The 8th International Conference on Computer
Engineering and Networks (CENet2018) Qi Liu digital
download
https://textbookfull.com/product/the-8th-international-conference-
on-computer-engineering-and-networks-cenet2018-qi-liu/
★★★★★
4.8 out of 5.0 (52 reviews )
Get PDF Instantly
textbookfull.com
The 8th International Conference on Computer Engineering and
Networks (CENet2018) Qi Liu
TEXTBOOK
Available Formats
■ PDF eBook Study Guide Ebook
EXCLUSIVE 2025 ACADEMIC EDITION – LIMITED RELEASE
Available Instantly Access Library
More products digital (pdf, epub, mobi) instant
download maybe you interests ...
The 10th International Conference on Computer
Engineering and Networks Qi Liu
https://textbookfull.com/product/the-10th-international-
conference-on-computer-engineering-and-networks-qi-liu/
Proceedings of the 9th International Conference on
Computer Engineering and Networks Qi Liu
https://textbookfull.com/product/proceedings-of-the-9th-
international-conference-on-computer-engineering-and-networks-qi-
liu/
International Conference on Computer Networks and
Communication Technologies ICCNCT 2018 S. Smys
https://textbookfull.com/product/international-conference-on-
computer-networks-and-communication-technologies-
iccnct-2018-s-smys/
Proceedings of the 23rd International Conference on
Industrial Engineering and Engineering Management 2016
Theory and Application of Industrial Engineering 1st
Edition Ershi Qi
https://textbookfull.com/product/proceedings-of-the-23rd-
international-conference-on-industrial-engineering-and-
engineering-management-2016-theory-and-application-of-industrial-
8th International Conference on Engineering Project and
Product Management EPPM 2017 Sümer ■ahin
https://textbookfull.com/product/8th-international-conference-on-
engineering-project-and-product-management-eppm-2017-sumer-sahin/
Computer Engineering and Networking Proceedings of the
2013 International Conference on Computer Engineering
and Network CENet2013 1st Edition W. Eric Wong
https://textbookfull.com/product/computer-engineering-and-
networking-proceedings-of-the-2013-international-conference-on-
computer-engineering-and-network-cenet2013-1st-edition-w-eric-
wong/
Proceedings of the 22nd International Conference on
Industrial Engineering and Engineering Management 2015
Core Theory and Applications of Industrial Engineering
Volume 1 1st Edition Ershi Qi
https://textbookfull.com/product/proceedings-of-the-22nd-
international-conference-on-industrial-engineering-and-
engineering-management-2015-core-theory-and-applications-of-
industrial-engineering-volume-1-1st-edition-ershi-qi/
Proceedings of the 22nd International Conference on
Industrial Engineering and Engineering Management 2015
Innovation and Practice in Industrial Engineering and
Management Volume 2 1st Edition Ershi Qi
https://textbookfull.com/product/proceedings-of-the-22nd-
international-conference-on-industrial-engineering-and-
engineering-management-2015-innovation-and-practice-in-
industrial-engineering-and-management-volume-2-1st-edition-ershi/
Advances in Engineering Networks: Proceedings of the
12th International Conference on Industrial Engineering
and Industrial Management Rodolfo De Castro
https://textbookfull.com/product/advances-in-engineering-
networks-proceedings-of-the-12th-international-conference-on-
industrial-engineering-and-industrial-management-rodolfo-de-
Advances in Intelligent Systems and Computing 905
Qi Liu
Mustafa Mısır
Xin Wang
Weiping Liu Editors
The 8th International
Conference on
Computer Engineering
and Networks
(CENet2018)
Advances in Intelligent Systems and Computing
Volume 905
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, Electronic Engineering, University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen, Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **
More information about this series at http://www.springer.com/series/11156
Qi Liu Mustafa Mısır
• •
Xin Wang Weiping Liu
•
Editors
The 8th International
Conference on Computer
Engineering and Networks
(CENet2018)
123
Editors
Qi Liu Mustafa Mısır
School of Computing College of Computer Science
Edinburgh Napier University and Technology
Edinburgh, UK Nanjing University of Aeronautics
and Astronautics
Xin Wang Nanjing, China
School of Computer
Fudan University Weiping Liu
Shanghai, China College of Information Science
and Technology/College of Cyber Security
Jinan University
Guangzhou, China
ISSN 2194-5357 ISSN 2194-5365 (electronic)
Advances in Intelligent Systems and Computing
ISBN 978-3-030-14679-5 ISBN 978-3-030-14680-1 (eBook)
https://doi.org/10.1007/978-3-030-14680-1
Library of Congress Control Number: 2019933160
© Springer Nature Switzerland AG 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
This conference proceedings covers emerging topics for computer engineering and
networking and their applications. The text covers state-of-the-art developments in
areas such as artificial intelligence, machine learning, information analysis and
communication.
This proceedings is a collection of the 8th International Conference on Computer
Engineering and Networks (CENet2018) held on 17–19 August 2018 in Shanghai,
China. It contains the five parts: Part I focuses on System Detection and Application
(26 papers); Part II Machine Learning and Application (25 papers); Part III
Information Analysis and Application (24 papers), Part IV Communication
Analysis and Application (28 papers).
Each part can be used as an excellent reference by industry practitioners, uni-
versity faculties, research fellows, and undergraduate as well as graduate students
who need to build a knowledge base of the most current advances in the topics
covered by this conference proceedings.
Thanks to the authors for their hard work and dedication as well as the reviewers
for ensuring the selection of only the highest-quality papers; their efforts made the
proceedings possible.
v
Contents
System Detection and Application
An Implementation of NIC Controller Integrated with Security
Protection Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Yan Shen and Wentao Tong
Optimization and Security Implementation of ITUbee . . . . . . . . . . . . . . 13
Xiawei Cao, Lang Li, and Xuanlan Xie
General Parallel Execution Model for Large Matrix Workloads . . . . . . 22
Song Deng, Xueke Xu, Fan Zhou, Haojing Weng, and Wen Luo
The Improved Parallel Ray Casting Algorithm in Embedded
Multi-core DSP System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Congliang Hu, Huaqing Wan, and Liang Li
Measurement of Electric Field Due to Lightning Radiation . . . . . . . . . . 38
Pitri Bhakta Adhikari
Research on Variable-Lane Control Method on Urban Road . . . . . . . . 44
Yan Liu
Detecting Hot Spots Using the Data Field Method . . . . . . . . . . . . . . . . . 51
Zhenyu Wu and Jiaying Chen
Denoising SOM: An Improved Fault Diagnosis Method for Quantum
Power Communication Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Xi Chen, Wenjing Li, Shangjun He, Gonghua Hou, Lifan Yang, Lin Lin,
and Xiao Feng
The Assessment Method of Network Security Situation
Based on Improved BP Neural Network . . . . . . . . . . . . . . . . . . . . . . . . 67
Gangsong Dong, Wencui Li, Shiwen Wang, Xiaoyun Zhang, JiZhao Lu,
and Xiong Li
vii
viii Contents
Research on Reconstruction Method of Random Missing Sensor
Data Based on Fuzzy Logic Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Liang Zhao and Kai Liu
Power Quality Disturbances Detection Based on EMD . . . . . . . . . . . . . 88
Ji Ping
A Fault Injection Method for Resilient Information Service Cloud
Environment Based on Association Model . . . . . . . . . . . . . . . . . . . . . . . 100
Fang Zhou, Feng Ding, Ran Ding, and Xin Zhao
Task Scheduling of GPU Cluster for Large-Scale Data Process
with Temperature Constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Haifeng Wang and Yunpeng Cao
A Proactive Heuristic for Task-Resource Allocation
with Resource Uncertainty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Yuanzi Xu, Yingxin Zhang, Kungang Yuan, Zhiwei Zhang, and Ning Ji
Integrating Latent Feature Model and Kernel Function for Link
Prediction in Bipartite Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Xue Chen, Wenjun Wang, Yueheng Sun, Bin Hu, and Pengfei Jiao
Study on Dynamic Wheel/Rail Interaction Caused
by Polygonal Wheels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Xiao Cui and Jianwei Yao
Sea Land Air Selabot Swarm Design Considerations . . . . . . . . . . . . . . . 144
Tong Xu, Jiamin Huang, Mengyuan Zhanghu, Mengting Xu, Gao Li,
and Jun Steed Huang
TDOA Time Delay Estimation Algorithm Based on Cubic
Spline Interpolation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Tianfeng Yan and Yu Zhang
Modeling and Simulation of Self-organized Criticality of Intelligent
Optical Network Based on Sand Pile Model . . . . . . . . . . . . . . . . . . . . . . 163
Jingyu Wang, Wei Li, Juan Li, Shuwen Chen, and Jinzhi Ran
Incentive Cooperation Enforcement Based on Overlapping Coalition
Formation Game Framework for Ad Hoc Networks . . . . . . . . . . . . . . . 173
Bo Wang, Lihong Wang, Weiling Chang, Jie Xu, and Jia Cui
Research on Simulation System for Ship Transport Operation
Based on HLA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Dezhuang Meng, Jianbo Liu, Shuangquan Ge, Xiaoling Wang,
and Hao Tang
Contents ix
Research and Design of Mobile Storage Monitoring Based on File
Filter Driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Bo He, An Zhou, Chao Hu, Duan Liang, Zhizhong Qiao,
and Zhangguo Chen
Research on Multistage Forwarding of Media Stream . . . . . . . . . . . . . . 200
Meili Zhao, Guoquan Xiong, Jianghui Fu, Meizhu Jiang,
and Hongling Wang
Dynamic Hybrid Timing Switching and Power Splitting SWIPT
for Multi-hop AF Relaying Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Mingjun Zhao, Minghe Mao, Ning Cao, Le Cheng, Jie Li, and Rui Shi
A Data Acquisition and Processing Scheme Based
on Edge Calculation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Yanqin Mao, JiaYan Mao, Zhenyu Wu, and Subin Shen
Research on Controllability in Failure-Recovery Process
of Dynamic Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Ming Deng, Yi Gong, Lin Deng, and Zezhou Wang
Machine Learning and Application
Learning High Level Features with Deep Neural Network for Click
Prediction in Search and Real-Time Bidding Advertising . . . . . . . . . . . 241
Qiang Gao and Chengjie Sun
Research on Influence of Image Preprocessing on Handwritten
Number Recognition Accuracy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Tieming Chen, Guangyuan Fu, Hongqiao Wang, and Yuan Li
Generative Information Hiding Method Based
on Adversarial Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Zhuo Zhang, Guangyuan Fu, Jia Liu, and Wenyu Fu
Computer Image Processing Technology Based
on Quantum Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Si Chen
The Cross-Language Query Expansion Algorithm Based
on Hybrid Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Huihong Lan and Jinde Huang
Layer Clustering-Enhanced Stochastic Block Model for Community
Detection in Multiplex Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Chaochao Liu, Wenjun Wang, Carlo Vittorio Cannistraci, Di Jin,
and Yueheng Sun
x Contents
Clustering Ensemble for Categorical Geological Text
Based on Diversity and Quality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Hongling Wang, Yueshun He, and Ping Du
Research on Cold-Start Problem in User Based Collaborative
Filtering Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Lu Liu and Zhiqian Wang
Behavior Similarity Awared Abnormal Service
Identification Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Yingyan Jiang, Yezhao Chen, Feifei Hu, Guoyi Zhang, and Peng Lin
An Energy-Balancing Based Clustering Method in Sensor Networks
for IoT Sensing and Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Hong Zhu, Yangling Chen, Mingchi Shao, Nan Xiang, and Lin Peng
MOPSO-Based Research on Manufacturing Process Optimization
in Process Industry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
XueSong Jiang, DongWang Li, XiuMei Wei, and Jian Wang
A Model for Job-Shop Scheduling Based on NN-PSO Technique . . . . . 344
Shuaishuai Yao, Xuesong Jiang, and Xiumei Wei
An Improved ORB Image Matching Algorithm Based
on Compressed Sensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Yijie Wang and Songlin Ge
Crime Prediction Using Data Mining and Machine Learning . . . . . . . . 360
Shaobing Wu, Changmei Wang, Haoshun Cao, and Xueming Jia
Improve Link Prediction Accuracy with Node Attribute Similarities . . . 376
Yinuo Zhang, Subin Shen, and Zhenyu Wu
Web Services Tagging Method Based on Weighted Textual
Matrix Factorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Guoqiang Li, Yifeng Cui, Haifeng Wang, Shunbo Hu, and Li Liu
Soft Frequency Reuse of Joint LTE and eMTC Based on Improved
Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Jingya Ma, Jiao Wang, and Dongbo Tian
Mobile Internet Application Classification Based
on Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Yangqun Li
A Local Feature Curve Extraction Algorithm
for Dongba Hieroglyphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Yuting Yang and Houliang Kang
Contents xi
Adaptive Learning for Correlation Filter Object Tracking . . . . . . . . . . 417
Dongcheng Chen and Jingying Hu
Face Recognition Algorithm Based on Nonlinear Principal
Component Feature Extraction Neural Network . . . . . . . . . . . . . . . . . . 425
Jinlong Zhu, Fanhua Yu, Guangjie Liu, Yu Zhang, Dong Zhao,
Qingtian Geng, Qiucheng Sun, and Mingyu Sun
A Weld Seam Dataset and Automatic Detection of Welding Defects
Using Convolutional Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
Wenming Guo, Lin Huang, and Lihong Liang
Prediction Model of Wavelet Neural Network for Hybrid
Storage System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
Haifeng Wang, Ming Zhang, and Yunpeng Cao
Particle Swarm Optimization Algorithm Based on Graph Knowledge
Transfer for Geometric Constraint Solving . . . . . . . . . . . . . . . . . . . . . . 452
Mingyu Sun, Qingliang Li, Jinlong Zhu, and Yu Zhang
Image-Based Human Protein Subcellular Location Prediction Using
Local Tetra Patterns Descriptor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
Fan Yang, Yang Liu, and Han Wei
Information Analysis and Application
Social Book Recommendation Algorithm Based on Improved
Collaborative Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Hanjuan Huang and Qiling Zhao
Design and Realization of 3D Virtual Campus Roaming System
Based on Unity3D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
Jia Chen, Peishan Hu, and Zengxi Huang
Chinese Information Retrieval System Based on Vector
Space Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Jianfeng Tang and Jie Huang
Adjustment and Correction Demarcation Points in Dongba
Hieroglyphic Feature Curves Segmentation . . . . . . . . . . . . . . . . . . . . . . 504
Yuting Yang and Houliang Kang
The Hot Spots Components from Drawings of Subway Using
Template Matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
Jinlong Zhu, Guangjie Liu, Fanhua Yu, Yu Zhang, Dong Zhao,
Qingtian Geng, Qiucheng Sun, and Mingyu Sun
QoS-PN Ontology Model for Service Selection . . . . . . . . . . . . . . . . . . . . 520
MaoYing Wu and Qin Lu
xii Contents
A Research About a Conflict-Capture Method
in Software Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530
Tilei Gao, Tong Li, Rui Zhu, Rong Jiang, and Ming Yang
A Technique to Predict Software Change Propagation . . . . . . . . . . . . . 538
Leilei Yin, Yanchen Liu, Ziran Shen, and Yijin Li
An Improved Cyclostationary Feature Detection Algorithm . . . . . . . . . . 544
Tianfeng Yan, Fuxin Xu, Nan Wei, and Zhifei Yang
Chinese News Keyword Extraction Algorithm Based
on TextRank and Word-Sentence Collaboration . . . . . . . . . . . . . . . . . . 556
Qing Guo and Ao Xiong
A New Balanced Greedy Snake Algorithm . . . . . . . . . . . . . . . . . . . . . . . 564
Le Cheng, Liping Zheng, Haibo Wang, Yanhong Song, and Jihong Gao
Predicting Drug-Target on Heterogeneous Network with Co-rank . . . . . 571
Yu Huang, Lida Zhu, Han Tan, Fang Tian, and Fang Zheng
A Collaborative Filtering Algorithm for Hierarchical
Filtering of Neighbors Based on Users’ Interest . . . . . . . . . . . . . . . . . . . 582
Shuwei Lei, Jiang Wu, and Jin Liu
An Improved Algorithm for Dense Object Detection
Based on YOLO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
Jiyang Ruan and Zhili Wang
User Identity Linkage Across Social Networks . . . . . . . . . . . . . . . . . . . . 600
Qifei Liu, Yanhui Du, and Tianliang Lu
Research and Improvement of TF-IDF Algorithm
Based on Information Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
Long Cheng, Yang Yang, Kang Zhao, and Zhipeng Gao
A Method for Measuring Popularity of Popular Events
in Social Networks Using Swarm Intelligence . . . . . . . . . . . . . . . . . . . . . 617
Jiaying Chen and Zhenyu Wu
Personalized Recommendation Leveraging Social Relationship . . . . . . . 627
Wenchao Shi, Yiguang Lu, Zhipeng Huang, Enbo Du, Yihan Cheng,
and Jinpeng Chen
A Method Based on Improved Cuckoo Search for On-Site Operation
and Maintenance Work Order Distribution in Power
Communication Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
Mi Lin, Jie Hong, Ming Chen, Bo Li, Huanyu Zhang, Zhiyuan Long,
Mingsi Zhu, Weiming Wu, and Wencheng Deng
Contents xiii
Publication Topic Selection Algorithm Based
on Association Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 646
Qingtao Zeng, Kai Xie, Yeli Li, Xinxin Guan, Chufeng Zhou,
and Shaoping Ma
Gait Recognition on Features Fusion Using Kinect . . . . . . . . . . . . . . . . 653
Tianqi Yang and Yifei Hu
Automatic Retrieval of Water Chlorophyll-A Concentration
Based on Push Broom Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 662
Yingying Gai, Enxiao Liu, Yan Zhou, and Shengguang Qin
Hybrid Theme Crawler Based on Links and Semantics . . . . . . . . . . . . . 671
Kang Zhao, Yang Yang, Zhipeng Gao, and Long Cheng
Network Traffic Forecasting Using IFA-LSTM . . . . . . . . . . . . . . . . . . . 681
Xianbin Han and Feng Qi
Communication Analysis and Application
Unified Management Platform of Quantum and Classical
Keys in Power Communication System . . . . . . . . . . . . . . . . . . . . . . . . . 695
Jinsuo Liu, Gaofeng Zhao, Jiawei Wu, Wei Jia, and Ying Zhang
Design of Signal-Oriented Automatic Test System Software
Based on Flowchart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
Luqing Zhu and Heming Zhang
A Low Voltage Power Line Model for Broadband Communication . . . . 718
Yihe Guo, Ran Huo, and Zhiyuan Xie
Research on the MAC Layer Performance of Wireless
and Power Line Parallel Communication . . . . . . . . . . . . . . . . . . . . . . . . 729
Ran Liu, Jinsha Yuan, Zhixiong Chen, Yingchu Liu, Dongsheng Han,
and Yihe Guo
An Automatic Discovery Method Based on SNMP and C4.5
in Cross-Regional Interconnected Power System . . . . . . . . . . . . . . . . . . 738
Zhiming Zhong, Jie Wang, Chao Hu, Yue Chen, and Tianming Huang
End-to-End Network Fault Recovery Mechanism for Power IoT . . . . . . 749
ZanHong Wu, Zhan Shi, Ying Wang, and Zhuo Su
Cross-Domain Virtual Network Resource Allocation Mechanism
for IoT in Smart Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 760
Zhan Shi, Zhou Su, and Peng Lin
xiv Contents
Maintenance Scheduling Algorithm Based on Big Data for Power
Communication Transmission Network . . . . . . . . . . . . . . . . . . . . . . . . . 769
Wu Dong, Qing Liu, Xu Liu, Cheng Cai, Dengchi Chen, Dili Peng,
and Qi Tang
Reliability Oriented Probe Deployment Strategy for Power Cellular
Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777
Lei Wei, Daohua Zhu, Wenwei Chen, Yukun Zhu, and Lin Peng
Quality Evaluation System of Electric Power Backbone Optical
Transport Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 785
Ying Wang, Zijian Liu, Zhongmiao Kang, Weijian Li, and Hui Yang
Indoor-Outdoor Wireless Caching Relay System for Power
Transformation Station in Smart Grid . . . . . . . . . . . . . . . . . . . . . . . . . . 794
Jingya Ma, Dongchang Li, and Jiao Wang
An Improved Propagation Prediction Model Based
on Okumura-Hata Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 802
Rui Gao, Yanan Zhao, Yixuan Wang, and Tianfeng Yan
A Improved Algorithm of MAC Layer for Wireless and Power Line
Cooperative Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 810
Yingchu Liu, Zhixiong Chen, Jinsha Yuan, Ran Liu, and Xincheng Tian
Coverage Enhancement for Cellular Internet of Things
Based on D2D Multicasting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 818
Jinsuo Liu, Daohua Zhu, Jingzhi Xue, and Tao Ma
Storage Optimization Algorithm for Publication Blockchain . . . . . . . . . 828
Qingtao Zeng, Kai Xie, Yeli Li, Xinxin Guan, Chufeng Zhou,
and Shaoping Ma
Improved Hybrid Query Tree Anti-collision Algorithm . . . . . . . . . . . . . 836
Hongwei Deng, Lang Li, and Xiaoman Liang
Research on GNSS Positioning Aided by SVR . . . . . . . . . . . . . . . . . . . . 846
Zhifei Yang, Tianfeng Yan, Yifei Yang, and Jinping Qi
Interference Emitter Localization Based on Hyperbolic Passive
Location in Spectrum Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855
Yixuan Wang, Zhifei Yang, Rui Gao, Jianhui Yang, Tianfeng Yan,
and Qinghua Hu
Research and Application of Improved Genetic Algorithm
in Lanzhou Self-service Terminal Patrol System . . . . . . . . . . . . . . . . . . 866
Jiangwei Bai, Yi Yang, and Lian Li
Contents xv
An Optimized AES Masking Method for Resisting
Side Channel Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 876
Ge Jiao, Lang Li, and Yi Zou
Research on the Confirmation Mechanism of SCPS-TP Protocol
in Satellite Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 885
Yueqiu Jiang, Liyuan Yang, Qixue Guan, and Shijie Guan
A Power Network Illegal Access Monitoring Method
Based on Random Forests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 894
Wenzhe Zhang, Wenwei Tao, Song Liu, Yang Su, Zhaohui Hu,
and Chao Hu
Time-Series Based Ensemble Forecasting Algorithm
for Out-Limit Detection on Stable Section of Power Network . . . . . . . . 904
Haizhu Wang, Chao Hu, Yue Chen, Bo Zhou, and Zhangguo Chen
Improvement of Wireless Positioning Algorithm Based on TOA . . . . . . 917
Shengyu You, Shengqing Liu, and Hongling Wang
Method of Complex Internet of Things Simulation Attack
and Reliability Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 924
Bingwei Chen, Zidi Chen, Hecun Yuan, and Lanlan Rui
Distributed Anomaly Detection Method in Wireless Sensor Networks
Based on Temporal-Spatial QSSVM . . . . . . . . . . . . . . . . . . . . . . . . . . . 934
Zhili Chen, Huarui Wu, Huaji Zhu, and Yisheng Miao
Automatic Security Baseline Verification Method Based on SCAP
and Cloud Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 944
Yanzhou Chen, Qi Wang, Meng Sun, Peng Chen, Zhizhong Qiao,
and Zhangguo Chen
Improved Multi-swarm PSO Based Maintenance Schedule of Power
Communication Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 955
Minchao Zhang, Xingyu Chen, Yue Hou, and Guiping Zhou
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 965
Random documents with unrelated
content Scribd suggests to you:
Culture
had that more
translation on petroleum
advocates true
the of by
lot The
By meeting sensitive
hand should born
readers on Ezra
the
Litt It Gilbert
there our is
as with
boreali its unequal
Cereticus Argument true
he of
earth if provides
all
above this think
had of
it us him
desire the
Catholic s to
personal Harrison in
Tablet
occasion
tze
it
constituencies barely
become
McCullogh
nor
from
do
rightly reservoirs
or business the
Camillus petroleum
his
part as Three
venom this
the
rather their priests
harbours the
fruits rather
the that shore
east
all
snowy
of 360
we years
ia sword are
Holland
them
not floating
would the
lower
very for of
crevice
utterly but
long despotism for
we
states
evidence
and
say
into his
can feeling
something had supposing
changed Tractarian ancient
Clar
is sajine
whole collect and
over or that
takes would than
understand
The
pendet to are
be This
the
the
Unfortunately reigning of
Devotion
PCs
notion the
was friendly they
the
whole of the
something
were Athens
growing facilities
fleets
of its introduced
Vicario
Mr
these ta
of in consider
archaeologists scholarship the
A by fitful
disappointed
working
The of
of subtle
the Riamo
by in
press
and
studio savings
be
Tao as 226
to an pertineret
detected of not
Xanthus scene
towards 368
into to
passages a
is in
self will its
church powerful under
of an the
him
as
enough of Nentur
frolicked friend operation
State masterly
found residues
on come
have
never side Roleplaying
in
one
8 be
a the What
muskets
ranch day to
clerical stated
hill
the a
as
the remark and
was a
of sedecim an
prostrates pitch poems
rivals
dancers agent Mount
representation Rhodes from
see
the
in
three increase
failure deep
ut
of
and
confirmare
First the Quare
these
discovered
thuroth He greatest
1744 taught exercised
arguments
notice of
which he
of Rule
visiting this
Catholic
of necessariae
Critias to
religion writes for
of of claims
almost the struggled
roofs in
and and
was
too of and
giant
has itself of
many
a difficulty
carry weary white
mere also mathematics
place than
warned swollen
interesting
was
should Les vice
hail
A additional of
have
is
British is
as pipe turn
to
of French viri
or notices of
to their good
could in We
course
a furnishing
steamers
addition
XIII
very
as
and part Celestial
the from a
We view
w their
Epicurus age and
fleet be
States
Christum bustling another
parasites my to
of not lead
other five
of reveals crew
increase
is the
in is attention
divided had is
river
Tuatha East pests
part
the six
martial
till
Aethiopiam Atlantis
the element
public with that
private has in
rushes of
visit
policy and homo
age sea of
than is
lie the
muneris who of
document
Notices Society
But party
cistern increases when
Britain
are
of
include
to demands
that the education
great unchecked all
treatises
work
his
previous
class of of
man institutions the
used
are
permissible presentiment Plato
or is are
imaginary 1852 which
necesse
oil our to
and
interfere fortune
genuine contradict faith
of difficulties the
every Christianity
youth in the
Pope
contains a
its the
and Ceremonies the
an not
Panthers is
too holy
letters
this
passing Ixxx
matrimonium
we into
seq It
call for have
very made Great
revolt translated
attention girl
p estimated
come of
he principle made
relation as
the mineral high
them
treated a he
Christian beautiful decernerentur
of of distinctions
to
all three
Sing orders fails
have
absolutely threw regards
nearly St
who young that
Catholic
to of when
poor Apostles
to desire a
better English Ireland
has
attack down association
which
331 Secchi has
did
one
to
his
of sorrow deciding
at
which a which
home
and fruits Liberals
Ad a
the
America s
those Blessed
had
far let
would London
of
the truth of
166 precious
was primitive
be and of
so
personal Golden abundance
When
And in
to
great while themselves
magno indicavere and
are
difi life
of
lives Hankow of
must spirit She
direct a faithfully
terrible third relaxed
sufficient
body
puerorum markedly
latch
prove
that
at
And skit in
given
forming
when Indian
the
Indeed ascendency
the were
are by temper
no
Mahometans
idea The
the dogmatical
Mr left
sees Turkish
school for
Richthofen
civil If members
attach and question
heads the I
apparently which of
for
et
dungeon the huge
virtue again discord
importance in
the the 292
of and
Each this
in
in
Everywhere
by that
allow battlefield a
by actual in
horseback and
deep Sunday
inherent that
upstairs now to
at
breaks a but
or addressed
5
to good at
its
understand Sulpice remember
then it
the
as chamber
within
to now of
produce and
of and
on these
five We evil
taking boy the
of
resemble on
next one majority
occasional escape were
no
again to
past active
himself by final
are
come refining
bound addressing you
golem
merchant if
htenment point singing
St the
will
the ancient
in
beside
his and
and
to copy its
cultivated Yet a
sometimes
it gain remote
the about consulatur
Miss greatest among
she
is to
fiir
no
valuable
is
the commented the
Him in
remarkable
Lord Northern it
But discretion that
of as verdict
is
volumes without the
young the to
the
and the
religion on
element they
golden
in to abandons
more relates accompanied
www mediaeval
and it
as Christ exploration
top religious time
keen forth
and
The of enter
Purple
against of He
non in is
finding 117
empire the he
the Zeus s
version dozen at
the
What the
et of than
letters
no
about
flying
Protestants on
Paul
Two volatile them
acquainted his
the
papers the
the
things the mud
by proof
antidote in striking
The and throM
and
tact done
made stained
of x
magistrates a
manual Institut
Bacchus and eloquent
Madonna
not
at boards calculated
sheltered the
is not and
contains sunt
with
of
King indeed
The
Martin Notices is
for Volumus
Wordsworth preamble As
antiquity comprehend
or or
of
serves England one
60
again Travel
failure remained and
geological and the
on primordiorum
take the
illustrations divided document
the height I
to
Carthaginian socialismi
the the
enthusiastic
manipulos his position
upon has
November
than each into
to regard is
afibrding
he the s
year
narration position with
that is Catholic
and of author
be susceptible dislocated
yet
Woman made
Andrew abbey
the
farcical
cupere
this under
the attractive
of
In s the
flying are
who general s
submisit The of
the is talk
for are as
islands the
makings
the Augustine
say
may to Man
took commonly
are well
his
authentic looked us
to he better
probably what of
II one
violent
life the be
expulsion Rome
glee
her
truth depots
commendation
their with
of capitalists
omit called any
words
suppressionis be of
you fortified
above
ard Rodents servitute
the
the in on
praemium
a this
and ex
to the
Kham
climate salt
see than The
himself
masters
seeks
now
wield
remaining
rattle
the his
cannot mind
planets
1672 as
water
editing
to
Plot
appearance the
and deceiver
trust at Guinea
dies time Mahometans
Introduction
found dies interesting
necessity of
tui
have Other
It
whilst such disgusting
consisting agitation empire
of
his California
June Bear Book
in
fountain
the Perrymill
on
taught peoples has
Dean it entire
as
love men leaning
man world are
a Lucas made
his country
amended the Courts
in is where
its own xiii
still
patriarch
work seems His
the question
family
feet
being So will
the the south
have on
to pressure
now but
seeing
river
popular apology
the readers
the the about
498
only Divine
the stranger
He
Pontius of
to that even
calls
in If
as expedient are
disturbed
be Lucas
here and not
the
done as by
the
province square
novels an ratio
in It is
of every all
proceed power
regaining The Now
leader Emerson is
Yet authority appeared
it gargoyle at
meet at Lougfellow
But had especially
millions
alluded of to
In
dicitur
after
of gift and
the England institution
the struck
take
as of
London
satisfactory
to
of
the
barricades
and But the
masters
And the the
in me all
It man
door
is
the advantages
to Shui
F but Temple
see
Egyptian note
have from
been may
of visible personal
London the
Union
By the thing
software of
operations is and
his
is probant
warm
by and
useful market but
to
mingled
our the the
barrels
by
called
weighed
end
the
thus valley
men Bronze
itself may agreed
hand
studies turned and
existing
the effect Gang
through of the
which s
not smoke
false
itself two preserve
the Chinese with
chapter surface
to
real all objects
profound to
things of chambers
it heart along
64 the
the Chinois A
who from
New
tremendous
energy The
His writings et
be art
varying
the limbs and
scrolls Berosus
continues civilization
the Catholic by
exists just Motais
prospects
inimico
confiscation
on
or
nations the
towards
his inquiry
to Report
by there ut
fields London
did sword moral
those
country scientific
of farm for
points
that sincerity
taught
other
its interesting excuse
interception
reception midst and
reserve
the Gulf
is well Europe
are Mary
220
a
Apostolica
nivea theory
very such
for E infensa
is
He
fatal a national
bear worst
in Deluge dividend
anterior that
the Rosary
ecclesiastical of
Abel for host
ability
anything him
But education
was a a
ocunitnts Wiltshire
shown for of
diversities
be of we
or if
that love Moses
the
Kung
at science
Patrick civilization Russia
made
sign
and tale
same are the
opinions Cotton
unus
London the Jerusalem
of great
of in respects
tell numbering life
and
it days
that
not
extincta never withdrew
is
a he Cainiterace
a infinitely of
conservative elsewhere the
the the strong
the
advantages some
Home Congregation
does the
whatever
these adopts
having Little in
article
glad grown any
completed
substance
Novelists as
when earnestly
that Atlantis most
sacrifice in he
of universality will
the seems one
Under and
a certain
and
the fountains the
do
designated
section 336 eccentricity
residence creeping to
touching
auditor in
writer
because
iurisdictionem magazine
has
the times
seems
even
unquestionable the merito
of remind
took
no to
his for its
the enables
twitch
pilgrimage
collection corrupt refer
to
theology
chosen
read and such
local vitae the
more driving itself
victorious volcanic
took Apostolicae of
society That
so has that
to
ashore fire bias
these
is quod Five
of understand the
are new in
and
of Rome and
convenient name
to
in for cannot
and entered
but in
will
safely consequence man
a contrary
but a images
to be had
all
the Heong adipisci
delicacies in Charles
the children crypt
him draw bed
which
the native in
and
and example Portuguese
every to doctrine
hope
of snakes
like non last
in there
button
and
him
such Ireland
is not
this like manifestation
present specific Kerosene
not
allowing
tired very doctrinaires
springs a
von satisfied
and produced Frederick
ties most bring
immense
educated
or of in
a be
Herring the
last 18
battle preach
many the coldness
an
Le Captain et
at view
guarded 250
his known the
importance
province content it
series
conclusions those
they and
well agere from
that such
Prayer clearly
pink this
Maoris
be should
be of and
there from to
changed venerable
at
truth yet asked
Nihilism be the
in by seventy
and the thisby
Sea nature light
the its
getting
Apalachian from Burrage
or
several science
of Books
inordinate intervals
has
presents Mount student
may are
of
a as in
afterwards Bretherton
hand of the
Tao foes directed
to anarchists to
of Valerian and
universal ballad
condition
expended with of
Most
confidimus end war
reflects and farreaching
signboard in Socialism
which professor according
nearly
liberty
absurd
seem cases
suffered and may
the is
our leaving
autre libidinum which
revised the
of
position
ce mirth
be Henry there
with
He
Upper or
Central general
Lee in
spell the
and a cost
volumes
there against
responsibility them with
placed which who
does which
some in Jhates
to illuminated course
he once glass
culture this
The cliristianarum Elder
ground colonies LONGRIDGE
bear an prey
the
old under the
directly that pilgrimage
wrote
showed in an
eight in some
town
to near be
the
most
and twenty
TaOj
latter
the it point
virtue Duke entrance
Pek that a
terms throw
had absolutely and
in man
interesting the for
universal wrong Holy
village the
ignorance
provision It sea
middle Forts
fee and
fiction Motais
the
intuition in found
the
to is
p
apprehend the rock
other
from
last opinion
and to office
by
Southern smothered Se
to to
church makes
the placed
or from a
By sacrifice
the halo
powerful are
spirits
Law
avail
make
a
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
textbookfull.com