PDF Cyber Security Intelligence and Analytics Zheng Xu Ebook Full Chapter

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 53

Cyber Security Intelligence and

Analytics Zheng Xu
Visit to download the full and correct content document:
https://textbookfull.com/product/cyber-security-intelligence-and-analytics-zheng-xu/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Information Fusion for Cyber-Security Analytics 1st


Edition Izzat M Alsmadi

https://textbookfull.com/product/information-fusion-for-cyber-
security-analytics-1st-edition-izzat-m-alsmadi/

Cyber Threat Intelligence Ali Dehghantanha

https://textbookfull.com/product/cyber-threat-intelligence-ali-
dehghantanha/

Analytics in Smart Tourism Design Concepts and Methods


1st Edition Zheng Xiang

https://textbookfull.com/product/analytics-in-smart-tourism-
design-concepts-and-methods-1st-edition-zheng-xiang/

Cyber Security Erickson Karnel

https://textbookfull.com/product/cyber-security-erickson-karnel/
Cyber Security Power and Technology Martti Lehto

https://textbookfull.com/product/cyber-security-power-and-
technology-martti-lehto/

2020 International Conference on Applications and


Techniques in Cyber Intelligence: Applications and
Techniques in Cyber Intelligence (ATCI 2020) Jemal H.
Abawajy
https://textbookfull.com/product/2020-international-conference-
on-applications-and-techniques-in-cyber-intelligence-
applications-and-techniques-in-cyber-intelligence-
atci-2020-jemal-h-abawajy/

Cyber Security for Cyber Physical Systems 1st Edition


Saqib Ali

https://textbookfull.com/product/cyber-security-for-cyber-
physical-systems-1st-edition-saqib-ali/

Cyber Security The complete guide to cyber threats and


protection 2nd edition Sutton

https://textbookfull.com/product/cyber-security-the-complete-
guide-to-cyber-threats-and-protection-2nd-edition-sutton/

Intelligent Orthopaedics Artificial Intelligence and


Smart Image guided Technology for Orthopaedics Guoyan
Zheng

https://textbookfull.com/product/intelligent-orthopaedics-
artificial-intelligence-and-smart-image-guided-technology-for-
orthopaedics-guoyan-zheng/
Advances in Intelligent Systems and Computing 928
Zheng Xu
Kim-Kwang Raymond Choo
Ali Dehghantanha
Reza Parizi
Mohammad Hammoudeh Editors

Cyber
Security
Intelligence
and Analytics
Advances in Intelligent Systems and Computing

Volume 928

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, Electronic Engineering, University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen, Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.

** Indexing: The books of this series are submitted to ISI Proceedings,


EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/11156


Zheng Xu Kim-Kwang Raymond Choo
• •

Ali Dehghantanha Reza Parizi


• •

Mohammad Hammoudeh
Editors

Cyber Security Intelligence


and Analytics

123
Editors
Zheng Xu Kim-Kwang Raymond Choo
Shanghai University University of Texas at San Antonio
Shanghai, China San Antonio, TX, USA

Ali Dehghantanha Reza Parizi


University of Guelph Kennesaw State University
Guelph, ON, Canada Marietta, GA, USA

Mohammad Hammoudeh
Manchester Metropolitan University
Stockport, UK

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-3-030-15234-5 ISBN 978-3-030-15235-2 (eBook)
https://doi.org/10.1007/978-3-030-15235-2

Library of Congress Control Number: 2019933893

© Springer Nature Switzerland AG 2020


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

The 2019 International Conference on Cyber Security Intelligence and Analytics


(CSIA 2019) is an international conference dedicated to promoting novel theoretical
and applied research advances in the interdisciplinary agenda of cyber security,
particularly focusing on threat intelligence and analytics and countering cybercrime.
Cyber security experts, including those in data analytics, incident response, and
digital forensics, need to be able to rapidly detect, analyze, and defend against a
diverse range of cyber threats in near real-time conditions. For example, when a
significant amount of data is collected from or generated by different security
monitoring solutions, intelligent and next-generation big data analytical techniques
are necessary to mine, interpret, and extract knowledge of this (big) data. Cyber
threat intelligence and analytics are among the fastest-growing interdisciplinary
fields of research bringing together researchers from different fields such as digital
forensics, political and security studies, criminology, cyber security, big data
analytics, and machine learning to detect, contain, and mitigate advanced persistent
threats and fight against organized cybercrimes.
Each paper was reviewed by at least three independent experts, and the accep-
tance rate was 45%. The conference would not have been possible without the
contributions of the authors. We sincerely thank all the authors for their valuable
contributions. We would like to express our appreciation to all members of the
Program Committee for their valuable efforts in the review process that helped us to
guarantee the highest quality of the selected papers for the conference.
We would like to express our thanks to Prof. Shunxiang Zhang, Anhui
University of Science and Technology, and Prof. Xiangfeng Luo, Shanghai
University, for being the keynote speakers at the conference. We would also thank
the Steering Committee, General Chairs, Program Committee Chairs, Organizing
Chairs, and Workshop Chairs. The local organizers’ and the students’ help is highly
appreciated.

v
vi Preface

Our special thanks are due also to the editors for publishing the proceedings in
Advances in Intelligent Systems and Computing of Springer.

Zheng Xu
Kim-Kwang Raymond Choo
Ali Dehghantanha
Reza Parizi
Mohammad Hammoudeh
Organization

General Chair

Zheng Xu TRIMS, China

Program Committee Chairs

Ali Dehghantanha University of Guelph, Canada


Mohammad Hammoudeh Manchester Metropolitan University, UK
Reza M. Parizi Kennesaw State University, USA

Publication Chairs

Shuai Ding Hefei University of Science and Technology,


China
Kun Gao Zhejiang Wanli University, China

Publicity Chairs

Xianchao Wang Fuyang Normal University, China


Jemal Abawajy Deakin University, Australia

Local Organizing Chairs

Xueping Liu Anhui Polytechnic University, China


Qingjun Wang Anhui Polytechnic University, China

vii
viii Organization

Program Committee Members

William Bradley Glisson Sam Houston State University, USA


George Grispos University of Nebraska Omaha, USA
V. Vijayakumar VIT Chennai, India
Aniello Castiglione Universit di Salerno, Italy
Neil Yen University of Aizu, Japan
Shunxiang Zhang Anhui University of Science and Technology,
China
Guangli Zhu Anhui University of Science and Technology,
China
Tao Liao Anhui University of Science and Technology,
China
Xiaobo Yin Anhui University of Science and Technology,
China
Kelei Sun Anhui University of Science and Technology,
China
Xiangfeng Luo Shanghai University, China
Xiao Wei Shanghai University, China
Huan Du Shanghai University, China
Zhiguo Yan Fudan University, China
Abdulbasit Darem Northern Border University, Saudi Arabia
Hairulnizam Mahdin Universiti Tun Hussein Onn Malaysia
Anil Kumar K. M. JSS Science & Technology University,
Mysore, Karnataka, India
Haruna Chiroma Abubakar Tafawa Balewa University,
Bauchi, Nigeria
Yong Ge University of North Carolina at Charlotte, USA
Yi Liu Tsinghua University, China
Foluso Ladeinde SUNY Korea
Kuien Liu Pivotal Inc., USA
Feng Lu Institute of Geographic Science and Natural
Resources Research, Chinese Academy
of Sciences
Ricardo J. Soares Magalhaes University of Queensland, Australia
Alan Murray Drexel University, USA
Yasuhide Okuyama University of Kitakyushu, Japan
Wei Xu Renmin University of China
Chaowei Phil Yang George Mason University, USA
Hengshu Zhu Baidu Inc., China
Morshed Chowdhury Deakin University, Australia
Elfizar University of Riau, Indonesia
Rohaya Latip Universiti Putra Malaysia
Contents

Regular Papers
Application of the CT Image Processing in the Urology Surgery . . . . . . 3
Xuan Huang, Juan Peng, and Laiqing Sen
Application of the Data Mining Technology in the Economic
Management in the Age of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Wenbiao Luo
Comprehensive Evaluation System Which Adapt to the Layout
of Power Facilities and the Utilization of Channel Resource
Based on the New-Type Urbanization . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Bin Ye, Xuli Wang, Bin Hu, Junxi Ren, Xuemei Shi, and Lei Wang
Computer Desktop Image Compression Technology Based
on the Clustering Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Liu Fei
Construction of the English Teaching Model Based on the Interactive
Network Streaming Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Mao Zhi and Wang Ping
Design and Implementation of the Image Processing Software
Based on the Infrared Image Feature Matching . . . . . . . . . . . . . . . . . . . 37
Fei Tian and Shilin Cui
Design and Implementation of the Image Processing Software
Based on the Wavelet Transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Shilin Cui and Zhanzheng Wan
Design and Implementation of the School Sports Management System
Based on WEB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Guanghui Sun

ix
x Contents

Design and Research on the Chinese Medicine Health Management


System Based on the Wireless Sensor Network . . . . . . . . . . . . . . . . . . . 55
Xiang Gao, Liuyun Lin, Tianying Lan, and Xinyan Gan
Design of the In-depth Intelligence Education System
Based on the Intercultural Communication . . . . . . . . . . . . . . . . . . . . . . 62
Minzi Song
Design of the Network Security Intrusion Detection System
Based on the Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Meng Di
Design of the Small Microstrip Antenna Based on the WLAN/UWB
Wireless Communication System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Jiangyun Qiu
Development and Application of the Computer Integrated
Management System for the Sports Teaching Platform . . . . . . . . . . . . . 80
Shoucheng Zhang
Development and Design of the Virtual Design System
Based on the Visual Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Bai Xue
Innovation of the School Computer Teaching Model
Based on the Information Network and the Intelligent Campus . . . . . . . 92
Zhang Qian
Integration Theory and Optimal Application of the Traffic
Accident Management System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Junhui Zhang
Paleomagnetic and Sedimentary Evidence for the Multi-stage
Paleoenvironmental Evolution of Prydz Bay Based
on Big Data Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Zhongyang Lin, Xibin Han, Xianglong Jin, Liang Yi, and Zhenggang Li
Preliminary Exploration of the Distribution Characteristics
and Influencing Factors of the Intangible Cultural Heritage in Sichuan
Province Based on GIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Yiming Xu, Siyang Gu, and Ying Liu
Real-Time Video Edge Enhancement IP Core Based on FPGA
and Sobel Operator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Boyang Liu
Research and Implementation of the Intelligent Tourism System
Based on VRGIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Yongqi Liao
Contents xi

Research on Robot Control Based on Reinforcement Learning . . . . . . . 136


Gang Liu
Research on the Agricultural Remote Sensing Image Enhancement
Technology Based on the Mixed Entropy Model . . . . . . . . . . . . . . . . . . 142
Youzhi Zhang
Research on the Application of Computer Aided Translation
CAT in the Field of Translation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Wang Yang
Research on the Application of the Computer Big Data Technology
in the Urban Power Energy Conservation . . . . . . . . . . . . . . . . . . . . . . . 155
Jieran Shen, Baocai Zhao, Rui Liu, and Feng Jiao
Research on the Data Mining Technology in College Students’
Attendance System Based on the Big Data Architecture . . . . . . . . . . . . 162
Zhong Jian
Research on the Directional Control of Direct Magnetic Field
of the Locomotive Asynchronous Traction Motor . . . . . . . . . . . . . . . . . 168
Tiezhu Zhang and Qiongjie Zhang
Research on the English Teaching Resource Library Management
System Based on the Computer Technology . . . . . . . . . . . . . . . . . . . . . . 174
Junmin Wu
Research on the Ideological and Political Education Service Platform
Based on the Campus Network Environment . . . . . . . . . . . . . . . . . . . . . 181
Xinglong Du
Research on the Image Feature Matching Technology
and Its Application in the Computer Vision System . . . . . . . . . . . . . . . . 188
Qing Liu
Research on the Influences of the Invisible Environment of Language
Laboratories on the Practical Teaching Based on the Network . . . . . . . 194
Zhang Fan
Research on the Motion Control and the Coordination Method
of the Autonomous Mobile Robots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Li Ning
Research on the Motion Simulation System Based on Association
Rule Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Zhanke Ma
Research on the Optimizing Process of the Basic Image
Processing Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Huie Zhang
xii Contents

Research on the Privacy Security and Defense Strategies


on the Internet of Things Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Qian Bian, Zhenduo Wang, Yingqiang Wang, and Weigang Zhang
Research on the Security Analysis and Management of the Network
Information System Based on the Big Data Decision Making . . . . . . . . 224
Weigang Liu
Research on the Security Risks and the Preventive Strategies
of Android Smart-Phones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Zhenduo Wang, Qian Bian, and Xinzhi Tian
Research on the Simple Algorithms for the Logistics Network Layout
in the Mobile Network E-Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Fan Ming
Research on the Sports Biomechanics Modeling of the Human Motion
Technical Movements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Jiafa Li and Huihui Du
Research on the Sports Teaching System Based
on the Data Visualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Zhanke Ma
Reverse Digital Repair and Evaluation Analysis of Injection Mold
Face Defects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Jun Fan
Sedimentary Facies and Paleoenvironment Significance of Hole
BZK01 in the Yangtze River Delta Plain Since Pliocene
Based on Big Data Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Zhongyang Lin, Xianglong Jin, Zhaohui Zhu, Shaojun Pan,
and Xudong Zhao
Simulation Analysis of Dynamic Characteristics of AC Motor
Based on BP Neural Network Algorithm . . . . . . . . . . . . . . . . . . . . . . . . 277
Shuang Wu and Jian Liu
Simulation and Optimization of the Scenic Beauty of Green Plants
in the Landscape Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Xiang Pan and Qing Lin
Simulation of the Hydraulic Support System and the Constant
Pressure Liquid Supply Based on Intelligent Systems . . . . . . . . . . . . . . 293
Mei Sun and Jianping Tan
Study of the Chinese-English Translation of Computer
Network Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Fenfen Zhu
Contents xiii

Study of the Soybean Imitation Cheese Based on Intelligent Systems


and Big Data Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Zhiguo Zhang and Qi Zeng
Study of the Structural Renewal of “Snow Bud” in Shutao Company
Based on Intelligent Systems and Big Data Analytics . . . . . . . . . . . . . . . 311
Yiming Xu, Siyang Gu, and Pinwu Li
A Brief Analysis of the Literature Network Resource Mining
and Data Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
Jianguo Gao
A Study of the 3D Animation Technology Based on the Internet . . . . . . 325
Jing Pu and Xinxin Nie
Analysis of the Information Service Levels of the Agricultural
Economy in the Environment of the Internet of Things
and the Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Meng Yue
Application of the Architectural Animation Virtual Technology
in the Landscape Architecture Design . . . . . . . . . . . . . . . . . . . . . . . . . . 339
Chunyan Zhu, Yizhi Jiang, Yuanyuan Zhang, Yujia Zhang, and Ying Xie
Application of the Big Data Technology in the Chain
Operation Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
Xiaohua Tang
Application of the Computer Vision Technology in the Image
Feature Extraction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Yunhui Qu
Chinese Entity Synonym Extraction from the Web . . . . . . . . . . . . . . . . 357
Xiuxia Ma, Xiangfeng Luo, Subin Huang, and Yike Guo
Mining Friend Relationship Existing in Microblog Based on Building
Relationship Description Dictionary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Nana Wang, Shunxiang Zhang, and Zheng Xu
Remaining Useful Life Prediction of Power MOSFETs Using
Model-Based and Data-Driven Methods . . . . . . . . . . . . . . . . . . . . . . . . . 373
Jinjing Wu, Zheng Xu, and Xiao Wei
Application of Improved Grey Predictive Control Adaptive PID
Control Algorithms in Temperature Control . . . . . . . . . . . . . . . . . . . . . 382
Yinjun Zhang and Mengji Chen
Application of Improved Grey Predictive Control in Alcohol
Temperature Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
Yinjun Zhang and Mengji Chen
xiv Contents

Human-Simulation Logical Predictive Controller Design . . . . . . . . . . . . 394


Mengji Chen and Yinjun Zhang
Iterative Learning Control for Uncertain Time-Delay Reaction
Diffusion System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Yinjun Zhang and Mengji Chen
Iterative Learning Control of Discrete Generalized
Distributed Parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Mengji Chen and Yinjun Zhang
The Multi-model Predictive Control Method Research
on the Outlet Temperature Control of Hot-Blast Stove . . . . . . . . . . . . . 415
Mengji Chen and Yinjun Zhang
Design of Embedded Data Acquisition Integrated System
Based on SQLite Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
Jin Xing and Yonghui Zhang
The Analysis of Structure and Freedom for Space Position
Adjustment Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Shuguang Zhang, Chenbing Guo, and Mingchen Wu
Application of Support Vector Machine Based on Particle Swarm
Optimization in Short-Term Load Forecasting of Honghe
Power Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Jing Hua, Wei Xiong, Lin Niu, and Linlin Cao
Research and Implementation of Security Vulnerability Detection
in Application System of WEB Static Source Code Analysis
Based on JAVA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
Hui Yuan, Lei Zheng, Liang Dong, Xiangli Peng, Yan Zhuang,
and Guoru Deng
Application of Deep Learning Algorithm Based on Multimodal
Regularization in Detection Robot Grasping . . . . . . . . . . . . . . . . . . . . . 453
Shunan Liu, Xiaoli Wang, and Haidong Huang
Research and Improvement on the Linkage of 2D and 3D
Based on Multi-touch Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
Youjian Yu, Xiangyi Meng, and Zihui Chen
Simulation of QoS Routing Algorithm Based on SDN Framework . . . . 469
Zhaochenzi Zhang and Yanfang Fu
The Research on Core Development Technology of Security Big Data
Application Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Gao Chai
Contents xv

Research on Parameter Optimization of Tracked Vehicle


Transmission System Based on Genetic Algorithm . . . . . . . . . . . . . . . . . 487
Lingjun Wei, Haiou Liu, Huiyan Chen, Ziye Zhao, Yi Xu,
and Hongyan Zhang
Adaptive Discrete-Time Sliding Mode Control of Brushless DC Motor
Servo System for Unmanned Surface Vehicles . . . . . . . . . . . . . . . . . . . . 496
Zhongjiu Zheng, Ning Wang, and Hong Zhao
Application of Learning Trajectory Preference Algorithm
Based on On-Line Iterative Feedback in Robots . . . . . . . . . . . . . . . . . . 505
Shunan Liu, Xiaoli Wang, and Haidong Huang
Review on Non-spherical Surface Detection Technology . . . . . . . . . . . . 513
Bo Yu, Yan Li, Xiaodong Li, Shijun Luo, and Haibo Li
Novel of Web Search Strategy Based on Web Page Block Granularity
Analysis Algorithm and Correlation Calculation Model . . . . . . . . . . . . . 521
Ganglong Fan and Hongsheng Xu
Electricity Consumption Prediction Model Based on Bayesian
Regularized BP Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528
Chenghao Yuan, Dongxiao Niu, Changzu Li, Lijie Sun, and Longxiu Xu
The Research on Teaching and Research Team Construction
and Management in Vocational Education Institutions . . . . . . . . . . . . . 536
Hong Zhang and Zhao Yao
Research on the Development Trend and Coping Strategies
of Internet Finance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
Xiaoxia Wu and Heyu Xiao
Research on the Development Trend and Protective Measures
of Campus Network Security in Colleges and Universities . . . . . . . . . . . 550
Deling Ran
The Safety Calculation and Simulation Analysis of Guyed Travelling
Carriage for Main Beam of Polonggou Bridge . . . . . . . . . . . . . . . . . . . . 559
Xiaojie Wu and Yuebo Zhang
Human Action Recognition Based on Fusion Features . . . . . . . . . . . . . . 569
Shiqiang Yang, Jiangtao Yang, Fei Li, Guohao Fan, and Dexin Li
Effective Teaching Design Scheme for Network Troubleshooting . . . . . . 580
Xiaoqi Yin
Research on Fatigue Test Based on Mobile Phone Gesture Design . . . . 590
Fujun Ma, Yan Liu, Fanghao Song, Junfeng Li, and Chhunli Liu
xvi Contents

Two-Echelon Location Routing Problem with Multi-fuzzy


and Pick-Delivery Model and Algorithm . . . . . . . . . . . . . . . . . . . . . . . . 600
Hong Li and Sujian Li
Analysis of FY-4 Satellite Lightning Data Processing
Based on MATLAB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611
Xiangke Liu, Leqi Chen, Meng Deng, and Peng Shang
Design of Wireless Sensor Network Node Based on CC2430 . . . . . . . . . 619
Jintao Yu, Liangliang Yu, and Cheng Wang
A Preliminary Study on the Introduction and Disposal of Pollutants
from Hazardous Waste Transfer and Single Billing System . . . . . . . . . . 626
Dongfang Zhang and Songming Wang
Research on the Integration of Marketing Management and Big
Data Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
Dian Jia
Analysis of Printing Talents Training Mode Under
the Background of Internet+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640
Yongxin Liu and Guohua Song
Development and Future Trends of Internet of Things . . . . . . . . . . . . . 648
Wencheng Liu, Fei Li, and Yan Li
The Impact of Data Quality on Neural Network Models . . . . . . . . . . . . 657
Chunmei Li, Zhao Li, Xu Jun, and Wei Pi
Research on Improvement Method of RF Phase of Antenna
Tracking System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666
Haidong Zou and Hongmin Li
Scientific Researcher Credit Evaluation Model Design . . . . . . . . . . . . . . 673
Yan Zhao, Li Zhou, Bisong Liu, Zhou Jiang, and Jing Wang
Practice on the Sustainable Development of Talent Cultivation Mode
in the Context of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Limei Chen
Research on the Automatic Test System of Motor Drive . . . . . . . . . . . . 692
Chen Tang and Maoyun Zhang
Remote Teaching System Based on Cloud Platform . . . . . . . . . . . . . . . . 700
Shuyan Wang, Xiaohui Li, and Lingyun Meng
The Review of Risk Identification of E-Commerce Supply Chain
Under the Network Economy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
Ping Kang and Tianyu Zhang
Contents xvii

Research on Multiple-Degree-of-Freedom Manipulator . . . . . . . . . . . . . 714


Zezhong Chen
Research on Green Exhibition Technology and Construction
of the Application Evaluation System . . . . . . . . . . . . . . . . . . . . . . . . . . . 722
Aimin Wei
An Improved Load Balancing Algorithm Based on Neural Network . . . 730
Rui Song and Hongqiong Huang
Research on International Logistics Supply Chain Management Mode
from the Perspective of Cross-border E-commerce . . . . . . . . . . . . . . . . 737
HaiLan Pan
Optimization of Logistics Warehouse Location Based
on Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
Xu Wang and Qing Xia
Application of Intelligent Algorithms in System Integration Design . . . . 753
Hequn Wu
Research on Obstacle Avoidance of Mobile Robot
Based on Multi-sensor Fusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 760
Ting Wang and Xiaoqing Guan
Interaction Steady State Transportation Network and Planning
Optimization Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771
Baiyu Chen, Da Fu, and Yuanyuan Yang
Fatigue Damage and Creep Modeling of Combined Rotor
and Its Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 781
Lijun Guo
Electromagnetic Force of Power Transformer with Different Short
Circuit Current Based on FEM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 788
Yan Wu, Lingyun Gu, Xue Zhang, and Jinyu Wang
Analysis and Research of Dynamic Data Path Selection Algorithm
in Heterogeneous Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 798
Zaiyi Pu
Contribution Title Graphical Language Transmission Mechanism
in Visual Communication Design Based on Data Abstraction . . . . . . . . 806
Rui Li, Chunyan Li, and Meiyan Tian
Deep Learning Approaches for Voice Activity Detection . . . . . . . . . . . . 816
Mantao Wang, Qiang Huang, Jie Zhang, Zhiyong Li, Haibo Pu,
Jinglan Lei, and Lanjing Wang
xviii Contents

A State Observer Design for Dual Lipschitz Nonlinear System . . . . . . . 827


Yiyuan Shao
Research on Speech Enhancement Algorithms Based on Blind
Source Separation in Outdoor Environment . . . . . . . . . . . . . . . . . . . . . 837
Chunli Wang and Quanyu Wang
An Improved Apriori Algorithm Research in Massive
Data Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 843
Yu Xu, Ranzhi Zhan, Gang Tan, Lu Chen, and BoJin Tian
Research on the Development Trend of Online Education Industry
Considering the Influence of Big Data and Artificial Intelligence . . . . . . 852
Yong Fu
Feature Analysis and Selection in Acoustic Events Detection . . . . . . . . . 860
Mantao Wang, Jie Zhang, Haitao Tang, Zhiyong Li, Jun Li,
and Yuchen Wang
Prediction of Dollar Exchange Rate Based on Wavelet
Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869
Chen Liu, Hongyan Wu, and Wenbin Liu
Computer Performance Determination System Based
on Big Data Distributed File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 877
Kong Lu
Research and Application of Bipartite Graph Optimal-Matching
Algorithm on Task-Driven Teaching Method . . . . . . . . . . . . . . . . . . . . . 885
Mei-shan Li, Jia-mei Xue, and Yue Liu
Research on Hybrid Quantum Genetic Algorithm
Based on Cross-Docking Delivery Vehicle Scheduling . . . . . . . . . . . . . . 893
Yue Yang
Optimization and Improvement of Lucene Index Algorithm . . . . . . . . . 901
Ya Tao Su
Social Public Safety Investigation and Prevention
Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 908
Qing Lu, Jun Lu, and Xin Chen
Intelligent Diagnosis of Middle and Low Voltage Distribution
Network Fault Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 916
Jing Hua, Yan-Ping Zhou, Wei Xiong, Lin Niu, and Xu Zhao
Using Three-Frame Difference Algorithm to Detect Moving Objects . . . 923
Zhigao Zhang, Hongmei Zhang, and Zhifeng Zhang
Contents xix

Research on Computer-Aided Ideological and Political Teaching


Based on Constructivism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 929
Yu Zhang
Research and Implementation of Web Application System
Vulnerability Location Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 937
Lei Zheng, Hui Yuan, Xiangli Peng, Guowei Zhu, Yue Guo,
and Guoru Deng
Analysis of Factors Affecting Construction Cost of Line Engineering
and Cost Control Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 945
Chen Wu, Bing-Jie Li, Qian Ma, Yin Wu, Hong-Da Zhao, Dong-Xiao Niu,
Hao Zhen, and Zhuoya Siqin
Analysis and Application of Mapreduce Architecture
and Working Principle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 955
Hongsheng Xu, Ganglong Fan, and Ke Li
Design of Temperature Control System for BIW
Phosphating Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 962
Weijie Gou, Lihong Wang, and Zhaokai An
The Impact of Artificial Intelligence on the Accounting Industry . . . . . . 971
Yanling Shi
Application and Realization of Genetic Algorithm
Based on MATLAB Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 979
Yan Li, Bo Yu, Xiaodong Li, Shijun Luo, and Haibo Li
Research on the Integration and Innovation of Cloud Computing
Technology and Enterprise Management by Internet Companies . . . . . 986
Dian Jia
Strategic Thinking on the Transformation and Development
of Printing Industry Under the Background of Internet+ . . . . . . . . . . . 993
Guohua Song and Yongxin Liu
Control Strategy of Unmanned Aerial Vehicle Based on Extended
State Observer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1000
Dan Wu
The Impact Factors of Neural Network Based Time Series Prediction:
Taking Stock Price as an Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007
Yue Hou, Heng Liu, Bin Xie, and Feng Ding
Laser Scanning Imaging System Research and Development
Trend Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1015
Maoyun Zhang, Chen Tang, Zhenglin Yu, and Fenglong Chen
xx Contents

A Survey of Group Intelligence Optimization Algorithms . . . . . . . . . . . 1024


Chunguang Chang and Xi Wu
Design of Multi-layer Industrial Internet of Data Mine Network Model
Based on Edge Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1034
Haibo Peng, Qiaoshun Wu, Jie Li, and Rong Zhou
Analysis and Research on Speech Enhancement Algorithms
for Mobile Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041
Chunli Wang and Quanyu Wang
Research on Three-Dimensional Localization Algorithm for WSN
Based on RSSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1048
Yu Shi, Hua Liu, Weiyu Zhang, Yong Wei, and Jinfeng Dong
Intelligent Recognition System for High Precision Image Significant
Features in Large Data Background . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056
Kong Lu
Research and Guidance on the Use of New Media by Grassland
Herdsmen in the Big Data Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1063
Yan Cui
Design and Implementation of Enterprise Network Security System
Based on Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1070
Hui Yuan, Lei Zheng, Shuang Qiu, Xiangli Peng, Yuan Liang,
Yaodong Hu, and Guoru Deng
Metadata Storage and Query of Hive Based on Hadoop
Distributed Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1079
Hongsheng Xu, Lan Wang, and Ganglong Fan
Quality Evaluation of Tank Shooter Night Vision Image Fusion
Based on Mark Watershed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1086
Zhao Yao
Research on Transformation and Innovation of Editing
and Publishing Under the Background of Media Convergence . . . . . . . 1094
Hongyuan Li and Yanhua Yin
An Improved K-means Clustering Algorithm
Based on Hadoop Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1101
Xiangru Hou
Research on Intelligent Detection System for Information Abnormal
Defect Based on Personalized Recommendation of E-Book . . . . . . . . . . 1110
Kong Lu
Contents xxi

Research on Distributed High Speed Network Intrusion


Prevention System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1118
Lei Zheng, Hui Yuan, Xiangli Peng, Guowei Zhu, Yue Guo, Hao Xu,
and Guoru Deng
Ecosystem Description of Hadoop Platform Based on HDFS,
MapReduce and Data Warehouse Tool Hive . . . . . . . . . . . . . . . . . . . . . 1127
Hongsheng Xu, Xiangkui Chen, and Ganglong Fan
Research on a Network Communication Data Privacy Protection
System Based on OFDM Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . 1134
Kong Lu
Research on College English Teaching System Based on Resource
Library and Network Support Platform . . . . . . . . . . . . . . . . . . . . . . . . . 1142
Lu Wei and Binquan Liu
Video Information Propagation Interruption Monitoring System
Based on Electromagnetic Interference . . . . . . . . . . . . . . . . . . . . . . . . . 1150
Kong Lu
Application Research of Intrusion Prevention System in Emergency
Platform Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1158
GuoRu Deng, Hui Yuan, Liang Dong, Shan Yang, Zheng Yu,
Yan Zhuang, Haohua Meng, and Xuan Luo
Research on Core Data Protection Based on Cloud Computing . . . . . . . 1167
Guoru Deng, Shuai Hu, Hui Yuan, Liang Dong, Yan Zhuang, Shan Yang,
Xuan Luo, and Yixi Wang
The Development Research of Gesture Recognition
Based on Human Interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1175
Jingliang Lai

Short Papers
Research on Computer Aided Design Software Innovation
Based on VR Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1185
Lei Zheng and Ruibo Song
Equipment and Application of Iris Recognition in Public Security . . . . 1190
Cheng Cheng, Bo Zhao, Zheng Xu, and Xiao Wei
Study on the Risk and Analyze the Preventive Measures
of We-Chat Pay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1195
Yongxiang Ma
Research on General Wearable Technology Based on Embedded
Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1200
Ting Zhang, Bingqian Li, Chenwang Xu, and Jiahao Wang
xxii Contents

Analysis of the Guiding Effect of Movie and TV Tourism Memes


Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1205
Yali Liu and Meiyun Zhang
Research on Mutual Information Registration Method
Based on Gradient Edge Information . . . . . . . . . . . . . . . . . . . . . . . . . . . 1211
Lianhuan Li
The Studied for the Positive and Negative Solutions of the 6-dof
Motion Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1217
Yiying Chen
A Review of Context-Based Personalized
Recommendation Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1222
Yi Ren, Cuirong Chi, and Jintao Zhang
Matching Technology of Internet of Things Based on Multiple Linear
Regression Model in Urban Management . . . . . . . . . . . . . . . . . . . . . . . 1228
Peilu Feng and Pingquan Wang
Optimization of Echo Parameter in Intelligent Instrument
Under the Condition of Numerical Stability . . . . . . . . . . . . . . . . . . . . . . 1234
Ke Song
Development of Position Detection Sensor Based on STM32 . . . . . . . . . 1239
Jian Huang and Guangpeng Zhang
Study on Intelligent Ventilator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1245
Na Wang, Rui Wang, and Yuanyuan Wang
Analysis on the Importance of Price Support-Resistance Levels
of Chinese Stock Market Based on the Proposed Information
Granulation and FCM Clustering Algorithm . . . . . . . . . . . . . . . . . . . . . 1251
Xianchang Wang, Jiayu Wang, Xuhong Lin, Lin Xue, Meiying Zhu,
Qianqian Song, and Xin Wang
Charging Analysis of Pipeline Robots Charged by Flow Power . . . . . . . 1256
Xiaomin Shan and Guangyu Liu
Reflections on the Application of AI in Auditing Practice
in the Context of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1262
Xiaohong Wang
Research on Safety Cost Optimization Model
of Prefabricated Building . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1268
Chunguang Chang and Xi Wu
Study on Distortion Characteristics of Analog Circuit by Nonlinear
Degree of Integrated Circuit Amplifier . . . . . . . . . . . . . . . . . . . . . . . . . . 1274
Wang Tao and Sun Wen
Contents xxiii

Gronwall Extension and Application to First Order Delay


Differential Equations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1280
Zhongqian Wang and Zhibin Yan
Research on Improvement of Particle Swarm Optimization . . . . . . . . . . 1287
Chunguang Chang and Xi Wu
The Rolling Process Analysis and Groove Optimization of 16# I-Beam
Based on FEM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1293
Rui Tang and Qi Zhang
Study on the Management Mode of Asphalt Pavement Cracks
in Different Climatic Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1299
Xin Lan and Xiangguo Chang
Research on Target Recognition Method Based on Laser
Point Cloud Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1305
Fan Yu, Yanxi Wei, and Haige Yu
Summary of Research on Computing and Cloud Computing . . . . . . . . . 1311
Xin Sui and Yi Sui
Prediction Model of Milling Surface Roughness
Based on Genetic Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1315
Ying Chen, Yanhong Sun, Han Lin, and Bing Zhang
The Research on Network Security Situation
Awareness Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1321
Yongmei Zhang, Yanmei Jia, and Jinxiang Zhong
The Research on Street Landscape Design in Smart City
Based on Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1327
Wenjun Wang
Adaptive Scheduling Algorithm for Hadoop Node Capability
in Heterogeneous Resource Environment . . . . . . . . . . . . . . . . . . . . . . . . 1332
Ming Zheng and Mugui Zhuo
Application and Practice of Deep Learning Platform
in Automobile Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1337
Yingzi Wang, Xiangyi Fang, and Jue Hou
Exploration and Practice of Market-Oriented Photoshop Image
Processing Course . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1342
Xiao Wang
xxiv Contents

Advertising Icon Design and Communication Conception


Under the Condition of EEG and Eye Movement
Experiments—Taking the Lingmei Omnimedia E-Commerce
Platform Mobile APP as an Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 1348
Yan Cui
Research on the Influencing Factors of Residents’ Travel
Based on Bayesian Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1354
Fengying Wang, Liming Du, Gui Li, and Jie Dong
Research on the Development of Western Coal Industry
Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1360
Xing Li, Yadi Nan, and Ting Li
Research and Application of Substation Safety Control Technology
Based on Internet of Things Technology . . . . . . . . . . . . . . . . . . . . . . . . 1366
Tianzheng Wang, Zhumao Lu, Shaohui Feng, Hua Yu, and Yongxin Liu
Research on Multi-source Image Fusion Method Based on FCM
and Wavelet Transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1371
Lianhuan Li
The Analysis and Research of Lifting Scheme
Based on Wavelet Transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1377
Li Ding and Weiqing Chen
A Survey of Personalized Recommendation Algorithm Selection
Based on Meta-learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1383
Yi Ren, Cuirong Chi, and Zhang Jintao
Study of Signal Remote Monitoring System Based on Template
Technology in Timing System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1389
Wei Wu and Haidong Zou
Research on E-learning Teaching Assistant System
Based on Improved Particle Swarm Optimization Algorithm . . . . . . . . . 1395
Yue Liu, Jiamei Xue, and Meishan Li
Design of Tracing Car Based on Photoelectric Sensor . . . . . . . . . . . . . . 1401
Huang Jian
An Improved Particle Swarm Optimization Algorithm . . . . . . . . . . . . . 1406
Chunguang Chang and Xi Wu
A Statistical Process Control Approach to Global Optimization
of System Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1411
Hequn Wu
Contents xxv

Research on 3-D Laser Point Cloud Recognition Based on Depth


Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1416
Fan Yu, Yanxi Wei, and Haige Yu
Information Management System and Supply
Chain Management (SCM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1421
Yefu Tang and Yanju Liu
Development of Hadoop Massive Data Migration System . . . . . . . . . . . 1427
Ming Zheng and Mugui Zhuo
Talent-Training Mode Exploration in Software Major Between
Universities and Enterprises Based on the Perspective of Big Data . . . . 1432
Xiaoming Yang
Analysis of Factors Affecting Power Grid Investment
Based on Johansen Cointegration Analysis Theory . . . . . . . . . . . . . . . . 1437
Wang Zhang, Kaihui Nan, Qinggang Yang, Jianfeng Zhang, Hong Chen,
and Xinyan Zhang
Direct Torque Control System of Electric Vehicle Based on Torque
Hysteresis Adjustment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1443
Taihua Jia
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1449
Regular Papers
Application of the CT Image Processing
in the Urology Surgery

Xuan Huang1, Juan Peng1(&), and Laiqing Sen2


1
Hubei 672 Chinese and Western Medicine Combined Orthopaedic Hospital,
Wuhan 430000, Hubei, China
huyp0213@126.com
2
Hubei University of Chinese Medicine, Wuhan 430000, Hubei, China

Abstract. The spiral CT can obtain the three-dimensional or the two-


dimensional images of different levels and angles, which can provide the
more intuitive and comprehensive imaging data, and clarify the size and location
of the lesions and their relationship with the surrounding tissues. The spiral CT
scanning time is short and the image quality is good. Compared with IVU and
B-mode ultrasonography, the spiral CT scanning has more guiding value in the
diagnosis and treatment of the urinary diseases.

Keywords: CT image  Technical processing  Urology surgery 


Application strategy

With the improvement of the CT performances and the development of the functional
software, the post-processing functions are becoming more and more diverse, including
the image processing technology and the image measurement and juicing technology
[1]. The measurement and calculation contents mainly include: the CT value, length,
distance, perimeter, area, volume and other data, which are not described here one by
one. This paper only talks about the image post-processing technology.

1 CT Image Processing

Computed Tomography (CT), which uses the precisely collimated X-ray beams,
gamma rays, ultrasound and other detectors to scan one section after another around a
certain part of the human body, has the characteristics of the fast scanning time and the
clear images, and can be used for the examination of various diseases. According to the
different X-rays used, it can be divided into the X-ray CT (X-CT), the ultrasound CT
(UCT), and the c-ray CT (c-CT).
The working procedure of CT is as follows. According to the difference of the X-
ray absorption and transmittance of different tissues of the human body, it uses the
highly sensitive instruments to measure the human body, and then inputs the measured
data into the computer. After the data are processed by the computer, the cross-section
or the three-dimensional images of the examined part of the human body can be taken,
and the minor diseases of any part of the body can be found [2]. The adjustment of the
window width and the window position is a routine content in the digital image

© Springer Nature Switzerland AG 2020


Z. Xu et al. (Eds.): CSIA 2019, AISC 928, pp. 3–8, 2020.
https://doi.org/10.1007/978-3-030-15235-2_1
4 X. Huang et al.

post-processing, and is also the most important function in the image display tech-
nology. The correct selection and application of the window technology is an important
means to obtain the high-quality images and improve the diagnostic rate [3].
In the image display, the magnification technique can be used to observe the micro-
lesions and the fine anatomical structures. There are two forms of the image enlarge-
ment. One is to enlarge the scanning field, that is, to narrow the scanning field, and the
other is to enlarge the image electronically [4]. The image enlargement in the post-
processing is different from that in the scanning. It is an electronic enlargement. With
the increase of the enlargement ratio, the image sharpness decreases. In addition, the
enlarged image also needs to adjust the window width and the window position
properly in order to better observe the image. There are two commonly used methods
for enlarging the region of the interest. One is to move the cursor (+) to the center of the
image to be enlarged and input the enlargement factor to get the corresponding
enlarged image. The other is to enlarge the image directly with the box. The smaller the
box is, the larger the image enlargement will be.
The subtraction usually takes place between two images. Usually, one image is
selected as the subtracting image and the other as the subtracted image [5]. That is to
say after subtracting the two images, the subtracted image can be obtained. The fil-
tration can be processed in a single frame. According to the effect of the filtering, there
is the smoothing, average, edge enhancement and shadow display. The filtering method
is that the computer uses different image algorithms to reprocess the images in order to
achieve some effects. Among the three methods mentioned above, the image
enlargement is the most commonly used in the clinic, usually for the diagnostic pur-
poses, in order to make up for some deficiencies in the scanning.
The multidirectional and the three-dimensional reconstruction are also used as the
image post-processing. In fact, they are all the functions of displaying the images in
different ways after the image post-processing on the basis of the cross-sectional
scanning. Generally, the cross-sectional images can be composed of the coronal,
sagittal, inclined or arbitrary surfaces, which are called the multi-directional reorga-
nization. The advantages of the multi-directional reorganization are as follows. Firstly,
it can observe the specific anatomical structures, and secondly, it can help to determine
the size of the lesions or the fractures, which is helpful for the diagnosis. The biggest
disadvantage of this method is that it is reconstructed on the basis of the cross-sectional
scanning, and its image quality is affected by the cross-sectional scanning image
quality. In the three-dimensional reconstruction method, the realistic and the stereo-
scopic display can be obtained through the reconstruction of the cross-sectional images.
Like the multi-position reconstruction, this method needs to be based on the thin-layer
scanning to obtain the satisfactory images. Usually, the thinner the scanning layer, the
better the effect of the reconstruction will be.
At present, there are many advantages of the multi-orientation reconstruction using
the spiral CT scanning. The volume scanning in a short time is difficult to move and the
volume data acquisition is complete due to the short scanning time. The spiral CT can
use a thicker scanning layer, while the reconstruction can use the thinnest recon-
struction interval, with the retrospective reconstruction at any number of times, but the
patient’s radiation does not increase. Usually the post-processing reorganization is a
Another random document with
no related content on Scribd:
were now married, and sat on two golden thrones, looking
wonderfully handsome and happy. Below them on the marble floor
all the lords and ladies were dancing the most graceful dances in the
world, and the musicians placed up in a high gallery sang and played
the most delightful music, while tables covered with nice tarts and
cakes and other beautiful things ran down on each side of the hall.
But notwithstanding that Duldy had married the Princess, and was
going to be king when Arago died, he felt quite unhappy, as the foam
bracelet still clasped his wrist.
“What is the matter, Prince?” asked Elsa, putting her beautiful white
arms round his neck; “you look so sad.”
“I’m afraid of Foamina,” said Duldy, showing Elsa his wrist. “Look at
the foam bracelet chaining my wrist; I cannot get it off. Look, you can
see it quite plainly.”
And indeed they could, a slender ring of white foam which clasped
his wrist so tightly that Duldy felt as though it were the hand of the
enchantress grasping him, to drag him away from his lovely bride to
the depths of her cold pool.
“Is it cold?” asked Elsa.
“Yes, very cold,” replied Duldy disconsolately. “I wish I could take it
off.”
“I think I can do that,” said the Princess, laughing. “If it’s cold, it will
soon melt away under my warm kisses;” and so saying, she bent
down and kissed his wrist three times with her red lips. Much to
Duldy’s surprise, at the first kiss the foam bracelet seemed to grow
loose, at the second it fell off his wrist and lay on the floor like a
white ring, and at the third it vanished with a loud noise.
Duldy was overjoyed that he was now free from the power of the
enchantress, and led the Princess out on to the balcony which
overlooked the river. It was a beautiful night, and Duldy saw the
great white peak of Kel shining against the dark blue sky, and the
heaving waters of the river at his feet. Just as he kissed the lips of
his Princess, a confused noise sounded from the city below. The
river, lashing itself into angry waves, began to rise, and as Duldy and
the Princess, full of dismay, retreated to the hall, a crowd of people
rushed in and stopped the dancing.
“Sire! sire!” they called out to the King, “the river is rising round the
city, and all the fountains are spouting foam! We are lost! we are
lost!”
Everything was in confusion, people rushing here and there
shrieking and crying, while the lights of the city died out, and the
cruel, dark waters kept on rising, until every one thought the whole
city would sink beneath the flood.
Duldy knew it was the work of Foamina, and his mind was quite
satisfied on that point when a great white wave of foam rolled into
the hall over the balcony. On this the Water-witch was riding, singing
loudly,—
“Give me my lover,
King’s daughter, king’s daughter,
Or I will cover
Your city with water.”

The Princess shrieked and hid her face on Duldy’s shoulder, while
Arago and all the people around looked at the witch in dismay.
Suddenly Duldy recollected how Salamander had promised to help
him, so he called out,—
“Salamander,
O, withstand her!
She has brought her
Cruel water.
Drive from land her,
Salamander!”

The witch laughed loudly, and the wave rolled on, amid the
lamentations sounding from the city below, when suddenly, in the
place where the Fountain of Jewels had been, a tall flame shot up,
and out of it flashed Salamander, glowing like a beautiful crimson
star.
“Foamina, beware!” he cried, shaking a torch which he held in his
hand; “or I will burn up your springs, scorch your forests, and crush
you for ever.”
“No, you won’t,” said Foamina, flinging her white arms aloft. “This
shepherd is mine—mine! and you can do nothing.”
“Can’t I?” cried Salamander, waving his torch. “Behold!”
There was a great roar, like the report of a thousand cannons, and
every one looked through the open window with a cry of alarm.
Far away, from the snowy peak of Kel shot a tall column of red flame,
with a black cloud above it spreading over the midnight sky, and
vividly bright streams of burning lava began to run down the white
snow like veins of fire.
“Oh, my springs, my springs!” shrieked Foamina wildly; “they will all
be burned up, and I’ll die—I can’t put that fire out.”
“No, you cannot,” said Salamander sternly; “nor will I till you give up
all claim to Duldy.”
“I do! I do!” shrieked the Water-witch, listening with terror to the roar
of the fire mountain.
“And tell Duldy who he really is?” said Salamander relentlessly.
“Yes! yes!” cried Foamina, who was now getting thinner and thinner
as the hot lava scorched her springs in the distant mountain. “Only
stop that cruel, cruel fire!”
“Who am I?” asked Duldy. “Quick! tell me, and Salamander will stop
the fire.”
“You are the son of the old King,” cried Foamina wildly. “I drowned
your mother and carried you off. I surrender all claim to you now,
only stop the fire—stop the fire!”
“You will never do cruel things again?” said Salamander.
“Never!—never!” said the Water-witch, who was now writhing on the
floor.
“Then make the waters leave the city,” cried Duldy.
The Water-witch flew to the window and muttered some words,
whereupon the river sank down to its usual level, all the fountains
stopped pouring out jets of foam, and in a short time the city was as
dry and clean as if no waters had been there at all.
“Now go!” cried Salamander, and stretched out his torch towards the
mountain. Immediately the column of fire sank back again, the
smoke vanished and nothing could be seen but the snow-white
peak, the dark blue sky, and the serene moon. As soon as Foamina
saw this, she gave a cry of joy, and, flinging herself in a foaming
torrent from the window, vanished in the river, and was never seen
again.
Then Salamander turned to Duldy and Arago, who stood near,
delighted with the defeat of the Water-witch.
“You heard what Foamina said,” he observed to Duldy; “you are the
son of the old king, and ought to reign now.”
“And so he shall,” cried Arago, taking off his beautiful silver crown
and placing it on Duldy’s head. “I will give up the throne to Duldy and
my daughter, and become prime minister once more. Hail, King
Duldy!”
“No, he must not be called Duldy,” said Salamander, smiling, “but by
his father’s name. So, Hail, King Sama!”
Then all present, including Arago, kneeled down before Duldy, who
ascended the throne with his silver crown, and his beautiful Queen
Elsa by his side.
“Be happy,” cried Salamander; “you have a kind heart, and that
always brings happiness.”
Whereupon he vanished, and was never more seen again, nor did
he allow the mountain of Kel to breathe fire any more. So King Sama
and Queen Elsa ruled over the land of Metella, and were very, very
happy, and were guided by the advice of Arago, who once more
became prime minister.
Duldy brought Dull and Day from the forest, and gave them a
beautiful palace to live in, but they did not like the city life, and went
back again to their cottage, where they died
after many years.
So Duldy became king after all, but while his
people hailed him as King Sama, his beautiful
wife called him nothing but Duldy, the
shepherd lad who had released her from the
enchantment of the Water-witch.
MOON FANCIES

THERE was once a girl called Lurina, who dwelt with her parents in
a cottage on the edge of a great forest, which was said to be
enchanted. She was an only child, and her parents, whose names
were Panus and Cora, were very fond of her, although she certainly
gave them a great deal of trouble. Not that she was naughty in any
way, for no one could have been better or more obedient; but she
was generally very dull and sleepy all the day, and only woke up at
night-time, when she liked to wander outside in the moonlight,
instead of going to bed. This habit led her parents to think she had
faery blood in her veins, and, although Panus was a dull, stupid man,
he nevertheless remembered how very peculiar his old grandmother
had been in her actions.
Another curious thing was that Lurina had been born just at full
moon, which is the time when all the faeries hold their great monthly
festival, and Cora remembered hearing them singing a birth-song
about little Lurina, who lay by her side. So there was no doubt but
that the faery blood which flowed in the veins of the old grandmother
had missed a generation, and once more came out in Lurina. Panus
and Cora therefore let her do just as she liked, which was the best
thing they could do, as they had been told by a Wise Woman who
lived near them.
Lurina was a most beautiful girl, with golden hair, a delicate white
skin, and dark, dark eyes, which had a somewhat mournful look in
their depths. When she arrived at the age of eighteen, a young
woodman called Berl fell in love with her, and, after some hesitation,
Lurina promised to become his wife, provided he let her do exactly
as she pleased, and did not stop her night wanderings.
“You can go into the forest whenever you like,” said Berl, kissing her;
“but why do you not come when the sun is bright, instead of the
feeble moonlight?”
“I don’t like the sun,” said Lurina, pouting, “it
makes everything so hot and disagreeable;
but the moonlight is so soft and beautiful that I
love it. Besides, you don’t know what strange
fancies come to me when the moon is
shining.”
“What kind of fancies?” asked Berl, who was a
somewhat dull youth.
“Oh, all sorts of beautiful things,” replied
Lurina dreamily; “lovely little men and women
dressed in green, who dance lightly on the
emerald turf, and strange, sweet songs which sound like rushing
water and the whispering of leaves. I dream about them when I’m in
the wood, but nowhere else.”
Berl was now convinced that Lurina had faery blood in her veins, and
attended the festivals of the faeries, which she called moon fancies;
but, being a very cautious man, he said nothing to Lurina;
nevertheless, before he got married he consulted the Wise Woman.
She was really a very wonderful old woman,
with snow-white hair and a form nearly bent
double with age. She listened to Berl’s story
about Lurina’s moon fancies, and then spoke
in a harsh, determined voice.
“Your future wife has dealings with the
faeries,” she said, looking at Berl from under
her bushy white eyebrows; “but what she sees
at night in the forest are real truths, and not
fancies as she thinks. My advice to you is not
to marry her, lest evil befall you.”
But Berl was too much in love with the beautiful Lurina to take this
advice, so he said nothing, but asked Panus and Cora to let him
marry their daughter at once, which they were very pleased to do, for
he was quite a rich man among the woodmen and, moreover, very
good-natured.
The wedding-day arrived at last, and Lurina was married to Berl by
the village pastor. Those who thought she had faery blood in her
veins said she would never be able to enter the church; but, much to
their surprise, nothing unusual occurred at the ceremony, so they
began to think Lurina was only a dull, stupid girl after all. This was a
mistake, however, as you will soon hear.
Berl and Lurina took up their abode in a pretty
cottage under the shade of a great oak, and
lived very happily for a long time. Lurina was
still dreamy and quiet all the day, but as Berl
was generally at work in the wood, he did not
notice it much. At night-time, however, she still
wandered into the forest, especially when the moon was very bright,
and this habit began to annoy Berl very much, but as he had given
his word not to interfere with Lurina, he said nothing.
One night, however, when the moon was full, and the whole of the
forest was bathed in the pale, cold light, he woke up, and, missing
his wife from his side, knew that she had gone into the forest to
indulge in her moon fancies. Berl sprang out of bed, and just caught
a glimpse of her shadow disappearing among the trunks of the trees;
so he rapidly slipped on his clothes and hurried after her, being
determined to find out why she was so fond of these midnight
wanderings.
“She’s going to a meeting of the faeries,” thought Berl, as he ran
across the lawn. “I hope the little people won’t be angry if they see
me; but my wife will protect me.”
For you must know that the faeries never like their revels gazed
upon by mortal eye, and if they catch any one looking they pinch him
black and blue; so Berl had good reason to be afraid of venturing
into the enchanted wood at night.
He followed his wife cautiously, always keeping her in sight, but
taking care she should not see him, when suddenly she crossed an
open glade and vanished. Berl ran after her, but could find no trace
of Lurina at all, and was quite disconsolate, when all at once he
espied her sitting at the foot of a great beech tree, leaning against
the trunk, with her beautiful face looking pale and white in the
moonshine. Having watched her for a long time, he ventured to
approach and call her by name, but, to his astonishment, she did not
answer nor express surprise at seeing him, but simply stared across
the glade with vague, unseeing eyes.
Emboldened by her silence, Berl ran up and fell on his knees with a
little laugh, thinking she would scold him for having dared to follow
her. He was perplexed, however, to see that she still did not seem to
notice him, and when at last he took one of her hands, it was as cold
as ice. Starting up in alarm, he looked closely at her, and found that
she did not breathe—placed his hand on her heart, and discovered
that it did not beat.
“Why, she’s dead!” he cried in alarm. “Lurina, it is I, your husband,
Berl.”
Still Lurina did not answer. So, convinced she was dead, Berl threw
her body over his shoulder and hurried home. When he got inside,
he did everything he could to revive her, but it was no use; the
beautiful Lurina was dead, and Berl sat all night beside her body,
weeping bitterly.
At the first red flush of dawn, he went from house to house, telling
Lurina’s parents and all the neighbours that his wife had died the
preceding night in the forest. Every one came to Berl’s house to see
if it was true, and offer advice, which one’s neighbours are very fond
of doing. Among those who came was the Wise Woman, who
surveyed the beautiful Lurina for some time in silence, then laughed
loudly.
“Why do you laugh?” asked Berl, angry with her for doing so.
“I laugh at your folly,” said the Wise Woman, looking oddly at him.
“Lurina is no more dead than I am.”
“But her heart is not beating, and she does not breathe,” said Panus
quickly.
“Nevertheless, she is not dead,” replied the Wise Woman quietly.
“Have you ever seen her like this before?” she added, turning to
Cora.
“No, never,” answered Cora, who was weeping bitterly.
“Ah! that is because you never followed her to the forest as Berl did,”
said the Wise Woman thoughtfully. “I told you, Berl, that your wife
had faery blood in her veins, and you should have taken my advice
about the marriage.”
“Well, it’s too late now to blame me,” said Berl roughly, for he did not
like to be reproached. “What am I to do?”
“I will tell you,” observed the Wise Woman. “Come to my cottage at
once.”
So Berl left the body of his beautiful Lurina with her parents, and
walked with the Wise Woman to her cottage, which was just on the
verge of the wood, but protected from the entry of the faeries by a
rusty horse-shoe fastened on the door.
When Berl entered, the Wise Woman drew a
circle on the ground with her magic staff,
whereupon a ring of pale flickering fire
appeared; then she pulled seven hairs out of
the tail of her black cat, and threw them into
the midst of the circle, where they began to
twist about in a most surprising manner. While
they were doing this, the Wise Woman waved
her staff seven times in the air, muttering
strange words, and a white smoke arose from
the centre of the fire circle where the hairs
were jumping about. This white smoke went up like a white cloud,
then suddenly vanished, and Berl saw a little man, all dressed in red,
sitting in the centre of the circle.
“Well, what do you want?” he said graciously
to the Wise Woman, whose bright eyes
sparkled when she saw him.
“Why did Lurina die?” asked the Wise
Woman. “Tell me, Pop.”
“She’s not dead at all,” answered Pop quickly;
“she is a faery, and went into the woods to attend the festival. As she
could not join the revels of Oberon in her human body, which would
be too big, she left it behind, leaning against the trunk of a beech
tree, and her faery body went to dance with the faeries. Of course,
when Berl took her body away, she could not find it again when she
returned, and she never will find it till it’s brought back to the same
place.”
“What is to be done, then?” asked the Wise
Woman.
“Berl must take Lurina’s body back again from
where he brought it,” said Pop; “but before
Lurina’s faery body can come back to it, Berl
will have to get permission for it to do so from
Oberon.—Now let me go, I’ve told you all I
know.”
The Wise Woman waved her staff again, the
white smoke came down on the little red man
like an extinguisher, then everything vanished, and Berl found
himself standing outside the door of the cottage, with the Wise
Woman smiling at him.
“You heard what Pop said,” she observed kindly; “you will have to go
to the court of King Oberon, and ask him to let your wife come back.”
“But will he do so?” asked Berl doubtfully.
“Ah, that I do not know,” said the Wise Woman; “but as the faeries
may treat you badly for looking at their festival, take this sprig of the
rowan tree, and it will protect you. Don’t forget to take Lurina’s body
back to the beech tree.”
Berl took the sprig of rowan with its red berries that she handed to
him, and walked away to his own cottage. He did not tell any one
what the Wise Woman had said, but managed to put off all their
questions by pretending to be too grieved to speak. So one after
another the neighbours departed, until only Panus and Cora were
left, and they, too, after kissing the pale lips of Lurina, went away,
leaving Berl alone.
Berl waited impatiently for night to come, and as soon as the moon
was glowing like glittering silver in the starry sky, he took Lurina up in
his arms, and, carrying her into the forest, placed her in the same
position as he had found her, leaning against the trunk of the beech
tree.
When he had done this, he looked round perplexed, for he did not
know how to find the faery court, but, taking out the rowan twig, he
looked at it earnestly, wondering if it would by some magic means
show him the way. But the rowan twig made no sign, and Berl put up
the hand in which he held it to take off his cap and fasten it in it,
when the twig happened to strike his ear, and immediately the silent
forest became full of sounds.
He heard the most delightful music, then a burst of gay laughter,
and, following the direction from whence they proceeded, he came
upon a wide open glade, with a smooth green sward upon which the
moon was shining. Still, though he looked very hard, he could not
see a faery; then, suddenly remembering how the rowan twig had
bewitched his ears, he took it out of his hat, and pressed the red
berries against his eyes. To his delight, he now saw that all the
sward was covered with thousands of little men and women all
dressed in pale green, and at the end was a throne of great white
lilies, upon which sat the King and Queen of Faeryland. All round the
glade were a circle of glow-worms, whose pale lights illuminated the
festival, and the bright moonlight pouring down through the boughs
of the trees made everything as bright as day.

As soon as the faeries discovered that Berl could really see them at
their revels, they shrieked with rage, and hundreds of the little green
creatures swarmed up on his body to pinch him black and blue. Berl
was in a great fright at first, till he suddenly remembered what the
Wise Woman had said about the rowan sprig, so immediately called
out—
“Magic branch of rowan tree,
Work the charm and set me free.”

At once there was a dead silence, and all the faeries fell to the
ground like withered leaves in autumn. Some of them ran to the
throne of lilies, and spoke to the King, upon which Oberon stepped
down, and, followed by a long train, walked up to Berl and
commanded him to sit down. Berl did so, and then Oberon struck the
ground with his wand, whereupon a great red rose sprang up, in
which he took his seat with Queen Titania, while the other faeries
gathered round and prepared to listen.
“Now, mortal,” said Oberon in a dignified manner, “how is it that with
an earthly eye you have beheld the unseen revels of the faeries?”
“It was by this rowan twig, your Majesty,” said Berl, showing Oberon
the sprig; “the Wise Woman gave it to me as a protection, in case
the faeries should be angry.”
“We are only angry with evil-disposed people,” said Oberon gently;
“and if you come here with a pure heart, no one will harm you. What
do you want with us?”
“I want my wife Lurina,” said Berl boldly.
There was a cry of astonishment at this. Suddenly a faery flew
forward on emerald wings, and, as she stood before Oberon, Berl
saw that it was Lurina.
“Yes, your Majesty,” said the faery Lurina, “I am his wife, but he lost
me through his curiosity, as your Majesty knows. I was exiled from
Faeryland many years ago, and condemned to dwell in a human
body. I lived in Lurina’s body, but was allowed by the Queen to join in
the faery revels at night. I told my husband not to follow me, but he
did so, and found my human body lying as if dead under the beech
tree, because I had left it to attend the festival. When I went back, I
could not find it, so had to stay in the forest all day as a faery.”
“Is this true?” asked Oberon, turning to Titania.
“Perfectly true,” answered Titania. “It was I who punished Lurina by
exiling her from Faeryland, but now I think she is punished enough,
and, as she has lost her human body through no fault of her own,
she is pardoned.”
On hearing these words, the faery Lurina dropped on her knees and
kissed the Queen’s hand, then flew off to be congratulated on her
good luck by her faery friends. But Berl was not at all pleased to
think he had lost his wife for ever, and spoke to the King.
“But what am I to do, your Majesty?” he said, with tears in his eyes.
“I love Lurina very much, and don’t want to lose her.”
“There is only one thing to be done,” said Oberon. “Have you
brought back the human body of Lurina?”
“Yes, your Majesty; it’s under the beech tree,” replied Berl eagerly.
“Then I’ll tell you what I’ll do,” said the King. “As the Queen has
pardoned Lurina, of course she can’t go back, as no faery likes to
live in your world; but the faery Mala has been very naughty of late,
so I will condemn her to inhabit your wife’s body, and stay in exile
until she is good enough to come back to court.”
“But that won’t be Lurina,” said Berl.
“She will wear Lurina’s body,” replied Oberon, laughing; “and no one
but yourself will be the wiser. Leave the forest at once, and to-
morrow morning you will see your wife come to the cottage door.
Strike up, music!”
Whereupon the faery music began to play loudly—the blue bells
rang merry chimes, the grasshoppers creaked gaily, and the wind
commenced to sigh among the forest leaves.
Berl dare not disobey the King’s command, and, after seeing Oberon
return to the throne of white lilies, and all the faeries commence their
dance again, he arose to his feet. As he did so, he accidentally
dropped the rowan twig, which was snatched up by a faery at once,
and then the whole of the faery revel vanished. Berl could see
nothing of the dancing, nor hear anything of the music, but only
beheld the smooth green lawn, the myriad trees around, and the
round orb of the moon.
There was nothing left to do but to return home, which he did at
once, and you may be sure he got very little sleep that night. At early
dawn he was standing at his cottage door, looking towards the wood,
when he beheld Lurina tripping gaily towards him, singing merrily.
When she saw Berl, she flung herself into his arms.
“Dear Berl, here I am at last!” she cried, kissing him.
“But you are the faery Mala,” said Berl, looking at her in perplexity.
“Who is the faery Mala?” asked Lurina, who had forgotten all about
her faery existence now she was in a human body. “I never heard of
her. I went into the forest and fell asleep, I suppose. When I awoke I
came straight back to you.”
Berl was a wise man, and said no more, but kissed his newly-
recovered wife heartily, then called all the neighbours to congratulate
him, which they did loudly.
When they told Lurina she had been dead, she declared it was
nonsense, as it was only a sleep, and soon every one believed it
except Berl and the Wise Woman, to whom Berl told all about his
reception by Oberon.
Lurina became bright and gay all day, and never more wandered into
the forest to indulge in moon fancies, so Berl thought the faery Mala
must have been exiled altogether from Faeryland.
She was very good indeed, so good that Berl was quite afraid lest
she should be called back to Faeryland, but as yet that has not
happened.
THE ROSE-PRINCESS
I.

THE QUEEN WHO DID NOT BELIEVE IN FAERIES.

ONCE upon a time there was a King and Queen who reigned over a
most beautiful country. They were very rich and very happy, and
lived in a most gorgeous palace, the grand gardens of which sloped
down to the blue sea, on which sailed many richly-laden ships,
carrying merchandise to the capital city of the kingdom.
The palace was built of silver and ivory, and adorned with pale blue
velvet hangings, upon which were painted the most exquisite
pictures in the world. It stood on a high green hill, and far below lay
the immense city of Buss, with its wide streets, many towers, and
glittering fountains. As the King and Queen looked down from their
beautiful castle on to the mighty city and great green plains which
surrounded it, they ought to have been happy, but, curious to say,
they were not. They had everything in the world to make them happy
except one thing, and that one thing they longed for ardently, the
more so because they did not see any chance of obtaining it.
“Ah, if I only had a child!” sighed the Queen.
“Yes; a little boy,” said the King.
“Or a little girl,” retorted the Queen. “Don’t you know any faeries, my
dear, who would gratify our one desire?”
“No,” replied the King, shaking his head sadly. “My great-grandfather
was the last person who ever saw a faery; no one has ever seen one
since.”
“I don’t believe they exist,” said the Queen angrily.
“Oh yes, they do,” observed her husband. “This palace is said to
have been built by faery hands.”
“I don’t believe they exist,” declared the Queen again. “If they did,
they would surely help me by giving me a little girl or boy. What’s the
good of faeries if they don’t help you?”
“I wish they would help me,” sighed his Majesty; “all my subjects are
getting so unruly that I don’t know but what there will be a revolution,
and they’ll put some one else on the throne.”
“Who else could they find?” asked the Queen curiously.
“Oh, I’m not certain of that,” replied the King. “You see, my
grandfather, who was the first of our dynasty, ascended the throne
by the help of the faeries, and the king who was deposed vanished,
but they say some of his descendants live there;” and he pointed
downward to the city.
“And there they will stay,” said the Queen angrily. “I don’t believe a
word of it. Faeries indeed! they don’t exist.”
“But they do,” persisted the King.
“Pooh!” replied her Majesty. “Pooh!”
Now, when the Queen said “Pooh!” her husband knew it was no use
talking any more, so he retired to his cabinet to look over some
petitions from starving people, while the Queen went down with the
ladies-in-waiting to walk in the garden.
It was really a delightful garden, filled with the most wonderful
flowers. There were great beds of scented carnations, glowing with
bright colours, red and white foxgloves, in whose deep bells the
faeries were said to hide, masses of snowy white lilies, and a great
mixture of marigolds, hollyhocks, sweet-williams, daisies, buttercups,
and dahlias, which made the whole ground look like a brightly-
coloured carpet. And as for the roses—oh, what a quantity of
charming roses there were growing there! Red roses, varying in
colour from a deep scarlet to a pale pink; white roses looking like
snowflakes; yellow roses that glittered like gold, and faintly-tinted
tea-roses that perfumed the still air with their sweet odours. Oh, it
was really a famous garden, and bloomed all the year round, for the
kingdom was situated in the region of perpetual summer, where
snow never fell and frost never came.
The Queen, whose name was Flora, wandered disconsolately about
the garden, quite discontented with the beautiful flowers, because
she could not obtain the wish of her heart. The ladies-in-waiting
began to pluck flowers in order to adorn the royal dinner-table, and
Queen Flora walked on alone towards a great white rose tree that
was covered with blossoms. As she stood looking at it, she suddenly
heard a tiny laugh, and a great white rose unfolded its petals,
showing a golden heart, and also a dainty little faery dressed in
delicate green leaves, with a crown of little white rosebuds, and a
wand made of a blade of grass. When the Queen saw her, she was
much astonished, because she did not believe in faeries, but, now
she really saw one, she had to believe her own eyes.
“I am called Rosina,” said the faery in a sweet, low voice, “and I
heard you say you did not believe faeries existed; now you see they
do, because I am a faery.”
“Yes, you must be a faery,” replied the Queen, clasping her hands,
“because no human being could be so small.”
“Oh, I can be any size I please,” said the Faery Rosina, with a laugh,
and, stepping down from the rose, she alighted on the ground, and
instantly grew as tall as the Queen herself.
“Oh, you are a real, real faery!” cried Flora in
delight. “But why do the faeries not appear
now?”
“Because the land is so badly governed,” said
Rosina in a severe tone. “Yourself and the
King only think of luxury, and never of
assisting the poor people; but I am going to
cure you both of such neglect.”
“But how?” asked the Queen, trembling.
“By giving you your wish,” said the faery,
plucking a white rosebud off the tree. “Lay this bud beside your bed
to-night, and at the dawn of day it will change into a beautiful little
baby Princess, which is what you want.”
“Oh yes, yes!” cried the Queen; “I do want a Princess.”
“Every night at sundown,” said the faery slowly, “the Princess will
once more change into a flower, and become a human being again
at sunrise.”
“But will she change like this all her life?” asked the Queen, in great
dismay, for she did not like to have such a curious baby.
“She will be a Princess by day and a rosebud by night,” said Rosina,
smiling, “until she marries the great-grandson of the King whom your
husband’s grandfather deposed from the throne.”
“And where is this Prince to be found?” demanded the Queen
breathlessly. “I’ll marry my Princess to him at once.”
“You can’t do that,” said the faery, shaking her head. “The exiled
Prince does not know who he is, and the Princess herself will have
to tell him he is of the royal blood. When she does that, and you
marry them to one another, the spell will be removed, and she will be
a Princess both by day and by night.”
“I don’t see how she’s ever going to find this lost Prince!” said the
Queen angrily. “I shall certainly not let my child run about the world
looking for him.”
“Fate is stronger than you are,” replied the faery, “and you will see
what you will see.” So saying, she suddenly disappeared, and, as
the white rose slowly curled up its petals, the Queen knew the Faery
Rosina was inside.
The ladies-in-waiting, who had seen the Queen talking to a strange
lady, dared not approach before, but now they saw their royal
mistress was alone, they ventured to come near, and one of them
offered to take the white rosebud which the Queen held.
“Oh no!” cried Flora, hastily drawing back her hand; “I am going to
keep this rosebud. It is my”—
She was going to say Princess, but, thinking it wiser to keep her own
counsel, she held her tongue, and, on returning to the palace, told no
one but the King about the faery’s promise. The King laughed at her,
and said he did not believe her story—that she must be dreaming;
but the Queen persisted in her tale, that the rosebud would become
a Princess, and placed it on a velvet cushion by the side of her bed.

You might also like