Cultural poverty and educational poverty are closely related. Without education, it is difficult to establish culture. Without culture, education will not be valued. Only by promoting cultural poverty alleviation and educational poverty alleviation as a whole, can we form a joint force to eliminate poverty culture and improve ideological, moral, scientific and cultural level. Only through high-level cultural poverty alleviation and educational poverty alleviation, can we really play the "supporting aspiration" of culture and the function of "supporting intelligence" to provide intellectual and human support for poverty-stricken areas to achieve industrial shaping and economic transformation, so as to achieve complete poverty alleviation. Therefore, Wish Magic Box will contact relevant educational institutions to conduct lectures and provide relevant support services. For example, in terms of service lectures, it will provide services that people need to work and solve employment problems to provide education support for people with education needs in poor areas.
{"title":"O2O Integrated AI Precise Poverty Alleviation Plan","authors":"Shih-Feng Chang, Hui Ding, Min-Qi Huang, Yong-Lin Tan, Jun-Jie Chen, Zhi-Tao Huang","doi":"10.1109/CISCE50729.2020.00096","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00096","url":null,"abstract":"Cultural poverty and educational poverty are closely related. Without education, it is difficult to establish culture. Without culture, education will not be valued. Only by promoting cultural poverty alleviation and educational poverty alleviation as a whole, can we form a joint force to eliminate poverty culture and improve ideological, moral, scientific and cultural level. Only through high-level cultural poverty alleviation and educational poverty alleviation, can we really play the \"supporting aspiration\" of culture and the function of \"supporting intelligence\" to provide intellectual and human support for poverty-stricken areas to achieve industrial shaping and economic transformation, so as to achieve complete poverty alleviation. Therefore, Wish Magic Box will contact relevant educational institutions to conduct lectures and provide relevant support services. For example, in terms of service lectures, it will provide services that people need to work and solve employment problems to provide education support for people with education needs in poor areas.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131319291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00100
Jianqiu Chen
At present, the classification of vehicle brands as an important unit in the urban intelligent transportation system has become a hot spot for researchers from various countries. The classification and recognition of videos and images have been effectively researched and applied. In order to achieve better classification effect and higher recognition efficiency, this paper uses Principal Component Analysis-Net (PCA-NET) to realize the classification of vehicle brand, and combined with Support Vector Machines (SVM) to achieve. From the experimental results, this method can effectively extract the vehicle front view and achieve classification. The classification accuracy is high, which can reach 93.2%. In addition, this method has flexible adaptability to complex background conditions.
{"title":"Vehicle Brand Classification Method Based on PCA-NET Under Complex Background","authors":"Jianqiu Chen","doi":"10.1109/CISCE50729.2020.00100","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00100","url":null,"abstract":"At present, the classification of vehicle brands as an important unit in the urban intelligent transportation system has become a hot spot for researchers from various countries. The classification and recognition of videos and images have been effectively researched and applied. In order to achieve better classification effect and higher recognition efficiency, this paper uses Principal Component Analysis-Net (PCA-NET) to realize the classification of vehicle brand, and combined with Support Vector Machines (SVM) to achieve. From the experimental results, this method can effectively extract the vehicle front view and achieve classification. The classification accuracy is high, which can reach 93.2%. In addition, this method has flexible adaptability to complex background conditions.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133823332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/cisce50729.2020.00063
Dawei Xiang, Danli Lei, Yanbo Wu
While civil servants’ welfare is improved, more and more people apply for civil service jobs. However, selecting the position at the time of application is a major difficulty for candidates. By crawling the online data of application for the national civil service entrance examination in recent years, this article uses Python to process and save data, as well as screen and visualize the number of qualifiers, the competition ratio, the recruiting posts, etc. The results of the analysis provide an intuitive reference for candidates when selecting posts.
{"title":"Data Visualization and Its Implementation of Civil Service Jobs Based on Python","authors":"Dawei Xiang, Danli Lei, Yanbo Wu","doi":"10.1109/cisce50729.2020.00063","DOIUrl":"https://doi.org/10.1109/cisce50729.2020.00063","url":null,"abstract":"While civil servants’ welfare is improved, more and more people apply for civil service jobs. However, selecting the position at the time of application is a major difficulty for candidates. By crawling the online data of application for the national civil service entrance examination in recent years, this article uses Python to process and save data, as well as screen and visualize the number of qualifiers, the competition ratio, the recruiting posts, etc. The results of the analysis provide an intuitive reference for candidates when selecting posts.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125988906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00083
Gao Ming, Ying Lili
A service path configuration method on shamir algorithm is advanced. The data path information is distributed and verified to do the test and verify the service chain deployment through the packet in message of Openflow. First, the path verification identification is generated according to the polynomial shamir sharing algorithm. And then with the distrihution of service chain deployment, the controller distributes the control verification flow table. When the service traffic passes through the configuration switch, the path verification message will be uploaded, and the controller will carry out the verification and decision judgment. Finally, the experiment shows the correctness and security of the method.
{"title":"Research on service path configuration method based on shamir algorithm","authors":"Gao Ming, Ying Lili","doi":"10.1109/CISCE50729.2020.00083","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00083","url":null,"abstract":"A service path configuration method on shamir algorithm is advanced. The data path information is distributed and verified to do the test and verify the service chain deployment through the packet in message of Openflow. First, the path verification identification is generated according to the polynomial shamir sharing algorithm. And then with the distrihution of service chain deployment, the controller distributes the control verification flow table. When the service traffic passes through the configuration switch, the path verification message will be uploaded, and the controller will carry out the verification and decision judgment. Finally, the experiment shows the correctness and security of the method.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114851132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00071
Mingqi Chen, Yinshan Jia
In recent years, the incidence of breast cancer is constantly increasing, for the current medical incurable advanced breast cancer, early accurate diagnosis is the most important to save the lives of patients. In this paper, support vector machine (SVM) is applied to the diagnosis of breast cancer, and the performance of four commonly used kernel functions in different data sets is explored. The experimental results show that the classification accuracy of this method in the breast cancer data set is 98.25%. Compared with the original research using SVM algorithm, this method has a better effect in the auxiliary diagnosis of breast cancer and can help patients and medical institutions to detect the disease more quickly and effectively.
{"title":"Support Vector Machine Based Diagnosis of Breast Cancer","authors":"Mingqi Chen, Yinshan Jia","doi":"10.1109/CISCE50729.2020.00071","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00071","url":null,"abstract":"In recent years, the incidence of breast cancer is constantly increasing, for the current medical incurable advanced breast cancer, early accurate diagnosis is the most important to save the lives of patients. In this paper, support vector machine (SVM) is applied to the diagnosis of breast cancer, and the performance of four commonly used kernel functions in different data sets is explored. The experimental results show that the classification accuracy of this method in the breast cancer data set is 98.25%. Compared with the original research using SVM algorithm, this method has a better effect in the auxiliary diagnosis of breast cancer and can help patients and medical institutions to detect the disease more quickly and effectively.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114883710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/cisce50729.2020.00087
K. Shi
With the continuous development of agriculture under the background of "Internet +", the original agricultural information service platforms need to be upgraded. According to the latest advances in intelligent agriculture, the design idea of network information service platform based on industry chain is put forward. The platform is positioned to the function of industry chain information link and multi-subject information exchange. A three-tier architecture is adopted in the platform, and the front-end is constructed by Angular, PWA and other technologies while the back-end is constructed by node. Js, Koa2 and other technologies, and many kinds of information service functions are designed in detail. This design idea provides help for the construction of other intelligent agricultural network information service platforms.
{"title":"Design of Network Information Service Platform for Intelligent Agricultural Industry Chain","authors":"K. Shi","doi":"10.1109/cisce50729.2020.00087","DOIUrl":"https://doi.org/10.1109/cisce50729.2020.00087","url":null,"abstract":"With the continuous development of agriculture under the background of \"Internet +\", the original agricultural information service platforms need to be upgraded. According to the latest advances in intelligent agriculture, the design idea of network information service platform based on industry chain is put forward. The platform is positioned to the function of industry chain information link and multi-subject information exchange. A three-tier architecture is adopted in the platform, and the front-end is constructed by Angular, PWA and other technologies while the back-end is constructed by node. Js, Koa2 and other technologies, and many kinds of information service functions are designed in detail. This design idea provides help for the construction of other intelligent agricultural network information service platforms.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134374639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/cisce50729.2020.00047
Wu Jing
Currently, people need to use a large number of accounts and password, this has already become a problem which can be called "sea of accounts and passwords". This problem has a lot of negative effects. This paper presents a new kind of user identity credential, i.e. user activity map. On this basis, a decentralized user identity authentication model based on activity proof is proposed. Based on the blockchain idea, the model is built by Authentication Chain. The Authentication Chain is composed of Activity Chain and Activity Proofer Chain. This model does not need a central system, but can use the user’s activity map as the identity credential, and verify the user’s identity with the supporting results of activity map through multiple systems. This paper introduces the prototype verification of the model, and discusses the security and feasibility of the model.
{"title":"A Decentralized User Authentication Model Based on Activity Proof : Use the new user identity credential: activity map","authors":"Wu Jing","doi":"10.1109/cisce50729.2020.00047","DOIUrl":"https://doi.org/10.1109/cisce50729.2020.00047","url":null,"abstract":"Currently, people need to use a large number of accounts and password, this has already become a problem which can be called \"sea of accounts and passwords\". This problem has a lot of negative effects. This paper presents a new kind of user identity credential, i.e. user activity map. On this basis, a decentralized user identity authentication model based on activity proof is proposed. Based on the blockchain idea, the model is built by Authentication Chain. The Authentication Chain is composed of Activity Chain and Activity Proofer Chain. This model does not need a central system, but can use the user’s activity map as the identity credential, and verify the user’s identity with the supporting results of activity map through multiple systems. This paper introduces the prototype verification of the model, and discusses the security and feasibility of the model.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121491011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00020
Chao Duan, Dongpo Guo, Jerry Xie, Jing Zhang
ICT advances in the pace of Moore’s law as well as Gilder’s Law. The introduction of ICT into education has resulted astounding effects in learning. This paper presents a case study of the establishment of National Engineering Research Center for E-learning, as part of education informationized effort in China. There are four stages of China’s integration of ICT with education: start-up phase, application phase, integration phase, and innovation phase. The four phases are well in line with the ICT evolutions from standalone computer, to all IP network, to all cloud infrastructure, and to today’s all AI, which utilizes full spectrum of ICT including emerging technology advances in big data and artificial intelligence. The role of ICT in education has gone far beyond as an assisting tool in learning; it led to reconsider the traditional classroom centric teaching architecturally, as well as represented a paradigm shift in education including the roles of classroom teaching, the way of learning, the learning period systematically. Interactive and exploratory learning have become the mantra and education as a service is inevitable. At the same time, like any other technologies, ICT used in education can backfire if not carefully planned. This paper proposes a systematical engineering approach that integrates multiple tooling and activities around the learning of a particular subject with the purpose that engages learners through an intuitive, game-like environment where students learn through exploration and discovery.
{"title":"The Impact of ICT Advances on Education: A Case Study","authors":"Chao Duan, Dongpo Guo, Jerry Xie, Jing Zhang","doi":"10.1109/CISCE50729.2020.00020","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00020","url":null,"abstract":"ICT advances in the pace of Moore’s law as well as Gilder’s Law. The introduction of ICT into education has resulted astounding effects in learning. This paper presents a case study of the establishment of National Engineering Research Center for E-learning, as part of education informationized effort in China. There are four stages of China’s integration of ICT with education: start-up phase, application phase, integration phase, and innovation phase. The four phases are well in line with the ICT evolutions from standalone computer, to all IP network, to all cloud infrastructure, and to today’s all AI, which utilizes full spectrum of ICT including emerging technology advances in big data and artificial intelligence. The role of ICT in education has gone far beyond as an assisting tool in learning; it led to reconsider the traditional classroom centric teaching architecturally, as well as represented a paradigm shift in education including the roles of classroom teaching, the way of learning, the learning period systematically. Interactive and exploratory learning have become the mantra and education as a service is inevitable. At the same time, like any other technologies, ICT used in education can backfire if not carefully planned. This paper proposes a systematical engineering approach that integrates multiple tooling and activities around the learning of a particular subject with the purpose that engages learners through an intuitive, game-like environment where students learn through exploration and discovery.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"38 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123207724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00084
Chao Liang, Shaojie Xin
With the continuous innovation and development of artificial intelligence, the theoretical research on and application of deep learning, one of its branches, has also reached a certain height, and has become a research hotspot in all walks of life. In the medical field, traditional manual image reading and other medical image analysis methods have been unable to adapt to the sharp increase in the amount of impact data. Based on this, the combination of deep learning and medical imaging has eased this pressure. This article first briefly analyzes the relevant theories of deep learning, and focuses on its applications in medical image classification and recognition, medical image segmentation, and computer-aided diagnosis. Finally, the application of deep learning in medical images is prospected.
{"title":"Research Status and Prospects of Deep Learning in Medical Images","authors":"Chao Liang, Shaojie Xin","doi":"10.1109/CISCE50729.2020.00084","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00084","url":null,"abstract":"With the continuous innovation and development of artificial intelligence, the theoretical research on and application of deep learning, one of its branches, has also reached a certain height, and has become a research hotspot in all walks of life. In the medical field, traditional manual image reading and other medical image analysis methods have been unable to adapt to the sharp increase in the amount of impact data. Based on this, the combination of deep learning and medical imaging has eased this pressure. This article first briefly analyzes the relevant theories of deep learning, and focuses on its applications in medical image classification and recognition, medical image segmentation, and computer-aided diagnosis. Finally, the application of deep learning in medical images is prospected.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128598310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00040
Chen Chen, Jianjun Cai, N. Ren, Xu Cheng
Aiming at reducing the costs for customers and making full use of software and hardware resources, this article propose a vehicle monitoring cloud architecture for multi-tenant in this paper which could provide customers with rent-and-use cloud services. This architecture is based on the springcloud microservice framework, any microservice module could be packaged into docker images and managed by kubernetes. When the system concurrency increases or decreases, the container can be dynamically expanded and recycled to rationally allocate hardware resources to solve the bottleneck of service access load. This architecture also recommends kafka message queues to decouple front-end data collection components and back-end data processing components that could achieve greater throughput. The MapReduce programming model is used to group chaotic data sent by all tenants’ vehicle terminal by tenant id, and statistical analysis is performed on the data of each tenant.
{"title":"Design and Implementation of Multi-tenant Vehicle Monitoring Architecture Based on Microservices and Spark Streaming","authors":"Chen Chen, Jianjun Cai, N. Ren, Xu Cheng","doi":"10.1109/CISCE50729.2020.00040","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00040","url":null,"abstract":"Aiming at reducing the costs for customers and making full use of software and hardware resources, this article propose a vehicle monitoring cloud architecture for multi-tenant in this paper which could provide customers with rent-and-use cloud services. This architecture is based on the springcloud microservice framework, any microservice module could be packaged into docker images and managed by kubernetes. When the system concurrency increases or decreases, the container can be dynamically expanded and recycled to rationally allocate hardware resources to solve the bottleneck of service access load. This architecture also recommends kafka message queues to decouple front-end data collection components and back-end data processing components that could achieve greater throughput. The MapReduce programming model is used to group chaotic data sent by all tenants’ vehicle terminal by tenant id, and statistical analysis is performed on the data of each tenant.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126526196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}