies. For large enterprise groups, especially multinational groups, the relatively centralized management of group funds is a challenge. In order to meet the management needs of large enterprise groups, the concept of centralized fund management emerged as the times require, and it first appeared in large enterprises in western countries. In order to solve the management difficulties and realize the centralized management of the company group, etc., and for the management staff to achieve overall planning and consideration, this article specifically takes Group A as an example to carry out the investigation. Through investigation, it can be found that the company's fund precipitation is very obvious, the supervision is seriously insufficient, the capital utilization rate is extremely low at about 40%, and the maximum does not exceed 50%. Group A cannot obtain the financial information of each subsidiary and branch in time. There is a lag in reconciliation information with branches. In order to solve this difficulty, this article deliberately combined puppet and Ansible to study the tools of the centralized management platform, to find the direction for the company to achieve centralized development, and to further promote the development of the group.

012227
The following article is Open access

, and

In the operation of urban rail stations, joint emergency drills for different types of work are an important way to ensure the safe operation of urban rail stations. However, due to the lack of equipment and means, at present, the joint emergency drills for urban rail stations are mostly a single-person system. Based on the current status of emergency joint drills in urban rail stations, this article proposes a virtual reality-based multi-person collaborative urban rail station emergency simulation system. Construct a large-scale virtual reality scene through the viewpoint-related LOD quadtree, and use socket technology to achieve multiplayer online interaction. Finally, all models are jointly driven by Unity3d in the simulation scene. An immersive, multi-industry coordinated urban rail station emergency drill simulation system was constructed. Providing a simulation training environment similar to the actual situation for emergency trains in urban rail stations can greatly improve the shortcomings of difficult and inefficient implementation of the organization, and change the difficult situation of insufficient emergency drills for multiple types of rail stations.

012228
The following article is Open access

and

In the fields of engineering technology, economy and systems engineering etc. there are many multi-objective optimization problems. The multi-objective optimization problem is a kind of complex optimization problem that are difficult to solve. Therefore, the thesis proposes themulti-objective optimization genetic algorithm based on Pareto optimal solution database. This algorithm improves the selection operator with a preservation mechanism--data basethat can reservethe optimal solution of each generation of Pareto. As for the Pareto optimal individual in data base, the optimal solution of Pareto operation and the Euclidean distance operation are carried out. Experimentalverification verifies that this algorithm not only effectively avoids the damage caused by selection, cross and mutation operation to Pareto, but has high evolution speed and stable algorithm.

012229
The following article is Open access

Traditional sharing platform adopts manual input information, and the sharing process is inefficient. A hospital nursing information sharing platform based on improved particle swarm optimization algorithm is proposed. The main index structure of the patient was designed and the information input was completed. The priority random swimming data transmission algorithm is used to transfer nursing information. The information sharing mechanism of particle swarm optimization (PSO) is analyzed, and the sharing platform is designed according to the optimal position of individual particles. Experiments show that the shared platform can achieve high speed interaction of hospital nursing information.

012230
The following article is Open access

With the continuous progress of economic level, China's tourism in recent years has made rapid development. However, with the rapid development of tourism, a series of problems have emerged, among which the most significant one is the imbalance between tourism management talents and tourism development. The current tourism management personnel simply cannot adapt to the needs of the rapid development of tourism. In particular, the rapid development of the Internet has given birth to the "Internet + tourism" model and promoted the reform of the tourism industry. The rapid change of tourism industry means that tourism industry has entered a new period of development, but it also puts forward higher requirements. Tourism management talents are related to the development quality of tourism industry. Under the background of "Internet +", it has become an urgent problem to study the cultivation of application-oriented undergraduate tourism management professionals. Based on this, this article - to hainan vocational college and undergraduate cultivation 4 + 0 pilot project as an example, the first "Internet +" and "4 + 0" model for the relevant interpretation, on the basis of the information data algorithm and combined with the related experiment, analyzes the current status of tourism management talents cultivation, and puts forward some strategies on the cultivation of the tourism management specialized talented person.

012231
The following article is Open access

With the advent of the era of big data, these diverse, maritime and high-speed terminal data will be calculated through cloud-based storage, sharing, and mining of information, cheaply, efficiently, and quickly. The creation and driving of new industries, new products, new services, and big data are constantly emerging, which has profoundly changed people's daily lives. The value of data in the era of big data is constantly being discovered and developed to provide a convenient and comfortable life. It brings unprecedented challenges to privacy protection. The collection of personal information is throughout life. The preservation of information is vulnerable to online attacks and leads to large-scale disclosure of personal information. During the operation of big data, problems such as illegal collection of privacy information, excessive analysis and illegal transactions occurred, which constantly threatened the stability of personal life and the security of personal property. The purpose of this article is to study teachers' privacy protection methods based on big data analysis. This paper uses the fusion technology of ORAM and group signatures to study the privacy protection of teachers. It aims to better protect the privacy of teachers in a big data environment. It also provides reference suggestions for other researchers and contributes to the protection of teachers' privacy.

012232
The following article is Open access

, and

The development and application of new energy vehicles has always been the focus of the government. As far as the users of new energy vehicles are concerned, the safety and energy-saving effects of operating conditions are of vital importance. Therefore, to fully promote the development of new energy vehicles, we must do a good job in the statistics and processing of new energy real-time vehicle data. This article focuses on the analysis of the effects of distributed storage and computing technology on real-time on-board data processing for new energy vehicles to provide solutions to the difficulties of countries and enterprises in the research and development of new energy vehicles and promote he energy saving of the state and enterprises.

012233
The following article is Open access

, , and

Traditional BP neural network-based prediction method cannot accurately predictregional economic trend, and the operation efficiency is low. To this end, a method based on improved BP neural network algorithm is developed to predict regional economic trend. The Cobb-Douglas production function is used to select the most influential number of working people and economic investment in fixed assets, fiscal expenditure, gross foreign export value, retail sales of social consumer goods index as the sample data and normalized. The error of sample data is calculated by TangXC_BPModel model, and the the weights are modified uniformly so that and the regional economic trend is predicted accurately.

012234
The following article is Open access

With the rapid development of science and technology in modern society, enterprises are developing in the direction of more openness, standardization and network interconnection. Although enterprises have realized the informationization of production and operation earlier, their network information security architecture is still not perfect, and the existing network information security model cannot be fully applied to some enterprises, which has made some enterprises unable to fully protect their network information security. Therefore, there is an urgent need for a more targeted network security model for enterprises to enhance the security strength of their network information systems. Based on the analysis of the security situation of the enterprise network information system, this thesis combines the security status of the enterprise information system and the main threats to construct a cloud computing-based enterprise network security model. This model is a classic network security model of dynamic closed-loop management consisting of four modules: protection, detection, response and recovery. On this basis, a risk-hardening security hardening scheme is designed and implemented, and the practicability and effectiveness of the improved enterprise network security model are verified. The research in this thesis proves that the improved enterprise network security model can make domestic companies 'network information systems more robust, and also provides a reference basis for the construction of other small and medium-sized enterprises' network information systems. Instead, it is developing in the direction of combining technical and management methods to effectively improve the level of enterprise network information security.

012235
The following article is Open access

In this work, a blurred detail enhancement algorithm is proposed to improve the feature recognition ability of motion video image based on computer network. The edge contour features of motion video images are decomposed using multi-scale Retinex algorithm, and the image recognition technology based on computer network is used to simulate the human visual features to enhance and repair the overlay or blurred features contained in the images. The feature extraction and feature focusing of blurred detail of motion video image are realized by computer vision template feature matching method, respectively. On this basis, the enhancement effect of blurred detail image is achieved. The proposed method is proved to be able to can improve the output peak signal to noise ratio (PSNR) the blur detail quality, and the recognition ability of motion video images.

012236
The following article is Open access

Urban rail transit such as subway is important means of transportation for people to travel. With the acceleration of urbanization construction throughout the country, urban rail transit has developed rapidly. More attention is paid to the interchange means between urban rail transit and other urban transportation systems, such as public transport, public bicycle, and private car, and the interchange means has gradually become an important indicator for assessing the level of urban transportation system. This paper analyzes the interchange means between urban rail transit and other urban transportation systems, and puts forward relevant suggestions on the interchange between between urban rail transit and private cars to contribute to the promotion of urbanization.

012237
The following article is Open access

The chaotic data in the distributed network is affected by the disturbance information of the network nodes, which leads to the poor convergence of the data feature detection. A new algorithm for the chaotic data feature detection in the distributed network is proposed based on fuzzy C-means clustering. According to the association rule attributes of the chaotic data in the distributed network, the principal component analysis is carried out, and the semantic attributes and fuzzy clustering features of the chaotic data in the distributed network are extracted. The joint association rule analysis method is used to deal with the interference filtering of the chaotic data in the distributed network, and the classified fuzzy set of the chaotic data in the distributed network is constructed based on the sensor fusion tracking measure method. In the fuzzy data set, the mixed weighting and adaptive block matching of chaotic data in distributed network are carried out, and the association rule feature quantity of chaotic data in distributed network is extracted. The extracted features are input into the fuzzy C-means clustering classifier for data classification and recognition, and the optimized feature detection of the chaotic data in the distributed network is completed. The simulation results show that the proposed method has good data convergence, strong convergence and anti-interference in the process of feature detection in distributed networks.

012238
The following article is Open access

Aiming improve the ability of fault detection and diagnosis of wireless network communication, the network chaotic information nodes are detected accurately and efficiently. An efficient detection method for chaotic information nodes in wireless networks is proposed based on quantization tracking and identification of sensor information. Firstly, the node connectivity graph model of wireless network communication is constructed, the link transmission channel of wireless network communication is analyzed, and the topology structure of distributed node is designed. Then the distributed sensor detection technique is used to detect the node output link equalization of wireless network communication. The higher-order spectral features of the output bit sequence stream of wireless network communication channel are extracted, and the anomaly of the characteristic quantity is extracted according to the characteristic quantity. The sensor information quantization tracking and identification technology is used to detect the chaotic information nodes in wireless network. Finally, the simulation test of high efficiency optimization detection of chaotic information nodes in wireless network communication is carried out. The results show that the accuracy of efficient optimization detection for chaotic information nodes is high by using this method. The quality of wireless network communication is improved because of the good real-time performance of network interrupt detection and fault diagnosis.

012239
The following article is Open access

This article has been retracted by IOP Publishing following an allegation that raises concerns this article may have been created, manipulated, and/or sold by a commercial entity. In addition, IOP Publishing has seen no evidence that reliable peer review was conducted on this article, despite the clear standards expected of and communicated to conference organisers.

The authors of the article have been given opportunity to present evidence that they were the original and genuine creators of the work, however at the time of publication of this notice, IOP Publishing has not received any response. IOP Publishing has analysed the article and agrees there are enough indicators to cause serious doubts over the legitimacy of the work and agree this article should be retracted. The authors are encouraged to contact IOP Publishing Limited if they have any comments on this retraction.

Retraction published: 23 September 2022

012240
The following article is Open access

This article has been retracted by IOP Publishing following an allegation that raises concerns this article may have been created, manipulated, and/or sold by a commercial entity. In addition, IOP Publishing has seen no evidence that reliable peer review was conducted on this article, despite the clear standards expected of and communicated to conference organisers.

The authors of the article have been given opportunity to present evidence that they were the original and genuine creators of the work, however at the time of publication of this notice, IOP Publishing has not received any response. IOP Publishing has analysed the article and agrees there are enough indicators to cause serious doubts over the legitimacy of the work and agree this article should be retracted. The authors are encouraged to contact IOP Publishing Limited if they have any comments on this retraction.

Retraction published: 23 September 2022

012241
The following article is Open access

This article has been retracted by IOP Publishing following an allegation that raises concerns this article may have been created, manipulated, and/or sold by a commercial entity. In addition, IOP Publishing has seen no evidence that reliable peer review was conducted on this article, despite the clear standards expected of and communicated to conference organisers.

The authors of the article have been given opportunity to present evidence that they were the original and genuine creators of the work, however at the time of publication of this notice, IOP Publishing has not received any response. IOP Publishing has analysed the article and agrees there are enough indicators to cause serious doubts over the legitimacy of the work and agree this article should be retracted. The authors are encouraged to contact IOP Publishing Limited if they have any comments on this retraction.

Retraction published: 23 September 2022

012242
The following article is Open access

This article has been retracted by IOP Publishing following an allegation that raises concerns this article may have been created, manipulated, and/or sold by a commercial entity. In addition, IOP Publishing has seen no evidence that reliable peer review was conducted on this article, despite the clear standards expected of and communicated to conference organisers.

The authors of the article have been given opportunity to present evidence that they were the original and genuine creators of the work, however at the time of publication of this notice, IOP Publishing has not received any response. IOP Publishing has analysed the article and agrees there are enough indicators to cause serious doubts over the legitimacy of the work and agree this article should be retracted. The authors are encouraged to contact IOP Publishing Limited if they have any comments on this retraction.

Retraction published: 23 September 2022

012243
The following article is Open access

This article has been retracted by IOP Publishing following an allegation that raises concerns this article may have been created, manipulated, and/or sold by a commercial entity. In addition, IOP Publishing has seen no evidence that reliable peer review was conducted on this article, despite the clear standards expected of and communicated to conference organisers.

The authors of the article have been given opportunity to present evidence that they were the original and genuine creators of the work, however at the time of publication of this notice, IOP Publishing has not received any response. IOP Publishing has analysed the article and agrees there are enough indicators to cause serious doubts over the legitimacy of the work and agree this article should be retracted. The authors are encouraged to contact IOP Publishing Limited if they have any comments on this retraction.

Retraction published: 23 September 2022

012244
The following article is Open access

This article has been retracted by IOP Publishing following an allegation that raises concerns this article may have been created, manipulated, and/or sold by a commercial entity. In addition, IOP Publishing has seen no evidence that reliable peer review was conducted on this article, despite the clear standards expected of and communicated to conference organisers.

The authors of the article have been given opportunity to present evidence that they were the original and genuine creators of the work, however at the time of publication of this notice, IOP Publishing has not received any response. IOP Publishing has analysed the article and agrees there are enough indicators to cause serious doubts over the legitimacy of the work and agree this article should be retracted. The authors are encouraged to contact IOP Publishing Limited if they have any comments on this retraction.

Retraction published: 23 September 2022

012245
The following article is Open access

This article has been retracted by IOP Publishing following an allegation that raises concerns this article may have been created, manipulated, and/or sold by a commercial entity. In addition, IOP Publishing has seen no evidence that reliable peer review was conducted on this article, despite the clear standards expected of and communicated to conference organisers.

The authors of the article have been given opportunity to present evidence that they were the original and genuine creators of the work, however at the time of publication of this notice, IOP Publishing has not received any response. IOP Publishing has analysed the article and agrees there are enough indicators to cause serious doubts over the legitimacy of the work and agree this article should be retracted. The authors are encouraged to contact IOP Publishing Limited if they have any comments on this retraction.

Retraction published: 23 September 2022

012246
The following article is Open access

This article has been retracted by IOP Publishing following an allegation that raises concerns this article may have been created, manipulated, and/or sold by a commercial entity. In addition, IOP Publishing has seen no evidence that reliable peer review was conducted on this article, despite the clear standards expected of and communicated to conference organisers.

The authors of the article have been given opportunity to present evidence that they were the original and genuine creators of the work, however at the time of publication of this notice, IOP Publishing has not received any response. IOP Publishing has analysed the article and agrees there are enough indicators to cause serious doubts over the legitimacy of the work and agree this article should be retracted. The authors are encouraged to contact IOP Publishing Limited if they have any comments on this retraction.

Retraction published: 23 September 2022

012247
The following article is Open access

This article has been retracted by IOP Publishing following an allegation that raises concerns this article may have been created, manipulated, and/or sold by a commercial entity. In addition, IOP Publishing has seen no evidence that reliable peer review was conducted on this article, despite the clear standards expected of and communicated to conference organisers.

The authors of the article have been given opportunity to present evidence that they were the original and genuine creators of the work, however at the time of publication of this notice, IOP Publishing has not received any response. IOP Publishing has analysed the article and agrees there are enough indicators to cause serious doubts over the legitimacy of the work and agree this article should be retracted. The authors are encouraged to contact IOP Publishing Limited if they have any comments on this retraction.

Retraction published: 23 September 2022

012248
The following article is Open access

This article has been retracted by IOP Publishing following an allegation that raises concerns this article may have been created, manipulated, and/or sold by a commercial entity. In addition, IOP Publishing has seen no evidence that reliable peer review was conducted on this article, despite the clear standards expected of and communicated to conference organisers.

The authors of the article have been given opportunity to present evidence that they were the original and genuine creators of the work, however at the time of publication of this notice, IOP Publishing has not received any response. IOP Publishing has analysed the article and agrees there are enough indicators to cause serious doubts over the legitimacy of the work and agree this article should be retracted. The authors are encouraged to contact IOP Publishing Limited if they have any comments on this retraction.

Retraction published: 23 September 2022

012249
The following article is Open access

This article has been retracted by IOP Publishing following an allegation that raises concerns this article may have been created, manipulated, and/or sold by a commercial entity. In addition, IOP Publishing has seen no evidence that reliable peer review was conducted on this article, despite the clear standards expected of and communicated to conference organisers.

The authors of the article have been given opportunity to present evidence that they were the original and genuine creators of the work, however at the time of publication of this notice, IOP Publishing has not received any response. IOP Publishing has analysed the article and agrees there are enough indicators to cause serious doubts over the legitimacy of the work and agree this article should be retracted. The authors are encouraged to contact IOP Publishing Limited if they have any comments on this retraction.

Retraction published: 23 September 2022

012250
The following article is Open access

This article has been retracted by IOP Publishing following an allegation that raises concerns this article may have been created, manipulated, and/or sold by a commercial entity. In addition, IOP Publishing has seen no evidence that reliable peer review was conducted on this article, despite the clear standards expected of and communicated to conference organisers.

The authors of the article have been given opportunity to present evidence that they were the original and genuine creators of the work, however at the time of publication of this notice, IOP Publishing has not received any response. IOP Publishing has analysed the article and agrees there are enough indicators to cause serious doubts over the legitimacy of the work and agree this article should be retracted. The authors are encouraged to contact IOP Publishing Limited if they have any comments on this retraction.

Retraction published: 23 September 2022

012251
The following article is Open access

This article has been retracted by IOP Publishing following an allegation that raises concerns this article may have been created, manipulated, and/or sold by a commercial entity. In addition, IOP Publishing has seen no evidence that reliable peer review was conducted on this article, despite the clear standards expected of and communicated to conference organisers.

The authors of the article have been given opportunity to present evidence that they were the original and genuine creators of the work, however at the time of publication of this notice, IOP Publishing has not received any response. IOP Publishing has analysed the article and agrees there are enough indicators to cause serious doubts over the legitimacy of the work and agree this article should be retracted. The authors are encouraged to contact IOP Publishing Limited if they have any comments on this retraction.

Retraction published: 23 September 2022