Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00071
Tian-yu Gao
Vibration has a great effect on electronic components. In this paper, the finite element technology is used to establish a finite element model of a circuit board. By analyzing the vibration characteristics of the circuit board, the installation structure of the circuit board is improved, and the position size of the installation point of the circuit board is optimized, and the optimal structure size of the circuit board is obtained.
{"title":"Modal Analysis and Structure Optimization of Composite Circuit Board","authors":"Tian-yu Gao","doi":"10.1109/ICNISC54316.2021.00071","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00071","url":null,"abstract":"Vibration has a great effect on electronic components. In this paper, the finite element technology is used to establish a finite element model of a circuit board. By analyzing the vibration characteristics of the circuit board, the installation structure of the circuit board is improved, and the position size of the installation point of the circuit board is optimized, and the optimal structure size of the circuit board is obtained.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115280913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00097
Yanling Zheng
Due to the different nations culture, people's ideology, value standard etc. all exist great difference, therefore business etiquette behavior also different. So, in mutual contacts and exchanges always for not familiar with other countries' ethnic customs or international prevailing etiquette so that can't get enough understanding and exchanges. This topic is aimed at through contrast to analyze similarities and differences of etiquette behavior in cross-cultural and common etiquette error, and reflect the communication value of business etiquette.
{"title":"Analyses the Business Etiquette in Cross-cultural Communication","authors":"Yanling Zheng","doi":"10.1109/ICNISC54316.2021.00097","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00097","url":null,"abstract":"Due to the different nations culture, people's ideology, value standard etc. all exist great difference, therefore business etiquette behavior also different. So, in mutual contacts and exchanges always for not familiar with other countries' ethnic customs or international prevailing etiquette so that can't get enough understanding and exchanges. This topic is aimed at through contrast to analyze similarities and differences of etiquette behavior in cross-cultural and common etiquette error, and reflect the communication value of business etiquette.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125920410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00022
Ainiao Wang
The further development of tourism cannot be achieved without information technology. The application of information technology can not only improve management efficiency, but also improve service experience, and the shortcomings of rural tourism are just management efficiency and higher quality service experience. The article analyzes the current situation and problems of rural tourism informatization, proposes to build a rural tourism smart platform, and again analyzes the main points and strategies of its construction in order to promote the development of rural tourism informatization and intellectualization.
{"title":"Research on the Construction of Rural Tourism Smart Platform Based on Information Technology","authors":"Ainiao Wang","doi":"10.1109/ICNISC54316.2021.00022","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00022","url":null,"abstract":"The further development of tourism cannot be achieved without information technology. The application of information technology can not only improve management efficiency, but also improve service experience, and the shortcomings of rural tourism are just management efficiency and higher quality service experience. The article analyzes the current situation and problems of rural tourism informatization, proposes to build a rural tourism smart platform, and again analyzes the main points and strategies of its construction in order to promote the development of rural tourism informatization and intellectualization.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126104551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00027
Mo Chen, Feng Li, Binfeng Xu, Yu Zhang
Collaborative learning(CL) is defined as situations where several learners with different ways of thinking, acting, and feeling participate in solving common problems. Group work is a representative form of CL and a strong need for various online courses. In this study, we focus on the student group recommendation based on the personalized information of students, including learning styles and social closeness. Moreover, aneffective recommendation method using extreme learning machine (ELM) is proposed in this paper. The method regards studentgroup recommendation asa binary classification problem. First, learning features are extracted from group learning styles using Felder-Silverman model and group members' social relationships. These features simultaneouslyconsider all the important factors which determine the results of recommendation and guarantee the effectiveness of grouprecommendation. Then, the extracted features are input to train ELM classifier due to its fast learning speed, whichguarantees the efficiency of recommendation. Finally, comparative experiments verify the accuracy and efficiencyof our method.
{"title":"Student GroupRecommendation using Extreme Learning Machinefor Collaborative Learning","authors":"Mo Chen, Feng Li, Binfeng Xu, Yu Zhang","doi":"10.1109/ICNISC54316.2021.00027","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00027","url":null,"abstract":"Collaborative learning(CL) is defined as situations where several learners with different ways of thinking, acting, and feeling participate in solving common problems. Group work is a representative form of CL and a strong need for various online courses. In this study, we focus on the student group recommendation based on the personalized information of students, including learning styles and social closeness. Moreover, aneffective recommendation method using extreme learning machine (ELM) is proposed in this paper. The method regards studentgroup recommendation asa binary classification problem. First, learning features are extracted from group learning styles using Felder-Silverman model and group members' social relationships. These features simultaneouslyconsider all the important factors which determine the results of recommendation and guarantee the effectiveness of grouprecommendation. Then, the extracted features are input to train ELM classifier due to its fast learning speed, whichguarantees the efficiency of recommendation. Finally, comparative experiments verify the accuracy and efficiencyof our method.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125986454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00020
Chunyan Chen
Mobile payment has become the mainstream payment method in daily life, such as low cost and convenient portability. Now that mobile payment is so popular, the security issues behind it should also be paid attention to. Therefore, this article will discuss the security risks of mobile payments and analyze the security risks of mobile payments based on the current payment security risks faced by mobile payments. Technical framework, discuss its mobile payment security protection technical measures.
{"title":"Discussion on the Security Mechanism of Mobile Payment","authors":"Chunyan Chen","doi":"10.1109/ICNISC54316.2021.00020","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00020","url":null,"abstract":"Mobile payment has become the mainstream payment method in daily life, such as low cost and convenient portability. Now that mobile payment is so popular, the security issues behind it should also be paid attention to. Therefore, this article will discuss the security risks of mobile payments and analyze the security risks of mobile payments based on the current payment security risks faced by mobile payments. Technical framework, discuss its mobile payment security protection technical measures.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127484206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00076
Caihong Ma, L. Guan, Dacheng Wang
The ocean is rich in oil and natural gas. The struggle for maritime rights and interests is becoming increasingly fierce. High temporal and spatial dynamic monitoring of offshore oil and gas drilling platforms has becoming important for comprehensive understanding of regional resource exploitation and development. In this paper, multi-source remote sensing satellite data are applied to the identification of offshore oil and gas platforms. And, an intelligent identification model of offshore oil and gas drilling platforms based on multi-source data is proposed. Firstly, the target area of offshore oil and gas platforms were first identified by ‘Flint’ annual NPP-VIIRS night-time light data. Then, they were accurately identified by combining the characteristics of multi temporal Sentinel-1 data. Finally, they were verified by combining multi-source high-resolution remote sensing satellite data. In this paper, the model was applied on the eastern sea area of Vietnam. And 75 platforms were rightly detected.
{"title":"Identification of Offshore Oil and Gas Drilling Platforms Based on Multi-source Remote Sensing Data","authors":"Caihong Ma, L. Guan, Dacheng Wang","doi":"10.1109/ICNISC54316.2021.00076","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00076","url":null,"abstract":"The ocean is rich in oil and natural gas. The struggle for maritime rights and interests is becoming increasingly fierce. High temporal and spatial dynamic monitoring of offshore oil and gas drilling platforms has becoming important for comprehensive understanding of regional resource exploitation and development. In this paper, multi-source remote sensing satellite data are applied to the identification of offshore oil and gas platforms. And, an intelligent identification model of offshore oil and gas drilling platforms based on multi-source data is proposed. Firstly, the target area of offshore oil and gas platforms were first identified by ‘Flint’ annual NPP-VIIRS night-time light data. Then, they were accurately identified by combining the characteristics of multi temporal Sentinel-1 data. Finally, they were verified by combining multi-source high-resolution remote sensing satellite data. In this paper, the model was applied on the eastern sea area of Vietnam. And 75 platforms were rightly detected.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126529712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00119
Rui Zhao, Songyang Wu, Yi Mao, Ning Li
Aiming at the problems of polysemy and overflow words in traditional vector representation methods such as word2vec and glove in question answering system, this paper introduces Elmo language model, char-CNN and traditional natural language features, and makes a complete semantic representation of the original corpus text from multiple language granularity levels A neural network model for multi granularity semantic representation. Experiments on the squad dataset show that the proposed model is superior to the classical bidaf model in terms of accurate matching rate and F1 value.
{"title":"Question Answering System Model Based on Multi Granularity Semantic Representation","authors":"Rui Zhao, Songyang Wu, Yi Mao, Ning Li","doi":"10.1109/ICNISC54316.2021.00119","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00119","url":null,"abstract":"Aiming at the problems of polysemy and overflow words in traditional vector representation methods such as word2vec and glove in question answering system, this paper introduces Elmo language model, char-CNN and traditional natural language features, and makes a complete semantic representation of the original corpus text from multiple language granularity levels A neural network model for multi granularity semantic representation. Experiments on the squad dataset show that the proposed model is superior to the classical bidaf model in terms of accurate matching rate and F1 value.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124234132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00172
Hongli Zhao, Lili Li
In existing Communication Based Train Control (CBTC) system, information security threats are analyzed, then information security demands of CBTC system are put forward. To protect information security, three security domains are divided according the Safety Integrity Level (SIL)) of CBTC system. Information security architecture of CBTC system is designed, special use firewalls and intrusion detection system are adopted. Through this CBTC system security are enhanced and operation safety is ensured.
{"title":"Information Security Architecture Design of CBTC System","authors":"Hongli Zhao, Lili Li","doi":"10.1109/ICNISC54316.2021.00172","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00172","url":null,"abstract":"In existing Communication Based Train Control (CBTC) system, information security threats are analyzed, then information security demands of CBTC system are put forward. To protect information security, three security domains are divided according the Safety Integrity Level (SIL)) of CBTC system. Information security architecture of CBTC system is designed, special use firewalls and intrusion detection system are adopted. Through this CBTC system security are enhanced and operation safety is ensured.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123414778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00148
J. Tan, Jun Wan
Nowadays, with the continuous development of the new media environment in China, more and more media are applied to teaching, and English teaching of French majors also presents a more novel and diversified trend. Integrating Ideological and political education into French professional English teaching with new media teaching methods can not only broaden the knowledge of English classroom and improve the effect of moral education in English classroom, but also expand a new teaching mode and promote the two-way development of English curriculum and ideological and political education.
{"title":"A Study on the Ideological and Political Teaching Strategies of French Professional English Course from the Perspective of New Media","authors":"J. Tan, Jun Wan","doi":"10.1109/ICNISC54316.2021.00148","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00148","url":null,"abstract":"Nowadays, with the continuous development of the new media environment in China, more and more media are applied to teaching, and English teaching of French majors also presents a more novel and diversified trend. Integrating Ideological and political education into French professional English teaching with new media teaching methods can not only broaden the knowledge of English classroom and improve the effect of moral education in English classroom, but also expand a new teaching mode and promote the two-way development of English curriculum and ideological and political education.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122137376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00117
Shuo Cui, Jiangbo Yin, Jun Wang, Peixin Xu
As the scale of national grid data continues to grow, data link fault location becomes more and more important. The traditional fault location method has many shortcomings due to its cognitive and technical limitations. With the rapid development of artificial intelligence technology today, using machine learning technology for data link fault location has become an effective method. Therefore, this paper proposes an autoencoder-BP neural network model, which uses the autoencoder to extract data features, and then uses the BP neural network for classification. Finally, it is proved through experiments that the combination of the two deep learning algorithms can effectively improve Accuracy of fault location.
{"title":"Data Link Fault Location Model Based on Machine Learning","authors":"Shuo Cui, Jiangbo Yin, Jun Wang, Peixin Xu","doi":"10.1109/ICNISC54316.2021.00117","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00117","url":null,"abstract":"As the scale of national grid data continues to grow, data link fault location becomes more and more important. The traditional fault location method has many shortcomings due to its cognitive and technical limitations. With the rapid development of artificial intelligence technology today, using machine learning technology for data link fault location has become an effective method. Therefore, this paper proposes an autoencoder-BP neural network model, which uses the autoencoder to extract data features, and then uses the BP neural network for classification. Finally, it is proved through experiments that the combination of the two deep learning algorithms can effectively improve Accuracy of fault location.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123801713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}