-
Contents
Part I Business Intelligence and Applications
1 Study on Standard of Tuition in Higher Education . . . . . . . . . . 3Chunfeng Liu, Shanshan Kong, Zhang Ling and Aimin Yang
2 Role of Teachers in Oral English Teaching . . . . . . . . . . . . . . . . 13Wanyu Liu
3 Study on Competitive Power of Chinese RetailChain Company . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Qingwen Li
4 Cultivating Scheme of Students Autonomous Learningin English Listening and Speaking. . . . . . . . . . . . . . . . . . . . . . . 27Xianmei Wei and Yiquan Liu
5 Research on English Teaching Cohesion Theory . . . . . . . . . . . . 33Ke Tu
6 Research on Practicing Teaching of University Students’Political and Ideological Education . . . . . . . . . . . . . . . . . . . . . . 41Jin Rui Zhao and Xin Ying Zhao
7 Reformation of University Students’ Politicaland Ideological Courses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47Jin Rui Zhao and Hui Jian Liang
8 Building of E-Commerce Trading Platform Basedon Web Data Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53Ruihui Mu
xv
http://dx.doi.org/10.1007/978-1-4471-4853-1_1http://dx.doi.org/10.1007/978-1-4471-4853-1_2http://dx.doi.org/10.1007/978-1-4471-4853-1_3http://dx.doi.org/10.1007/978-1-4471-4853-1_3http://dx.doi.org/10.1007/978-1-4471-4853-1_4http://dx.doi.org/10.1007/978-1-4471-4853-1_4http://dx.doi.org/10.1007/978-1-4471-4853-1_5http://dx.doi.org/10.1007/978-1-4471-4853-1_6http://dx.doi.org/10.1007/978-1-4471-4853-1_6http://dx.doi.org/10.1007/978-1-4471-4853-1_7http://dx.doi.org/10.1007/978-1-4471-4853-1_7http://dx.doi.org/10.1007/978-1-4471-4853-1_8http://dx.doi.org/10.1007/978-1-4471-4853-1_8
-
9 Study on Professional Education in Liberal Arts Colleges . . . . . 61Ping-an Wang
10 Reform of College Advertising Teaching . . . . . . . . . . . . . . . . . . 67Ying Guo
11 Study of Comprehensive Training in Import and ExportBusiness in Higher Vocational College . . . . . . . . . . . . . . . . . . . . 77Yuying Zhu
Part II Communication Technology and Applications
12 Reliable and Energy-Efficient Routing Protocolfor Wireless Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . 87Liwei Tan
13 Research on Minimum Coverage Algorithmin Wiriness Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . 97Gang Hong and Xiao-qin Pan
14 Quantum Secure Direct Communication Protocol Basedon Four-Qubit Cluster State . . . . . . . . . . . . . . . . . . . . . . . . . . . 105Xianzhong Li, Guotian He, Mingxin Gu and Pengfei Dai
15 An On-Demand QoS Routing Algorithmin Multiservice Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113Yanjing Li and Li Li
16 Large-Scale Test of 4G TD-LTE Network . . . . . . . . . . . . . . . . . 121Jiankang Zhang, Yuwen Liu, Yangli Gu and Lijuan Su
17 A Routing Algorithm Based on High Energy Efficiencyin Cooperation WSN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129Jianbin Xue, Ting Zhang and Wenhua Wang
18 Communication Protocol for Greenhouse Monitoring SystemBased on Wireless Sensor Network . . . . . . . . . . . . . . . . . . . . . . 137Han Qiao, Qin Ma, Xin Zhu, Mingli Li, Jinhui Zhouand Xiongchun Duan
19 Research on Single-Carrier System with Frequency-DomainEqualization in HF Communication. . . . . . . . . . . . . . . . . . . . . . 145Boyuan Xu, Fei Xu and Weizhang Xu
xvi Contents
http://dx.doi.org/10.1007/978-1-4471-4853-1_9http://dx.doi.org/10.1007/978-1-4471-4853-1_10http://dx.doi.org/10.1007/978-1-4471-4853-1_11http://dx.doi.org/10.1007/978-1-4471-4853-1_11http://dx.doi.org/10.1007/978-1-4471-4853-1_12http://dx.doi.org/10.1007/978-1-4471-4853-1_12http://dx.doi.org/10.1007/978-1-4471-4853-1_13http://dx.doi.org/10.1007/978-1-4471-4853-1_13http://dx.doi.org/10.1007/978-1-4471-4853-1_14http://dx.doi.org/10.1007/978-1-4471-4853-1_14http://dx.doi.org/10.1007/978-1-4471-4853-1_15http://dx.doi.org/10.1007/978-1-4471-4853-1_15http://dx.doi.org/10.1007/978-1-4471-4853-1_16http://dx.doi.org/10.1007/978-1-4471-4853-1_17http://dx.doi.org/10.1007/978-1-4471-4853-1_17http://dx.doi.org/10.1007/978-1-4471-4853-1_18http://dx.doi.org/10.1007/978-1-4471-4853-1_18http://dx.doi.org/10.1007/978-1-4471-4853-1_19http://dx.doi.org/10.1007/978-1-4471-4853-1_19
-
20 LEACH Clustering Routing Protocol for WSN . . . . . . . . . . . . . 153Dongfeng Guo and Lijun Xu
21 Security Model Based on Cluster Formationin Ad Hoc Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161Shuyu Hu
22 An Enhanced BitTorrent Protocol Supporting MultipleNetwork Accesses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169Xue Yifei
23 An Improved QoS Routing Algorithm in Internet . . . . . . . . . . . 177Hongbo Huang and Yongzhi Wang
24 Synchronization Accuracy in Wireless Sensor Networks . . . . . . . 187Ying Zhang
25 Energy-Efficient Routing Algorithm in WirelessSensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193Hongmei Li
26 Planar Inverted-F Antennas Structures for MobileCommunications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199Ming Li and Juan Song
Part III Internet of Things and Applications
27 Study of Web-Based Independent Learning Environmentin the Course of Programming Foundation . . . . . . . . . . . . . . . . 207Yan Gou, Dongsheng Liu and Liping Zhang
28 MPLS VPN Technology in Campus Network . . . . . . . . . . . . . . . 215Dong Wang
29 Evolution Course and Analysis of Internet of Things . . . . . . . . . 221Peng Li, Qingzheng Xu and Na Wang
30 Study of the Hierarchy Management Model Basedon Active Network Node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229Wenshu Duan, Tianping Dong, Yan Ma and Lunpeng Liu
Contents xvii
http://dx.doi.org/10.1007/978-1-4471-4853-1_20http://dx.doi.org/10.1007/978-1-4471-4853-1_21http://dx.doi.org/10.1007/978-1-4471-4853-1_21http://dx.doi.org/10.1007/978-1-4471-4853-1_22http://dx.doi.org/10.1007/978-1-4471-4853-1_22http://dx.doi.org/10.1007/978-1-4471-4853-1_23http://dx.doi.org/10.1007/978-1-4471-4853-1_24http://dx.doi.org/10.1007/978-1-4471-4853-1_25http://dx.doi.org/10.1007/978-1-4471-4853-1_25http://dx.doi.org/10.1007/978-1-4471-4853-1_26http://dx.doi.org/10.1007/978-1-4471-4853-1_26http://dx.doi.org/10.1007/978-1-4471-4853-1_27http://dx.doi.org/10.1007/978-1-4471-4853-1_27http://dx.doi.org/10.1007/978-1-4471-4853-1_28http://dx.doi.org/10.1007/978-1-4471-4853-1_29http://dx.doi.org/10.1007/978-1-4471-4853-1_30http://dx.doi.org/10.1007/978-1-4471-4853-1_30
-
31 Fault Elimination in Campus Network . . . . . . . . . . . . . . . . . . . 237Hong Ye, Yuanyuan Liang, Mingyong Li and Wenshu Duan
32 Advices of Perfecting the Civil Law on Protectionof Network Virtual Property . . . . . . . . . . . . . . . . . . . . . . . . . . . 245Yu-e Li and Zhi-jie Li
33 Intelligent Learning System Based on Ontologyfor Network Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251Xie Yong
34 IOT Intelligent Monitoring Terminal Based on ARM1Linux . . . 259Li Lu and Qi Ren
35 Study of Security Technology in Wireless Sensor Networks . . . . 267Chunjie Tang
36 College Student’s Poineering Work Ability Analysis Basedon the Network Environment . . . . . . . . . . . . . . . . . . . . . . . . . . 275Zhijin Wang
37 College English Teaching Resources Library Basedon Campus Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283Fuqiang Wang and Lijun Xu
38 A Novel Secure Pairwise and Groupwise SynchronizingScheme in WSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289Qin Dong
39 Study of Gender Feature in Computer MediatedCommunication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297Xiaoyi Zheng
Part IV Information Security and Network Protection
40 A Tibetan and Uygur Sensitive Word Tracking System . . . . . . . 307Xiaodong Yan, Xiaobing Zhao and Guosheng Yang
41 Intrusion Detection System Model Based on CGA . . . . . . . . . . . 315Zongjiang Wang and Xiaobo Li
xviii Contents
http://dx.doi.org/10.1007/978-1-4471-4853-1_31http://dx.doi.org/10.1007/978-1-4471-4853-1_32http://dx.doi.org/10.1007/978-1-4471-4853-1_32http://dx.doi.org/10.1007/978-1-4471-4853-1_33http://dx.doi.org/10.1007/978-1-4471-4853-1_33http://dx.doi.org/10.1007/978-1-4471-4853-1_34http://dx.doi.org/10.1007/978-1-4471-4853-1_35http://dx.doi.org/10.1007/978-1-4471-4853-1_36http://dx.doi.org/10.1007/978-1-4471-4853-1_36http://dx.doi.org/10.1007/978-1-4471-4853-1_37http://dx.doi.org/10.1007/978-1-4471-4853-1_37http://dx.doi.org/10.1007/978-1-4471-4853-1_38http://dx.doi.org/10.1007/978-1-4471-4853-1_38http://dx.doi.org/10.1007/978-1-4471-4853-1_39http://dx.doi.org/10.1007/978-1-4471-4853-1_39http://dx.doi.org/10.1007/978-1-4471-4853-1_40http://dx.doi.org/10.1007/978-1-4471-4853-1_41
-
42 Research on Risk of Knowledge Sharing Basedon Risk Assessmentand Energy Analysis . . . . . . . . . . . . . . . . . . 323Bingfeng Liu
43 A Novel Cache Prefetching Algorithm for RestorationOperations of Deduplication Systems . . . . . . . . . . . . . . . . . . . . . 331Zhike Zhang, Zejun Jiang, Xiaobin Cai and Chengzhang Peng
44 Balance Theory-Based Model for Discovering Trust Network. . . 339Guangming Yang, Xiangjun Hou, Zhenhua Tan,Liangyu Zhang and Hainan Yu
45 Cluster Enterprises’ Internationalization Basedon Cluster Risk Evaluation Model . . . . . . . . . . . . . . . . . . . . . . . 347He Huang
46 Enterprise Information Security Warning Basedon Subjective Bayes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355Bo Wu and Tuo Ji
47 Intrusion Detection Based on Rough-Set Attribute Reduction . . . 363Shuyue Ma, Huifen Liao and Yuan Yuan
Part V Semantic Grid and Natural Language Processing
48 Building of Virtual Server in Computer Laboratory . . . . . . . . . 373Yueping Wu, Jian Zheng and Yi Du
49 New Global Stability Criterion of Delayed BAMNeural Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381Chunyan Hu and Degang Yang
50 Semantic Integration Framework Based on DomainOntology Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391Jike Ge, Xianqiu Xu, Yongwen Huang and Mingying You
51 Research of Text Plagiarism Detection Process . . . . . . . . . . . . . 401Qin Xu, Yan Tang and Lan-su Nie
52 A Hot Topic Detection Approach on Chinese Microblogging . . . 411Changchun Yang, Jing Yang, Hong Ding and Hengxin Xue
Contents xix
http://dx.doi.org/10.1007/978-1-4471-4853-1_42http://dx.doi.org/10.1007/978-1-4471-4853-1_42http://dx.doi.org/10.1007/978-1-4471-4853-1_43http://dx.doi.org/10.1007/978-1-4471-4853-1_43http://dx.doi.org/10.1007/978-1-4471-4853-1_44http://dx.doi.org/10.1007/978-1-4471-4853-1_45http://dx.doi.org/10.1007/978-1-4471-4853-1_45http://dx.doi.org/10.1007/978-1-4471-4853-1_46http://dx.doi.org/10.1007/978-1-4471-4853-1_46http://dx.doi.org/10.1007/978-1-4471-4853-1_47http://dx.doi.org/10.1007/978-1-4471-4853-1_48http://dx.doi.org/10.1007/978-1-4471-4853-1_49http://dx.doi.org/10.1007/978-1-4471-4853-1_49http://dx.doi.org/10.1007/978-1-4471-4853-1_50http://dx.doi.org/10.1007/978-1-4471-4853-1_50http://dx.doi.org/10.1007/978-1-4471-4853-1_51http://dx.doi.org/10.1007/978-1-4471-4853-1_52
-
53 High-Speed and High-Precision Wavelength Demodulationof Fiber Bragg Grating Sensor Network . . . . . . . . . . . . . . . . . . 421Junjie Bai, Jianxing Li, Ying Wu and Xiaoyun Zhang
54 A New Method for Rapid Extraction of Graduation Line. . . . . . 429Jianxing Li, Junjie Bai and Jian Dong
55 Research of NFC Framework in MeeGo Harmattan . . . . . . . . . 437Wei Gong, Yan Ma, Yang Zhang and Ping Chen
56 A Hierarchical Scheduler Design for Multiple Trafficswith Reduced Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445Qiaoyun Sun, Haijun Zhang, Kai Sun, Shuguang Zhangand Cuiting Wu
57 Low-Slop Hilly Land Resources Development and UtilizationBased on AHP-SWOT Model . . . . . . . . . . . . . . . . . . . . . . . . . . 453Jie Lv, Xiping Yuan, Shu Gan and Wei Li
58 Novel and Effective Multi-Secret Sharing Scheme . . . . . . . . . . . 461Shanyue Bu and Ronggeng Yang
59 Rural E-Commerce Based on Probabilistic NeuralNetwork Model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469Yuan He, Yangxu Li and Hong Xu
Part VI Artificial Intelligence
60 Optimality Conditions for Minimax Semi-Infinite FractionalProgramming Involving Generalized Convexity . . . . . . . . . . . . . 479Xiaoyan Gao
61 Study on Hairiness of Polyester/Cotton Blended Yarn in RotorSpinning Via Artificial Neural Network Theory . . . . . . . . . . . . . 487Bo Zhao
62 SEMG Multi-Class Classification Based on S4VM Algorithm . . . 495Zhuojun Xu, Yantao Tian, Zhang Li and Yang Li
63 Attribute Reduction Based on Equivalence Classeswith Multiple Decision Values in Rough Set. . . . . . . . . . . . . . . . 505Dongwen Zhang, Jiqing Qiu and Xiao Li
xx Contents
http://dx.doi.org/10.1007/978-1-4471-4853-1_53http://dx.doi.org/10.1007/978-1-4471-4853-1_53http://dx.doi.org/10.1007/978-1-4471-4853-1_54http://dx.doi.org/10.1007/978-1-4471-4853-1_55http://dx.doi.org/10.1007/978-1-4471-4853-1_56http://dx.doi.org/10.1007/978-1-4471-4853-1_56http://dx.doi.org/10.1007/978-1-4471-4853-1_57http://dx.doi.org/10.1007/978-1-4471-4853-1_57http://dx.doi.org/10.1007/978-1-4471-4853-1_58http://dx.doi.org/10.1007/978-1-4471-4853-1_59http://dx.doi.org/10.1007/978-1-4471-4853-1_59http://dx.doi.org/10.1007/978-1-4471-4853-1_60http://dx.doi.org/10.1007/978-1-4471-4853-1_60http://dx.doi.org/10.1007/978-1-4471-4853-1_61http://dx.doi.org/10.1007/978-1-4471-4853-1_61http://dx.doi.org/10.1007/978-1-4471-4853-1_62http://dx.doi.org/10.1007/978-1-4471-4853-1_63http://dx.doi.org/10.1007/978-1-4471-4853-1_63
-
64 Mathematical Models of Classification and Mass Calculation . . . 513Jincai Chang, Aimin Yang and Liyu Chen
65 Green Supply Chain and Supplier Selection and Evaluation. . . . 523Jie Xiang
66 Path-Based Floyd Algorithm in Automatic Search System . . . . . 531Hua Sun
67 Modern Fashion Design Based on Virtual Reality . . . . . . . . . . . 539Zhang Yi
68 The Application of Fuzzy Self-Tuning PID Controllerin SEHS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547Sun Lan
Part VII Mathematics and Computation
69 Research of University Financial Risk Early WarningMechanism Based on Hierarchical Fuzzy Method . . . . . . . . . . . 559Jun Zheng, Benluo Xiao, Guangbiao Sun and Xiaosi Xu
70 Hilbert Algebras in Negative Implicative BCK-Algebras . . . . . . 569Qiu-na Zhang, Nan Ji and Li-nan Shi
71 Study on Optimization of Innovative City Evaluation IndexSystem Based on Mathematical Model. . . . . . . . . . . . . . . . . . . . 575Shujuan Yuan and Li Li
72 Some New Results for the Tree Indexed Markov Chains . . . . . . 583Zhenyao Fan, Jian Zhang, Jing Bian and Yourong Wang
73 Actuarial Pricing to Compound Option UnderOrnstein-Uhlenback Process . . . . . . . . . . . . . . . . . . . . . . . . . . . 591Congcong Xu and Haiying Li
74 Mental Health Evaluation Model Based on FuzzyComprehensive Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603Ying Li, Donghui Li and Xinchun Wang
75 Predictive Model of Population Growth in China. . . . . . . . . . . . 611Zhijiang Wang, Jixun Song and Xiaolong Zhang
Contents xxi
http://dx.doi.org/10.1007/978-1-4471-4853-1_64http://dx.doi.org/10.1007/978-1-4471-4853-1_65http://dx.doi.org/10.1007/978-1-4471-4853-1_66http://dx.doi.org/10.1007/978-1-4471-4853-1_67http://dx.doi.org/10.1007/978-1-4471-4853-1_68http://dx.doi.org/10.1007/978-1-4471-4853-1_68http://dx.doi.org/10.1007/978-1-4471-4853-1_69http://dx.doi.org/10.1007/978-1-4471-4853-1_69http://dx.doi.org/10.1007/978-1-4471-4853-1_70http://dx.doi.org/10.1007/978-1-4471-4853-1_71http://dx.doi.org/10.1007/978-1-4471-4853-1_71http://dx.doi.org/10.1007/978-1-4471-4853-1_72http://dx.doi.org/10.1007/978-1-4471-4853-1_73http://dx.doi.org/10.1007/978-1-4471-4853-1_73http://dx.doi.org/10.1007/978-1-4471-4853-1_74http://dx.doi.org/10.1007/978-1-4471-4853-1_74http://dx.doi.org/10.1007/978-1-4471-4853-1_75
-
76 Training Management of High-Level Sports Teamsin Ordinary Universities Based on Mathematics Model . . . . . . . 619Chunzhong Liu
77 Research on the Role of Vocabulary in the Teaching of EnglishWriting Based on Mathematical Statistics Law . . . . . . . . . . . . . 627Lihua Yang
78 Analysis of College Students’ Employmentand Entrepreneurship Based on Mathematical Statistic Law . . . 635Jianfeng Cui and Tao Xiong
Part VIII Information Management Systemsand Software Engineering
79 Closed-Loop Control System of Single-PhaseAC FFU Motor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645Yiwang Wang, Bo Zhang and Hui Pan
80 Personal Health Records System Based on App Engine . . . . . . . 653Bin Mu, Cheng Xiong and Shijin Yuan
81 Efficient Applied Software Talents Training Scheme . . . . . . . . . 661Yi Xiang, Jun Peng, Liang Lei and Ying Wu
82 Solution of Online Reimbursement Systemon Campus Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669Guang Biao Sun, Jun Zheng, Lu Yang Gao and Hui Wang
83 Research of Accounting Information SystemUnder E-Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679Quan Quan, Yaping Li and Lingli Wang
84 Radio Frequency Identification Books Monitoring System . . . . . 687Quan Bi Chang, Li Juan Wang and Zhi Jie Fan
85 Design and Implementation of Campus GIS . . . . . . . . . . . . . . . 695Shunxi Yan, Xiaolei Wang and Dongfa Li
86 Island Resources Management System Based on GIS . . . . . . . . . 703Xue-yu Mi, Yang Li, Lin Zhang, Guang Chen and Ai-hong Zhang
xxii Contents
http://dx.doi.org/10.1007/978-1-4471-4853-1_76http://dx.doi.org/10.1007/978-1-4471-4853-1_76http://dx.doi.org/10.1007/978-1-4471-4853-1_77http://dx.doi.org/10.1007/978-1-4471-4853-1_77http://dx.doi.org/10.1007/978-1-4471-4853-1_78http://dx.doi.org/10.1007/978-1-4471-4853-1_78http://dx.doi.org/10.1007/978-1-4471-4853-1_79http://dx.doi.org/10.1007/978-1-4471-4853-1_79http://dx.doi.org/10.1007/978-1-4471-4853-1_80http://dx.doi.org/10.1007/978-1-4471-4853-1_81http://dx.doi.org/10.1007/978-1-4471-4853-1_82http://dx.doi.org/10.1007/978-1-4471-4853-1_82http://dx.doi.org/10.1007/978-1-4471-4853-1_83http://dx.doi.org/10.1007/978-1-4471-4853-1_83http://dx.doi.org/10.1007/978-1-4471-4853-1_84http://dx.doi.org/10.1007/978-1-4471-4853-1_85http://dx.doi.org/10.1007/978-1-4471-4853-1_86
-
87 Study of Tourism Information System Basedon Android Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711Fengbo Hou and Xin Du
Part IX Physical Education and Applications
88 Happy Education in the School Football Teaching . . . . . . . . . . . 721Dong Bin
89 Study of Martial Arts Industry in Henan Province . . . . . . . . . . 729Yuxi Hu
90 Study on a User-Defined and Low Cost Fieldbus Technology . . . 737Chengshan Zhang
91 Study on Education Enlightenment of Olympic Spiritto Competitive Sports Training . . . . . . . . . . . . . . . . . . . . . . . . . 745Jianping Xi
92 Research on the Development Pattern for Rural Sports . . . . . . . 751Jianping Xi
93 Study of Citizens Sports Tourism . . . . . . . . . . . . . . . . . . . . . . . 759Lin Guo, Fei Ma and Zhizhang Wang
94 Study on Promotion Development of Shaolin Wushu . . . . . . . . . 767Deliang Wei and Yang Liu
95 Research on Rural Sports Development . . . . . . . . . . . . . . . . . . . 775Hongxue Zhang
96 An Adolescent Physical Exercise Ability Evaluation Methodin Sports Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 783Xiaokun Zhang, Cheng Tao and Yan Liu
97 Study on Physical Education of Vocational Colleges Basedon Outward Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 791Qiang Wei, Yali Liu and Xiaomei Zhao
98 Social Sports Connotation and Occupation Mechanism . . . . . . . 799Keke Bao
Contents xxiii
http://dx.doi.org/10.1007/978-1-4471-4853-1_87http://dx.doi.org/10.1007/978-1-4471-4853-1_87http://dx.doi.org/10.1007/978-1-4471-4853-1_88http://dx.doi.org/10.1007/978-1-4471-4853-1_89http://dx.doi.org/10.1007/978-1-4471-4853-1_90http://dx.doi.org/10.1007/978-1-4471-4853-1_91http://dx.doi.org/10.1007/978-1-4471-4853-1_91http://dx.doi.org/10.1007/978-1-4471-4853-1_92http://dx.doi.org/10.1007/978-1-4471-4853-1_93http://dx.doi.org/10.1007/978-1-4471-4853-1_94http://dx.doi.org/10.1007/978-1-4471-4853-1_95http://dx.doi.org/10.1007/978-1-4471-4853-1_96http://dx.doi.org/10.1007/978-1-4471-4853-1_96http://dx.doi.org/10.1007/978-1-4471-4853-1_97http://dx.doi.org/10.1007/978-1-4471-4853-1_97http://dx.doi.org/10.1007/978-1-4471-4853-1_98
-
99 Research on Socialized Mechanism of the Gymnasiumand Stadium Inside School . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807Ju-xia Sheng
Part X Intelligent Evolutionary Algorithms
100 Multi-Product Kanban System Based on ModifiedGenetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 817Liang Huang
101 Image Feature Selection Based on Genetic Algorithm . . . . . . . . 825Liang Lei, Jun Peng and Bo Yang
102 Weather Forecast Based on Improved Genetic Algorithmand Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833XueMei Meng
103 A Digital Watermarking Method Based on ParticleSwarm Optimization and Contourlet Transform . . . . . . . . . . . . 839Jia Mo, Zhaofeng Ma, Yixian Yang and Xinxin Niu
104 Mixed Recommendation Algorithm Based on CommodityGene and Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 849Zhang Hao
105 Improved Algorithm Based on Gaussian MixtureBackground Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859Wei Wang, Xinyuan Yang, Sui Zong and Chenhui Wang
106 Particle Filter-Based Target Tracking in Gaussianand Non-Gaussian Environments. . . . . . . . . . . . . . . . . . . . . . . . 867Tanglin Xie, YiKang Yang and Xue Li
107 A Delay-Constrained Multicast Routing Algorithm Basedon the Ant Colony Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . 875Linan Shi, Li Li, Wenjing Zhao and Bochao Qu
108 An Improved Discrete Particle Swarm OptimizationAlgorithm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883QingFeng Liu
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 891
xxiv Contents
http://dx.doi.org/10.1007/978-1-4471-4853-1_99http://dx.doi.org/10.1007/978-1-4471-4853-1_99http://dx.doi.org/10.1007/978-1-4471-4853-1_100http://dx.doi.org/10.1007/978-1-4471-4853-1_100http://dx.doi.org/10.1007/978-1-4471-4853-1_101http://dx.doi.org/10.1007/978-1-4471-4853-1_102http://dx.doi.org/10.1007/978-1-4471-4853-1_102http://dx.doi.org/10.1007/978-1-4471-4853-1_103http://dx.doi.org/10.1007/978-1-4471-4853-1_103http://dx.doi.org/10.1007/978-1-4471-4853-1_104http://dx.doi.org/10.1007/978-1-4471-4853-1_104http://dx.doi.org/10.1007/978-1-4471-4853-1_105http://dx.doi.org/10.1007/978-1-4471-4853-1_105http://dx.doi.org/10.1007/978-1-4471-4853-1_106http://dx.doi.org/10.1007/978-1-4471-4853-1_106http://dx.doi.org/10.1007/978-1-4471-4853-1_107http://dx.doi.org/10.1007/978-1-4471-4853-1_107http://dx.doi.org/10.1007/978-1-4471-4853-1_108http://dx.doi.org/10.1007/978-1-4471-4853-1_108
Contents