Lecture Notes on Data Engineering and Communications ...

24
Lecture Notes on Data Engineering and Communications Technologies Volume 85 Series Editor Fatos Xhafa, Technical University of Catalonia, Barcelona, Spain

Transcript of Lecture Notes on Data Engineering and Communications ...

Lecture Notes on Data Engineeringand Communications Technologies

Volume 85

Series Editor

Fatos Xhafa, Technical University of Catalonia, Barcelona, Spain

The aim of the book series is to present cutting edge engineering approaches to datatechnologies and communications. It will publish latest advances on the engineeringtask of building and deploying distributed, scalable and reliable data infrastructuresand communication systems.

The series will have a prominent applied focus on data technologies andcommunications with aim to promote the bridging from fundamental research ondata science and networking to data engineering and communications that lead toindustry products, business knowledge and standardisation.

Indexed by SCOPUS, INSPEC, EI Compendex.

All books published in the series are submitted for consideration in Web of Science.

More information about this series at http://www.springer.com/series/15362

Bernard J. Jansen • Haibo Liang •

Jun YeEditors

International Conferenceon Cognitive basedInformation Processingand Applications(CIPA 2021)Volume 2

123

EditorsBernard J. JansenQatar Computing Research InstituteDoha, Qatar

Jun YeHainan UniversityHaikou, China

Haibo LiangSchool of Mechanical EngineeringSouthwest Petroleum UniversityChengdu, China

ISSN 2367-4512 ISSN 2367-4520 (electronic)Lecture Notes on Data Engineering and Communications TechnologiesISBN 978-981-16-5853-2 ISBN 978-981-16-5854-9 (eBook)https://doi.org/10.1007/978-981-16-5854-9

© The Editor(s) (if applicable) and The Author(s), under exclusive licenseto Springer Nature Singapore Pte Ltd. 2022This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whetherthe whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse ofillustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, andtransmission or information storage and retrieval, electronic adaptation, computer software, or by similaror dissimilar methodology now known or hereafter developed.The use of general descriptive names, registered names, trademarks, service marks, etc. in thispublication does not imply, even in the absence of a specific statement, that such names are exempt fromthe relevant protective laws and regulations and therefore free for general use.The publisher, the authors and the editors are safe to assume that the advice and information in thisbook are believed to be true and accurate at the date of publication. Neither the publisher nor theauthors or the editors give a warranty, expressed or implied, with respect to the material containedherein or for any errors or omissions that may have been made. The publisher remains neutral with regardto jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,Singapore

Foreword

Cognition has emerged as a new and promising methodology with the developmentof cognitive-inspired computing, cognitive-inspired interaction, and systems thatenable a large class of applications and has developed a great potential to changeour life. However, recent advances in artificial intelligence (AI), fog computing, bigdata, and cognitive computational theory show that multidisciplinarycognitive-inspired computing still struggles with fundamental, long-standingproblems, such as computational models and decision-making mechanisms basedon the neurobiological processes of the brain, cognitive sciences, and psychology.How to enhance human cognitive performance with machine learning, commonsense, natural language processing, etc., is worth exploring.

2021 International Conference on Cognitive-based Information Processing andApplications includes data mining, intelligent computing, deep learning, and allother theories, models, techniques related to artificial intelligence.

The purpose of CIPA2021 is to provide a forum for the presentation and dis-cussion of innovative ideas, cutting-edge research results, and novel techniques,methods, and applications on all aspects of technology and intelligence in intelli-gent computing.

At least two independent experts reviewed each paper. The conference wouldnot have been a reality without the contributions of the authors. We sincerely thankall the authors for their valuable contributions. We would like to express ourappreciation to all Program Committee members for their valuable efforts in thereview process that helped us guarantee the highest quality of the selected papersfor the conference.

We would like to express our thanks for the strong support of the PublicationChairs, Organizing Chairs, Program Committee members, and all volunteers.

v

Our special thanks are also due to the editors of the Springer book series“Advances in Intelligent Systems and Computing”, Ramesh Nath Premnath andKarthik Raj Selvaraj, for their assistance throughout the publication process.

Bernard J. JansenHaibo Liang

Jun Ye

vi Foreword

Welcome Message

Cognition has emerged as a new and promising methodology with the developmentof cognitive-inspired computing, cognitive-inspired interaction, and systems, whichcan enable a large class of applications and has great potential to change our lives.However, recent advances in artificial intelligence (AI), fog computing, big data,and cognitive computational theory show that multidisciplinary cognitive-inspiredcomputing still struggles with fundamental, long-standing problems, such ascomputational models and decision-making mechanisms based on the neurobio-logical processes of the brain, cognitive sciences, and psychology. How to enhancehuman cognitive performance with machine learning, common sense, natural lan-guage processing, etc., is worth exploring.

2021 International Conference on Cognitive-based Information Processing andApplications includes precision mining, intelligent computing, deep learning, andall other theories, models, techniques related to artificial intelligence. The purposeof CIPA2021 is to provide a forum for the presentation and discussion of innovativeideas, cutting-edge research results, and novel techniques, methods, and applica-tions on all aspects of technology and intelligence in intelligent computing.

At least two independent experts reviewed each paper. The conference wouldnot have been a reality without the contributions of the authors. We sincerely thankall the authors for their valuable contributions. We would like to express ourappreciation to all Program Committee members for their valuable efforts in thereview process that helped us guarantee the highest quality of the selected papersfor the conference.

We want to express our thanks for the strong support of the General Chairs,Publication Chairs, Organizing Chairs, Program Committee members, and allvolunteers.

vii

Our special thanks are also due to the editors of the Springer book series“Advances in Intelligent Systems and Computing”, Ramesh Nath Premnath andKarthik Raj Selvaraj, for their assistance throughout the publication process.

Jim JansenHaibo Liang

Jun Ye

viii Welcome Message

Organization

Conference Committee

Local Organizing Chairs

Tao Liao Anhui University of Science and Technology,China

Xiaobo Yin Anhui University of Science and Technology,China

Program ChairsJim Jansen Qatar Computing Research Institute, QatarHaibo Liang Southwest Petroleum University, ChinaJun Ye Hainan University, China

Publication ChairsNeil Y. Yen University of Aizu, JapanVijayan Sugumaran Oakland University, USA

Publicity ChairsWeidong Liu Inner Mongolia University, ChinaSulin Pang Jinan University, China

Program CommitteeAmeer Al-Nemrat University of East London, UKRobert Ching-Hsien Hsu Chung Hua University, ChinaNeil Yen University of Aizu, JapanMeng Yu The University of Texas at San Antonio, USA

ix

Shunxiang Zhang Anhui Univ. of Sci. & Tech., ChinaWilliam Liu Auckland University of Technology,

New ZealandMustafa Mat Deris Universiti Tun Hussein Onn Malaysia, MalaysiaZaher AL Aghbari Sharjah University, UAEGuangli Zhu Anhui Univ. of Sci. & Tech., ChinaRaja Al Jaljouli College of Computer Science and Engineering,

Kingdom of Saudi ArabiaTao Liao Anhui Univ. of Sci. & Tech., ChinaAbdul Basit Darem University of Mysore, IndiaXiaobo Yin Anhui Univ. of Sci. & Tech., ChinaVjay Kumar VIT, IndiaXiangfeng Luo Shanghai Univ., ChinaJemal Abawajy Deakin University, AustraliaAhmed Mohamed Khedr University of Sharjah, UAEXiao Wei Shanghai Univ., ChinaSabu M. Thampi Indian Institute of Information Technology

and Management, IndiaHuan Du Shanghai Univ., ChinaShamsul Huda Deakin University, AustraliaZhiguo Yan Fudan University, ChinaRick Church UC Santa Barbara, USATom Cova University of Utah, USASusan Cutter University of South Carolina, USAYi Liu Tsinghua University, ChinaKuien Liu Pivotal Inc, USAWei Xu Renmin University of China, ChinaV. Vijayakumar Professor & Associate Dean, SCSE, VIT

Chennai, IndiaAbdullah Azfar KPMG Sydney, AustraliaFlorin Pop University Politehnica of Bucharest, RomaniaKim-Kwang Raymond Choo The University of Texas at San Antonio, USAMohammed Atiquzzaman University of Oklahoma, USARafiqul Islam Charles Sturt University, AustraliaMorshed Chowdhury Deakin University, Australia

x Organization

CIPA 2021 Keynotes

Jim Jansen is a Principal Scientist in the socialcomputing group of the Qatar Computing ResearchInstitute. He is a graduate of West Point and has aPh.D. in computer science from Texas A&MUniversity. Professor Jansen is editor-in-chief of thejournal, Information Processing & Management(Elsevier), a member of the editorial boards of seveninternational journals, and former editor-in-chiefof the journal, Internet Research (Emerald). He hasreceived several awards and honors, including anACM Research Award, six application developmentawards, and a university-level teaching award,along with other writing, publishing, research,teaching, and leadership honors. Dr. Jansen hasauthored or co-authored 300 or so research publi-cations, with articles appearing in a multidisci-plinary range of journals and conferences. He isauthor of the book, Understanding SponsoredSearch: A Coverage of the Core Elements ofKeyword Advertising (Cambridge UniversityPress).

xi

Jemal Abawajy is a faculty member at DeakinUniversity and has published more than 100 articlesin refereed journals and conferences as well as anumber of technical reports. He is on the editorialboard of several international journals and editedseveral international journals and conference pro-ceedings. He has also been a member of the orga-nizing committee for over 60 internationalconferences and workshops serving in variouscapacities including best paper award chair, generalco-chair, publication chair, vice-chair, and programcommittee. He is actively involved in fundedresearch in building secure, efficient, and reliableinfrastructures for large-scale distributed systems.Toward this vision, he is working in several areasincluding pervasive and networked systems (mobile,wireless network, sensor networks, grid, cluster, andP2P), e-science and e-business technologies andapplications, and performance analysis andevaluation.

xii CIPA 2021 Keynotes

Contents

Cognitive Environment, Sensing and Data

Development of Advertising Art Design Basedon Information Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Zhinong Liu

Micro Animation Design Based on New Media App Interaction . . . . . . 11Ping Hu and Ronghui Fu

The Impact of Digital Economy on Economic Growth Basedon Pearson Correlation Test Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 19Rong Li and C. G. Gospodarik

Tourism Demand Analysis Algorithm Based on Data ForecastModel Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28Meng Chen

The Harm of Social Class Consolidation and Its Solutions from thePerspective of Fairness Based on Big Data Predictive Analysis . . . . . . . 38Caiyun Ding

The Visual Art Design of the Inheritance and Development of theInvisible Embroidery Culture Under the Smart City . . . . . . . . . . . . . . . 48Kunkun Yang

A Diachronic Study of Second Language Mental Lexical AttritionBased on WordNet Computer Data Analysis . . . . . . . . . . . . . . . . . . . . . 57Chunxia Zhang

Establishment of Agricultural Economic Management Data ModelBased on Block Chain Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64Wei Liu

xiii

Improvement Design of Information Processing of Urban MunicipalCrossing Facilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71Yu Liu and Yu Peng

Visual Communication of Light in 3D Filmand Television Animation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79Shuguang Li

Computer Media and Communication of Folk Culture in ShaanxiLiterary Works Under the Background of Big Data . . . . . . . . . . . . . . . 86Shiqing Zhou and Wengao Sun

Image Classification Based on Sentinel-1A and Landsat 8 OLI . . . . . . . 95Tingxi Song, Liming Gao, Lele Zhang, Yankun Li, and Guangrui Zhu

Application of Clothing Design and Production Based on Clothing3D Simulation Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106Yuwu Xiao

Image Processing and Restoration of Cultural Relics of SongDynasty in Sichuan Based on 3D Modeling Technology . . . . . . . . . . . . . 115Qinbing He, Qiwang Zhao, and Zhongyun Wu

Chinese Buddhist Literature Database and Image TextExtraction Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122Xuetao Liu

A Speedy Brain-Computer Interface Combinedwith Computer Vision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128Kaixuan Liu, Yang Yu, Yadong Liu, and Zongtan Zhou

Data Analysis Based on the Processing Method of DisplayingReduced-Layer Dust Handprints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135Xinhua Lv and Shengjiang Wang

Development Status of the Integration of Basic Art Skills andComputer Art Design Under the Background of Information Age . . . . . 144Bei Gong and Ling Fu

On the Development Status of Student Football Referees’ VideoCamera Classification in the Development of Campus Football . . . . . . . 151Jinyu Liu

Development Trend and Research of Computer DrawingTechnology in Chinese Farmer’s Painting . . . . . . . . . . . . . . . . . . . . . . . 158Lanting Liu

Communication of Advertising Visual Communication DesignArt in the Information Network Era . . . . . . . . . . . . . . . . . . . . . . . . . . . 166Qiongfang Zhang

xiv Contents

The Influencing Factors of Business English InterculturalCommunication Based on Data Mining . . . . . . . . . . . . . . . . . . . . . . . . . 173Xiaohong Zhang

Effect of Remote Sensing Image Pixel Decomposition on theSpectral Response of Soil Heavy Metals . . . . . . . . . . . . . . . . . . . . . . . . . 182Jiabin Huang, Qiong Zhang, and Yunkai Guo

Computer Artificial Vision Image Processing SystemBased on FPGA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194Xiuzhi Su and Guocai Zuo

Analysis and Application of Computer Graphics Processingand Recognition Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202Xiuxian Li and Yurong Zhu

Effective Application of Sports Video Tutorial Mode TeachingBased on Information Processing Technology . . . . . . . . . . . . . . . . . . . . 213Bin Qian

Exploration and Research of Computer Image ProcessingTechnology in Clothing Design Patterns . . . . . . . . . . . . . . . . . . . . . . . . . 222Li Wang

Research on Computer Intelligent Image Recognition Algorithmin Chinese Local Opera Clothing Education Teaching . . . . . . . . . . . . . . 231LuLu Jia and Tao Gao

Analysis of the Non-invasive Identification of Sensitive Load Basedon Voltage Sag Monitoring Data Based on BP Neural Network . . . . . . . 237Ben Wang, Qing Zhao, Bo Li, Xiaosong Jing, and Qi Diao

Study on Population Prediction by Two Different NeuralNetwork Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242Jiangnan Wang

Development and Algorithm Research of Deep Learning TrainingCloud Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248Li Li and Jian Xiao

Research on Optimization Algorithm of Digital Supply ChainFinance in Science and Technology Enterprises . . . . . . . . . . . . . . . . . . . 255Xiaojie Ren and Xiaoyi Wang

A Corpus-Based Multi-dimensional Study of Tourism EnglishRegister Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262Jiawen Sun

Basketball Players’ Behavior Prediction Method Based on Video . . . . . 269Yu Long and Jiaojiao Long

Contents xv

Evaluation of Enterprise Network Marketing Performance Based onImproved BP Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276Huojun Zhu, Liangting Wang, and Zhishan Zheng

Data Mining Method of Tennis Technique and TacticsAssociation Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284Mengran Niu

Security Issue in Cognitive-Inspired Computing

Implementation of Application Asset Analysis and ManagementTool Based on Zowe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293Xiaosong Lv and Biyue Fan

Negative Transfer of L1 Thinking on L2 Writing Based on IwriteEvaluation System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304Dan Shen and Dan Huang

The Civil Law Protection of Citizens’ Personal Informationin the Context of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313Chao Jin

Development of Network Security Based onInformation Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321Renxian Zeng

Status Quo of TCM Tumor Diagnosis and Treatment Based onLiterature Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329Liang Han

Use the TCM Diagnosis and Treatment Information MiningPlatform to Carry Out the Diagnosis and Treatment of TCMLiver, Gallbladder, Spleen and Stomach Diseases . . . . . . . . . . . . . . . . . 337Qianqian Su

Water Quality Security Guarantee and Monitoring System Basedon Cloud Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345Li Wei, Hui Xie, and Hong Lv

Performance Test of Corrosion System Based on SimulationControl Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351Sen Cai

Application of Computer Virtual Simulation Technology in BuildingStructure Design and Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359Zhenhua Liu and Yuechun Feng

Financial Technology Risk Management and Control in the BigData Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368Xiuwen Wang, Zhen Wu, and Shuangcheng Shen

xvi Contents

Module Design of Network Security Course Based on Attackand Defense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375Guofang Zhang

Design and Implementation of an Information Security Platformfor the IoT Based on Blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382Chao Duan

Improvement and Software Realization of Residential AreaLandscape Design and Protection System Based on the NewCoronavirus Epidemic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390Yang Wang, Yiting Wu, and Xiaohe Chen

Optimizing the Configuration of Financial Supervision Equipmentby Using Key Privacy Protection Technologies of Blockchain . . . . . . . . 397Jianfei Ke and Jianxiong Lin

Analysis of Key Technologies of Cloud Computing Security Basedon Trust Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404Fangfang Dang, Weijian Zhang, Shuai Li, and Han Liu

Innovating the Management Method of Students’ Growth Filesby Using Computer Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413Lin Hou

Analysis and Research of Civil Engineering ConstructionApplication Based on Computer BIM Technology . . . . . . . . . . . . . . . . . 422Jie Wang

Digital Protection of Dance of Intangible Cultural Heritage byMotion Capture Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429Lebei Zhang

Analysis and Research of Students’ Mental Health Status Basedon K-Means Clustering Under the Background of Big Data . . . . . . . . . 437Yao Li, Ruijie Liu, Yu Bo, and Huimei Wei

Financial Crisis Early Warning Model of Small and Medium SizedEnterprises Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445Tao Yu

Automatic AI Detection Technology of Foul Shot Scanning inSimulated Basketball Match Under the Background of AI . . . . . . . . . . 454He Li

One-Cycle Control Strategy for Active Power Filter Basedon Current Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463Yiyuan Shao and Xueqin Wu

Contents xvii

The Qualification Verification of Athletes in Sports Competitionby Using HDFS Distributed File Storage System with MySQLRelational Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474Ruoguo Li

Development Trend of Smart Leisure Tourism Based on BigData Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482Xia Xu

A New Detection Method of Overhead Power Line Basedon HED Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491Haiping Liang, Yanzhe Yin, Xinming Wang, Shaobo Li, Huayang Liang,and Shize Li

Study on Algorithm and Parameters of Seismic Design Code forMedium and Long Span Bridges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500Jiangping Li, Ping Zhang, and Zhijun Meng

Using Object-Oriented Programming Method to Realize the Controlof PLC in the Raw Material Conveying System . . . . . . . . . . . . . . . . . . . 506Yan Qin

Analysis of Configurable Human Resource Management SystemBased on Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512Wei Wu

Research on Forest Fire Recognition Based on ComputerVision Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518Kai Yao, Jinglan Zhang, and Jiuqing Liu

Application of Decision Tree Algorithm in MentalHealth Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524Guo Ping

Research on the Innovation and Development of DataMining Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530Na Wei

Application of Cognitive Environment and Data in Urban SewageBiological Phosphorus and Nitrogen Removal System . . . . . . . . . . . . . . 536Bingbing Jin

Test-Bed, Prototype Implementation and Applications

Application of Machine Learning in Finance . . . . . . . . . . . . . . . . . . . . . 543Dipeng Song

Virtual Reality and System Simulation Technology Under theBackground of Network Informationization . . . . . . . . . . . . . . . . . . . . . . 550Yongming Pan

xviii Contents

The Study of the Innovation of Commercial Operation Patternof Chinese Design Industry Under the Influence of 3DP . . . . . . . . . . . . 558Xinjue Zhang and Qinghua Lin

Spread Model of Vespa Mandarinia through Machine Learning . . . . . . 565Qiming Zhuang

Application of ZigBee Wireless Sensor Network Technology in theCultivation of Innovative Talents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573Mingxiang Cao and Guoxiong Xiang

New Media Technology System and Development Path ofBroadcasting and Hosting Style in the New Media Era . . . . . . . . . . . . . 584Yini Chu and Yang Sun

Three-Dimensional Design of IMP Propeller Rotor Blade Basedon Lift Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592Qiao Li

Construction of Practical Courses of Financial Sharing CenterUnder the Background of Cloud Computing . . . . . . . . . . . . . . . . . . . . . 599Yapeng Wang and Ge Guo

Application of Machine Learning in Financial Asset PricePrediction and Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606Yunfei Cao

Application of BIM Technology in the Informatization ofConstruction Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613Dun Miao

Guangxi University Scientific Research Management Basedon Neural Network AHP and BP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622Manying Huang

Design of IIR Digital Filter Based on FPGA . . . . . . . . . . . . . . . . . . . . . 628Chuang Wang, He Xi, Tienian Chen, and Jiawei Liu

Application of Computer Aided Language Learning in CollegeRussian Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635Congmin Wang

Application of Semantics Analysis in Text Classificationof Computer Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643Ziqi Wang

Droop Control Strategy of Microgrid Anti-island Based onVirtual Impedance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651Huaizhong Chen, Riliang Xu, and Jun Meng

Contents xix

Application of Oblique Photogrammetry in 3D Modeling . . . . . . . . . . . 657Weihua Qiao

Influence and Strategy of 5G Technology on E-commerceMarketing and Operation Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664Yongliang Li and Yanli Wang

Principle and Application of Peak Force Tapping Mode AtomicForce Microscope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671Shoujin Wang and Chunxue Hao

Innovation of Supply Chain Finance Model Basedon Blockchain Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680Jianfei Ke and Zhengyi Tang

Application of Blockchain Technology in Practical InternationalTechnology Trade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687Dandan Ren

The Influence of Calculating and Simulating Talent Filtering IndexModel on the Activation of Talents . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695Chen Zhang, Xiaoyan He, and Qi Yang

Human Resources Development and Management System Basedon “Five New” Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703Qi Yang

Application of Image Feature Classification Method Basedon Deep Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711Jinhua Yang

The Construction of the Virtual Simulation Experiment PlatformUnder the Background of Education Informatization . . . . . . . . . . . . . . 718Zhihui Lin

Application of G1-EWM-TOPSIS Method Based on MATLABin the Evaluation of Social Contribution Benefits of Investmentin a Certain Provincial Power Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725Yan Lu, Ke Lv, Jingzhong Yuan, Hongjian Li, Luofei Wu, and Sha Peng

Application of VR Technology in Interior Design . . . . . . . . . . . . . . . . . 735Yu Gui and Shuaiye Shi

Classification and Grading Storage Method Basedon Terminal Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 744Weixiong Wang, Gui Wang, Xiaodong He, Zhen Guo, Ziqin Lin,and Zhitao Wang

Measurement of Low Carbon Effect of Industrial StructureAdjustment – Based on NSGA - II Genetic Algorithm . . . . . . . . . . . . . . 752Wei Hu

xx Contents

Numerical Simulation and Multi-objective Genetic Algorithm AreUsed to Optimize the Flow Field in the Slot . . . . . . . . . . . . . . . . . . . . . . 759Jinnan Liu and Yihui Wang

Application of Artificial Immune Algorithmin Evolutionary Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766Shuyan Wu

Hidden Danger and Control of Construction Safety of Internetof Things Based on Cognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772Shihai Wang

Application of Precise Mining Optimization Algorithm in EnterpriseEconomic Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777Maonian Lin

Application of AI Aided Cognitive Computing Methodin CAI System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 784Tuo Niu

Probability Analysis of China's Stock Market Rise and Fall Basedon Data Mining Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 790Huan Xu

Research on Recommendation System of Internet ShoppingPlatform Based on Cognitive Internet of Things . . . . . . . . . . . . . . . . . . 796Xuefeng Xu

Short Paper Session

The Trend of Elderly Service Industry Under ModernInformation Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 805Xiu Sun

Application of Computer Information Technology in SocialGovernance—Taking Big Data as an Example . . . . . . . . . . . . . . . . . . . . 810Pei Zhang and Bei Yef

Fetus Data Analysis System Based on Cloud Computing Platform . . . . 815Jifeng Liang

Application of Virtual Reality Technology in Digital MediaArt Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820Yi Li

Flower “Dock”-Smart Flowerpot Based on Microcontroller . . . . . . . . . . 826Shengyue Fan, Tiantian Wang, Bo Wang, Yuting Zhang, Yao Cai,and Baojun Liu

Contents xxi

Application of Computer Data System in Intelligent Extractionof Fresh Rehmannia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 831Zhen Ren and Mingsan Miao

Innovation and Development of Higher Education ManagementInformatization Based on Big Data Technology . . . . . . . . . . . . . . . . . . . 836Guofang Miao

Smart Recognition Application of Android Mobile GarbageClassification from the Perspective of Big Data . . . . . . . . . . . . . . . . . . . 841Liping Liang, Chang Xing, Jiaai Zhang, and Jie Hu

Computer Games Based on Artificial Intelligence . . . . . . . . . . . . . . . . . 847Weiwen He

Construction and Practice of Professional Ability Embeddedin Clothing Major Under Cloud Data Service . . . . . . . . . . . . . . . . . . . . 852Qi Guo and Jiatong Yan

The Evolution Trend of “Digital Economy” and Its Enlightenmentto Energy Enterprises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 858Guang Chen, Hongda Gao, Guozhen Ma, Jianye Liu, and Wanting Yin

Virtual Interactive System of Manipulator Based on Digital Twin . . . . . 864Yawei Li, Guofu Luo, Ningbo Zhang, Junhao Zhang, and Xingbo Yang

Discussion on the Application of the Internet of Things Technologyin English Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 868Xiaowen Du

The Creation and Presentation of Sculpture Art in the Contextof Digitization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873Zizhao Han

Prevention and Control of Systemic Financial Risks from thePerspective of Digital Finance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878Jinjie Xiao and Shengbo Zeng

Research and Development of Learning Early Warning SystemBased on Artificial Intelligence Technology . . . . . . . . . . . . . . . . . . . . . . 884Shaohua Fu

New Application of WeChat Marketing in the Context of Internet . . . . 890He Huang

Mobile Game Design in the Context of the Mobile Network . . . . . . . . . 895Jianlong Jiang and Gang Liu

xxii Contents

Structural Modification Design and Application of Back SupportDevice for Coal Mine Drilling Rig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 901Xin Gao

Design of the Aging of the Residential Area Environment by UsingComputer Three-Dimensional Drawing Technology Under the HomeCare Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 906Jie Gao

Translation Quality Evaluation Method and Its Applicationin Computer Translation Evaluation System—From the Perspectiveof Translation Criticism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912Shengliang Xie

Design and Implementation of Chinese Pronunciation AutomaticScoring System Based on Speech Recognition . . . . . . . . . . . . . . . . . . . . 917Chao Wang

Analysis of Computer Network Security Problems andCountermeasures Based on Cognitive Big Data . . . . . . . . . . . . . . . . . . . 922Jie Dong, Peng Wang, Haihong Chen, and Yazhen Gu

Application of Artificial Intelligence Aided Cognitive ComputingMethod in Building System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 927Gu Yue

Data Mining Algorithm and the Role of Business Administrationin Promoting Economic Development . . . . . . . . . . . . . . . . . . . . . . . . . . . 932Yanping Tan

Research on Real Time Detection of Human Fitness Basedon Artificial Intelligence Assisted Cognitive Computing . . . . . . . . . . . . . 936Chenqi Xiang

Application Analysis of Cognitive Internet of Things Technologyon Permeability in Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 941Jing Meng

Monitoring Method of Hydraulic Long Auger Drilling ProcessBased on Cognitive Interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 946Haifeng Wu

Application of Cognitive Internet of Things in Well Test DataStimulation Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 951LiLi Zhang

Analysis of Big Data Computing Logistics Supply ChainManagement Mode Inspired by Cognition . . . . . . . . . . . . . . . . . . . . . . . 956Yinghuan Liu

Contents xxiii

Design and Implementation of New Media Resource Search SystemBased on Cognitive Heuristic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 961Qing Liu and Jinghua Zhao

Airline Slot Allocation Optimization Decision UnderCDM Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 966Wenya Xiao and Jinghua Zhao

On the Combination of College Translation Curriculum Systemand Information Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971Changhong Zhai

An Exploration of College Students’ Second Language MentalLexicon Storage Model Based on WordNet ComputerData Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 977Chunxia Zhang

Information Technology-Based Picture Book Design of Children'sIntellectual and Educational Anecdotes . . . . . . . . . . . . . . . . . . . . . . . . . 982Gang Liu and Lei Zhu

Human Effectiveness Analysis Based on Big Data Thinking – a CaseStudy of Human Resource Strategic Management Course . . . . . . . . . . . 986Lei Tan and Yuelin Yin

Portrait of College Students and Personalized Teaching Mode Underthe Blended Learning Mode Based on Big Data Technology . . . . . . . . . 992Yuelin Yin and Xiaomu Yu

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 999

xxiv Contents