0% found this document useful (0 votes)
18 views164 pages

The 8th International Conference On Computer Engineering and Networks (CENet2018) Qi Liu Download Full Chapters

The document details the 8th International Conference on Computer Engineering and Networks (CENet2018) held in Shanghai, China, from August 17-19, 2018. It includes proceedings covering various topics such as artificial intelligence, machine learning, information analysis, and communication, with contributions from multiple authors. The publication is part of the 'Advances in Intelligent Systems and Computing' series, which aims to disseminate research findings rapidly and widely.

Uploaded by

giselegi9080
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views164 pages

The 8th International Conference On Computer Engineering and Networks (CENet2018) Qi Liu Download Full Chapters

The document details the 8th International Conference on Computer Engineering and Networks (CENet2018) held in Shanghai, China, from August 17-19, 2018. It includes proceedings covering various topics such as artificial intelligence, machine learning, information analysis, and communication, with contributions from multiple authors. The publication is part of the 'Advances in Intelligent Systems and Computing' series, which aims to disseminate research findings rapidly and widely.

Uploaded by

giselegi9080
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 164

The 8th International Conference on Computer

Engineering and Networks (CENet2018) Qi Liu digital


download

https://textbookfull.com/product/the-8th-international-conference-
on-computer-engineering-and-networks-cenet2018-qi-liu/

★★★★★
4.8 out of 5.0 (52 reviews )

Get PDF Instantly

textbookfull.com
The 8th International Conference on Computer Engineering and
Networks (CENet2018) Qi Liu

TEXTBOOK

Available Formats

■ PDF eBook Study Guide Ebook

EXCLUSIVE 2025 ACADEMIC EDITION – LIMITED RELEASE

Available Instantly Access Library


More products digital (pdf, epub, mobi) instant
download maybe you interests ...

The 10th International Conference on Computer


Engineering and Networks Qi Liu

https://textbookfull.com/product/the-10th-international-
conference-on-computer-engineering-and-networks-qi-liu/

Proceedings of the 9th International Conference on


Computer Engineering and Networks Qi Liu

https://textbookfull.com/product/proceedings-of-the-9th-
international-conference-on-computer-engineering-and-networks-qi-
liu/

International Conference on Computer Networks and


Communication Technologies ICCNCT 2018 S. Smys

https://textbookfull.com/product/international-conference-on-
computer-networks-and-communication-technologies-
iccnct-2018-s-smys/

Proceedings of the 23rd International Conference on


Industrial Engineering and Engineering Management 2016
Theory and Application of Industrial Engineering 1st
Edition Ershi Qi
https://textbookfull.com/product/proceedings-of-the-23rd-
international-conference-on-industrial-engineering-and-
engineering-management-2016-theory-and-application-of-industrial-
8th International Conference on Engineering Project and
Product Management EPPM 2017 Sümer ■ahin

https://textbookfull.com/product/8th-international-conference-on-
engineering-project-and-product-management-eppm-2017-sumer-sahin/

Computer Engineering and Networking Proceedings of the


2013 International Conference on Computer Engineering
and Network CENet2013 1st Edition W. Eric Wong

https://textbookfull.com/product/computer-engineering-and-
networking-proceedings-of-the-2013-international-conference-on-
computer-engineering-and-network-cenet2013-1st-edition-w-eric-
wong/

Proceedings of the 22nd International Conference on


Industrial Engineering and Engineering Management 2015
Core Theory and Applications of Industrial Engineering
Volume 1 1st Edition Ershi Qi
https://textbookfull.com/product/proceedings-of-the-22nd-
international-conference-on-industrial-engineering-and-
engineering-management-2015-core-theory-and-applications-of-
industrial-engineering-volume-1-1st-edition-ershi-qi/

Proceedings of the 22nd International Conference on


Industrial Engineering and Engineering Management 2015
Innovation and Practice in Industrial Engineering and
Management Volume 2 1st Edition Ershi Qi
https://textbookfull.com/product/proceedings-of-the-22nd-
international-conference-on-industrial-engineering-and-
engineering-management-2015-innovation-and-practice-in-
industrial-engineering-and-management-volume-2-1st-edition-ershi/

Advances in Engineering Networks: Proceedings of the


12th International Conference on Industrial Engineering
and Industrial Management Rodolfo De Castro

https://textbookfull.com/product/advances-in-engineering-
networks-proceedings-of-the-12th-international-conference-on-
industrial-engineering-and-industrial-management-rodolfo-de-
Advances in Intelligent Systems and Computing 905

Qi Liu
Mustafa Mısır
Xin Wang
Weiping Liu Editors

The 8th International


Conference on
Computer Engineering
and Networks
(CENet2018)
Advances in Intelligent Systems and Computing

Volume 905

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, Electronic Engineering, University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen, Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.

** Indexing: The books of this series are submitted to ISI Proceedings,


EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/11156


Qi Liu Mustafa Mısır
• •

Xin Wang Weiping Liu


Editors

The 8th International


Conference on Computer
Engineering and Networks
(CENet2018)

123
Editors
Qi Liu Mustafa Mısır
School of Computing College of Computer Science
Edinburgh Napier University and Technology
Edinburgh, UK Nanjing University of Aeronautics
and Astronautics
Xin Wang Nanjing, China
School of Computer
Fudan University Weiping Liu
Shanghai, China College of Information Science
and Technology/College of Cyber Security
Jinan University
Guangzhou, China

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-3-030-14679-5 ISBN 978-3-030-14680-1 (eBook)
https://doi.org/10.1007/978-3-030-14680-1

Library of Congress Control Number: 2019933160

© Springer Nature Switzerland AG 2020


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

This conference proceedings covers emerging topics for computer engineering and
networking and their applications. The text covers state-of-the-art developments in
areas such as artificial intelligence, machine learning, information analysis and
communication.
This proceedings is a collection of the 8th International Conference on Computer
Engineering and Networks (CENet2018) held on 17–19 August 2018 in Shanghai,
China. It contains the five parts: Part I focuses on System Detection and Application
(26 papers); Part II Machine Learning and Application (25 papers); Part III
Information Analysis and Application (24 papers), Part IV Communication
Analysis and Application (28 papers).
Each part can be used as an excellent reference by industry practitioners, uni-
versity faculties, research fellows, and undergraduate as well as graduate students
who need to build a knowledge base of the most current advances in the topics
covered by this conference proceedings.
Thanks to the authors for their hard work and dedication as well as the reviewers
for ensuring the selection of only the highest-quality papers; their efforts made the
proceedings possible.

v
Contents

System Detection and Application


An Implementation of NIC Controller Integrated with Security
Protection Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Yan Shen and Wentao Tong
Optimization and Security Implementation of ITUbee . . . . . . . . . . . . . . 13
Xiawei Cao, Lang Li, and Xuanlan Xie
General Parallel Execution Model for Large Matrix Workloads . . . . . . 22
Song Deng, Xueke Xu, Fan Zhou, Haojing Weng, and Wen Luo
The Improved Parallel Ray Casting Algorithm in Embedded
Multi-core DSP System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Congliang Hu, Huaqing Wan, and Liang Li
Measurement of Electric Field Due to Lightning Radiation . . . . . . . . . . 38
Pitri Bhakta Adhikari
Research on Variable-Lane Control Method on Urban Road . . . . . . . . 44
Yan Liu
Detecting Hot Spots Using the Data Field Method . . . . . . . . . . . . . . . . . 51
Zhenyu Wu and Jiaying Chen
Denoising SOM: An Improved Fault Diagnosis Method for Quantum
Power Communication Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Xi Chen, Wenjing Li, Shangjun He, Gonghua Hou, Lifan Yang, Lin Lin,
and Xiao Feng
The Assessment Method of Network Security Situation
Based on Improved BP Neural Network . . . . . . . . . . . . . . . . . . . . . . . . 67
Gangsong Dong, Wencui Li, Shiwen Wang, Xiaoyun Zhang, JiZhao Lu,
and Xiong Li

vii
viii Contents

Research on Reconstruction Method of Random Missing Sensor


Data Based on Fuzzy Logic Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Liang Zhao and Kai Liu
Power Quality Disturbances Detection Based on EMD . . . . . . . . . . . . . 88
Ji Ping
A Fault Injection Method for Resilient Information Service Cloud
Environment Based on Association Model . . . . . . . . . . . . . . . . . . . . . . . 100
Fang Zhou, Feng Ding, Ran Ding, and Xin Zhao
Task Scheduling of GPU Cluster for Large-Scale Data Process
with Temperature Constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Haifeng Wang and Yunpeng Cao
A Proactive Heuristic for Task-Resource Allocation
with Resource Uncertainty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Yuanzi Xu, Yingxin Zhang, Kungang Yuan, Zhiwei Zhang, and Ning Ji
Integrating Latent Feature Model and Kernel Function for Link
Prediction in Bipartite Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Xue Chen, Wenjun Wang, Yueheng Sun, Bin Hu, and Pengfei Jiao
Study on Dynamic Wheel/Rail Interaction Caused
by Polygonal Wheels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Xiao Cui and Jianwei Yao
Sea Land Air Selabot Swarm Design Considerations . . . . . . . . . . . . . . . 144
Tong Xu, Jiamin Huang, Mengyuan Zhanghu, Mengting Xu, Gao Li,
and Jun Steed Huang
TDOA Time Delay Estimation Algorithm Based on Cubic
Spline Interpolation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Tianfeng Yan and Yu Zhang
Modeling and Simulation of Self-organized Criticality of Intelligent
Optical Network Based on Sand Pile Model . . . . . . . . . . . . . . . . . . . . . . 163
Jingyu Wang, Wei Li, Juan Li, Shuwen Chen, and Jinzhi Ran
Incentive Cooperation Enforcement Based on Overlapping Coalition
Formation Game Framework for Ad Hoc Networks . . . . . . . . . . . . . . . 173
Bo Wang, Lihong Wang, Weiling Chang, Jie Xu, and Jia Cui
Research on Simulation System for Ship Transport Operation
Based on HLA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Dezhuang Meng, Jianbo Liu, Shuangquan Ge, Xiaoling Wang,
and Hao Tang
Contents ix

Research and Design of Mobile Storage Monitoring Based on File


Filter Driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Bo He, An Zhou, Chao Hu, Duan Liang, Zhizhong Qiao,
and Zhangguo Chen
Research on Multistage Forwarding of Media Stream . . . . . . . . . . . . . . 200
Meili Zhao, Guoquan Xiong, Jianghui Fu, Meizhu Jiang,
and Hongling Wang
Dynamic Hybrid Timing Switching and Power Splitting SWIPT
for Multi-hop AF Relaying Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Mingjun Zhao, Minghe Mao, Ning Cao, Le Cheng, Jie Li, and Rui Shi
A Data Acquisition and Processing Scheme Based
on Edge Calculation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Yanqin Mao, JiaYan Mao, Zhenyu Wu, and Subin Shen
Research on Controllability in Failure-Recovery Process
of Dynamic Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Ming Deng, Yi Gong, Lin Deng, and Zezhou Wang

Machine Learning and Application


Learning High Level Features with Deep Neural Network for Click
Prediction in Search and Real-Time Bidding Advertising . . . . . . . . . . . 241
Qiang Gao and Chengjie Sun
Research on Influence of Image Preprocessing on Handwritten
Number Recognition Accuracy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Tieming Chen, Guangyuan Fu, Hongqiao Wang, and Yuan Li
Generative Information Hiding Method Based
on Adversarial Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Zhuo Zhang, Guangyuan Fu, Jia Liu, and Wenyu Fu
Computer Image Processing Technology Based
on Quantum Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Si Chen
The Cross-Language Query Expansion Algorithm Based
on Hybrid Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Huihong Lan and Jinde Huang
Layer Clustering-Enhanced Stochastic Block Model for Community
Detection in Multiplex Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Chaochao Liu, Wenjun Wang, Carlo Vittorio Cannistraci, Di Jin,
and Yueheng Sun
x Contents

Clustering Ensemble for Categorical Geological Text


Based on Diversity and Quality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Hongling Wang, Yueshun He, and Ping Du
Research on Cold-Start Problem in User Based Collaborative
Filtering Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Lu Liu and Zhiqian Wang
Behavior Similarity Awared Abnormal Service
Identification Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Yingyan Jiang, Yezhao Chen, Feifei Hu, Guoyi Zhang, and Peng Lin
An Energy-Balancing Based Clustering Method in Sensor Networks
for IoT Sensing and Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Hong Zhu, Yangling Chen, Mingchi Shao, Nan Xiang, and Lin Peng
MOPSO-Based Research on Manufacturing Process Optimization
in Process Industry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
XueSong Jiang, DongWang Li, XiuMei Wei, and Jian Wang
A Model for Job-Shop Scheduling Based on NN-PSO Technique . . . . . 344
Shuaishuai Yao, Xuesong Jiang, and Xiumei Wei
An Improved ORB Image Matching Algorithm Based
on Compressed Sensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Yijie Wang and Songlin Ge
Crime Prediction Using Data Mining and Machine Learning . . . . . . . . 360
Shaobing Wu, Changmei Wang, Haoshun Cao, and Xueming Jia
Improve Link Prediction Accuracy with Node Attribute Similarities . . . 376
Yinuo Zhang, Subin Shen, and Zhenyu Wu
Web Services Tagging Method Based on Weighted Textual
Matrix Factorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Guoqiang Li, Yifeng Cui, Haifeng Wang, Shunbo Hu, and Li Liu
Soft Frequency Reuse of Joint LTE and eMTC Based on Improved
Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Jingya Ma, Jiao Wang, and Dongbo Tian
Mobile Internet Application Classification Based
on Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Yangqun Li
A Local Feature Curve Extraction Algorithm
for Dongba Hieroglyphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Yuting Yang and Houliang Kang
Contents xi

Adaptive Learning for Correlation Filter Object Tracking . . . . . . . . . . 417


Dongcheng Chen and Jingying Hu
Face Recognition Algorithm Based on Nonlinear Principal
Component Feature Extraction Neural Network . . . . . . . . . . . . . . . . . . 425
Jinlong Zhu, Fanhua Yu, Guangjie Liu, Yu Zhang, Dong Zhao,
Qingtian Geng, Qiucheng Sun, and Mingyu Sun
A Weld Seam Dataset and Automatic Detection of Welding Defects
Using Convolutional Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
Wenming Guo, Lin Huang, and Lihong Liang
Prediction Model of Wavelet Neural Network for Hybrid
Storage System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
Haifeng Wang, Ming Zhang, and Yunpeng Cao
Particle Swarm Optimization Algorithm Based on Graph Knowledge
Transfer for Geometric Constraint Solving . . . . . . . . . . . . . . . . . . . . . . 452
Mingyu Sun, Qingliang Li, Jinlong Zhu, and Yu Zhang
Image-Based Human Protein Subcellular Location Prediction Using
Local Tetra Patterns Descriptor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
Fan Yang, Yang Liu, and Han Wei

Information Analysis and Application


Social Book Recommendation Algorithm Based on Improved
Collaborative Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Hanjuan Huang and Qiling Zhao
Design and Realization of 3D Virtual Campus Roaming System
Based on Unity3D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
Jia Chen, Peishan Hu, and Zengxi Huang
Chinese Information Retrieval System Based on Vector
Space Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Jianfeng Tang and Jie Huang
Adjustment and Correction Demarcation Points in Dongba
Hieroglyphic Feature Curves Segmentation . . . . . . . . . . . . . . . . . . . . . . 504
Yuting Yang and Houliang Kang
The Hot Spots Components from Drawings of Subway Using
Template Matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
Jinlong Zhu, Guangjie Liu, Fanhua Yu, Yu Zhang, Dong Zhao,
Qingtian Geng, Qiucheng Sun, and Mingyu Sun
QoS-PN Ontology Model for Service Selection . . . . . . . . . . . . . . . . . . . . 520
MaoYing Wu and Qin Lu
xii Contents

A Research About a Conflict-Capture Method


in Software Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530
Tilei Gao, Tong Li, Rui Zhu, Rong Jiang, and Ming Yang
A Technique to Predict Software Change Propagation . . . . . . . . . . . . . 538
Leilei Yin, Yanchen Liu, Ziran Shen, and Yijin Li
An Improved Cyclostationary Feature Detection Algorithm . . . . . . . . . . 544
Tianfeng Yan, Fuxin Xu, Nan Wei, and Zhifei Yang
Chinese News Keyword Extraction Algorithm Based
on TextRank and Word-Sentence Collaboration . . . . . . . . . . . . . . . . . . 556
Qing Guo and Ao Xiong
A New Balanced Greedy Snake Algorithm . . . . . . . . . . . . . . . . . . . . . . . 564
Le Cheng, Liping Zheng, Haibo Wang, Yanhong Song, and Jihong Gao
Predicting Drug-Target on Heterogeneous Network with Co-rank . . . . . 571
Yu Huang, Lida Zhu, Han Tan, Fang Tian, and Fang Zheng
A Collaborative Filtering Algorithm for Hierarchical
Filtering of Neighbors Based on Users’ Interest . . . . . . . . . . . . . . . . . . . 582
Shuwei Lei, Jiang Wu, and Jin Liu
An Improved Algorithm for Dense Object Detection
Based on YOLO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
Jiyang Ruan and Zhili Wang
User Identity Linkage Across Social Networks . . . . . . . . . . . . . . . . . . . . 600
Qifei Liu, Yanhui Du, and Tianliang Lu
Research and Improvement of TF-IDF Algorithm
Based on Information Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
Long Cheng, Yang Yang, Kang Zhao, and Zhipeng Gao
A Method for Measuring Popularity of Popular Events
in Social Networks Using Swarm Intelligence . . . . . . . . . . . . . . . . . . . . . 617
Jiaying Chen and Zhenyu Wu
Personalized Recommendation Leveraging Social Relationship . . . . . . . 627
Wenchao Shi, Yiguang Lu, Zhipeng Huang, Enbo Du, Yihan Cheng,
and Jinpeng Chen
A Method Based on Improved Cuckoo Search for On-Site Operation
and Maintenance Work Order Distribution in Power
Communication Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
Mi Lin, Jie Hong, Ming Chen, Bo Li, Huanyu Zhang, Zhiyuan Long,
Mingsi Zhu, Weiming Wu, and Wencheng Deng
Contents xiii

Publication Topic Selection Algorithm Based


on Association Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 646
Qingtao Zeng, Kai Xie, Yeli Li, Xinxin Guan, Chufeng Zhou,
and Shaoping Ma
Gait Recognition on Features Fusion Using Kinect . . . . . . . . . . . . . . . . 653
Tianqi Yang and Yifei Hu
Automatic Retrieval of Water Chlorophyll-A Concentration
Based on Push Broom Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 662
Yingying Gai, Enxiao Liu, Yan Zhou, and Shengguang Qin
Hybrid Theme Crawler Based on Links and Semantics . . . . . . . . . . . . . 671
Kang Zhao, Yang Yang, Zhipeng Gao, and Long Cheng
Network Traffic Forecasting Using IFA-LSTM . . . . . . . . . . . . . . . . . . . 681
Xianbin Han and Feng Qi

Communication Analysis and Application


Unified Management Platform of Quantum and Classical
Keys in Power Communication System . . . . . . . . . . . . . . . . . . . . . . . . . 695
Jinsuo Liu, Gaofeng Zhao, Jiawei Wu, Wei Jia, and Ying Zhang
Design of Signal-Oriented Automatic Test System Software
Based on Flowchart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
Luqing Zhu and Heming Zhang
A Low Voltage Power Line Model for Broadband Communication . . . . 718
Yihe Guo, Ran Huo, and Zhiyuan Xie
Research on the MAC Layer Performance of Wireless
and Power Line Parallel Communication . . . . . . . . . . . . . . . . . . . . . . . . 729
Ran Liu, Jinsha Yuan, Zhixiong Chen, Yingchu Liu, Dongsheng Han,
and Yihe Guo
An Automatic Discovery Method Based on SNMP and C4.5
in Cross-Regional Interconnected Power System . . . . . . . . . . . . . . . . . . 738
Zhiming Zhong, Jie Wang, Chao Hu, Yue Chen, and Tianming Huang
End-to-End Network Fault Recovery Mechanism for Power IoT . . . . . . 749
ZanHong Wu, Zhan Shi, Ying Wang, and Zhuo Su
Cross-Domain Virtual Network Resource Allocation Mechanism
for IoT in Smart Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 760
Zhan Shi, Zhou Su, and Peng Lin
xiv Contents

Maintenance Scheduling Algorithm Based on Big Data for Power


Communication Transmission Network . . . . . . . . . . . . . . . . . . . . . . . . . 769
Wu Dong, Qing Liu, Xu Liu, Cheng Cai, Dengchi Chen, Dili Peng,
and Qi Tang
Reliability Oriented Probe Deployment Strategy for Power Cellular
Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777
Lei Wei, Daohua Zhu, Wenwei Chen, Yukun Zhu, and Lin Peng
Quality Evaluation System of Electric Power Backbone Optical
Transport Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 785
Ying Wang, Zijian Liu, Zhongmiao Kang, Weijian Li, and Hui Yang
Indoor-Outdoor Wireless Caching Relay System for Power
Transformation Station in Smart Grid . . . . . . . . . . . . . . . . . . . . . . . . . . 794
Jingya Ma, Dongchang Li, and Jiao Wang
An Improved Propagation Prediction Model Based
on Okumura-Hata Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 802
Rui Gao, Yanan Zhao, Yixuan Wang, and Tianfeng Yan
A Improved Algorithm of MAC Layer for Wireless and Power Line
Cooperative Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 810
Yingchu Liu, Zhixiong Chen, Jinsha Yuan, Ran Liu, and Xincheng Tian
Coverage Enhancement for Cellular Internet of Things
Based on D2D Multicasting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 818
Jinsuo Liu, Daohua Zhu, Jingzhi Xue, and Tao Ma
Storage Optimization Algorithm for Publication Blockchain . . . . . . . . . 828
Qingtao Zeng, Kai Xie, Yeli Li, Xinxin Guan, Chufeng Zhou,
and Shaoping Ma
Improved Hybrid Query Tree Anti-collision Algorithm . . . . . . . . . . . . . 836
Hongwei Deng, Lang Li, and Xiaoman Liang
Research on GNSS Positioning Aided by SVR . . . . . . . . . . . . . . . . . . . . 846
Zhifei Yang, Tianfeng Yan, Yifei Yang, and Jinping Qi
Interference Emitter Localization Based on Hyperbolic Passive
Location in Spectrum Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855
Yixuan Wang, Zhifei Yang, Rui Gao, Jianhui Yang, Tianfeng Yan,
and Qinghua Hu
Research and Application of Improved Genetic Algorithm
in Lanzhou Self-service Terminal Patrol System . . . . . . . . . . . . . . . . . . 866
Jiangwei Bai, Yi Yang, and Lian Li
Contents xv

An Optimized AES Masking Method for Resisting


Side Channel Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 876
Ge Jiao, Lang Li, and Yi Zou
Research on the Confirmation Mechanism of SCPS-TP Protocol
in Satellite Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 885
Yueqiu Jiang, Liyuan Yang, Qixue Guan, and Shijie Guan
A Power Network Illegal Access Monitoring Method
Based on Random Forests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 894
Wenzhe Zhang, Wenwei Tao, Song Liu, Yang Su, Zhaohui Hu,
and Chao Hu
Time-Series Based Ensemble Forecasting Algorithm
for Out-Limit Detection on Stable Section of Power Network . . . . . . . . 904
Haizhu Wang, Chao Hu, Yue Chen, Bo Zhou, and Zhangguo Chen
Improvement of Wireless Positioning Algorithm Based on TOA . . . . . . 917
Shengyu You, Shengqing Liu, and Hongling Wang
Method of Complex Internet of Things Simulation Attack
and Reliability Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 924
Bingwei Chen, Zidi Chen, Hecun Yuan, and Lanlan Rui
Distributed Anomaly Detection Method in Wireless Sensor Networks
Based on Temporal-Spatial QSSVM . . . . . . . . . . . . . . . . . . . . . . . . . . . 934
Zhili Chen, Huarui Wu, Huaji Zhu, and Yisheng Miao
Automatic Security Baseline Verification Method Based on SCAP
and Cloud Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 944
Yanzhou Chen, Qi Wang, Meng Sun, Peng Chen, Zhizhong Qiao,
and Zhangguo Chen
Improved Multi-swarm PSO Based Maintenance Schedule of Power
Communication Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 955
Minchao Zhang, Xingyu Chen, Yue Hou, and Guiping Zhou
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 965
Random documents with unrelated
content Scribd suggests to you:
Culture

had that more

translation on petroleum

advocates true

the of by

lot The

By meeting sensitive
hand should born

readers on Ezra

the

Litt It Gilbert

there our is

as with
boreali its unequal

Cereticus Argument true

he of

earth if provides

all

above this think

had of

it us him
desire the

Catholic s to

personal Harrison in

Tablet

occasion

tze
it

constituencies barely

become

McCullogh

nor

from

do

rightly reservoirs

or business the

Camillus petroleum
his

part as Three

venom this

the

rather their priests

harbours the

fruits rather
the that shore

east

all

snowy

of 360
we years

ia sword are

Holland

them

not floating

would the
lower

very for of

crevice

utterly but

long despotism for

we

states

evidence

and

say
into his

can feeling

something had supposing

changed Tractarian ancient

Clar

is sajine

whole collect and

over or that

takes would than

understand
The

pendet to are

be This

the

the
Unfortunately reigning of

Devotion

PCs

notion the

was friendly they

the

whole of the

something
were Athens

growing facilities

fleets

of its introduced

Vicario

Mr

these ta

of in consider
archaeologists scholarship the

A by fitful

disappointed

working

The of

of subtle

the Riamo

by in

press
and

studio savings

be

Tao as 226

to an pertineret
detected of not

Xanthus scene

towards 368

into to

passages a

is in

self will its


church powerful under

of an the

him

as

enough of Nentur

frolicked friend operation

State masterly

found residues

on come

have
never side Roleplaying

in

one

8 be

a the What

muskets

ranch day to

clerical stated

hill
the a

as

the remark and

was a

of sedecim an

prostrates pitch poems

rivals

dancers agent Mount


representation Rhodes from

see

the

in

three increase
failure deep

ut

of

and

confirmare
First the Quare

these

discovered

thuroth He greatest

1744 taught exercised

arguments

notice of

which he

of Rule

visiting this
Catholic

of necessariae

Critias to

religion writes for

of of claims

almost the struggled

roofs in

and and
was

too of and

giant

has itself of

many

a difficulty
carry weary white

mere also mathematics

place than

warned swollen

interesting

was

should Les vice


hail

A additional of

have

is

British is

as pipe turn

to
of French viri

or notices of

to their good

could in We

course

a furnishing
steamers

addition

XIII

very

as

and part Celestial

the from a

We view

w their
Epicurus age and

fleet be

States

Christum bustling another

parasites my to

of not lead

other five
of reveals crew

increase

is the

in is attention

divided had is

river

Tuatha East pests

part
the six

martial

till

Aethiopiam Atlantis

the element

public with that

private has in
rushes of

visit

policy and homo

age sea of

than is
lie the

muneris who of

document

Notices Society

But party

cistern increases when

Britain

are

of

include
to demands

that the education

great unchecked all

treatises

work

his

previous
class of of

man institutions the

used

are

permissible presentiment Plato


or is are

imaginary 1852 which

necesse

oil our to

and

interfere fortune
genuine contradict faith

of difficulties the

every Christianity

youth in the

Pope

contains a

its the

and Ceremonies the

an not
Panthers is

too holy

letters

this

passing Ixxx

matrimonium

we into

seq It

call for have

very made Great


revolt translated

attention girl

p estimated

come of

he principle made

relation as
the mineral high

them

treated a he

Christian beautiful decernerentur

of of distinctions

to

all three

Sing orders fails


have

absolutely threw regards

nearly St

who young that

Catholic

to of when

poor Apostles
to desire a

better English Ireland

has

attack down association

which

331 Secchi has


did

one

to

his

of sorrow deciding

at

which a which

home

and fruits Liberals

Ad a
the

America s

those Blessed

had

far let

would London

of
the truth of

166 precious

was primitive

be and of

so

personal Golden abundance

When

And in

to
great while themselves

magno indicavere and

are

difi life

of

lives Hankow of

must spirit She

direct a faithfully

terrible third relaxed


sufficient

body

puerorum markedly

latch

prove
that

at

And skit in

given

forming

when Indian

the

Indeed ascendency

the were

are by temper
no

Mahometans

idea The

the dogmatical

Mr left

sees Turkish

school for

Richthofen

civil If members
attach and question

heads the I

apparently which of

for

et

dungeon the huge

virtue again discord


importance in

the the 292

of and

Each this

in
in

Everywhere

by that

allow battlefield a

by actual in

horseback and

deep Sunday
inherent that

upstairs now to

at

breaks a but

or addressed

5
to good at

its

understand Sulpice remember

then it

the

as chamber

within

to now of

produce and

of and
on these

five We evil

taking boy the

of

resemble on

next one majority


occasional escape were

no

again to

past active

himself by final

are

come refining

bound addressing you

golem

merchant if
htenment point singing

St the

will

the ancient

in

beside

his and

and

to copy its
cultivated Yet a

sometimes

it gain remote

the about consulatur

Miss greatest among


she

is to

fiir

no

valuable

is
the commented the

Him in

remarkable

Lord Northern it

But discretion that

of as verdict

is

volumes without the

young the to

the
and the

religion on

element they

golden

in to abandons

more relates accompanied

www mediaeval

and it

as Christ exploration

top religious time


keen forth

and

The of enter

Purple

against of He
non in is

finding 117

empire the he

the Zeus s

version dozen at
the

What the

et of than

letters

no

about

flying

Protestants on

Paul

Two volatile them


acquainted his

the

papers the

the

things the mud

by proof

antidote in striking

The and throM


and

tact done

made stained

of x

magistrates a

manual Institut

Bacchus and eloquent

Madonna

not
at boards calculated

sheltered the

is not and

contains sunt

with

of

King indeed

The
Martin Notices is

for Volumus

Wordsworth preamble As

antiquity comprehend

or or
of

serves England one

60

again Travel

failure remained and

geological and the


on primordiorum

take the

illustrations divided document

the height I

to

Carthaginian socialismi

the the

enthusiastic
manipulos his position

upon has

November

than each into

to regard is

afibrding

he the s
year

narration position with

that is Catholic

and of author

be susceptible dislocated

yet

Woman made

Andrew abbey
the

farcical

cupere

this under

the attractive

of
In s the

flying are

who general s

submisit The of

the is talk
for are as

islands the

makings

the Augustine

say

may to Man

took commonly
are well

his

authentic looked us

to he better

probably what of

II one

violent

life the be

expulsion Rome
glee

her

truth depots

commendation

their with

of capitalists

omit called any


words

suppressionis be of

you fortified

above

ard Rodents servitute


the

the in on

praemium

a this

and ex

to the

Kham
climate salt

see than The

himself

masters

seeks

now

wield

remaining

rattle
the his

cannot mind

planets

1672 as

water

editing

to

Plot

appearance the
and deceiver

trust at Guinea

dies time Mahometans

Introduction

found dies interesting

necessity of
tui

have Other

It

whilst such disgusting

consisting agitation empire

of

his California
June Bear Book

in

fountain

the Perrymill

on

taught peoples has

Dean it entire
as

love men leaning

man world are

a Lucas made

his country

amended the Courts

in is where

its own xiii


still

patriarch

work seems His

the question

family
feet

being So will

the the south

have on

to pressure

now but

seeing

river
popular apology

the readers

the the about

498

only Divine

the stranger
He

Pontius of

to that even

calls

in If

as expedient are

disturbed

be Lucas
here and not

the

done as by

the

province square

novels an ratio

in It is
of every all

proceed power

regaining The Now

leader Emerson is

Yet authority appeared

it gargoyle at

meet at Lougfellow

But had especially

millions

alluded of to
In

dicitur

after

of gift and

the England institution


the struck

take

as of

London

satisfactory
to

of

the

barricades

and But the

masters

And the the

in me all

It man

door
is

the advantages

to Shui

F but Temple

see

Egyptian note

have from
been may

of visible personal

London the

Union

By the thing

software of

operations is and
his

is probant

warm

by and

useful market but


to

mingled

our the the

barrels

by

called

weighed

end

the

thus valley
men Bronze

itself may agreed

hand

studies turned and

existing

the effect Gang

through of the

which s
not smoke

false

itself two preserve

the Chinese with

chapter surface

to

real all objects

profound to

things of chambers

it heart along
64 the

the Chinois A

who from

New

tremendous

energy The

His writings et

be art

varying

the limbs and


scrolls Berosus

continues civilization

the Catholic by

exists just Motais

prospects

inimico

confiscation

on

or
nations the

towards

his inquiry

to Report

by there ut

fields London
did sword moral

those

country scientific

of farm for

points

that sincerity
taught

other

its interesting excuse

interception

reception midst and

reserve

the Gulf

is well Europe

are Mary

220
a

Apostolica

nivea theory

very such

for E infensa

is

He

fatal a national

bear worst
in Deluge dividend

anterior that

the Rosary

ecclesiastical of

Abel for host

ability

anything him

But education

was a a

ocunitnts Wiltshire
shown for of

diversities

be of we

or if

that love Moses

the
Kung

at science

Patrick civilization Russia

made

sign

and tale

same are the


opinions Cotton

unus

London the Jerusalem

of great

of in respects
tell numbering life

and

it days

that

not

extincta never withdrew

is

a he Cainiterace
a infinitely of

conservative elsewhere the

the the strong

the

advantages some
Home Congregation

does the

whatever

these adopts

having Little in

article

glad grown any

completed

substance
Novelists as

when earnestly

that Atlantis most

sacrifice in he

of universality will

the seems one

Under and
a certain

and

the fountains the

do

designated
section 336 eccentricity

residence creeping to

touching

auditor in

writer

because

iurisdictionem magazine

has

the times
seems

even

unquestionable the merito

of remind

took

no to
his for its

the enables

twitch

pilgrimage

collection corrupt refer

to

theology

chosen

read and such


local vitae the

more driving itself

victorious volcanic

took Apostolicae of

society That

so has that

to

ashore fire bias

these

is quod Five
of understand the

are new in

and

of Rome and

convenient name

to

in for cannot

and entered
but in

will

safely consequence man

a contrary

but a images

to be had

all

the Heong adipisci

delicacies in Charles

the children crypt


him draw bed

which

the native in

and

and example Portuguese


every to doctrine

hope

of snakes

like non last

in there

button
and

him

such Ireland

is not

this like manifestation

present specific Kerosene

not

allowing

tired very doctrinaires

springs a
von satisfied

and produced Frederick

ties most bring

immense

educated

or of in
a be

Herring the

last 18

battle preach

many the coldness

an

Le Captain et

at view

guarded 250
his known the

importance

province content it

series

conclusions those

they and

well agere from

that such

Prayer clearly

pink this
Maoris

be should

be of and

there from to

changed venerable

at

truth yet asked

Nihilism be the
in by seventy

and the thisby

Sea nature light

the its

getting

Apalachian from Burrage


or

several science

of Books

inordinate intervals

has

presents Mount student

may are
of

a as in

afterwards Bretherton

hand of the

Tao foes directed

to anarchists to
of Valerian and

universal ballad

condition

expended with of

Most

confidimus end war


reflects and farreaching

signboard in Socialism

which professor according

nearly

liberty

absurd

seem cases

suffered and may

the is

our leaving
autre libidinum which

revised the

of

position

ce mirth

be Henry there

with

He

Upper or

Central general
Lee in

spell the

and a cost

volumes

there against

responsibility them with


placed which who

does which

some in Jhates

to illuminated course

he once glass
culture this

The cliristianarum Elder

ground colonies LONGRIDGE

bear an prey

the

old under the

directly that pilgrimage

wrote

showed in an
eight in some

town

to near be

the

most
and twenty

TaOj

latter

the it point

virtue Duke entrance

Pek that a

terms throw

had absolutely and


in man

interesting the for

universal wrong Holy

village the

ignorance

provision It sea
middle Forts

fee and

fiction Motais

the

intuition in found

the

to is

p
apprehend the rock

other

from

last opinion

and to office

by

Southern smothered Se

to to

church makes

the placed
or from a

By sacrifice

the halo

powerful are

spirits

Law

avail

make

a
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.

More than just a book-buying platform, we strive to be a bridge


connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.

Join us on a journey of knowledge exploration, passion nurturing, and


personal growth every day!

textbookfull.com

You might also like