PDF The 10th International Conference On Computer Engineering and Networks Qi Liu Download

Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

Download and Read online, DOWNLOAD EBOOK, [PDF EBOOK EPUB ], Ebooks

download, Read Ebook EPUB/KINDE, Download Book Format PDF

The 10th International Conference on Computer


Engineering and Networks Qi Liu

OR CLICK LINK
https://textbookfull.com/product/the-10th-
international-conference-on-computer-engineering-
and-networks-qi-liu/

Read with Our Free App Audiobook Free Format PFD EBook, Ebooks dowload PDF
with Andible trial, Real book, online, KINDLE , Download[PDF] and Read and Read
Read book Format PDF Ebook, Dowload online, Read book Format PDF Ebook,
[PDF] and Real ONLINE Dowload [PDF] and Real ONLINE
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

The 8th International Conference on Computer


Engineering and Networks (CENet2018) Qi Liu

https://textbookfull.com/product/the-8th-international-
conference-on-computer-engineering-and-networks-cenet2018-qi-liu/

Proceedings of the 9th International Conference on


Computer Engineering and Networks Qi Liu

https://textbookfull.com/product/proceedings-of-the-9th-
international-conference-on-computer-engineering-and-networks-qi-
liu/

International Conference on Computer Networks and


Communication Technologies ICCNCT 2018 S. Smys

https://textbookfull.com/product/international-conference-on-
computer-networks-and-communication-technologies-
iccnct-2018-s-smys/

Proceedings of the 23rd International Conference on


Industrial Engineering and Engineering Management 2016
Theory and Application of Industrial Engineering 1st
Edition Ershi Qi
https://textbookfull.com/product/proceedings-of-the-23rd-
international-conference-on-industrial-engineering-and-
engineering-management-2016-theory-and-application-of-industrial-
Computer Engineering and Networking Proceedings of the
2013 International Conference on Computer Engineering
and Network CENet2013 1st Edition W. Eric Wong

https://textbookfull.com/product/computer-engineering-and-
networking-proceedings-of-the-2013-international-conference-on-
computer-engineering-and-network-cenet2013-1st-edition-w-eric-
wong/

ICSECM 2019: Proceedings of the 10th International


Conference on Structural Engineering and Construction
Management Ranjith Dissanayake

https://textbookfull.com/product/icsecm-2019-proceedings-of-
the-10th-international-conference-on-structural-engineering-and-
construction-management-ranjith-dissanayake/

Proceedings of the 22nd International Conference on


Industrial Engineering and Engineering Management 2015
Core Theory and Applications of Industrial Engineering
Volume 1 1st Edition Ershi Qi
https://textbookfull.com/product/proceedings-of-the-22nd-
international-conference-on-industrial-engineering-and-
engineering-management-2015-core-theory-and-applications-of-
industrial-engineering-volume-1-1st-edition-ershi-qi/

Proceedings of the 22nd International Conference on


Industrial Engineering and Engineering Management 2015
Innovation and Practice in Industrial Engineering and
Management Volume 2 1st Edition Ershi Qi
https://textbookfull.com/product/proceedings-of-the-22nd-
international-conference-on-industrial-engineering-and-
engineering-management-2015-innovation-and-practice-in-
industrial-engineering-and-management-volume-2-1st-edition-ershi/

Advances in Engineering Networks: Proceedings of the


12th International Conference on Industrial Engineering
and Industrial Management Rodolfo De Castro

https://textbookfull.com/product/advances-in-engineering-
networks-proceedings-of-the-12th-international-conference-on-
industrial-engineering-and-industrial-management-rodolfo-de-
Advances in Intelligent Systems and Computing 1274

Qi Liu
Xiaodong Liu
Tao Shen
Xuesong Qiu Editors

The
10th International
Conference
on Computer
Engineering and
Networks
Advances in Intelligent Systems and Computing

Volume 1274

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/11156


Qi Liu Xiaodong Liu
• •

Tao Shen Xuesong Qiu


Editors

The 10th International


Conference on Computer
Engineering and Networks

123
Editors
Qi Liu Xiaodong Liu
Science and Technology School of Computing
Nanjing University of Information Edinburgh Napier University
Nanjing, Jiangsu, China Edinburgh, UK

Tao Shen Xuesong Qiu


School of Electrical Engineering Institute of Network Technology
University of Jinan Beijing University of Posts
Jinan, Shandong, China and Telecommunications
Beijing, Beijing, China

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-981-15-8461-9 ISBN 978-981-15-8462-6 (eBook)
https://doi.org/10.1007/978-981-15-8462-6

© The Editor(s) (if applicable) and The Author(s), under exclusive license
to Springer Nature Singapore Pte Ltd. 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of
illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface

This conference proceedings is a collection of the papers accepted by the CENet


2020—the 10th International Conference on Computer Engineering and Networks
held on October 16–18 2020, in Xi’an, China.
This proceedings contains the five parts: Part I Artificial Intelligence and
Applications (51 papers); Part II Communication System Detection, Analysis and
Application (32 papers); Part III Information Security and Cybersecurity (25
papers), Part IV Intelligent System and Engineering (17 papers), Part V Internet of
Things and Smart Systems (61 papers) and Part VI Medical Engineering And
Information Systems (13 papers).
Each part can be used as an excellent reference by industry practitioners, uni-
versity faculties, research fellows and undergraduates as well as graduate students
who need to build a knowledge base of the most current advances and state of
practice in the topics covered by this conference proceedings. This will enable them
to produce, maintain and manage systems with high levels of trustworthiness and
complexity.
Thanks to the authors for their hard work and dedication as well as the reviewers
for ensuring the selection of only the highest-quality papers; their efforts made the
proceedings possible.

v
Contents

Artificial Intelligence and Applications


A Unified Framework for Micro-video BackGround Music
Automatic Matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Zongzhi Chai, Haichao Zhang, Yuehua Li, Qianxi Yang, Tianyi Li,
Fan Zhang, and Jinpeng Chen
YOLO_v3-Based Pulmonary Nodules Recognition System . . . . . . . . . . . 11
Wenhao Deng, Zhiqiang Wang, Xiaorui Ren, Xusheng Zhang, Bing Wang,
and Tao Yang
An Optimized Hybrid Clustering Algorithm for Mixed Data:
Application to Customer Segmentation of Table Grapes in China . . . . . 20
Yue Li, Xiaoquan Chu, Xin Mou, Dong Tian, Jianying Feng,
and Weisong Mu
Prediction of Shanghai and Shenzhen 300 Index Based
on BP Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Hong Liu, Nan Ge, Bingbing Zhao, Yi-han Wang, and Fang Xia
Application of Time-Frequency Features and PSO-SVM
in Fault Diagnosis of Planetary Gearbox . . . . . . . . . . . . . . . . . . . . . . . . 42
Qing Zhang, Heng Li, and Shuaihang Li
Wind Power Variable-Pitch DC Servo System Based
on Fuzzy Adaptive Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Weicai Xie, Shibo Liu, Yaofeng Wang, Hongzhi Liao, and Li He
Artificial Topographic Structure of CycleGAN for Stroke Patients’
Motor Imagery Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Fenqi Rong, Tao Sun, Fangzhou Xu, Yang Zhang, Fei Lin,
Xiaofang Wang, and Lei Wang

vii
viii Contents

Rail Defect Detection Method Based on BP Neural Network . . . . . . . . . 68


Qinhua Xu, Qinjun Zhao, Liguo Wang, and Tao Shen
Apple Grading Method Based on GA-SVM . . . . . . . . . . . . . . . . . . . . . . 79
Zheng Xu, Qinjun Zhao, Yang Zhang, Yuhua Zhang, and Tao Shen
Deep Spatio-Temporal Dense Network for Regional Pollution
Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Qifan Wu, Qingshan She, Peng Jiang, Xuhua Yang, Xiang Wu,
and Guang Lin
Research on the Relationship Among Electronic Word-of-Mouth,
Trust and Purchase Intention-Take JingDong Shopping E-commerce
Platform as an Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Chiu-Mei Chen, Kun-Shan Zhang, and Hsuan Li
An Effective Face Color Comparison Method . . . . . . . . . . . . . . . . . . . . 105
Yuanyong Feng, Jinrong Zhang, Zhidong Xie, Fufang Li, and Weihao Lu
Transfer Learning Based Motor Imagery of Stroke Patients
for Brain-Computer Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Yunjing Miao, Fangzhou Xu, Jinglu Hu, Dongri Shan, Yanna Zhao,
Jian Lian, and Yuanjie Zheng
Intelligent Virtual Lipstick Trial Makeup Based on OpenCV
and Dlib . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Yuanyong Feng, Zhidong Xie, and Fufang Li
A Hybrid Chemical Reaction Optimization Algorithm
for N-Queens Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Guangyong Zheng and Yuming Xu
Apple Soluble Solids Content Prediction Based on Genetic Algorithm
and Extreme Learning Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Xingwei Yan, Tao Shen, Shuhui Bi, and Qinhua Xu
Structural Damage Semantic Segmentation Using Dual-Network
Fusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Lingrui Mei, Jiaqi Yin, Donghao Zhou, Kai Kang, and Qiang Zhang
Improved UAV Scene Matching Algorithm Based on CenSurE
Features and FREAK Descriptor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Chenglong Wang, Tangle Peng, Longzhi Hu, and Guanjun Liu
Analysis of Image Quality Assessment Methods for Aerial Images . . . . 168
Yuliang Zhao, Yuye Zhang, Jikai Han, and Yingying Wang
The Applications of AI: The “Shandong Model” of E-commerce
Poverty Alleviation Under Technology Enabling Direction . . . . . . . . . . 176
Xinmei Wu, Zhiping Zhang, and Guozhen Song
Contents ix

Emotional Research on Mobile Phone E-Commerce Reviews


on LSTM Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Chunmei Zhang, Mingqing Zhao, and Gang Dong
Research on Intelligent Robot System for Park Inspection . . . . . . . . . . . 193
Lianqin Jia, Liangliang Wang, Qing Yan, and Qin Liu
Intelligent Network Operation and Maintenance Based on Deep
Learning Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Xidian Wang, Lei Wang, Zihan Jia, Jing Xu, Yanan Wang, Duo Shi,
Yang Xue, and Zhenlin Nie
Research on Autonomous Driving Perception Test Based
on Adversarial Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Yisi Wang, Wei Sha, Zhongming Pan, and Yigui Luo
Application Research of Artificial Intelligence Technology
in Intelligent Agriculture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Lianqin Jia, Jun Wang, Qin Liu, and Qing Yan
Facial Expression Extraction Based on Wavelet Transform
and FLD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Lichun Yu and Jinqing Liu
Research on Content-Based Reciprocal Recommendation Algorithm
for Student Resume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Jianfeng Tang and Jie Huang
Research on Personalized Recommendation Based
on Big Data Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
Jinhai Li, Shichao Qi, Longfeng Chen, and Hui Yan
Agricultural Product Quality Traceability System Based
on the Hybrid Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Jun Wang, Lianqin Jia, and Qian Zhou
The Research of Intelligent Bandwidth Adjustment System . . . . . . . . . . 254
Yong Cui, Yili Qin, Qirong Zhou, and Bing Li
Research on Tibetan Phrase Classification Method for Language
Information Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Zangtai Cai, Nancairang Suo, and Rangjia Cai
A Garbage Image Classification Framework Based
on Deep Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Chengchuang Lin, Gansen Zhao, Lei Zhao, and Bingchuan Chen
Ancient Ceramics Classification Method Based on Neural Network
Optimized by Improved Ant Colony Algorithm . . . . . . . . . . . . . . . . . . . 276
Yanzhe Liu and Bingxiang Liu
x Contents

Design of ISAR Image Annotation System Based on Deep Learning . . . 283


Bingning Li, Chi Zhang, Wei Pei, and Liang Shen
Research on Public Sentiment Data Center Based on Key Technology
of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Zhou Qi, Yin Jian, and Liangjun Zhang
Fire Detection from Images Based on Single Shot
MultiBox Detector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Zechen Wan, Yi Zhuo, Huihong Jiang, Junfeng Tao, Huimin Qian,
Wenbo Xiang, and Ying Qian
Human Activities Recognition from Videos Based on Compound Deep
Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
Zhijian Liu, Yi Han, Zhiwei Chen, Yuelong Fang, Huimin Qian,
and Jun Zhou
Deep Q-Learning Based Collaborative Caching in Mobile
Edge Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Ruichao Wang, Jizhao Lu, Yongjie Li, Xingyu Chen, and Shaoyong Guo
VNF Instance Dynamic Scaling Strategy Based on LSTM . . . . . . . . . . . 335
Hongwu Ge, Yonghua Huo, Zhihao Wang, Ping Xie, and Tongyan Wei
A Flow Control Method Based on Deep Deterministic
Policy Gradient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
Junli Mao, Donghong Wei, Qicai Wang, Yining Feng, and Tongyan Wei
Design of Forest Fire Warning System Based on Machine Vision . . . . . 352
Jiansheng Peng, Hanxiao Zhang, Huojiao Wu, and Qingjin Wei
Design of an Intelligent Glass-Wiping Robot . . . . . . . . . . . . . . . . . . . . . 364
Jiansheng Peng, Hemin Ye, Xin Lan, Qingjin Wei, and Qiwen He
Design and Implementation of ROS-Based Rapid Identification
Robot System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Qingjin Wei, Jiansheng Peng, Hanxiao Zhang, Hongyi Mo, and Yong Qin
Lane Recognition System for Machine Vision . . . . . . . . . . . . . . . . . . . . 388
Yong Qin, Jiansheng Peng, Hanxiao Zhang, and Jianhua Nong
Review on Deep Learning in Intelligent Transportation Systems . . . . . . 399
Yiwei Liu, Yizhuo Zhang, and Chi-Hua Chen
Glacier Area Monitoring Based on Deep Learning
and Multi-sources Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Guang Wang, Yue Liu, Huifang Shen, Shudong Zhou, Jinzhou Liu,
Hegao Sun, and Yan Tao
Contents xi

3D Convolutional Neural Networks with Image Fusion


for Hyperspectral Image Classification . . . . . . . . . . . . . . . . . . . . . . . . . . 419
Cheng Shi, Jie Zhang, Zhenzhen You, and Zhiyong Lv
Traffic Flow Prediction Model and Performance Analysis Based
on Recurrent Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Haozheng Wu, Yu Tang, Rong Fei, Chong Wang, and Yufan Guo
Review on Deep Learning in Feature Selection . . . . . . . . . . . . . . . . . . . 439
Yizhuo Zhang, Yiwei Liu, and Chi-Hua Chen
Design and Implementation of Handwritten Digit Recognition Based
on K-Nearest Neighbor Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
Ying Wang, Qingyun Liu, Yaqi Sun, Feng Zhang, and Yining Zhu
Gender Identification for Coloring Black and White Portrait
with cGan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
Qingyun Liu, Mugang Lin, Yaqi Sun, and Feng Zhang

Communication System Detection, Analysis and Application


Considerations on the Telemetry System in Fight Test . . . . . . . . . . . . . . 467
Tenghuan Ding, Tielin Li, and Wenyu Yan
Design and Implementation of Remote Visitor System Based
on NFC Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
Zhiqiang Wang, Shichun Gao, Meng Xue, Xinyu Ju, Xinhao Wang,
Xin Lv, Yang Li, and Tao Yang
Bit Slotted ALOHA Algorithm Based on a Polling Mechanism . . . . . . . 483
Hongwei Deng, Wenli Fu, Ming Yao, Yuxiang Zhou, and Songling Xia
A Mobile E-Commerce Recommendation Algorithm Based
on Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Jianxi Zhang and Changfeng Zhang
Heat Dissipation Optimization for the Electronic Device
in Enclosure Condition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
Bibek Regmi and Bishwa Raj Poudel
Transformer Fault Diagnosis Based on Stacked Contractive
Auto-Encoder Net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514
Yang Zhong, Chuye Hu, Yiqi Lu, and Shaorong Wang
Control Strategy for Vehicle-Based Hybrid Energy Storage System
Based on PI Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523
Chongzhuo Tan, Zhangyu Lu, Zeyu Wang, and Xizheng Zhang
Research on Task Scheduling in Distributed Vulnerability
Scanning System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530
Jie Jiang and Sixin Tang
xii Contents

Delta Omnidirectional Wheeled Table Tennis Automatic Pickup


Robot Based on Vision Servo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537
Ming Lu, Cheng Wang, Jinyu Wang, Hao Duan, Yongteng Sun,
and Zuguo Chen
RTP-GRU: Radiosonde Trajectory Prediction Model
Based on GRU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
Yinfeng Liu, Yaoyao Zhou, Jianping Du, Dong Liu, Jie Ren, Yuhan Chen,
Fan Zhang, and Jinpeng Chen
Life Prediction Method of Hydrogen Energy Battery Based
on MLP and LOESS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
Zhanwen Dai, Yumei Wang, and Yafei Wu
Application of DS Evidence Theory in Apple’s Internal
Quality Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
Xingwei Yan, Liyao Ma, Shuhui Bi, and Tao Shen
Scheduling Algorithm for Online Car-Hailing Considering Both
Benefit and Fairness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
Rongyuan Chen, Yuanxing Shi, Lizhi Shen, Xiancheng Zhou,
and Geng Qian
The Shortest Time Assignment Problem and Its
Improved Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
Yuncheng Wang, Chunhua Zhou, and Zhenyu Zhou
Injection Simulation Equipment Interface Transforming
from PCIe to SFP Based on FPGA . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589
Jing-ying Hu and Dong-cheng Chen
Design and Implementation of IP LAN Network Performance
Monitoring and Comprehensive Analysis System . . . . . . . . . . . . . . . . . . 596
Yili Qin, Qing Xie, and Yong Cui
Research on RP Point Configuration Optimizing
of the Communication Private Network . . . . . . . . . . . . . . . . . . . . . . . . . 604
Yili Qin, Yong Cui, and Qing Xie
Cross Polarization Jamming and ECM Performance
of Polarimetric Fusion Monopulse Radars . . . . . . . . . . . . . . . . . . . . . . . 612
Huanyao Dai, Jianghui Yin, Zhihao Liu, Haijun Wang, Jianlu Wang,
and Leigang Wang
The Customization and Implementation of Computer Teaching
Website Based on Moodle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623
Zhiping Zhang and Mei Sun
Contents xiii

Recommendation of Community Correction Measures Based


on FFM-FTRL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
Fangyi Wang, Xiaoxia Jia, and Xin Shi
The Current Situation and Improvement Suggestions of Information
Management and Service in Colleges and Universities—Investigation
of Xianyang City, Western China . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
Yang Sun
Research on Location Method of Network Key Nodes
Based on Position Weight Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
Shihong Chen
Design and Implementation of E-Note Software Based on Android . . . . 655
Zhenhua Li
Research and Design of Context UX Data Analysis System . . . . . . . . . . 661
Xiaoyan Fu and Zhengjie Liu
Trust Evaluation of User Behavior Based on Entropy
Weight Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670
Yonghua Gong and Lei Chen
Byzantine Fault-Tolerant Consensus Algorithm Based
on the Scoring Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676
Cheng Zhong, Zhengwen Zhang, Peng Lin, and Shujuan Sun
Network Topology-Aware Link Fault Recovery Algorithm
for Power Communication Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
Huaxu Zhou, Meng Ye, Yaodong Ju, Guanjin Huang, Shangquan Chen,
Xuhui Zhang, and Linna Ruan
An Orchestration Algorithm for 5G Network Slicing Based
on GA-PSO Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
Wenge Wang, Jing Shen, Yujing Zhao, Qi Wang, Shaoyong Guo,
and Lei Feng
A Path Allocation Method for Opportunistic Networks
with Limited Delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701
Zhiyuan An, Yan Liu, Lei Wang, Ningning Zhang, Kaili Dong, Xin Liu,
and Kun Xiao
The Fault Prediction Method Based on Weighted Causal
Dependence Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
Yonghua Huo, Jing Dong, Zhihao Wang, Yu Yan, Ping Xie,
and Yang Yang
xiv Contents

Network Traffic Anomaly Detection Based on Optimized


Transfer Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
Yonghua Huo, Libin Jiao, Ping Xie, Zhiming Fu, Zhuo Tao,
and Yang Yang
Constant-Weight Group Coded Bloom Filter for Multiple-Set
Membership Queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723
Xiaomei Tian and Huihuang Zhao

Information Security and Cybersecurity


A Image Adaptive Steganography Algorithm Combining Chaotic
Encryption and Minimum Distortion Function . . . . . . . . . . . . . . . . . . . 733
Ge Jiao, Jiahao Liu, Sheng Zhou, and Ning Luo
Research on Quantitative Evaluation Method of Network Security
in Substation Power Monitoring System . . . . . . . . . . . . . . . . . . . . . . . . . 741
Liqiang Yang, Huixun Li, Yingfu Wangyang, Ye Liang, Wei Xu,
Lisong Shao, and Hongbin Qian
Research on FTP Vulnerability Mining Based
on Fuzzing Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
Zhiqiang Wang, Haoran Zhang, Wenqi Fan, Yajie Zhou, Caiming Tang,
and Duanyun Zhang
Research on Integrated Detection of SQL Injection Behavior
Based on Text Features and Traffic Features . . . . . . . . . . . . . . . . . . . . . 755
Ming Li, Bo Liu, Guangsheng Xing, Xiaodong Wang, and Zhihui Wang
Android Secure Cloud Storage System Based on SM Algorithms . . . . . 772
Zhiqiang Wang, Kunpeng Yu, Wenbin Wang, Xinyue Yu, Haoyue Kang,
Xin Lv, Yang Li, and Tao Yang
Identification System Based on Fingerprint and Finger Vein . . . . . . . . . 780
Zhiqiang Wang, Zeyang Hou, Zhiwei Wang, Xinyu Li, Bingyan Wei,
Xin Lv, and Tao Yang
Analysis and Design of Image Encryption Algorithms Based
on Interlaced Chaos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 789
Kangman Li and Qiuping Li
Verifiable Multi-use Multi-secret Sharing Scheme on Monotone
Span Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796
Ningning Wang and Yun Song
Design and Implementation of a Modular Multiplier for Public-Key
Cryptosystems Based on Barrett Reduction . . . . . . . . . . . . . . . . . . . . . . 803
Yun Zhao, Chao Cui, Yong Xiao, Weibin Lin, and Ziwen Cai
Contents xv

Near and Far Collision Attack on Masked AES . . . . . . . . . . . . . . . . . . . 810


Xiaoya Yang, Yongchuan Niu, Qingping Tang, Jiawei Zhang,
Yaoling Ding, and An Wang
A Novel Image Encryption Scheme Based on Poker Cross-Shuffling
and Fractional Order Hyperchaotic System . . . . . . . . . . . . . . . . . . . . . . 818
Zhong Chen, Huihuang Zhao, and Junyao Chen
Research on High Speed and Low Power FPGA Implementation
of LILLIPUT Cryptographic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . 826
Juanli Kuang, Rongjie Long, and Lang Li
Adversarial Domain Adaptation for Network-Based Visible Light
Positioning Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
Luchi Hua, Yuan Zhuang, Longning Qi, and Jun Yang
Robustness Detection Method of Chinese Spam Based on the Features
of Joint Characters-Words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845
Xin Tong, Jingya Wang, Kainan Jiao, Runzheng Wang, and Xiaoqin Pan
Domain Resolution in LAN by DNS Hijacking . . . . . . . . . . . . . . . . . . . 852
Zongping Yin
Study on Distributed Intrusion Detection Systems of Power
Information Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859
Shu Yu, Taojun, and Zhang Lulu
Credible Identity Authentication Mechanism of Electric Internet
of Things Based on Blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 866
Liming Wang, Xiuli Huang, Lei Chen, Jie Fan, and Ming Zhang
Trusted Identity Cross-Domain Dynamic Authorization Mechanism
Based on Master-Slave Chain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 876
Xiuli Huang, Qian Guo, Qigui Yao, and Xuesong Huo
Trusted Identity Authentication Mechanism for Power Maintenance
Personnel Based on Blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883
Zhengwen Zhang, Sujie Shao, Cheng Zhong, Shujuan Sun, and Peng Lin
Power Data Communication Network Fault Recovery Algorithm
Based on Nodes Reliability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 890
Meng Ye, Huaxu Zhou, Guanjin Huang, Yaodong Ju, Zhicheng Shao,
Qing Gong, and Meiling Dai
Congestion Link Inference Algorithm of Power Data Network Based
on Bayes Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 899
Meng Ye, Huaxu Zhou, Yaodong Ju, Guanjin Huang, Miaogeng Wang,
Xuhui Zhang, and Meiling Dai
xvi Contents

Multimodal Continuous Authentication Based on Match


Level Fusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 908
Wenwei Chen, Pengpeng Lv, Zhuozhi Yu, Qinghai Ou, Yukun Zhu,
Huifeng Yang, Lifang Gao, Yangyang Lian, Qimeng Li, Kai Lin,
and Xin Liu
NAS Honeypot Technology Based on Attack Chain . . . . . . . . . . . . . . . . 915
Bing Liu, Hui Shu, and Fei Kang
Key Technology and Application of Customer Data Security
Prevention and Control in Public Service Enterprises . . . . . . . . . . . . . . 927
Xiuli Huang, Congcong Shi, Qian Guo, Xianzhou Gao, and Pengfei Yu
Efficient Fault Diagnosis Algorithm Based on Active Detection
Under 5G Network Slice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 934
Zhe Huang, Guoyi Zhang, Guoying Liu, and Lingfeng Zeng

Intelligent System and Engineering


Research on Blue Force Simulation System of Naval Surface Ships . . . . 945
Rui Guo and Nan Wang
Research on Evaluation of Distributed Enterprise Research
and Development (R & D) Design Resources Sharing
Based on Improved Simulated Annealing AHP:
A Case Study of Server Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 951
Yongqing Hu, Weixing Su, Yelin Xia, Han Lin, and Hanning Chen
A Simplified Simulation Method for Measurement of Dielectric
Constant of Complex Dielectric with Sandwich Structure
and Foam Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 960
Yang Zhang, Qinjun Zhao, and Zheng Xu
Research on PSO-MP DC Dual Power Conversion
Control Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 968
Yulong Huang and Jing Li
Design of Lithium Battery Management System
for Underwater Robot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 989
Baoping Wang, Qin Sun, Dong Zhang, and Yuzhen Gong
Research and Application of Gas Wavelet Packet Transform
Algorithm Based on Fast Fourier Infrared Spectrometer . . . . . . . . . . . . 996
Wanjie Ren, Xia Li, Guoxing Hu, and Rui Tuo
Segment Wear Characteristics of the Frame Saw for Hard Stone
in Reciprocating Sawing Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1002
Qin Sun, Baoping Wang, Zuoli Li, and Zhiguang Guan
Contents xvii

Dongba Hieroglyphs Visual Parts Extraction Algorithm


Based on MSD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008
Yuting Yang and Houliang Kang
Key Structural Points Extracting Algorithm
for Dongba Hieroglyphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014
Houliang Kang and Yuting Yang
Research on a High Step-Up Boost Converter . . . . . . . . . . . . . . . . . . . . 1020
Jingmei Wu, Ping Ji, Xusheng Hu, and Ling Chen
CAUX-Based Mobile Personas Creation . . . . . . . . . . . . . . . . . . . . . . . . 1033
Mo Li and Zhengjie Liu
Exploration and Research on CAUX in High-Level Context-Aware . . . 1040
Ke Li, Zhengjie Liu, and Vittorio Bucchieri
Research on Photovoltaic Subsidy System Based on Alliance Chain . . . 1048
Cheng Zhong, Zhengwen Zhang, Peng Lin, and Yajie Zhang
Design of Multi-UAV System Based on ROS . . . . . . . . . . . . . . . . . . . . . 1056
Qingjin Wei, Jiansheng Peng, Hemin Ye, Jian Qin, and Qiwen He
Design of Quadrotor Aircraft System Based on msOS Platform . . . . . . 1068
Yong Qin, Jiansheng Peng, Hemin Ye, Liyou Luo, and Qingjin Wei
Design and Implementation of Traversing Machine System Based
on msOS Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1080
Qiwen He, Jiansheng Peng, Hanxiao Zhang, and Yicheng Zhan
Single Image Super-Resolution Based on Sparse Coding
and Joint Mapping Learning Framework . . . . . . . . . . . . . . . . . . . . . . . 1091
Shudong Zhou, Li Fang, Huifang Shen, Hegao Sun, and Yue Liu

Internet of Things and Smart Systems


A Study on the Satisfaction of Consumers Using Ecommerce
Tourism Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1105
Kun-Shan Zhang, Chiu-Mei Chen, and Hsuan Li
Research on Construction of Smart Training Room Based
on Mobile Cloud Video Surveillance Technologies . . . . . . . . . . . . . . . . . 1113
Lihua Xiong and Jingming Xie
Design of a Real-Time and Reliable Multi-machine System . . . . . . . . . . 1120
Jian Zhang, Lang Li, Qiuping Li, Junxia Zhao, and Xiaoman Liang
A Detection Method of Safety Helmet Wearing Based on Centernet . . . 1128
Bo Wang, Qinjun Zhao, Yong Zhang, and Jin Cheng
xviii Contents

A Hybrid Sentiment Analysis Method . . . . . . . . . . . . . . . . . . . . . . . . . . 1138


Hongyu Han, Yongshi Zhang, Jianpei Zhang, Jing Yang, and Yong Wang
Optimizing Layout of Video Surveillance for Substation Monitoring . . . 1147
Yiqi Lu, Yang Zhong, Chuye Hu, and Shaorong Wang
Multi-objective Load Dispatch of Microgrid Based
on Electric Vehicle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1158
Zeyu Wang, Zhangyu Lu, Chongzhuo Tan, and Xizheng Zhang
Local Path Planning Based on an Improved Dynamic Window
Approach in ROS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1164
Desheng Feng, Lixia Deng, Tao Sun, Haiying Liu, Hui Zhang,
and Yang Zhao
An Effective Mobile Charging Approach for Wireless Sensor
and Actuator Networks with Mobile Actuators . . . . . . . . . . . . . . . . . . . 1172
Xiaoyuan Zhang, Yanglong Guo, Hongrui Yu, and Tao Chen
An Overview of Outliers and Detection Methods in General
for Time Series from IoT Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1180
Bin Sun and Liyao Ma
A Path Planning Algorithm for Mobile Robot with Restricted
Access Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1187
Youpan Zhang, Tao Sun, Hui Zhang, Haiying Liu, Lixia Deng,
and Yongguo Zhao
Weighted Slopeone-IBCF Algorithm Based on User Interest
Attenuation and Item Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1197
Peng Shi and Wenming Yao
Simulation Analysis of Output Characteristics of Power
Electronic Transformers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1209
Zhiwei Xu, Zhimeng Xu, and Weicai Xie
Virtual Synchronous Control Strategy for Frequency Control
of DFIG Under Power-Limited Operation . . . . . . . . . . . . . . . . . . . . . . . 1219
Yunkun Mao, Guorong Liu, Lei Ma, and Shengxiang Tang
Design on Underwater Fishing Robot in Shallow Water . . . . . . . . . . . . 1229
Zhiguang Guan, Dong Zhang, and Mingxing Lin
Structure Design of a Cleaning Robot for Underwater Hull Surface . . . 1236
Qin Sun, Zhiguang Guan, and Dong Zhang
Design of Control System for Tubeless Wheel Automatic
Transportation Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1243
Qiuhua Miao, Zhiguang Guan, Dong Zhang, and Tongjun Yang
Contents xix

Research on Positioning Algorithm of Indoor Mobile Robot Based


on Vision/INS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1250
Tongqian Liu, Yong Zhang, Yuan Xu, Wanfeng Ma, and Jidong Feng
Design of Smart Electricity Meter with Load
Identification Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1256
Jia Qiao, Yong Zhang, and Lei Wu
Entropy Enhanced AHP Algorithm for Heterogeneous
Communication Access Decision in Power IoT Networks . . . . . . . . . . . . 1263
Yao Wang, Yun Liang, Hui Huang, and Chunlong Li
An Off-line Handwritten Numeral Recognition Method . . . . . . . . . . . . . 1271
Yuye Zhang, Xingxiang Guo, Yuxin Li, and Shujuan Wang
3D Point Cloud Multi-target Detection Method Based
on PointNet++ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1279
Jianheng Li, Bin Pan, Evgeny Cherkashin, Linke Liu, Zhenyu Sun,
Manlin Zhang, and Qinqin Li
Distance Learning System Design in Edge Network . . . . . . . . . . . . . . . . 1291
Wei Pei, Junqiang Li, Bingning Li, and Rong Zhao
Marine Intelligent Distributed Temperature and Humidity Collection
System Based on Narrow-Band IoT Architecture . . . . . . . . . . . . . . . . . . 1298
Congliang Hu, Huaqing Wan, and Wei Ding
Design of Intelligent Clothes Hanger System Based on Rainfall
Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1308
Binbin Tao, Jing Zhang, Xusheng Hu, and Jingmei Wu
Smart Shoes for Obstacle Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1319
Wenzhu Wu, Ning Lei, and Junquan Tang
Research on Differential Power Analysis of Lightweight Block
Cipher LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1327
Yi Zou, Lang Li, Hui-huang Zhao, and Ge Jiao
Research on Network Optimization and Network Security
in Power Wireless Private Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1335
Yu Chen, Kun Liu, and Ziqian Zhang
Review and Enlightenment of the Development of British Modern
Flood Risk Management System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1345
Zhi Cong Ye, Yi Chen, Jun Zhou Ma, and Hui Liu
Research on 5G in Electric Power System . . . . . . . . . . . . . . . . . . . . . . . 1356
Long Liu, Wei-wei Kong, Shan-yu Bi, and Guang-yu Hu
xx Contents

Research on Interference of LTE Wireless Network in Electric


Power System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1364
Shanyu Bi, Junyao Zhang, Weiwei Kong, Long Liu, and Pengpeng Lv
Research on Time-Sensitive Technology in Electric Power
Communication Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1374
Yu-qing Yang
Research on High Reliability Planning Method in Electric
Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1382
Zewei Tang and Chengzhi Jiang
Task Allocation Method for Power Internet of Things Based
on Two-Point Cooperation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1393
Jun Zhou, Yajun Shi, Qianjun Wang, Zitong Ma, and Can Zhang
Heterogeneous Sharing Resource Allocation Algorithm in Power Grid
Internet of Things Based on Cloud-Edge Collaboration . . . . . . . . . . . . . 1403
Bingbing Chen, Guanru Wu, Qinghang Zhang, and Xin Tao
A Load Balancing Container Migration Mechanism in the Edge
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1414
Chen Xin, Dongyu Yang, Zitong Ma, Qianjun Wang, and Yang Wang
Research on Key Agreement Security Technology Based on Power
Grid Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1423
Weidong Xia, Ping He, Yi Li, Qinghang Zhang, and Han Xu
Design and Implementation of a Relay Transceiver with Deep
Coverage in Power Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . 1431
Jinshuai Wang, Xunwei Zhao, LiYu Xiang, Lingzhi Zhang,
and Gaoquan Ding
A Multi-domain Virtual Network Embedding Approach . . . . . . . . . . . . 1439
Yonghua Huo, Chunxiao Song, Yi Cao, Juntao Zheng, and Jie Min
An Intent-Based Network Slice Orchestration Method . . . . . . . . . . . . . . 1447
Jie Min, Ying Wang, and Peng Yu
Service Offloading Algorithm Based on Depth Deterministic Policy
Gradient in Fog Computing Environment . . . . . . . . . . . . . . . . . . . . . . . 1456
Biao Zou, Jian Shen, Zhenkun Huang, Sijia Zheng, Jialin Zhang,
and Wei Li
Server Deployment Algorithm for Maximizing Utilization
of Network Resources Under Fog Computing . . . . . . . . . . . . . . . . . . . . 1466
Wei Du, Hongbo Sun, Heping Wang, Xiaobing Guo, and Biao Zou
Contents xxi

Power Data Network Resource Allocation Algorithm Based


on TOPSIS Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1475
Huaxu Zhou, Meng Ye, Guanjin Huang, Yaodong Ju, Zhicheng Shao,
Qing Gong, and Linna Ruan
Application of Dynamic Management of 5G Network Slice Resource
Based on Reinforcement Learning in Smart Grid . . . . . . . . . . . . . . . . . 1485
Guanghuai Zhao, Mingshi Wen, Jiakai Hao, and Tianxiang Hai
Improved Genetic Algorithm for Computation Offloading
in Cloud-Edge-Terminal Collaboration Networks . . . . . . . . . . . . . . . . . 1493
Dequan Wang, Ao Xiong, Boxian Liao, Chao Yang, Li Shang, Lei Jin,
and Xiaolei Tian
A Computation Offloading Scheme Based on FFA and GA
for Time and Energy Consumption . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1500
Jia Chen, Qiang Gao, Qian Wu, Zhiwei Huang, Long Wang,
Dequan Wang, and Yifei Xing
IoT Terminal Security Monitoring and Assessment Model Relying
on Grey Relational Cluster Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . 1507
Jiaxuan Fei, Xiangqun Wang, Xiaojian Zhang, Qigui Yao, and Jie Fan
Research on Congestion Control Over Wireless Network with Delay
Jitter and High Ber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1514
Zulong Liu, Yang Yang, Weicheng Zhao, Meng Zhang, and Ying Wang
Reinforcement Learning Based QoS Guarantee Traffic Scheduling
Algorithm for Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1522
Qingchuan Liu, Ao Xiong, Yimin Li, Siya Xu, Zhiyuan An, Xinjian Shu,
Yan Liu, and Wencui Li
Network Traffic Prediction Method Based on Time Series
Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1533
Yonghua Huo, Chunxiao Song, Sheng Gao, Haodong Yang, Yu Yan,
and Yang Yang
E-Chain: Blockchain-Based Energy Market for Smart Cities . . . . . . . . . 1542
Siwei Miao, Xiao Zhang, Kwame Omono Asamoah, Jianbin Gao,
and Xia Qi
Deep Reinforcement Learning Cloud-Edge-Terminal Computation
Resource Allocation Mechanism for IoT . . . . . . . . . . . . . . . . . . . . . . . . 1550
Xinjian Shu, Lijie Wu, Xiaoyang Qin, Runhua Yang, Yangyang Wu,
Dequan Wang, and Boxian Liao
Low-Energy Edge Computing Resource Deployment Algorithm Based
on Particle Swarme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1557
Jianliang Zhang, Wanli Ma, Yang Li, Honglin Xue, Min Zhao, Chao Han,
and Sheng Bi
xxii Contents

Efficient Fog Node Resource Allocation Algorithm Based


on Taboo Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1565
Yang Li, Wanli Ma, Jianliang Zhang, Jian Wu, Junwei Ma,
and Xiaoyan Dang
Network Reliability Optimization Algorithm Based on Service Priority
and Load Balancing in Wireless Sensor Network . . . . . . . . . . . . . . . . . . 1574
Pengcheng Ni, Zhihao Li, Yunzhi Yang, Jiaxuan Fei, Can Cao,
and Zhiyuan Ye
5G Network Resource Migration Algorithm Based
on Resource Reservation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1581
Guoliang Qiu, Guoyi Zhang, Yinian Gao, and Yujing Wen
Virtual Network Resource Allocation Algorithm Based on Reliability
in Large-Scale 5G Network Slicing Environment . . . . . . . . . . . . . . . . . . 1590
Xiaoqi Huang, Guoyi Zhang, Ruya Huang, and Wanshu Huang
Resource Allocation Algorithm of Power Communication Network
Based on Reliability and Historical Data Under 5G Network Slicing . . . 1599
Yang Yang, Guoyi Zhang, Junhong Weng, and Xi Wang
5G Slice Allocation Algorithm Based on Mapping Relation . . . . . . . . . . 1608
Qiwen Zheng, Guoyi Zhang, Minghui Ou, and Jian Bao
High-Reliability Virtual Network Resource Allocation Algorithm
Based on Service Priority in 5G Network Slicing . . . . . . . . . . . . . . . . . . 1617
Huicong Fan, Jianhua Zhao, Hua Shao, Shijia Zhu, and Wenxiao Li
Design of Real-Time Vehicle Tracking System for Drones
Based on ROS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1626
Yong Xu, Jiansheng Peng, Hemin Ye, Wenjian Zhong, and Qingjin Wei

Medical Engineering and Information Systems


Study of Cold-Resistant Anomalous Viruses Based
on Dispersion Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1641
Hongwei Shi, Jun Huang, Ming Sun, Yuxing Li, Wei Zhang,
Rongrong Zhang, Lishen Wang, Tong Xu, and Xiumei Xue
A Pilot Study on the Music Regulation System of Autistic Children
Based on EEG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1649
Xiujin Zhu, Sixin Luo, Xianping Niu, Tao Shen, Xiangchao Meng,
Mingxu Sun, and Xuqun Pei
EEG Characteristics Extraction and Classification Based on R-CSP
and PSO-SVM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1658
Xue Li, Yuliang Ma, Qizhong Zhang, and Yunyuan Gao
Contents xxiii

Motor Imagery EEG Feature Extraction Based on Fuzzy Entropy


with Wavelet Transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1668
Tao Yang, Yuliang Ma, Ming Meng, and Qingshan She
An Automatic White Balance Algorithm via White Eyes . . . . . . . . . . . . 1679
Yuanyong Feng, Weihao Lu, Jinrong Zhang, and Fufang Li
Experimental Study on Mechanical Characteristics of Lower Limb
Joints During Human Running . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1687
Lingyan Zhao, Shi Zhang, Lingtao Yu, Kai Zhong, and Zhiguang Guan
Study on the Gait Motion Model of Human Lower Limb Joint . . . . . . . 1694
Lingyan Zhao, Shi Zhang, Lingtao Yu, Kai Zhong, and Guan Zhiguang
CWAM: Analysis and Research on Operation State of Medical Gas
System Based on Convolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1702
Lida Liu, Song Liu, and Yanfeng Xu
Yi Zhuotong Intelligent Security Management Platform
for Hospital Logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1710
Lida Liu, Song Liu, and Fengjuan Li
Research on Tibetan Medicine Entity Recognition and Knowledge
Graph Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1718
Luosanggadeng, Nima Zhaxi, Renzeng Duojie, and Suonan Jiancuo
Spatial Distribution Characteristics and Optimization Strategies
of Medical Facilities in Kunming Based on POI Data . . . . . . . . . . . . . . 1725
Xin Shan, Jian Xu, Yunfei Du, Ruli Wang, and Haoyang Deng
Study on the Abnormal Expression MicroRNA Network
of Pancreatic Cancer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1734
Bo Zhang, Lina Pan, and HuiPing Shi
Modeling RNA Secondary Structures Based on Stochastic Tree
Adjoining Grammars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1741
Sixin Tang, Huihuang Zhao, and Jie Jiang

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1751


Artificial Intelligence and Applications
A Unified Framework for Micro-video
BackGround Music Automatic Matching

Zongzhi Chai1, Haichao Zhang1, Yuehua Li1, Qianxi Yang1,


Tianyi Li2, Fan Zhang1, and Jinpeng Chen1(&)
1
School of Software Engineering, Beijing University of Posts
and Telecommunications, Beijing 100786, China
[email protected]
2
University of Pittsburgh, Pittsburgh, USA
[email protected]

Abstract. The current widely spread of micro-form video is undeniable. How-


ever, neither the music-orienting nor the video-orienting way to make a video can
totally express the idea of the video maker because of the fixed music types and the
cost of time to find a proper music. Based on the deep learning method, this paper
studies the automatic matching algorithm of background music for micro-videos
which analyzes the background information and the emotions of characters in
micro-videos and establishes the model to select the proper background music
according to the video contents. Experiments are carried out on the database
obtained from TikTok and the result shows that the current Micro-Video Back-
ground Music Automatic Matching model in this paper is effective.

Keywords: Micro-video  Deep learning  Video feature extraction  Chorus


intercepting  Background music matching

1 Introduction

In recent years, with the popularity of the global mobile Internet and the development
of network technology, micro videos have become a part of daily life for many people.
More and more people are trying to make micro videos. But the traditional way of
making micro videos with fixed music, limits this trend. In the current market, inno-
vations in short video production and video filtering processing are imminent.
Therefore, we have studied a method based on video content to add suitable back-
ground music to fill the gap in the current market demand. In this article, we propose a
MVBGMAMA method to solve the above problems, and automatically select and
match the appropriate background music based on the scene settings and character
emotions in the short video. When analyzing the characteristics of the video, we can
analyze the key frames of the video, and then use the scene recognition technology of
pictures and facial expression recognition technology to label the scenes and emotional

Z. Chai and H. Zhang—These authors contributed to the work equally and should be regarded as
co-first authors.

© The Editor(s) (if applicable) and The Author(s), under exclusive license
to Springer Nature Singapore Pte Ltd. 2021
Q. Liu et al. (Eds.): CENet 2020, AISC 1274, pp. 3–10, 2021.
https://doi.org/10.1007/978-981-15-8462-6_1
Another random document with
no related content on Scribd:
The Old Testament
IN THE JEWISH CHURCH:
Twelve Lectures on Biblical Criticism, with Notes. By W. Robertson
Smith, M.A., Recently Professor of Hebrew and Exegesis of the Old
Testament, Free Church College, Aberdeen. 1 vol., 12mo. Cloth,
$1.75.
"Professor Robertson Smith's book is exactly what was wanted at
once to inform and to stimulate. Written by one of the first Semitic
scholars of our time, it is completely abreast of the most recent
investigations, and pervaded by a thoroughly scholar-like spirit. His
easy mastery of the subject and his sense of which are the really
difficult points and which the settled ones are apparent on every
page. What is more surprising is the skill wherewith these resources
are used. Although scientific in the sense of being thorough, exact,
and business-like, the book is also popular—that is to say, it is
perfectly intelligible to every person of fair general education who
has read the Bible. For clearness of statement, for cogency of
argument, for breadth of view, for impartiality of tone, for the
judgment with which details are subordinated to the most interesting
and instructive principles and facts, it is a model of how a great and
difficult subject should be presented to the world."—Pall Mall
Gazette.
"Speaking after mature deliberation, we pronounce Professor
Robertson Smith's book on Biblical Science one of the most
important works that has appeared in our time. It justifies, in a
convincing and conclusive manner, what we have from first to last
maintained regarding him—namely, that he was engaged in an
enterprise auspicious to the Christian Church; that he was not
assailing the faith, but fortifying it. He has not abandoned one jot or
one tittle of his principles, but he now for the first time states them
comprehensively, and points out their natural and logical
applications."—The Christian World (London).
"In his studies the author has made a careful use of the studies of
the great critics of England and Germany. But his work is marked by
a spirit of intrepid independence and an individuality which refuses to
surrender at discretion to anybody. He refuses to be lifted from his
feet on the solid rock of Christian faith, by any passing wave of
skepticism. As an introduction to the Old Testament for the use of
teachers, and a vigorous, scholarly statement of the principles and
results of conservative Biblical criticism, as related to the Old
Testament, these lectures will be found specially serviceable and
interesting. And they are certainly remarkable as an indication of a
liberal movement in the Scottish Church."—New York Evening
Express.
"Heresy is a difficult charge to prove nowadays, and when proved to
the satisfaction of the religious court seems to advance a man's
reputation rather than injure it. Here is Professor Robertson Smith,
who was found too heretical to be allowed to address the students at
Aberdeen, Scotland, on the Hebrew language and literature, who is
received in the larger world with something of the prestige of a
martyr. Influential laymen, both in Edinburgh and Glasgow, have
requested him to deliver in both cities a course of lectures on the
present state of Biblical criticism. These lectures have now been
delivered, and are published not only in England, but in this country
also."—New York Times.
"How far Professor Smith's conclusions may coincide with those of
our own best Biblical scholars we shall not undertake to say, but his
work is so able and accurate, so scholarly and devout, that it will be
read with interest by American clergymen and students, and will
stimulate all who read it to make further researches in the same
field."—The Christian-at-Work.
Sent, post-paid, to any address in the United States, on receipt of
the price.
APPLETONS'
PERIODICALS.
Appletons' Journal.
A Magazine of General Literature. Published Monthly. Subscription,
$3.00 per annum; single copy, 25 cents. The volumes begin January
and July of each year. Cloth covers for the volumes, 50 cents each.
The Popular Science Monthly.
Conducted by E.L. & W.J. Youmans. Containing instructive and
interesting articles and abstracts of articles, original, selected, and
illustrated, from the pens of the leading scientific men of different
countries. Subscription, to begin at any time, $5.00 per annum;
single copy, 50 cents. A club of five will be sent as directed for
$20.00 per annum. The volumes begin May and November of each
year. Cloth covers for the volumes, 50 cents each.
The New York Medical Journal and Obstetrical Review.
Published Monthly. Edited by Frank P. Foster, M.D., Physician for
Diseases of Women to the Out Patient Department of the New York
Hospital. Subscription, $4.00 per annum; single copy, 40 cents. The
volumes begin January and July of each year.
The North American Review.
Published Monthly. Containing articles of general public interest, it is
a forum for their full and free discussion. It is cosmopolitan, and, true
to its ancient motto, it is the organ of no sect, or party, or school.
Subscription, $5.00 per annum; single copy, 50 cents. The volumes
begin January and July of each year. Volumes, in cloth, $3.50 each;
half morocco, $4.00 each.
COMBINATION RATES.
To one address, postage paid.
PRICES.
Regular.
Club.
Appletons' Journal and Popular Science Monthly $8
00 $7 00
And North American Review 13
00 11 50
Popular Science Monthly and New York Medical Journal 9
00 8 00
And North American Review 14
00 12 50
Appletons' Journal and New York Medical Journal 7
00 6 25
And North American Review 12
00 10 50
Popular Science Monthly and North American Review 10
00 9 00
Appletons' Journal and North American Review 8
00 7 00
New York Medical Journal and North American Review 9
00 8 00
D. APPLETON & CO., Publishers,
1, 3, & 5 Bond Street, New York.
*** END OF THE PROJECT GUTENBERG EBOOK IN THE BRUSH
***

Updated editions will replace the previous one—the old editions will
be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying copyright
royalties. Special rules, set forth in the General Terms of Use part of
this license, apply to copying and distributing Project Gutenberg™
electronic works to protect the PROJECT GUTENBERG™ concept
and trademark. Project Gutenberg is a registered trademark, and
may not be used if you charge for an eBook, except by following the
terms of the trademark license, including paying royalties for use of
the Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is very
easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund from
the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law in
the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms of
this agreement by keeping this work in the same format with its
attached full Project Gutenberg™ License when you share it without
charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears, or
with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning of
this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute this


electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1 with
active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or expense
to the user, provide a copy, a means of exporting a copy, or a means
of obtaining a copy upon request, of the work in its original “Plain
Vanilla ASCII” or other form. Any alternate format must include the
full Project Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™


electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in paragraph
1.F.3, the Project Gutenberg Literary Archive Foundation, the owner
of the Project Gutenberg™ trademark, and any other party
distributing a Project Gutenberg™ electronic work under this
agreement, disclaim all liability to you for damages, costs and
expenses, including legal fees. YOU AGREE THAT YOU HAVE NO
REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF
WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE
PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE
FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of receiving it,
you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or entity
that provided you with the defective work may elect to provide a
replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.

1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the
Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and distribution
of Project Gutenberg™ electronic works, harmless from all liability,
costs and expenses, including legal fees, that arise directly or
indirectly from any of the following which you do or cause to occur:
(a) distribution of this or any Project Gutenberg™ work, (b)
alteration, modification, or additions or deletions to any Project
Gutenberg™ work, and (c) any Defect you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.

The Foundation’s business office is located at 809 North 1500 West,


Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many small
donations ($1 to $5,000) are particularly important to maintaining tax
exempt status with the IRS.

The Foundation is committed to complying with the laws regulating


charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states where


we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot make


any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.

Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.

Section 5. General Information About Project


Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.

Project Gutenberg™ eBooks are often created from several printed


editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.

You might also like