Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Advances in Intelligent Systems and Computing
Volume 842
Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Polande-mail: [email protected]
The series “Advances in Intelligent Systems and Computing” contains publications on theory,applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually alldisciplines such as engineering, natural sciences, computer and information science, ICT, economics,business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all theareas of modern intelligent systems and computing such as: computational intelligence, soft computingincluding neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms,social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds andsociety, cognitive science and systems, Perception and Vision, DNA and immune based systems,self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centriccomputing, recommender systems, intelligent control, robotics and mechatronics includinghuman-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligentdata analysis, knowledge management, intelligent agents, intelligent decision making and support,intelligent network security, trustmanagement, interactive entertainment,Web intelligence andmultimedia.
The publications within “Advances in Intelligent Systems and Computing” are primarily proceedingsof important conferences, symposia and congresses. They cover significant recent developments in thefield, both of a foundational and applicable character. An important characteristic feature of the series isthe short publication time and world-wide distribution. This permits a rapid and broad dissemination ofresearch results.
Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, Indiae-mail: [email protected]
Members
Rafael Bello Perez, Universidad Central “Marta Abreu” de Las Villas, Santa Clara, Cubae-mail: [email protected]
Emilio S. Corchado, University of Salamanca, Salamanca, Spaine-mail: [email protected]
Hani Hagras, University of Essex, Colchester, UKe-mail: [email protected]
László T. Kóczy, Széchenyi István University, Győr, Hungarye-mail: [email protected]
Vladik Kreinovich, University of Texas at El Paso, El Paso, USAe-mail: [email protected]
Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwane-mail: [email protected]
Jie Lu, University of Technology, Sydney, Australiae-mail: [email protected]
Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexicoe-mail: [email protected]
Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazile-mail: [email protected]
Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Polande-mail: [email protected]
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Konge-mail: [email protected]
More information about this series at http://www.springer.com/series/11156
Jemal Abawajy • Kim-Kwang Raymond ChooRafiqul Islam • Zheng XuMohammed AtiquzzamanEditors
International Conferenceon Applicationsand Techniques in CyberSecurity and IntelligenceATCI 2018Applications and Techniques in CyberSecurity and Intelligence
123
EditorsJemal AbawajyFaculty of Science, Engineeringand Built Environment
Deakin University GeelongGeelong, VIC, Australia
Kim-Kwang Raymond ChooDepartment of Information Systemsand Cyber Security
The University of Texas at San AntonioSan Antonio, TX, USA
Rafiqul IslamSchool of Computing and MathematicsCharles Sturt UniversityAlbury, NSW, Australia
Zheng XuShanghai UniversityShanghai Shi, China
Mohammed AtiquzzamanSchool of Computer ScienceUniversity of OklahomaNorman, OK, USA
ISSN 2194-5357 ISSN 2194-5365 (electronic)Advances in Intelligent Systems and ComputingISBN 978-3-319-98775-0 ISBN 978-3-319-98776-7 (eBook)https://doi.org/10.1007/978-3-319-98776-7
Library of Congress Control Number: 2018951638
© Springer Nature Switzerland AG 2019This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or partof the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmissionor information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilarmethodology now known or hereafter developed.The use of general descriptive names, registered names, trademarks, service marks, etc. in thispublication does not imply, even in the absence of a specific statement, that such names are exempt fromthe relevant protective laws and regulations and therefore free for general use.The publisher, the authors and the editors are safe to assume that the advice and information in thisbook are believed to be true and accurate at the date of publication. Neither the publisher nor theauthors or the editors give a warranty, express or implied, with respect to the material contained herein orfor any errors or omissions that may have been made. The publisher remains neutral with regard tojurisdictional claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AGThe registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
The 2018 International Conference on Applications and Techniques in CyberIntelligence (ATCI), building on the previous successes in Ningbo, China (2017),Guangzhou, China (2016), Dallas, USA (2015), Beijing, China (2014), and Sydney,Australia (2013), is proud to be in the sixth consecutive conference year inShanghai. Previously, the event is known as the International Workshop onApplications and Techniques in Cyber Security (ATCS 2016), held in conjunctionwith the International Conference on Security and Privacy in CommunicationNetworks (SecureComm). The purpose of ATCI 2018 is to provide a forum forpresentation and discussion of innovative theory, methodology, and applied ideas,cutting-edge research results, and novel techniques, methods, and applications onall aspects of cyber and electronics security and intelligence. The conferenceestablishes an international forum and aims to bring recent advances in theever-expanding cybersecurity area including its fundamentals, algorithmic devel-opments, and applications.
Each paper was reviewed by at least three independent experts, and the accep-tance rate was 35%. The conference would not have been a reality without thecontributions of the authors. We sincerely thank all the authors for their valuablecontributions. We would like to express our appreciation to all members of theProgram Committee for their valuable efforts in the review process that helped us toguarantee the highest quality of the selected papers for the conference.
We would like to express our thanks to our distinguished keynote speakers, Prof.Tharam Dillon, La Trobe University, Australia; Prof. Zhou Wenbo, President ofShanghai Tunnel Engineering Co., Ltd., Prof. Lv Kangjuan, Executive VicePresident, Professor and Doctoral Supervisor in SHU-UTS SILC Business Schoolof Shanghai University, Prof. J. Christopher Westland, University of Illinois,Chicago. We would also like to acknowledge the strong support of SHU-UTS SILCBusiness School of Shanghai University, Shanghai, China, as well as the GeneralChairs, Publication Chairs, Organizing Chairs, Program Committee Members, andall volunteers.
v
Our special thanks due also to the editors for their assistance throughout thepublication process.
Jemal AbawajyKim-Kwang Raymond Choo
Mohammed AtiquzzamanRafiqul Islam
Zheng Xu
vi Preface
Organization
General Chairs
Siyi Gong Shanghai University, ChinaJohn Macintyre
(Pro Vice Chancellor)University of Sunderland
Program Chairs
Jemal Abawajy Deakin University, AustraliaKim-Kwang Raymond Choo University of Texas at San Antonio, USAMohammed Atiquzzaman University of Oklahoma, USARafiqul Islam Charles Sturt University, AustraliaZheng Xu TRIMPS and Shanghai University, China
Publication Chairs
Juan Du Shanghai University, ChinaMazin Yousif T-Systems International, USAVijayan Sugumaran Oakland University, USA
Publicity Chairs
Fangqi Cheng Zhejiang Business Technology Institute, ChinaKewei Sha University of Houston, USAYongchun Xu Zhejiang Business Technology Institute, ChinaNeil. Y. Yen University of Aizu, Japan
vii
Local Organizing Chairs
Min Hu Shanghai University, ChinaGang Luo Shanghai University, ChinaJuan Chen Shanghai University, ChinaQigang Liu Shanghai University, China
Program Committee Members
William Bradley Glisson Sam Houston State University, USAGeorge Grispos University of Nebraska Omaha, USAAbdullah Azfar KPMG Sydney, AustraliaAniello Castiglione Università di Salerno, ItalyFlorin Pop University Politehnica of Bucharest, RomaniaBen Martini University of South Australia, AustraliaWei Wang University of Texas at San Antonio, USANeil Yen University of Aizu, JapanShunxiang Zhang Anhui University of Science and Technology,
ChinaGuangli Zhu Anhui University of Science and Technology,
ChinaTao Liao Anhui University of Science and Technology,
ChinaXiaobo Yin Anhui University of Science and Technology,
ChinaXiangfeng Luo Shanghai University, ChinaXiao Wei Shanghai University, ChinaHuan Du Shanghai University, ChinaZhiguo Yan Fudan University, ChinaRick Church UC Santa Barbara, USATom Cova University of Utah, USASusan Cutter University of South Carolina, USAZhiming Ding Beijing University of Technology, ChinaYong Ge University of North Carolina at Charlotte, USADanhuai Guo Computer Network Information Center, Chinese
Academy of Sciences, ChinaJianping Fang University of North Carolina at Charlotte, USAJianhui Li Computer Network Information Center, Chinese
Academy of Sciences, ChinaYi Liu Tsinghua University, ChinaKuien Liu Pivotal Inc., USAFeng Lu Institute of Geographic Science and Natural
Resources Research, Chinese Academyof Sciences, China
viii Organization
Ricardo J. Soares Magalhaes University of Queensland, AustraliaAlan Murray Drexel University, USAYasuhide Okuyama University of Kitakyushu, JapanXiaogang Qiu National University of Defense Technology,
ChinaXing Xie Microsoft Research Asia, ChinaWei Xu Renmin University of China, ChinaChaowei Phil Yang George Mason University, USAHengshu Zhu Baidu Inc., ChinaMorshed Chowdhury Deakin University, Australia
Organization ix
Contents
ATCI 2018
Convolutional Neural Network Deep-Learning Modelsfor Prediction of Shared Bicycle Demand . . . . . . . . . . . . . . . . . . . . . . . . 3J. Christopher Westland, Jian Mou, and Dafei Yin
Analysis of Feature Selection Techniques for Correlation-BasedNetwork Anomaly Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Florian Gottwalt, Elizabeth Chang, and Tharam Dillon
An RFID Path Authentication Protocol Basedon Chebyshev Polynomials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Zuming Shen and Peng Zeng
An Efficient Authentication Protocol for RFID-Based Supply Chains . . . 28Yuyin Qian and Peng Zeng
Research on the Two Stage Full Life Cycle Managementof Police Equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38Zhiwei Tang, Lingling Hu, and Jianye Li
Research on Audio and Video Transmission Strategy for Android . . . . 44Shaoqi Feng, Shiyang Song, and Siliang Gong
Emojis Sentiment Analysis Based on Big Social Media Data . . . . . . . . . 56Dongdong Li, Xiangfeng Luo, Xiao Wei, and Ruirong Xue
A Transfer Learning Approach for Credit Scoring . . . . . . . . . . . . . . . . 64Wei Li, Shuai Ding, Yi Chen, and Shanlin Yang
A Parallel Programming Model Research Basedon Heterogeneous Multi-core Embedded Processor . . . . . . . . . . . . . . . . 74YuXin Cai and ZhiWei Tang
xi
An Improved Apriori-Pro Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 83Huaping Zhou and Daoyi Zhang
An Improved Fuzzy Support Vector Machine Algorithm Basedon Refactoring Class Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91Huaping Zhou, Huangli Qin, and Huali Shen
An Ensemble Data Stream Mining Algorithmfor Class-Imbalanced Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100Qin Sun, Yufei Wu, Huixian Duan, Jun Wang, and Lin Mei
A Gaussian-Based Trust Model for Nodes of Sensor Networks . . . . . . . 109Ming Yang
A Study of Face Recognition System’s Testingand Evaluation Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118Ming Yang, Zhizong Wu, and Zhiguo Yan
Network Security Problems and Solutions of VideoSurveillance System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124Ming Yang, Zhizong Wu, and Jinbo Wu
Image Encryption Algorithms Based on Chaos Through DualScrambling of Dynamic Josephus Ring and Bit . . . . . . . . . . . . . . . . . . . 131Mengran Zhou and M. A. Xin
Statistical Analysis of Traffic-Related Social Media Dataof Multiple Cities in China . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141Zhihao Zheng and Pu Wang
Exploring Influential Factors in Recommending Algorithmsfor All Items and Niche Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151Zhengye Xiao, Yi Zhang, and Yuchun Fang
A Distributed Approach of Accompany Vehicle Discovery . . . . . . . . . . . 161Yu Liang Zhao, Qi Tong Wang, Peng Wang, Wei Wang,and Zhi Guo Yan
Spatial Context for Correlation Filter Tracking . . . . . . . . . . . . . . . . . . . 174Fuhui Tang, Xiankai Lu, Xiaoyu Zhang, Xueqian Song, Jiyuan Cai,Hong Zhang, and Jiaru Song
The Automobile Recommendation Method Based on SentimentAnalysis of Online Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182Zhuangzhuang Pan and Guangli Zhu
An Adaptive Tracking Algorithm for Micro-blog Topic Basedon Association Semantic Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194Shunxiang Zhang and Hongze Zhu
xii Contents
Knowledge Extracting from Micro-Blog Topic . . . . . . . . . . . . . . . . . . . . 207Shunxiang Zhang and Pengfei Ji
Personal Relations Extraction from Microblog Text Basedon Relations Trigger Words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220Qian Chen and Shunxiang Zhang
Recommendation Algorithm Based on Latent Semantic of Tags . . . . . . 230Kelei Sun, Huali Shen, Jiaming Yu, and Shunxiang Zhang
Ontology-Supported Case-Based Reasoning Approach for DoubleScenario Model Construction in International Disaster MedicalRelief Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239Min Zhu, Ruxue Chen, Shi Chen, Shaobo Zhong, Tianye Lin,and Quanyi Huang
Web Sanitization from Malicious Code Injection Attacks . . . . . . . . . . . 251Hussein Alnabulsi and Rafiqul Islam
Event Element Recognition Based on Improved K-means Algorithm . . . 262Tao Liao, Wenhua Yang, Shunxiang Zhang, and Zongtian Liu
A Comparative Method of Legal Documents Based on LDA . . . . . . . . . 271Zhanxing Hao, Xiao Wei, and Hong Hu
Feature Selection Approach for Twitter Sentiment Analysisand Text Classification Based on Chi-Square and Naïve Bayes . . . . . . . 281S. Paudel, P. W. C. Prasad, Abeer Alsadoon, MD. Rafiqul Islam,and Amr Elchouemi
Prospect of Application of Hyperspectral Imaging Technologyin Public Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299Cheng Cheng and Bo Zhao
Design and Development of Automatic Packaging Equipmentfor Boxed Drugs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305Zhongyuan Zhang, Yu Xie, and Junwei Zhang
Development of Automatic Material Sorting Machine Based on PLC . . . 312Yu Xie and Zhongyuan Zhang
Intelligent Counter-Terrorism Equipment Status and Development . . . . 318Cheng Cheng and Bo Zhao
A Monitoring System of Ground-Air Interaction Multi-sensoryFusion Plant Growth Condition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325Li Jingzhao and Guo Mingming
RSCHE: A Virtual Grid Structure Based Routing Schemewith Cell-Header Group Exchanged for Wireless Sensor Network . . . . . 333Jin Wang, Junming Niu, Xiang Yin, and Kai Wang
Contents xiii
An Improved Person Reidentification Method by SelectiveConvolutional Descriptor Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . 344Shuren Zhou, Maolin Ke, and Peng Luo
A Survey of Multi-object Video Tracking Algorithms . . . . . . . . . . . . . . 351Shuren Zhou, Maolin Ke, Jia Qiu, and Jin Wang
An Overview of Image-Based Person Re-identification . . . . . . . . . . . . . . 370Shuren Zhou, Maolin Ke, and Peng Luo
Electrical Data Recovery with Weather Information via CollectiveMatrix Factorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379Xushan Han, Qian Dang, Huafeng Zhang, Yanwen He, and Lin Gao
Two-Phases Detection Scheme: Detecting Android Malwarein Android Markets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389Xin Su, Jiuchuan Lin, Fuhui Shen, and Yi Zheng
A Software Quality Testing Evaluation Method and Its PowerGrid Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400Keshou Wu, Xingyu Gao, Zhenyu Chen, and Jin Wang
An Index Display Software Evaluation Architecture for PowerGrid Application on Big Data Platform . . . . . . . . . . . . . . . . . . . . . . . . . 405Keshou Wu, Xingyu Gao, Zhenyu Chen, and Jin Wang
An Uniform Access Method of Heterogeneous Big Datawith Power Grid Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410Zhenyu Chen, Dapeng Li, Lixin Li, Ruili Ye, Xingyu Gao,Fangchun Di, Lingxu Guo, Jie Zhang, and Zhengping Chen
A Cloud Computing Based District Power Grid Dispatchingand Control Integrated Standby Framework . . . . . . . . . . . . . . . . . . . . . 417Zhenyu Chen, Lixin Li, Dapeng Li, Fangchun Di, Xingyu Gao,Can Cui, Zhengping Chen, Lingxu Guo, and Jie Zhang
Detection of Anomaly in Firewall Rule-Sets . . . . . . . . . . . . . . . . . . . . . . 422Victor Clincy and Hossain Shahriar
Classification and Coding of Pipe Gallery Bim Modelfor Operation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432Song-Tao Lu, Min Hu, Li Teng, and Li Zhou
A UAV Operational Situation Similarity Measurement MethodBased on Empirical Mode Decomposition . . . . . . . . . . . . . . . . . . . . . . . 443Yao Lu, DongSheng Li, and Yang Gao
Research on Parking Guidance Information System Basedon “Internet Plus” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452Yang Li
xiv Contents
Dynamic Multi-objective Optimization for Mixed Traffic FlowBased on Partial Least Squares Prediction Model . . . . . . . . . . . . . . . . . 462Juan Chen, Zhengxuan Xue, and Dongxiao Han
Multi-objective Genetic Algorithm Based Prefabricated ComponentProduction Process Optimization Considering the DemandFluctuations in the Construction Site . . . . . . . . . . . . . . . . . . . . . . . . . . . 469Juan Du, Peng Dong, and Xin Wang
Anomaly Detection in Time Series Data Based on UnthresholdedRecurrence Plots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477Min Hu, Xiaowei Feng, Shengchen Zhou, and Wei Xu
A Two-Stage Temporal Anomaly Detection Algorithm Basedon Danger Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485Min Hu, Zhiwei Ji, Ye Guo, Ke Yan, and Haigen Hu
A Data-Driven Framework for Tunnel Infrastructure Maintenance . . . 495Yufeng Sun, Min Hu, Wenbo Zhou, and Wei Xu
A Heuristic for Legacy Information System Re-modularization . . . . . . . 505Lifeng Mu, Lihui Chen, and Fangyuan Wang
E-maintenance Platform Design for Public Infrastructure Basedon IFC and Semantic Web Technologies . . . . . . . . . . . . . . . . . . . . . . . . 517Min Hu and Yunru Liu
Building and Application of Shield Construction Big DataAnalysis Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527Gang Chen and Gang Li
A Professional Competence Measurement Approach Basedon a Modified PageRank Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536Shanshan Lyu, Zhao Wu, and Nan Jing
Particle-Filter-Based Prediction for Anomaly Detection . . . . . . . . . . . . . 546Xinwen Gao, Guoyao Xu, and Yufan Wu
Analysis on Building a Green Eco-smart City Based on BlockChain Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554Pengfei Zhang
3D Indoor Network Model for Emergency Responseof Multi-utility Tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565Gang Yu, Zeyu Mao, Min Hu, and Li Zhou
Computer Data Integration Analysis of the Personal CreditReporting System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572Sunping Guan
Contents xv
Digital Image Encryption Algorithm Based on Affine Cipher . . . . . . . . . 578Qi Ke, Qi-Nan Liao, Ai-Quan Li, and Rong Gao
Research on the Evaluation Methods of the Guidance and Teston the Student Employment Based on the Computer Model . . . . . . . . . 586Wenzhao Zhang
Research on the Ideological and Political Assessment System Basedon the Data Visualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593Sunping Guan
Research on the Interaction Mechanism Between the Ideologicaland Political Education and the Computer Network Underthe New Media Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599Jiasheng Ma
Research on the Key Technology of the Computer Graphicsand Image Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606Weina Zhang
Research on the Security Management Information System Basedon the Data Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612Xiaodong Meng
ATCI 2018 Companion
The Development and Application of Data Management SystemBased on B/S Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621Jingjie Yang
Speed Identification of PMSM Based Least Square Algorithmfor Closed Loop I/F Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627Yang Yu, Leyao Cong, Jianbin Lu, Renjie Xie, and Xia Tian
A Data Storage and Mining Algorithm Based on DistributedFile System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634Jian Nong
A Novel Ship Detector Based on Gaussian Mixture Modeland K-Means Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639Jingwei Yu, Qian Wan, Qianqian Liu, Xinqiang Chen, and Zhibin Li
Research on Intelligent Traffic Scheduling Basedon Dijkstra Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647Huiyan Shen
Construction of the Network Learning Community of the NewGeneration of Migrant Workers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652Jun Mo and Chunmei Mao
xvi Contents
Research on Visualization of Intelligent Substation InformationFlow Based on Simulated Annealing Algorithm . . . . . . . . . . . . . . . . . . . 657Xian Zheng Feng, XiaoJun Liao, HongJun Li, and Bin Zhao
Cloud Service Discovery and Key Matching Methodsin the Semantic Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664Jian Nong and Pengyu Xie
Research on a Lightweight Security Communication Method Basedon OTP and OTK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670Zhao Donghao and Lu Yu
A Reasoning and Query Method of Equipment PHM OntologyBased on Jena . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677Jingsheng Liu, Xu Li, Yuliang Lu, Hui Liu, and Litao Wang
Computational Advertising Under the Convergence of CustomizedCommunication Paradigm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685Gang Li and Jing Cao
Network Security Management and Implementation Based on ACL . . . 691Mengqing Feng
Indoor Navigation System Based on Sub High FrequencySound Wave . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704Bocheng Liu and Xiaoman Wang
Smart Campus Information Security Analysis and Research . . . . . . . . . 711Hua Li, Shiyu Zhang, and Laifeng Tang
Benefit Evaluation of Power Grid Project Based on GrayTriangle Whiten Weight Function Model . . . . . . . . . . . . . . . . . . . . . . . . 716Hui Kang, Dongxiao Niu, Yaru Han, Xianing Jin, Yi Song,and Xiao Wu
An Empirical Analysis of the Impact of Media Coverageon Stock Returns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724Weiqing Wang, Ziyuan Li, and Jiajun Fu
Research on the Countermeasures of Property ServiceEnterprises Constructing Smart Community . . . . . . . . . . . . . . . . . . . . . 732Yanqing Cui and Haoyuan Li
An Analysis of Film Subtitle Translation from the Perspectiveof Intercultural Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739Jinhua Chen
Classification of Neurons Based on Deep Learning and Featureof Image Gray Symbiosis Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 747Tao Chen and Wenbin Liu
Contents xvii
The Application of Auto CAD Drawing Technique in Interior Design . . . 755Hongxing Yi
Fault Diagnosis for Uncertain Stochastic Nonlinear Systemsvia LMI Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761Haiyi Sun, Ning Li, Shuxian Miao, and Jinbao Wang
Clustering Fuzzy Network Dynamic Data Simulation Research . . . . . . . 768Bo Tang
An Improved Support Vector Machine of Intrusion Detection System . . . 774Mingyuan Xin
Construction of China’s Land Network Communication—ShandongSub System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 781Chen Wu, Tingting Guo, Hao Zhang, ChunShuai Lv, and JinLong Song
Research on Management Innovation of Equipment ManufacturingIndustry—From the Perspective of Intelligent Productionand Service Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 790Xing Li, Liyan Jia, and ZiHan Yang
The Reform and Research on Training Program and CurriculumSystem of Computer Network Engineering Professionalsin the Big Data Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796Hui Wang, Gang Liu, Yizhuo Liu, and Mao Lu
Non-fragile H1 Controller Design for Linear Discrete-Systemwith Quantization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 802Liang Zhang, Gang Luo, and Haoyan Zhang
Military Text Named Entity Recognition Based on Deep Learning . . . . 808Jianlong Li and Panqing Wang
Differential Expression Analysis Based on Expression Dataof Multiple Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 817Ming Zheng and Mugui Zhuo
Computer Network Security Technology Research . . . . . . . . . . . . . . . . 824Shen Wei
Intelligent Property System of Science and Technology Park Basedon GPON Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832Chen Wu, Dan Tian, Le Yang, Xiao Liang Fang, Jin Long Song,and Dong Jing Zhang
Iterated Particle Filter for Bearing Only Target Tracking . . . . . . . . . . . 840Fasheng Wang, Xucheng Li, Baowei Lin, and Junxing Zhang
xviii Contents
An Improved Strategy of Distributed Network Crawler Basedon Hadoop and P2P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849Hongsheng Xu, Ke Li, and Ganglong Fan
Campus Network Control Management System Based on Python . . . . . 856Qiang Miao, Hui Li, and Zonggang He
Image Recognition Technology in Motion Trajectory PlanningBased on Intelligent Robot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 866Zhang Yu
Realtime 3D Reconstruction with Mobile Devices . . . . . . . . . . . . . . . . . . 874Xiaomeng Wang
Three Dimensional Finite Element Analysis on the Failure Processof a Reinforced Concrete Arch Structure by Damage Theory . . . . . . . . 883Shaohui Xiong and Xuesong Tang
Study on the Function and Evolution Mechanism of UrbanInnovation System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 894Yan Ningning
Research on the Autoloader Device’ Fault Diagnostic MechanismBased on the Current Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 901Guobao Ding, Dan Li, and Fanghuai Gou
Big Data-Driven Innovation: An Empirical Researchon Sustainable Development of Business Model . . . . . . . . . . . . . . . . . . . 907Yucong You
Research on the Application of Block Chain Technologyin Military Supply Chain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 915Yingjin Lu, Zhangyi Xu, and Xisheng Le
Research on the Application of Computer Aided Audit Technology . . . 921Leping Jiang
Improved Hybrid Collaborative Filtering Algorithm Basedon K-Means . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 928Xiaofeng Li and Dong Li
Efficient Parallel Clustering Spectral Algorithm Based on Hadoop . . . . 935Ling Ma
A New Real-Time Assessment Method and System Designfor Closed-Loop Simulation Experiment . . . . . . . . . . . . . . . . . . . . . . . . 942Yu Wang, Dao-Wei Liu, Ming-Fei Liao, and Yu-Feng Du
Application and Research of Blockchain Technology in P2P NetworkDistributed Data Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953Sun Peng
Contents xix
Simulation Research of HVDC Control Strategy Basedon Matlab/Simulink . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 961Fang Zhao and Haiyun Zhu
A New DV-Hop Location of Wireless Sensor Networks Basedon Firefly Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967JianYin Lu and DaQiong Zhao
Co-saliency Detection via Weighted Low-Rank Matrix Fusion . . . . . . . . 975Song Yu and Yuan Xie
Research on Product Form Design Based on Computer Technology . . . 988Zhang Liang and Zhao Jian
Product Quality Prediction Based on BP Neural Networkand Rough Set Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 997Yingying Su and Lianjuan Han
Research on the Innovation of Industrial Economy Underthe Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1005Xing Li, ZiHan Yang, JianMing He, and Bingjie Huo
Software and Hardware Design of Data Safety SystemUnder Power Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1010Lei Yao
A Solution for Quality Monitoring System of IndoorDistribution System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1018Wenjun Su
The Development Dilemma and Countermeasures of China’sPersonal Credit Industry in the Era of Large Data . . . . . . . . . . . . . . . . 1023Ying Hu and Zhenxing Ge
An Improved Apriori Algorithm Based on Data Mining . . . . . . . . . . . . 1031Chen Luan, Hong Li, and Ying Qin
Research on the Influence of Brand Fit on Brand Emotionand Brand Loyalty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1038Wenguang Liang, Yi Ye, and Man Bao
Characteristic of W3C’ Standardization and Its Enlightenmentto China’s Association Standardization Work . . . . . . . . . . . . . . . . . . . . 1046Qing Xu
On the Prospect of the Intelligent Computer-Aided Translation . . . . . . 1054Changhong Zhai
Fault Recognition Method Based on Deep Learning . . . . . . . . . . . . . . . 1059Jingjie Yang
xx Contents
Research on Construction Scheme of Equipment SupportInformation Network Under Cloud Environment . . . . . . . . . . . . . . . . . . 1067Wang Zeng-guang, Lu Yu, and Su Xiao-bo
Design and Simulation of Optical Wireless CommunicationDevice Based on SCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1074Pengfei Liu, Jinzhu Wang, Xiaodong Zhou, and Yuliang Lu
Fitting of Nonlinear Function Based on Elman Neural Network . . . . . . 1082Yong Shan, Wenbin Liu, and Tao Chen
Research on Information-Based Teaching Model of ComputerAided Design in Big Data Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1088Wenjun Wang
Mixed Feature Selection Method Based on SVM . . . . . . . . . . . . . . . . . . 1093Hairui Lei and Xiufeng Gao
Research on Key Technology and Application of Big DataIntegrated Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1101Ming Zheng and Mugui Zhuo
Research on the Gene Regulation Network Construction Algorithm . . . 1107Shen Wei
Prediction of Auricularias Bacterial Package Density Basedon Improved BP Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1113Chunyu Mao, Zhuojuan Yang, and Chao Gao
Authenticated Identity-Based Private Key Sharing Schemeand Its Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1121Weiqing Wan
Research on Topic Crawler Strategy Based on Web PageExtension and Best Priority Search Algorithm . . . . . . . . . . . . . . . . . . . . 1129Hongsheng Xu, Yanqing Lv, and Ganglong Fan
An Improved Speech Enhancement Algorithm Basedon Combination of OMLSA and IMCRA . . . . . . . . . . . . . . . . . . . . . . . 1137Hui Li, Qiang Miao, and Hua Shen
Research on Virtual Guzheng Based on Kinect . . . . . . . . . . . . . . . . . . . 1145Shuyao Li, Kuangyi Xu, and Heng Zhang
Source Extraction with Linear Predictor . . . . . . . . . . . . . . . . . . . . . . . . 1157Yongjian Zhao
Research on Reasonable Time Limit of Project Basedon Monte-Carlo Computer Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . 1164Zheng Huimin and Chen Xuan
Contents xxi
The Application of Big Data in the Analysis of SecurityWork Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1172Gao Chai
Research on Signal Intensity and Distance in Cold ChainLogistics Data Acquisition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1178Rui Luo, ZiHong Zhang, and Wei Xiong
Data Communication Method in Collaborative Process Planning . . . . . . 1185Yingying Su and Lianjuan Han
Analysis and Research of Fatigue Driving Detection Algorithm . . . . . . . 1195Jun Wang and Qiang Liu
Research on Computer Network Information Securityand Preventive Countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1200Guang Li, Shuang Yu, and Xiaohui Chai
The Influence of the Opening Community on the Traffic . . . . . . . . . . . . 1206Bingjun He, Yi Cheng, Han Li, and Shi Kang
An Improved K-means Clustering Algorithm Basedon Distance Evaluation Function and Entropy . . . . . . . . . . . . . . . . . . . . 1210Peng Li, Xiaoyun Gong, and Qinghua Hao
Design of LQR Controller Based on Particle Swarm OptimizationAlgorithm for Aircraft Test Simulation Attitude Control System . . . . . . 1219Jian Fang and Wei Li
Website Fingerprinting Attack Method Based on DNSResolution Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1227Kai Wang, Liyun Chen, and Xingkai Chen
Transformer Fault Diagnosis Model Based on Discrete HopfieldNeural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1234Shuo Ding, Zhongyu Cheng, Qinghui Wu, Fang Zhang, and Youlin Yang
Spindle Fault Prediction Based on Improved Fuzzy NeuralNetwork Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1240Guangwen Zhou, Chunyu Mao, and Mei Tian
Application of Big Data Analysis in the Automation Securityof Power Grid Dispatching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1249Li Zi
Application of Big Data Mining Technology in Intelligent SafeProduction on Cloud Computing Platform . . . . . . . . . . . . . . . . . . . . . . . 1255Hongsheng Xu and Ganglong Fan
xxii Contents
Research on Emotional Feature Mapping of Artificial IntelligenceBased on Brain Wave Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1263Hangming Zhang
SAML Improvement Scheme in Cloud Environment . . . . . . . . . . . . . . . 1271Zhang La and Lu Yu
Improvement of Semantic Annotation Method in Semantic Internetof Things Based on Conceptual Ontology Model . . . . . . . . . . . . . . . . . . 1276Hongsheng Xu, Luosheng An, and Ganglong Fan
Research on Attitude Control of Aircraft Test Simulation SystemBased on LQR Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1283Ming-yue Li and Jian Fang
The Attitude Control of Flying Car Test Simulation System Basedon the Variable Theory Domain Fuzzy Algorithm . . . . . . . . . . . . . . . . . 1292Yue Wu and Jian Fang
The Design of Vehicle Intelligent Anti-False Stepping System Basedon Sensor Fusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1300Wei Li and Jian Fang
The TPMS Module in the Vehicle Positioning and SafetyWarning System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1307Fang Shao and Yue Wu
Study on Risk-Benefit Quantification of FloodwaterResources Utilization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1315Lixiang Zhu and Xianfeng Huang
Exploration of Compiling Principle Practice Courses Basedon System Ability Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1325Yanqiu Wang and Xiaofei Yan
Research on the Application of Regional Cultural Symbolsin Industrial Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1330Zhao Yu and Xun Lin
Component Separation with Gaussian Moments . . . . . . . . . . . . . . . . . . 1337Yongjian Zhao
Study on Key Design Parameters of Calcinations Systemin Rotary Lime Kiln Based on Computer Simulation . . . . . . . . . . . . . . . 1343Tingzhong Wang and Lingli Zhu
Synchronization of Chay Neuron System Under GapJunction Coupling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1349Di-cong Wang and Kai-jun Wu
Contents xxiii
Low Carbon Economy Boosts New Developmentof Environmental Cost Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1355Ran Wei
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1363
xxiv Contents