Pub Date : 2021-03-13DOI: 10.12783/DTCSE/CCNT2020/35439
Lina Wang
This article in view of the current computer basic education present situation, under the background of "Internet +", combined with advanced information technology and demand of applied innovative talents training of higher education and teachers in a line of actual teaching experience, put forward the "Internet +" under "university computer" turn into the classroom, explore the teaching mode that suit the development of students, enhance students' motivation in learning, to promote the cultivation of interdisciplinary talents.
{"title":"Research on the Teaching Mode of Flipped Classroom of University Computer Under \"Internet +\"","authors":"Lina Wang","doi":"10.12783/DTCSE/CCNT2020/35439","DOIUrl":"https://doi.org/10.12783/DTCSE/CCNT2020/35439","url":null,"abstract":"This article in view of the current computer basic education present situation, under the background of \"Internet +\", combined with advanced information technology and demand of applied innovative talents training of higher education and teachers in a line of actual teaching experience, put forward the \"Internet +\" under \"university computer\" turn into the classroom, explore the teaching mode that suit the development of students, enhance students' motivation in learning, to promote the cultivation of interdisciplinary talents.","PeriodicalId":11066,"journal":{"name":"DEStech Transactions on Computer Science and Engineering","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76586389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-13DOI: 10.12783/DTCSE/CCNT2020/35413
Xiaofeng Luo, Sen Wang, Wanbo Luo
We found that the Multi-data-type Interval Decision Diagrams (MIDD) approach proposed by Ngo et al. has some flaws: the way in which the critical mark of an attribute is represented does not retain the critical information, definition of the internal node is not entirely correct, and there are bugs in the corresponding algorithms. The first flaw could lead to potential missing attribute attacks, the second one wastes resources, and the last one makes the decision diagrams inconsistent. Two solutions were proposed to fix the first flaw. The first solution is to expand the scope of representation of internal nodes from only normal attributes of subject, object, operations, and environmental conditions to other required elements so that the critical attribute marks, obligations and/or advices, etc. are also represented by nodes. The second solution is to bind the critical mark of an attribute to its value. For the second flaw, corresponding definition was revised. For the third problem, a debug suggestion was made. The corresponding decision diagrams showed that the proposed schemes can overcome these problems of the MIDD approach.
{"title":"Flaws and Remedies of the MIDD Approach","authors":"Xiaofeng Luo, Sen Wang, Wanbo Luo","doi":"10.12783/DTCSE/CCNT2020/35413","DOIUrl":"https://doi.org/10.12783/DTCSE/CCNT2020/35413","url":null,"abstract":"We found that the Multi-data-type Interval Decision Diagrams (MIDD) approach proposed by Ngo et al. has some flaws: the way in which the critical mark of an attribute is represented does not retain the critical information, definition of the internal node is not entirely correct, and there are bugs in the corresponding algorithms. The first flaw could lead to potential missing attribute attacks, the second one wastes resources, and the last one makes the decision diagrams inconsistent. Two solutions were proposed to fix the first flaw. The first solution is to expand the scope of representation of internal nodes from only normal attributes of subject, object, operations, and environmental conditions to other required elements so that the critical attribute marks, obligations and/or advices, etc. are also represented by nodes. The second solution is to bind the critical mark of an attribute to its value. For the second flaw, corresponding definition was revised. For the third problem, a debug suggestion was made. The corresponding decision diagrams showed that the proposed schemes can overcome these problems of the MIDD approach.","PeriodicalId":11066,"journal":{"name":"DEStech Transactions on Computer Science and Engineering","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76838422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes an analysis method for software deployment conflict detection. First, we analyze the possible dependencies in the process of software deployment. Based on these dependencies, we find out the factors that may lead to software deployment conflict.
{"title":"An Analysis Method for Software Deployment Conflict Detection","authors":"Han-yo Wu, Xinhui Li, Jiawei Hu, Jingsen Zhang, Yucheng Hua, Lei Qiu","doi":"10.12783/DTCSE/CCNT2020/35430","DOIUrl":"https://doi.org/10.12783/DTCSE/CCNT2020/35430","url":null,"abstract":"This paper proposes an analysis method for software deployment conflict detection. First, we analyze the possible dependencies in the process of software deployment. Based on these dependencies, we find out the factors that may lead to software deployment conflict.","PeriodicalId":11066,"journal":{"name":"DEStech Transactions on Computer Science and Engineering","volume":"96 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76021111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to solve the problem of inaccurate localization of intestinal center in the process of endoscopic navigation, a local threshold adaptive localization method based on morphological reconstruction is proposed in this paper. On the basis of image reconstruction and combined with local threshold, it is necessary to find the intestinal center point of the endoscope image and guide the movement of the endoscope in the intestinal tract through the guidance of the intestinal center point, which is an important basis for the navigation path planning of the endoscope by combining the endoscope with visual navigation. In this paper, 355 continuous real endoscope intestinal images were taken to locate the center point, and accurate intestinal center points were obtained. The center points were used to guide the front end of the endoscope, which played a navigation role in the endoscope and visual navigation.
{"title":"Local Threshold Adaptive Endoscope Intestinal Center Localization Method Based on Morphological Reconstruction","authors":"Zhe Zhao, Haohan Niu, Xian Wu, Shuzhen Han, Huiquan Wang, Bo Jiang","doi":"10.12783/DTCSE/CCNT2020/35440","DOIUrl":"https://doi.org/10.12783/DTCSE/CCNT2020/35440","url":null,"abstract":"In order to solve the problem of inaccurate localization of intestinal center in the process of endoscopic navigation, a local threshold adaptive localization method based on morphological reconstruction is proposed in this paper. On the basis of image reconstruction and combined with local threshold, it is necessary to find the intestinal center point of the endoscope image and guide the movement of the endoscope in the intestinal tract through the guidance of the intestinal center point, which is an important basis for the navigation path planning of the endoscope by combining the endoscope with visual navigation. In this paper, 355 continuous real endoscope intestinal images were taken to locate the center point, and accurate intestinal center points were obtained. The center points were used to guide the front end of the endoscope, which played a navigation role in the endoscope and visual navigation.","PeriodicalId":11066,"journal":{"name":"DEStech Transactions on Computer Science and Engineering","volume":"415 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84898729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-13DOI: 10.12783/DTCSE/CCNT2020/35426
Xinyu Liu
{"title":"Regression Method Based on ACE for Humidity Measurement on Colorimetric Sensor Array","authors":"Xinyu Liu","doi":"10.12783/DTCSE/CCNT2020/35426","DOIUrl":"https://doi.org/10.12783/DTCSE/CCNT2020/35426","url":null,"abstract":"","PeriodicalId":11066,"journal":{"name":"DEStech Transactions on Computer Science and Engineering","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75853365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-13DOI: 10.12783/DTCSE/CCNT2020/35445
Jing Liu, Lifeng Yang
Knowledge and culture are indissolubly linked together in organizations. Considerable evidence supports the importance of culture in the success or failure of knowledge management. Then, the effectiveness of knowledge sharing needs both cultural understanding and new considerations in the knowledge transfer of intercultural organizations. This paper reviews some critical literatures and identifies the influence of different dimensions of culture on knowledge transfer and sharing in different types of knowledge. The aim of this paper is to propose a theoretical framework for knowledge sharing processes based on differences in national culture for future research.
{"title":"Knowledge Sharing Across Culture—Critical Review","authors":"Jing Liu, Lifeng Yang","doi":"10.12783/DTCSE/CCNT2020/35445","DOIUrl":"https://doi.org/10.12783/DTCSE/CCNT2020/35445","url":null,"abstract":"Knowledge and culture are indissolubly linked together in organizations. Considerable evidence supports the importance of culture in the success or failure of knowledge management. Then, the effectiveness of knowledge sharing needs both cultural understanding and new considerations in the knowledge transfer of intercultural organizations. This paper reviews some critical literatures and identifies the influence of different dimensions of culture on knowledge transfer and sharing in different types of knowledge. The aim of this paper is to propose a theoretical framework for knowledge sharing processes based on differences in national culture for future research.","PeriodicalId":11066,"journal":{"name":"DEStech Transactions on Computer Science and Engineering","volume":"253 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76291651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-13DOI: 10.12783/DTCSE/CCNT2020/35444
Kunfu Wang, Wei Feng, Xing Li
In order to assist network administrators to assess network security risks, a new Bayesian model of network risk assessment method is proposed. Firstly, the model designs the quantitative method of attack revenue and attack cost index, introduces the atomic attack efficiency variable, and integrates the variable into the calculation of probability, obtains the prior risk probability of each node in the network, so as to carry out the static evaluation of network risk. Secondly, DNO_Alg of deleting node order is proposed to determine the order of eliminating elements, so that Bayesian model can be transformed into cluster tree. Finally, combined with the detected attacks, the cluster tree propagation algorithm is used to dynamically calculate the posterior risk probability of nodes, so as to evaluate the network risk in real time.
{"title":"A New Method of Network Risk Assessment Based on Bayesian Model","authors":"Kunfu Wang, Wei Feng, Xing Li","doi":"10.12783/DTCSE/CCNT2020/35444","DOIUrl":"https://doi.org/10.12783/DTCSE/CCNT2020/35444","url":null,"abstract":"In order to assist network administrators to assess network security risks, a new Bayesian model of network risk assessment method is proposed. Firstly, the model designs the quantitative method of attack revenue and attack cost index, introduces the atomic attack efficiency variable, and integrates the variable into the calculation of probability, obtains the prior risk probability of each node in the network, so as to carry out the static evaluation of network risk. Secondly, DNO_Alg of deleting node order is proposed to determine the order of eliminating elements, so that Bayesian model can be transformed into cluster tree. Finally, combined with the detected attacks, the cluster tree propagation algorithm is used to dynamically calculate the posterior risk probability of nodes, so as to evaluate the network risk in real time.","PeriodicalId":11066,"journal":{"name":"DEStech Transactions on Computer Science and Engineering","volume":"73 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76306011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-13DOI: 10.12783/DTCSE/CCNT2020/35405
Yan Zhou, Qiang Li, Naiwen Jiang
This paper mainly studied the influence of the design of virtual experiment platform on the users' emotional state and learning achievements, and explored the relationship between the three. The routine methods of emotion elicitation and measurement were studied. The emotion of users was elicited by different interaction design and visual design, and the emotion state of users was measured by SAM. Through the experiment, we got the conclusion that the design change will affect the emotion, and the emotion valence and the learning achievement are positively related, and provide the theoretical basis for the subsequent platform design.
{"title":"Research on the Design of Virtual Experiment Platform of Product Appearance Structure Based on Emotion Measurement","authors":"Yan Zhou, Qiang Li, Naiwen Jiang","doi":"10.12783/DTCSE/CCNT2020/35405","DOIUrl":"https://doi.org/10.12783/DTCSE/CCNT2020/35405","url":null,"abstract":"This paper mainly studied the influence of the design of virtual experiment platform on the users' emotional state and learning achievements, and explored the relationship between the three. The routine methods of emotion elicitation and measurement were studied. The emotion of users was elicited by different interaction design and visual design, and the emotion state of users was measured by SAM. Through the experiment, we got the conclusion that the design change will affect the emotion, and the emotion valence and the learning achievement are positively related, and provide the theoretical basis for the subsequent platform design.","PeriodicalId":11066,"journal":{"name":"DEStech Transactions on Computer Science and Engineering","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86209901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-13DOI: 10.12783/DTCSE/CCNT2020/35437
Yihan Jia
s: Flat icon design has been widely applied in web pages and mobile phone UI interface, and has been widely praised for its simplicity, clear color, and directness of information. With the rapid development of Internet e-commerce, according to the survey report of China Internet Network Information Center CNNIC (the 45th), until March 2020, the scale of China's mobile phone netizens has reached 897 million. Mobile phone has become an indispensable part of People's Daily life. It not only provides convenience for people's life and shopping, but also becomes a platform for people's work, study and education. The development of multimedia mobile phones has promoted the flat icon design to flourish. Through analysis and research in this paper, it is concluded that the UI interface flat icon has distinct visual characteristics: concise graphic design elements, strong visual impact color design, distinct order, and so on. According to the visual performance characteristics of the flat icon, a large number of cases are analyzed to obtain the style classification and specific design method of the flat icon design. Therefore, this paper hopes to provide references for relevant designers by analyzing and studying the features of flat icon and design method.
{"title":"Flat Research on the Design and Application of Icon Design in Mobile Phone UI Interface","authors":"Yihan Jia","doi":"10.12783/DTCSE/CCNT2020/35437","DOIUrl":"https://doi.org/10.12783/DTCSE/CCNT2020/35437","url":null,"abstract":"s: Flat icon design has been widely applied in web pages and mobile phone UI interface, and has been widely praised for its simplicity, clear color, and directness of information. With the rapid development of Internet e-commerce, according to the survey report of China Internet Network Information Center CNNIC (the 45th), until March 2020, the scale of China's mobile phone netizens has reached 897 million. Mobile phone has become an indispensable part of People's Daily life. It not only provides convenience for people's life and shopping, but also becomes a platform for people's work, study and education. The development of multimedia mobile phones has promoted the flat icon design to flourish. Through analysis and research in this paper, it is concluded that the UI interface flat icon has distinct visual characteristics: concise graphic design elements, strong visual impact color design, distinct order, and so on. According to the visual performance characteristics of the flat icon, a large number of cases are analyzed to obtain the style classification and specific design method of the flat icon design. Therefore, this paper hopes to provide references for relevant designers by analyzing and studying the features of flat icon and design method.","PeriodicalId":11066,"journal":{"name":"DEStech Transactions on Computer Science and Engineering","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89827613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-13DOI: 10.12783/DTCSE/CCNT2020/35421
Wenhao Wang, Zhenyang Yu
To protect the copyright of multimedia data effectively, the adaptive digital watermarking algorithm is presented in this paper, which based on chaotic sequence and two-dimensional wavelet transform. Firstly, a chaotic sequence generated by Logistic chaotic map is utilized to encrypt watermark image. Then the strength and position of watermark embedding are obtained by discrete wavelet transform of host image. Finally the encrypted watermark is embedded in the host image. The experimental results show this method has better effect: the watermark is invisibility and robust against common image. It can protect multimedia data effectively.
{"title":"Digital Watermarking Algorithm Based on Chaotic and Wavelet Transform","authors":"Wenhao Wang, Zhenyang Yu","doi":"10.12783/DTCSE/CCNT2020/35421","DOIUrl":"https://doi.org/10.12783/DTCSE/CCNT2020/35421","url":null,"abstract":"To protect the copyright of multimedia data effectively, the adaptive digital watermarking algorithm is presented in this paper, which based on chaotic sequence and two-dimensional wavelet transform. Firstly, a chaotic sequence generated by Logistic chaotic map is utilized to encrypt watermark image. Then the strength and position of watermark embedding are obtained by discrete wavelet transform of host image. Finally the encrypted watermark is embedded in the host image. The experimental results show this method has better effect: the watermark is invisibility and robust against common image. It can protect multimedia data effectively.","PeriodicalId":11066,"journal":{"name":"DEStech Transactions on Computer Science and Engineering","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79568765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}