the frontiers of society, science and technologyvarious intrusion detection techniques are analyzed....

40

Upload: others

Post on 31-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is
Page 2: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society,

Science and Technology

Issue 04

2018

Page 3: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

Call for Papers

The Frontiers of society, Science and Technology (TFSST, ISSN 2616-7433) is a scholarly peer-reviewed

international scientific journal published Bimonthly for researchers, developers, technical managers, and

educators in the engineering and society field. It provides a high profile, leading edge forum for academic

researchers, industrial professionals, engineers, consultants, managers, educators and policy makers

working in the field to contribute and disseminate innovative new work on all the areas of society, science

and technology.

Submission Guidelines

Papers are accepted either through the online submission tool or email at [email protected]. For those

unable to use the Online System and are emailing, please include a cover letter with author details,

university or country information, and any other author related data.

⚫ .docx/.pdf/Latex PDF file formats are accepted.

⚫ The covering email should clearly state the name, address and affiliation of the corresponding author.

Each paper will be provided with a paper ID for further reference.

⚫ Please ensure all articles are proofread and checked for accuracy prior to submission. Changes cannot

be made during the review process. If accepted, minor revisions may be made prior to final

submission.

Formatting Guidelines

⚫ Papers must be in English of up to 4-5 pages.

⚫ Paper content must be original and topics of interests are not limited.

⚫ Authors are required to ensure accuracy of quotations, citations, diagrams, maps, and tables.

⚫ Figures and tables need to be placed where they are to appear in the text and must be clear and easy to

view.

⚫ Papers must follow format according to the downloadable Word or Latex template.

Review Process

The acceptance decisions will take into account paper novelty, technical depth, elegance, practical or

theoretic impact, and presentation.

⚫ Original: the paper explores a new idea, project or issue; discusses existing research with promise of

new insight, discusses new research; or presents new ways of considering existing information.

⚫ Significant: the paper raises and discusses issues important to improving the effectiveness and/or

sustainability of open education efforts, and its contents can be broadly disseminated and understood

⚫ Quality: claims are supported by sufficient data; claims draw upon relevant literature; and limitations

are described honestly.

The review process may take approximately three months to be completed. Should authors be requested by

the editor to revise the text, the revised version should be submitted within 1 month. Authors who need

more time are kindly requested to contact the Editor. The Editor reserves the right to reject a paper if it does

not meet the aims and scope of the journal, it is not technically sound, it is not revised satisfactorily, or if it

is inadequate in presentation.

Page 4: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

Content

Research on Improved Genetic Algorithm for Virus Intrusion Detection Model

R. Vijayanand, D. Devaraj, B. Kannapiran P1

Differential Drive and Steering Control Technology of Automatic Navigation

Handling Tool Based on PLC

Takao Kobayashi, Etsuo Katsuyama, Hideki Sugiura P6

Application of Ozone MBBR Process in Refinery Wastewater Treatment

Henrik Rasmus Andersen, Kamilla M. S. Kaarshol, Ravi Kumar Chhetri P12

Association Rules Redundancy Processing Algorithm Based on Hypergraph in

Data Mining

Ankit Agrawal, Alok Choudhary P18

Research and review on the knot of Innovation and Entrepreneurship Training

Program project in Leshan Normal University in November 2018

Zhao Li xin P27

Page 5: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

1

Research on Improved Genetic Algorithm for

Virus Intrusion Detection Model

R. Vijayanand1,*, D. Devaraj2, B. Kannapiran3

1 Shanghai Advanced Research Institute, Chinese Academy of Sciences (CAS), Shanghai, 201210, China

2 Department of Electrical and Electronics Engineering, Kalasalingam University, Srivilliputur, Tamilnadu, India

University of the CAS, Beijing 100039, China

3 Department of Instrumentation and Control Engineering, Kalasalingam University, Srivilliputur, Tamilnadu,

India

*E-mail: [email protected]

Abstract: The purpose of this study is to solve the

computer security problems. Based on the traditional

security model, the hidden dangers of computer

security and the advantages and disadvantages of

various intrusion detection techniques are analyzed. A

computer intrusion detection system based on an

improved genetic algorithm is designed. The results

show that the optimized genetic algorithm can

improve the efficiency of intrusion detection and

reduce the false alarm rate. Therefore, we conclude

that the application of genetic algorithm in intrusion

detection has important theoretical and practical

significance.

Keywords: improved genetic algorithm; intrusion

detection model; traditional security model; computer virus

1. INTRODUCTION

With the rapid development of computer technology

and communication technology, the application of

computer is becoming more and more popular [3]. At

the same time, the computer security problem

becomes more and more complex. In the late 1960s,

people realized the vulnerability of computer system

and began to study its security [2]. In the1980s, the

performance of computers has been greatly improved.

All the isolated computer systems are connected to

form a network to realize mutual communication and

resource sharing [5]. Especially since the 1990s, the

rapid development of the Internet has greatly

promoted the social informatization [1]. Based on the

computer network environment, it has realized a

variety of applications such as electronic banking,

e-commerce, e-government, e-household, financial

network, manufacturing resource management and

network virtual community [4]. However, the

network also provides an opportunity for illegal acts

of information. The storage, processing and

transmission of information is attacked by the

intruder or the virus, which results in the paralysis of

the system or the loss of important data. For example,

hackers break new industrial security mechanisms,

and millions of computers are paralyzed for viruses in

hours [6]. In a word, computer security becomes

more and more important. It is related to business

interests, personal privacy and national secrets.

Therefore, the computer security issues need to be

resolved urgently. It is of great significance for

China's aerospace manufacturing industry [8].

From the initial experimental research to today's

commercial products, intrusion detection system (IDS)

has been developed for more than 20 years. In 1980,

Anderson first proposed audit tracking, which could

be used to monitor intrusion threats [9]. Although the

importance of the idea was not understood at the time,

his report was considered groundbreaking work for

intrusion detection. From 1984 to 1986, Dorothy

Denning and Peter Neumann jointly proposed a

real-time intrusion detection system model, which

was named IDES (Intrusion Detection Expert

System). It is a host based intrusion detection system,

which uses statistical methods to detect user

abnormal behavior. Their hypothesis is the basis of

intrusion detection research. In 1987, Dorothy

Denning introduced a generic intrusion detection

model [10]. The model consists of three components:

event generator, activity recorder and rule set. The

event generator is part of the model that provides

system activity information. The activity recorder

holds the status of the system or network in the

monitoring. The rule set is an ordinary check event

for checking events and status data. In 1980s,

inspired by Anderson and IDES, a large number of

IDS systems emerged [11]. However, until the 1990s,

the commercial IDS appeared. In foreign countries,

commercial intrusion detection systems include ISS's

Secure Secure, Nai Cybercop, SVC Net Prowler,

CA's Session Wall-3, Cisco's Secure IDS and IBM's

IERS (Internet Emergency Response Service). In

China, there are few network intrusion software [13].

It mainly includes intrusion detection systems of

Netpower, hacker intrusion detection and early

warning system. There are still a big gap with foreign.

In 1994, Biswanath Mukherjee made a complete

review and analysis of previous IDS studies. He

Page 6: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

2

analyzed and commented on various IDS prototype

systems. After 1995, there were many different new

IDS research methods, especially intelligent IDS,

which included neural networks, fuzzy recognition,

genetic algorithms, immune systems, and data mining

[12]. These methods are currently in the theoretical

research stage. At present, most commercial intrusion

detection systems are similar in principle to virus

detection. They have a certain size and number of

intrusion feature pattern libraries, which can be

updated regularly [7].

2. MATERIALS AND METHODS

(1) The concept of genetic algorithm

Genetic algorithm (GA) is a global search algorithm,

which randomly generates a population. Then. it

simulates the process of natural evolution in a better

direction, and evaluates the merits of individuals

through fitness. In each generation, the superior

individual produces offspring by genetic

manipulation, and the inferior individual is

eliminated. Individuals in a population are usually

composed of a string of binary or real numbers of

length. An individual is a solution to the problem, and

genetic algorithms are widely used to solve

optimization problems.

The genetic algorithm was first proposed by

American professor John. Holland of the University

of michigan. It originated from the study of adaptive

behavior of natural and artificial systems in the 60s. It

is a global optimization random search algorithm,

which imitates the principles of natural biology,

heredity and evolution. It uses bit string coding

technique to generate initial population for the

problem. Then, the fitness of the population is

evaluated, followed by selection, crossover, and

mutation operations. A selection strategy based on

fitness ratio is used to select individuals in the current

population, and crossover and mutation are used to

produce the next generation. This generation goes on

until it meets the expected conditions. The genetic

algorithm can simultaneously search multiple regions

in the solution space by using the method of

population organization, and it is especially suitable

for large-scale parallel processing. Genetic algorithm

has the characteristics of self-organization,

self-adaptation and self-learning. The natural

selection of the fittest and the simple genetic

operations make the computation free from the

constraints of the search space (e.g., differentiable,

continuous, unimodal) and the absence of additional

supporting information (such as guidance). Therefore,

the genetic algorithm not only can achieve high

efficiency, but also has a simple, easy to operate and

common features. At present, with the development

of computer technology, genetic algorithm has been

paid more and more attention, and has been

successfully applied in machine learning, pattern

recognition, image processing, combinatorial

optimization, VLSI design and optimization control.

Genetic algorithm is not a simple random comparison

search algorithm. By assessing the fitness of

chromosomes and the role of genes in chromosomes,

it effectively uses existing information to guide the

search for the most promising states to improve the

quality of the optimization. The flow chart of simple

genetic algorithm is shown in Figure 1.

Figure 1. The flow chart of simple genetic

algorithm

(2) Improvement of genetic algorithm

In the genetic algorithm, the generation of new

generation population mainly depends on the

stochastic crossover, recombination and mutation of

the previous generation. Therefore, it takes a great

deal of cost to obtain the optimal solution. Therefore,

genetic algorithm has the disadvantages of premature

maturity and weak local search ability, which

seriously affect the efficiency of genetic algorithm.

Nowadays, the commonly used methods of

improvement can be broadly divided into the

following categories. First, genetic operators are

improved appropriately, including selection,

crossover and mutation, etc. in addition, in order to

improve the performance of the algorithm, a number

of high-level genetic operations have been developed

and applied. Second, combining genetic algorithm

with traditional heuristic search techniques based on

problem knowledge (such as hill climbing, simulated

annealing, tabu search, etc.), a framework of hybrid

search algorithm based on genetic algorithm is

constructed. Third, the genetic algorithm is

parallelized. At present, the most basic parallel

schemes are synchronous master-slave, asynchronous,

synchronous and network. Fourth, the dynamic

adaptive technology is used to adjust the algorithm

control parameters and coding granularity in the

evolution process. The last one is an organic

combination of several previous approaches.

This paper mainly studies the use of genetic

algorithm to train the neural network, optimize the

network connection right, and use it for intrusion

detection. Due to the shortcomings of the local search

Page 7: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

3

ability of the basic genetic algorithm, it is necessary

to improve the genetic algorithm.

3. RESULTS

(1) Implementation of improved genetic algorithm

The main idea of genetic algorithm to optimize the

weights of BP neural network is as follows. First of

all, the genetic algorithm is used to optimize the

initial weight (threshold) distribution, and a better

search space is found in the solution space. Then, BP

algorithm is used to search the optimal solution in

this smaller solution space. The improved genetic

algorithm can optimize the weights of neural

networks and prevent the search from being trapped

into local minima.

The global characteristics of genetic algorithm and

the fast and efficient characteristics of neural

networks in local optimization are comprehensively

utilized. A local improved GABP algorithm is used to

train the neural network. A locally improved genetic

algorithm is used to optimize the weights of neural

networks. The adaptive learning rate momentum

gradient descent algorithm is used to train the neural

network, and the fitness function is calculated.

Finally, the output of neural network is computed by

the weight corresponding to the maximum fitness

function. The algorithm flow is shown in Figure 2.

Figure 2. The algorithm flowchart

(2) Detector sets

The generation of the detector is calculated and

analyzed in a probabilistic manner. If Nx is used to

represent the size of the set X, then: NR0: the number

of candidate detectors, that is, the size of the detector

set prior to review; NR: the number of valid detectors,

that is, the size of the set of detectors after the review;

NS: the number of strings in the "own" collection; PM:

the probability of matching between any two random

strings; Pf: false dismissal probability,that is,

Pf=(1-PM)NR; f: the probability that any random string

does not match the NS string in the "own" set, that is,

f=(1-PM)NS.

Because f=(1-PM) NS, we can get

)MP1(In•SN=Inf - . When the PM is small enough,

according to the Taylor expansion:

SNMPe•

MPfPnI

=0RN﹣

(1)

This formula can estimate the number of candidate

detectors NR0. NR0 is the function of Pf, NS and PM.

The minimum set of detectors is obtained by the

formula (1). Then, by calculating the minimum, we

can get:

SN1

=MP (2)

Therefore, when matching rules SN

1=MP , there is

the minimum value of NR0. At this point, the required

set of candidate detectors is minimal, that is, the

number of randomly generated strings is minimized.

Formula (1) gives an estimate of NR0, which is related

to the size of the protected content NS, the required

detection reliability Pf, and the matching rule PM.

Through further analysis, we can see that the

algorithm has the following characteristics. The

formula (2) is introduced into formula (1), and the

function relation between NR0 and NS is obtained:

SN•)fInP•e-(=0RN . When choosing a suitable

detection probability Pf, )fInP•e-( is a constant.

Therefore, NR0 is proportional to NS. Figure 3 shows

the minimum NR0 dynamic results for each different

NS value. It can also be seen from equation (1) that

the size NR0 of the detector set is related to the

detection capability Pf of the detection system.

The elements of the detector set should have better

distribution characteristics, so that neither of the two

detectors will match the same "non-self" string. The

string space that the detector set R is covered in the

collection U is: UN×RN×MP . For a given failure

probability Pf, it requires at least

)SN-UN(×)fP-1( detector in order to cover the

"non-self" string space )SN-UN(×)fP-1( that can

be detected. Therefore, we can get: )SN-UN(×)fP-1(≥UN×RN×MP

That is,

MP

)fP-1(≥RN )SNUN( > (3)

If Pf and PM are fixed, then NR0 grows exponentially

with NS. Therefore, NR0 is very sensitive to NS, that is,

NS has changed a little, it will lead to a large set of

candidate detector changes. For this index factor, we

can consider from both positive and negative aspects:

the negative side is that it will increase the

computational cost of the algorithm; its advantage is

that it makes it harder for the intruders to cover up

their malicious behavior. For example, if a collection

of detectors is generated (possibly using a

supercomputer), an attempt to mask its malicious

behavior is difficult to succeed if the malicious agent

Page 8: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

4

wants to modify the "own" collection, and then

modify the set of detectors accordingly.

(3) Algorithm test

The system runs on Red Hat Linux 9.0 and

windows2000 server platform. The simulation

experiments use MATLAB 7.4.0. The trial CPU is

AMD Athlon XP 1700+, memory 1G and 120G hard

drive. The database uses SQL 2000 Server. The

actual network data packet is used as the data source,

and the experimental results of GABPIDS in the

simulation are obtained, and the detection rate, false

alarm rate and false negative rate are calculated. This

experiment uses the more authoritative KDD CUP 99

data set for intrusion detection.

The data set contains normal data and a variety of

anomaly data, involving a total of four major

categories of 22 categories of intrusion attacks: DOS

(denial of service attacks); R2L (remote

non-authorized access attacks); U2R (unauthorized

access to super user rights attacks); PROBE

(vulnerability detection and scanning attacks). The

kddcup.data.corrected file provided by the dataset

contains 4,898,431 raw data, SQL2000 delete

duplicate records, get 1,074,992 valid data, the

distribution is: Normal (812,814), DOS (247,267),

R2L (999), U2R (52), PROBE (13,860).

The data used in the experiment are pretreated by

PCA technology. After the 41-dimensional data is

processed, the data dimension is reduced to 7, which

greatly reduces the dimension of the input data of the

neural network and the training and testing time of

the neural network, and improves the system

effectiveness.

In order to explain the performance of genetic

algorithm to optimize the design of neural network

more clearly, this paper compares BP algorithm with

GABP algorithm. Each algorithm was trained 100

times and compared with the same test data. The

convergence times, convergence speed and average

detection results of each algorithm are shown in

Table 1 and Table 2.

Table 1. The convergence effect statistical

The number of convergence in 100 training sessions The convergence speed

Neural network algorithm 66 Slower

Improved genetic algorithm 100 From fast to slow

Table 2. Detection effect statistical

Attack type Training /

test

samples

Neural network algorithm Improved genetic algorithm

Average false

alarm rate

Average

detection rate

Average

false alarm

rate

Average

detection rate

neptune (DOS) 5000/1000 2.5% 95.6% 1.6% 99.2%

smurf (DOS) 5000/1000 4.8 % 92.1% 3.6% 96.5%

ipsweep (PROBE) 5000/1000 5.1% 89.1% 4% 95%

portsweep (PROBE) 5000/1000 7.3% 87.5% 6.8% 94.8%

satan (PROBE) 5000/1000 8.1% 89.3% 6.5% 95.3%

Mixed attack 10000/2000 12.3% 73.5% 10% 85.3%

Mixed attack, test data for

new attacks

10000/2000 12.8% 60.5% 10.9% 74.3%

As can be seen from Table 1 and Table 2, compared

with the neural network algorithm, the optimized

genetic algorithm not only converges fast and

converges easily, but also has higher detection rate

for various attacks and lower false positive rate. At

the same time, compared with other current methods,

the detection rate has also improved significantly. It

also proves that the performance of the optimized

network is improved obviously after the improved

genetic algorithm.

The improved genetic algorithm is used to optimize

the neural network algorithm, and the simulation test

is carried out on the MATLAB platform. Through the

preprocessing of real network packets, the input data

of the improved genetic algorithm is obtained. The

reduction of dimension is reduced by introducing

PCA technology, and the structure of neural network

is simplified. Neural networks and improved genetic

algorithms are used to test the same data. It is found

that the improved genetic algorithm is easier to

converge, and the convergence speed is faster. It has

high classification and recognition rate for normal

data. For the data of mixed attack and new attack,

although the detection rate of the improved genetic

algorithm has been improved significantly, it is still

around 75%. For single attack data recognition,

especially for Neptune (DOS) attack data, the

detection rate is between 98%~100%, and the

recognition effect is very good.

4. CONCLUSION

Combined with the actual data of computer network,

an intrusion detection model based on genetic neural

network is proposed. Through the data acquisition,

preprocessing and feature extraction, the model

transforms the computer network data into neural

network data. In order to improve the deficiency of

the basic genetic algorithm, the genetic algorithm is

optimized by the fitness value calibration and the

expected value selection method. In this way, the

improved genetic algorithm is more suitable for

intrusion detection system. Through analysis and

research, the following conclusions are obtained.

Page 9: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

5

Compared with the traditional genetic algorithm, the

improved genetic algorithm has been improved in

terms of system efficiency, detection rate and

omission rate. At the same time, it improves the

ability to detect unknown attacks to a certain extent.

REFERENCE

[1] Ahmad, I., Hussain, M., Alghamdi, A., & Alelaiwi,

A. (2014). Enhancing SVM performance in intrusion

detection using optimal feature subset selection based

on genetic principal components. Neural Computing

and Applications, 24(7-8), 1671-1682.

[2] Bhattacharjee, P. S., Fujail, A. K. M., & Begum, S.

A. (2017). Intrusion Detection System for NSL-KDD

Data Set using Vectorised Fitness Function in Genetic

Algorithm. Advances in Computational Sciences and

Technology, 10(2), 235-246.

[3] Chen, M. H., Chang, P. C., & Wu, J. L. (2016). A

population-based incremental learning approach with

artificial immune system for network intrusion

detection. Engineering Applications of Artificial

Intelligence, 51, 171-181.

[4] Dastanpour, A., Ibrahim, S., & Mashinchi, R.

(2014). Using genetic algorithm to supporting

artificial neural network for intrusion detection

system. In The international conference on computer

security and digital investigation (ComSec2014) (pp.

1-13). The Society of Digital Information and

Wireless Communication.

[5] Elhag, S., Fernández, A., Bawakid, A.,

Alshomrani, S., & Herrera, F. (2015). On the

combination of genetic fuzzy systems and pairwise

learning for improving detection rates on Intrusion

Detection Systems. Expert Systems with Applications,

42(1), 193-202.

[6] Ganapathy, S., Kulothungan, K., Muthurajkumar,

S., Vijayalakshmi, M., Yogesh, P., & Kannan, A.

(2013). Intelligent feature selection and classification

techniques for intrusion detection in networks: a

survey. EURASIP Journal on Wireless

Communications and Networking, 2013(1), 271.

[7] Hosseinpour, F., Amoli, P. V., Farahnakian, F.,

Plosila, J., & Hämäläinen, T. (2014). Artificial

immune system based intrusion detection: Innate

immunity using an unsupervised learning approach.

International Journal of Digital Content Technology

and its Applications, 8(5), 1.

[8] Jahromy, B. M., Honarvar, A. R., Saif, M., &

Jahromy, M. A. M. (2016). A New Method for

Detecting Network Intrusion by Using a Combination

of Genetic Algorithm and Support Vector Machine

Classifier. Journal of Engineering and Applied

Sciences, 100(4), 810-815.

[9] Mukesh, K. G., Khanna, H. P., & Velvizhi, R. V.

(2015). An anamoly based Intrusion Detection

System for mobile ad-hoc networks using genetic

algorithm based support vector machine. Advances in

Natural and Applied Sciences, 9(12), 40-45.

[10] Moorthy, V. P., & Kumar, S. A. (2014).

MCKELM-IDS: efficient feature transformation &

optimal feature subset selection based intrusion

detection approach using MCKELM. Advances in

Natural and Applied Sciences, 8(19), 88-100.

[11] Shamshirband, S., Amini, A., Anuar, N. B., Kiah,

M. L. M., Teh, Y. W., & Furnell, S. (2014). D-FICCA:

A density-based fuzzy imperialist competitive

clustering algorithm for intrusion detection in

wireless sensor networks. Measurement, 55, 212-226.

[12] Singh, T., Verma, S., Kulshrestha, V., & Katiyar,

S. (2016, March). Intrusion Detection System Using

Genetic Algorithm for Cloud. In Proceedings of the

Second International Conference on Information and

Communication Technology for Competitive

Strategies (p. 115). ACM.

[13] Swaminathan, A., Vivekanandan, P., & Sivajothi,

E. (2016). Anomaly Detection Model Based on

Multivariate Correlation Analysis Technique to

Detect Covert Communication in Wireless Sensor

Network. Journal of Computational and Theoretical

Nanoscience, 13(8), 5281-5287.

Page 10: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

6

Differential Drive and Steering Control

Technology of Automatic Navigation

Handling Tool Based on PLC

Takao Kobayashi1,*, Etsuo Katsuyama2, Hideki Sugiura1

1 Mechanical Engineering Dept. 2, Toyota Central R&D Laps., Inc., Aichi, Japan

2 Classis Control Development Div., Toyota Motor Corporation, Shizuoka, Japan

*E-mail: [email protected]

Abstract: In order to improve the differential drive

and steering control technology, the differential drive

and steering control technique for automatic

navigation based on power line communication (PLC)

is designed. The steering of the automatic guided

vehicle (AGV) is divided into steering and

differential steering. Because of the different steering

modes, the AGV will cause different errors when

moving along the desired trajectory in the path

trajectory transformation. The AGV locus consists of

straight and arc line. Among them, the steering

trajectory of AGV is not complex because of the lack

of spin adaptation, so its trajectory transition is

complicated. Taking the self-developed single wheel

drive and steering AGV as the object of study, the

AGV trajectory planning program and motion

program are developed by using Matlab and VC++.

The error of AGV in trajectory transformation is

analyzed theoretically, and it is proved that the error

caused by acceleration of motor can be compensated.

At the same time, combined with the development of

AGV control card PMAC, the program of motion is

discussed. In addition, visual navigation has become

the main direction of navigation technology because

of its large amount of information and flexibility. In

order to improve the robustness and accuracy of

landmark detection, the effects of image denoising,

edge detection and other techniques in navigation are

discussed in turn. For the identification of path

trajectory, genetic algorithm is introduced to improve

the accuracy and time truth of navigation. Finally, the

experiment proves the feasibility of the theory, and

also gives the method to reduce the error of vision

navigation. It provides a good foundation for

improving the accuracy of visual navigation.

Keywords: single wheel drive / steering AGV, turn

error, visual navigation, genetic algorithm, PLC

1. INTRODUCTION

PLC (Power Carrier Communication) is a

communication technology that couples data signals

to power lines and uses power lines as propagation

media. With the development of DSP and digital

coding technology, PLC technology will be used

more widely. As an important means of

communication, PLC technology can replace the

special communication network through the existing

power line network. It is easy to implement the

lighting control automation, security monitoring,

remote meter reading and so on. According to the

bandwidth size, PLC technology can be divided into

narrowband PLC technology (9-500kHz) and

broadband PLC technology (2-34, MHz).

Narrowband PLC technology is often used in

situations where data transmission rate is not high,

such as power grid load control, automatic meter

reading system and street light control. Broadband

PLC is commonly used in high-speed data

transmission occasions, such as large file transceiver,

voice calls, video calls and other high-speed data

transmission services. As one of the greatest

inventions of mankind in twentieth century, robot has

made great progress after more than 50 years'

development, especially mobile robot. Because of its

unique advantages, it has been widely used in all

walks of life. As a member of mobile robot, it has the

characteristics of good flexibility, automation and

high intelligence [1]. The path can be changed

according to the storage and production process

changes. It has realized the automation of loading and

unloading of goods and materials, and has become

the main logistics tool in FMS.

According to the definition of American Logistics

Association, AGV refers to a vehicle equipped with

an electromagnetic or optical automatic guidance

device. It can travel along a prescribed path. At the

same time, it also has car programming and parking

selection device, security protection and various load

removal functions. The AGV is an unmanned

automatic transport vehicle with a contactless

guidance device and an independent addressing

system. It is powered by batteries, and it is an

automatic material handling equipment developed in

50 and 60s. The utility model can be used for

transportation of goods in docks, airports, hospitals,

shops, etc., and can also be used as a movable

assembly platform for assembly lines. In particular,

there is an urgent need for dangerous workplaces

Page 11: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

7

where staff cannot operate [2].

Through theoretical analysis, the method of solving

this problem for single wheel AGV is discussed. The

attitude of black guiding belt is recognized by CCD

camera, and the AGV motion is guided by the

acquired data. Since the curvature of the black band

is guided to guide the AGV, the single wheel AGV

can be satisfied as long as the rudder angle is

controlled. But for two-wheel differential drive AGV,

the control is more complicated than single wheel

drive. Therefore, the visual navigation of two

wheeled AGV is mainly discussed.

2. LITERATURE REVIEW

The first AGV in the world was developed by Barrett

electronics company in America in 1950s. Prior to the

middle of the 80s, most of the AGV was fixed wired

guidance, limiting the restructuring and layout of its

production. With the rapid development of modern

industry, the level of AGV technology is also

increasing. AGV is equipped with on-board

computers, communication devices and materials

handling devices, and the overall complexity and

automation are greatly improved [3]. The United

States government set up the National Automatic

Highway Alliance (NAHSC) in 1995 to study the

feasibility of developing an automatic guided vehicle

and to promote the practicability of AGV. Generally

speaking, the development of mobile robots in

foreign countries basically follows two lines. Some

universities and research institutions in Europe follow

the academic line that robots are used as a vehicle for

research into artificial intelligence. Since artificial

intelligence and other intelligent technologies are far

from expected, this kind of research is mostly in the

experimental stage.

In recent years, the research and development of

automatic guided vehicle (AGV) in our country

shows a thriving scene, which is mainly related to the

logistics heat in recent years. Beijing Hoisting

Machinery Research Institute, China Postal Science

Planning Institute, CAS Shenyang Automation

Institute, Dalian composite machine tool research

institute and other research institutes are the earliest

units involved in the development of AGV. Some of

them have been produced in small quantities. AGV,

the company that produces the real scale, is the

Kunming marine equipment company [4]. In addition,

Shenyang SIASUN, robotic company also developed

a variety of AGV. Tsinghua University has developed

a THMR_V automatic guided vehicle, has realized

the structured Lane under the environment of

automatic tracking, quasi structured environment

road tracking under complex environment, obstacle

avoidance, telepresence driving and other functions.

National University of Defense Technology has

developed automatic guided vehicle CITAVT series.

The CITAVT_ IV vision autonomous navigation

vehicle also implements autonomous navigation on

the highway.

3. METHODS

(1) The composition and working principle of AGV

Because of its wide range of applications, the specific

purpose and working conditions of AGV vary greatly.

Therefore, it also has many kinds. But functionally, a

variety of AGV should have the following

subsystems:

Drive / boot system: The driving system and the

guidance system of AGV are inseparable, and they

are related to the chassis structure adopted. The

design of the chassis structure ensures that the AGV

can move freely and flexibly under the control of the

drive / guidance system. The commonly used is

three-wheel chassis dual rear wheel differential drive

/ steering, three-wheel chassis single-wheel drive /

steering, four-wheel dual rear wheel differential drive

/ steering, four-wheel drive dual-wheel drive /

steering, differential drive / steering, six-wheel drive

dual-wheel drive / steering. Depending on the

guidance system, the AGV can automatically run

along the ground lead wire or the ground reflector or

even any designated route [5].

Communication system: Several AGV can form an

automated guided transport system (AGVS) together.

When the automatic guided vehicle system in

multiple car works at the same time, in order to make

the car work conflict (task conflict, route conflict),

logistics automation equipment and all other car in

the system are unified by the central control computer

control [6]. The car needs to receive instructions from

the host computer for the next step, and also needs to

report its current status to the main controller, which

is done through the communication system. Fixed

line AGV can communicate by wires embedded on

the running line, while AGV can only use wireless

communication in all directions [7]. When there are

many interference sources, the communication

system must have higher reliability in order to ensure

the normal operation of the system.

(2) Main technical parameters of AGV

Rated loading capacity. It is the maximum weight

that AGV can bear.

Dead weight. It refers to the total weight added by the

AGV and the battery.

Car body size. It refers to the size of the car body, and

this size should be subject to the size of the goods

and the site.

Stopping accuracy. It refers to the number of

millimeters between the location of the AGV job and

the location of the program.

Minimum turning radius. It refers to the distance

between the instantaneous steering center distance

and the AGV longitudinal centerline when the AGV

is in the form of no-load, low speed and maximum

deflection.

Running speed. It refers to the maximum speed at

which AGV travels at rated loads.

Cell voltage. There are two specifications for battery

voltage, 24V and 48V respectively.

Page 12: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

8

Work cycle. It refers to the time required for AGV to

complete a cycle of work.

4. RESULTS AND DISCUSSION

AGV is a wheeled autonomous mobile robot, which

mainly completes the tasks of path planning,

positioning and obstacle avoidance. Therefore, path

planning is one of the basic steps of AGV navigation

[8]. It searches for an optimal or nearly optimal

collision free path from the start state to the target

state according to a performance index. According to

the degree of robot access to environmental

information, path planning is divided into two types.

The environment information is fully aware of the

global path planning and the environment

information is completely unknown or partially

unknown to the local path planning [9]. The global

path planning that is fully aware of the environment

information is applicable to static environments, and

the path is off-line planning. The local path planning

environment information completely or partly

unknown is detected by the sensor online on the robot

operation environment, information obstacle location,

shape and size to complete planning. The path is

planned online. This article only discusses the

planning of known paths for single round AGV.

(1) Trajectory analysis of single wheel drive / steering

AGV

According to the structure and motion analysis of

AGV, the trajectory of double wheel drive AGV can

be divided into straight line, arc and spin. When the

two wheels are the same in size and speed, the AGV

can move forward or backward in a straight line.

When the two wheels have the same speed direction,

but the size is different, the AGV can move forward

or backward in the arc motion [10]. When one wheel

does not move, the AGV will rotate at the center of a

wheel. When the two wheels move at the same speed

in the opposite direction, the AGV will spin at its

center of mass.

For a single wheel drive / steering AGV, since its

steering is controlled by the steering motor to drive

the wheel, the AGV has only two tracks of circular

and straight lines, and there is no spin. However, if

there is an angle between the front and rear two

tracks, since there is no spin, the AGV must go

through a transition arc to complete the trajectory. It

is necessary to know that AGV needs to take the

amount of arc ahead of time and the amount of

second segments that have not gone. That is, the

point between the arc and the two trajectories.

At the same time, when the AGV is taking the arc

path, the steering motor needs to control the drive to

rotate an angle. Obviously, the radius of the arc is

different. The steering motor needs to be controlled,

and the angle of rotation is different. So, it is assumed

that the AGV moves from line to arc, the steering

motor needs to be controlled to rotate over an angle.

However, the steering motor is unable to turn the

drive wheel suddenly to the desired angle. At the

same time, the steering motor itself also has

acceleration and deceleration process. So, there is a

lot of error here, and the law needs to be found out.

The error is then reduced by compensation. This

chapter deals with the two issues mentioned above.

Stage IIStage I

(a) The angle between the two paths

Stage II

Stage I

(b) The translation between the two paths

Figure 1. The trajectory analysis of AGV

(2) Trajectory planning of single wheel drive /

steering AGV

The flow chart of the AGV motion planning program

is introduced. This program is AGV's entire PC

program, and AGV can follow the planned results of

the movement. The program has the function of track

input and display. The parameters are written into the

moving program, and the attitude parameters are

feedback when the AGV is moving. First of all, users

need to design the trajectory parameters, while the

trajectory is divided into straight line trajectory and

arc trajectory. The parameters required for the line

trajectory include five aspects. They are the running

speed of the AGV, the direction of motion of the

AGV (forward or backward), the distance of the AGV

motion, the angle between the trajectory of the

Page 13: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

9

segment and the previous section, the direction of the

included angle (clockwise or counterclockwise). The

parameters of arc trajectory include six parameters.

They are the speed of the AGV AGV movement

direction (forward or backward), the direction of

rotation of the arc (clockwise or counterclockwise),

arc radius, arc angle, the angle of the trajectory with a

trajectory, direction angle (clockwise or counter

clockwise) a total of six parameters.

(3) Experimental result analysis

The AGV vision navigation experiment was

completed in the laboratory. Taking black belt as its

navigation road marking, its driving environment is

the cement pavement in the laboratory. In the

experiment, the running speed of AGV is set to

5m/min, and its trajectory is paved with straight line,

arc, ladder and so on. AGV can track the trajectory,

and the results are satisfactory. The parameters

obtained by a trajectory with smaller curvature and a

wavy trajectory are analyzed. Experimental results

for the first trajectory. The trajectory of this strip

consists of a straight line and a curve with smaller

curvature. Figure 2 is a result of a comparison of the

identified trajectory deviations and the measurement

deviations

0 1000 2000 3000 4000 5000 6000

-60

-40

-20

0

20

40

me

asu

rem

en

tsD

ire

ctio

n d

evia

tio

n

AGV operating distance

Deviations identified by computer

Deviations from actual

Figure 2. Comparison of identification bias and measurement deviation

As shown in the figure, the AGV begins at least in

a straight line, and the slope of the identified

trajectory is within 5S. Then, AGV moves along an

arc, and the change of the slope is that the slope

begins to grow from small to small at last. AGV

adjusts the attitude of the AGV according to the

positive and negative value that identifies the

deviation. If the identified value is negative, the

AGV moves in the positive direction, and vice

versa. By comparison, it can be seen that the

deviation of the measured AGV is basically

changed according to the detected deviation

direction. It shows that the correction effect of

AGV is satisfactory according to the result of

visual navigation.

Experimental results for the second trajectory. This

trajectory is a S curve consisting of several arcs

with large curvature. At the same time, the

response speed of AGV is improved due to the

large curvature. The trajectory deviations and

measurements identified by the computer are

shown in figure 3.

The result of the deviation comparison shows that

there is a gap between the actual running track of

AGV and the laying track. As shown in the

diagram, the starting angle of the AGV is a

negative value, that is, AGV has an angle at the

beginning of the path. As AGV runs, the angles

tend to become smaller and then change toward

positive values. It shows that AGV is in an arc, and

then the angle change is violent. It shows that the

curvature of the second section arc is larger than

that of the first section. Finally, the angle slowly

returns to zero and then moves to a stop along a

slightly curved arc. Because the response speed of

AGV is improved, the deviation correction effect

of AGV is better than that of the first experiment.

Although the response speed is increased, the error

is greater than the first experiment due to the large

curvature and rapid curvature change. But the

results of the AGV follow the guidance belt are

still satisfactory.

Page 14: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

10

0 1000 2000 3000 4000 5000 6000

-300

-250

-200

-150

-100

-50

0

Ru

nn

ing

dis

tan

ce

in

X d

ire

ctio

n

Running distance in Y direction

AGV guided trajectory

The actual trajectory of AGV

Figure 3. Comparison of actual trajectory and following trajectory

From the above experiments, it is shown that the

volume of AGV used in the experiment is larger.

For a larger trajectory, the tracking error is

significantly larger than the curvature of the

trajectory. Therefore, the vision navigation is

suitable for small size and fast response AGV. On

the other hand, the external conditions will have a

certain impact on the results, so the accuracy of the

image recognition needs to be improved. At the

same time, the results of this experiment are

satisfactory, which fully demonstrates the

feasibility of AGV using visual navigation. 5. CONCLUSION

The motion path of AGV trajectory is discussed in

two aspects. One is to use the path shape developed

by the user on the upper computer to plan the path of

the AGV. Another is to use visual navigation to direct

the AGV along a fixed path. In the former method, it

not only analyzes the existence of the angle between

the two tracks, but also analyzes the theoretical

solution that produces the error in turning. This not

only guarantees the movement accuracy of AGV

between different trajectories, but also provides a

good solution and reference for the future study of

using this method to formulate AGV trajectories. In

the second method, through analysis of image

enhancement, denoising and segmentation, genetic

algorithm is used to solve the trajectory recognition.

The feasibility of the theory is proved by experiment,

and the actual error is given. This provides a good

theoretical and practical guarantee for the recognition

of other images in the future.

ACKNOWLEDGMENT

The authors acknowledge the National Natural

Science Foundation of China (Grant: 51578109), the

National Natural Science Foundation of China (Grant:

51121005).

REFERENCES

[1]Vogel-Heuser, B., Rösch, S., Fischer, J., Simon, T.,

Ulewicz, S., & Folmer, J. (2016). Fault handling in

plc-based industry 4.0 automated production systems

as a basis for restart and self-configuration and its

evaluation. Journal of Software Engineering &

Applications, 9(1), 1-43.

[2]Hu, C., Jing, H., Wang, R., Yan, F., Li, C., & Chen,

N. (2015). Fault-tolerant control of fwia electric

ground vehicles with differential drive assisted

steering. IFAC PapersOnLine, 48(21), 1180-1185.

[3]Xiong, Z., Zhenhuan, Y. E., Juan, H. E., Chen, L.,

& Linghu, J. (2015). Small agricultural machinery

path intelligent tracking control based on fuzzy

immune pid. Robot, 37(2), 212-223.

[4]Pan, X., Zhou, Y., Gao, S., & Xu, M. (2015).

Virtual endoscopy automatic navigation method

based on rotation minimizing frames. Jisuanji Fuzhu

Sheji Yu Tuxingxue Xuebao/Journal of

Computer-Aided Design and Computer Graphics,

27(8), 1550-1555.

[5]Zhang, R., Li, Y., Yan, Y., Zhang, H., Wu, S., & Yu,

T., et al. (2016). Control of a wheelchair in an indoor

environment based on a brain–computer interface and

automated navigation. IEEE Transactions on Neural

Systems & Rehabilitation Engineering, 24(1),

128-139.

[6]G. Lin, X. Zou, Q. Zhang, & J. Xiong. (2017).

Visual navigation for automatic guided vehicles

based on active contour model. Nongye Jixie

Xuebao/Transactions of the Chinese Society of

Agricultural Machinery, 48(2), 20-26.

[7]Sun, Q., Teng, S., Du, Y., Kang, Z., Yin, C., &

Chen, L. (2016). Research on calibration method for

tractor automatic navigation control system. , 10(1),

129-140.

[8]Bai, X. P., Hu, J. T., Gao, L., & Zhang, T. (2016).

A sliding-mode variable-structure controller based on

exact feedback linearization for automatic navigation

system. International Journal of Agricultural &

Biological Engineering, 9(5), 158-165.

Page 15: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

11

[9]Cai, D. (2015). Museum navigation based on nfc

localization approach and automatic guidance system.

International Journal of Computer Applications,

120(3), 514-517.

[10]Luan, S., Qiu, T., Song, A., Wang, P., Li, J., &

Tan, H. (2017). Automatic dependent

surveillance-broadcast time delay estimation based

on extended recursive maximum correntropy

algorithm. Iet Radar Sonar & Navigation, 10(8),

1500-1507.

Page 16: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

12

Application of Ozone MBBR Process in

Refinery Wastewater Treatment

Henrik Rasmus Andersen1,*, Kamilla M. S. Kaarshol1, Ravi Kumar Chhetri1

1Department of Environmental Engineering, Technical University of Denmark, Miljøvej 113, 2800 Kongens

Lyngby, Denmark

*E-mail: [email protected]

Abstract: Moving Bed Biofilm Reactor (MBBR) is a

kind of sewage treatment technology based on

fluidized bed. At the same time, it can also be

regarded as an efficient new reactor between active

sludge method and the biological membrane method.

The application of ozone MBBR process in refinery

wastewater treatment is mainly studied. The key

point is to design the ozone +MBBR combined

process based on MBBR process. The ozone +MBBR

process is used to analyze the treatment of

concentrated water COD discharged from the refinery

wastewater treatment plant. The experimental results

show that the average removal rate of COD is

46.0%~67.3% in the treatment of reverse osmosis

concentrated water by ozone MBBR process, and the

effluent can meet the relevant standard requirements.

Compared with the traditional process, the ozone

MBBR process is more flexible. The investment of

this process is mainly ozone generator, blower and so

on. The prices of these items are relatively

inexpensive, and these costs can be offset by the

excess investment in traditional activated sludge

processes. At the same time, ozone MBBR process

has obvious advantages in water quality, stability and

other aspects.

Keywords: Ozone MBBR; refinery Wastewater; COD

1. INTRODUCTION

In recent years, the state has increased the intensity of

environmental pollution management and pays more

attention to environmental protection issue, which

means that the country will increasingly strict sewage

discharge standards for petroleum and petrochemical

industries. With the progress of the times and the

development of science and technology, the

disadvantages of the traditional sewage treatment

methods are becoming more and more obvious, and it

has been unable to meet the current requirements of

the relevant departments for the discharge of water

quality. In order to solve this problem, the

optimization of existing wastewater treatment

processes and the development of new wastewater

treatment processes have become a pressing matter of

the moment for major petrochemical enterprises [1].

In this paper, the existing refinery wastewater

treatment methods in a chemical enterprise are

studied. When the refinery wastewater produced by

the enterprise is treated by oil separation and

biochemical treatment, the reverse osmosis process is

used to further treat the wastewater [2]. However, in

the advanced treatment, there will be a large number

of reverse osmosis concentrated shrinkage which is

not easy to degrade organic compounds. This part of

reverse osmosis concentrated water contains more

than 50mg/L of COD, which does not conform to the

standards set by relevant parts [3]. At present, the

methods to deal with concentrated water are very

scarce, and most companies have chosen reverse

osmosis advanced treatment, that is, to inject fresh

water into the water for dilution. Although this

method can reduce the content of COD in the

concentrated water to a certain extent and make it

conform to the standard, this greatly consumes the

water resources [4]. In view of this, in order to reduce

environmental risks and ensure the discharge

standards of enterprises, it is necessary to study the

treatment technology of refinery wastewater, and

build a set of devices that can effectively deal with

concentrated water [5].

2.METHODS

(1) Experimental principle

The ozone MBBR process is based on the strong

oxidation characteristics of ozone (O3). The strong

oxidation characteristics of O3 can oxidize a variety

of pollutants which are not easy to degrade, and

decompose or dissociate them into small molecules

which can be easily handled by microorganisms. The

experiment designed in this paper mainly uses the

strong oxidation of O3 to reduce the content of COD

in reverse osmosis concentrated water, so that it can

reach the acceptable level without dilution of water.

Then MBBR method is used to treat the concentrated

water treated by O3 deep oxidation process for two

times, so as to reduce the content of COD, ensuring

that the quality of the effluent meets the requirements.

It is well known that O3 is unstable in water, which is

rapidly decomposed into oxygen in an aqueous

solution with low purity. At the same time, hydroxyl

(OH) with 2.8V oxidation-reduction potential and

other small molecules with strong oxidation such as

single atom oxygen (O) are formed. Although

oxidation occurs when O3 dissolves in water, the

Page 17: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

13

process is relatively long. However, it has high

selectivity, and can react with ethanol and C6H5OH.

At the same time, O3 dissolves in water and causes

hydrogen chain reaction by decomposing hydrogen

radicals. The decomposition chemical reaction of O3

can be expressed by formula (1) and the chemical

reaction with water can be expressed by formula (2).

)(23 OOO +→ (1)

OHOHO 2)( 2 →+ (2)

The carrier material used in the moving bed biofilm

reactor is K3, which has the following advantages:

Biofilms grow on the inner surface of cells.

Compared with the outer surface, the inner surface is

more protected, and the biological content is

relatively fixed. There will be no shrinkage of the

surface area due to internal congestion.

Compared with the biofilm reactor filled with other

fillers, the moving bed biofilm reactor selected in this

paper has larger surface area and larger biofilm

quantity. The basic amount is 10 to 14g/L, and the

amount of VSS contained in the specific biofilm can

be as high as 95%, which can guarantee the

biological activity to some extent.

There are more species of bacteria on K3 carrier. At

the same time, the environment on the K3 carrier is

more suitable for the growth of microorganisms

which can degrade and decompose non-degradable

materials. Therefore, the effluent quality of K3

treated with MBBR is better. In addition, in view of

the biological growth mode of K3 matched with the

environmental requirements of nitrifying bacteria

growth, the number of nitrifying bacteria is relatively

heavy, which makes the nitrification efficiency more

ideal. It can reach 1 kgNH3-N/m3 D, and the

nitrification efficiency is increased by nearly 5 times

compared with activated sludge.

The ratio of K3 carrier is close to 1, so it tends to

flow when it is in the reactor, which can effectively

promote mass transfer, reduce congestion and energy

consumption.

K3 can rotate freely in the reactor, which can

effectively promote the splitting and collision times

of bubbles in water. In addition, it can prolong the

time length of the bubbles to stay in water, which

promotes the use efficiency of O2 and reduces the

energy consumption of aeration to some extent.

(2) Equipment and materials

Experimental raw water:

The pretreatment for waste water can adjust the

production of sediment by pH, and the strong

oxidation of O3 can mineralize the harmful organic

compounds in sewage, so as to remove the COD in

reverse osmosis concentrated water. At the same time,

it can transform harmful substances and COD which

cannot be decomposed by microorganisms into

organic compounds which can be degraded by

microorganisms, so as to improve their biological

characteristics. After O3 oxidation, the concentration

of COD in concentrated water will be reduced to

some extent. At this time, the use of activated carbon,

aeration, coagulation and other treatment methods to

re-care can be clearly reduce the concentration of

COD in concentrated water.

The raw water is obtained from reverse osmosis

concentrated water, which is produced by oil

separation and biochemical treatment of refinery

wastewater. The unique nature of this water is that it

contains a small amount of heavy metals and difficult

(non) biochemical degradation substances. At the

same time, it has the characteristics of low

biodegradability and toxicity to microorganisms. The

amount of water to be treated is about 0.5m3/h. The

content of COD is not more than 200mg/L, the

content of ammonia nitrogen is not more than 8mg/L,

and the suspended matter is not more than 20mg/L.

Major drugs:

The drugs used in this experiment and their purity

requirements are shown in table 1.

Table 1 Experimental drugs

Reagent Purity Manufacturer

NaOH Analytical reagent Tianjin Standard Technology Co., Ltd.

K2Cr2O7 Analytical reagent Tianjin Tianda Chemical Reagent Factory

HgSO4 Analytical reagent Jiangyan Huanqiu Reagent Factory

Ag2SO4 Analytical reagent Tianjin Standard Technology Co., Ltd.

H2SO₄ 98% Jinzhou Gucheng Chemical Reagent Factory

(NH4)2Fe(SO4)2·6H2O Analytical reagent Tianjin Standard Technology Co., Ltd.

FeSO4·7H2O Analytical reagent Tianjin North-Tianyi Chemical Reagent Factory

phenanthroline Analytical reagent Shanghai Reagent Factory

Distilled water — Self-made

H2O2 30% Shenyang Federal Reagent Factory

The equipment needed by the experiment is

assembled and assembled by the research unit and a

chemical enterprise, mainly including catalytic

oxidation tower, tail gas destruction tank and MBBR

Page 18: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

14

biochemical tank. Specific equipment parameters are shown in table 2.

Table 2 Parameters of the main unit device

Main unit Clearance size (m) Active area (m3) Filler content (m3)

Catalytic oxidation

tower

4.0Ф0.5 0.7232 Catalytic packing 0.45

Tail gas destruction

tank

0.35.02.1 1.8

MBBR biochemical

tank

0.32.12.1 3.8 K3 biological vector 1.5

Drain trap 2.12.1 Superficial area 1.6m2

(3) Experiment process

Experimental flow:

The specific process of this experiment is shown in

figure 1. First of all, we need to start the test and

run the water, then access to tap water after

determining that the device function is normal. The

tap water is filled into the device until it is full, and

then the sludge is connected to the MBBR pool.

Nutrients, such as P and sugar, are added for

microbial growth according to the setting time. At

the same time, aeration should be carried out

according to the actual situation. After the biofilm

is added, the raw water is injected into it, which is

about 1/5 of the total raw water. Then, the amount

of water is slowly increased and the number of

nutrients injected is reduced, ensuring that the

microorganisms in the MBBR pool can survive

normally in the pool.

Ozone generation

Flo

w m

eter

Catalytic reaction

column

Tail gas destruction

tank

MBBR biochemical

poolPrecipitate

Reverse osmosis

concentrated water

Atmosphere

Pump

Sludge return

Figure 1. Test process flow chart

After the culture of microorganisms for a period of

time, the index data of biochemical effluent can be

measured. It is confirmed that the removal effect is

ideal and the removal effect is stable. The raw water,

catalytic oxidation influent, effluent, biochemical

influent and effluent data are collected and arranged.

After the successful culture of microorganisms, the

experiment is carried out according to the

experimental process. Once the experiment can be

carried out stably, the process is adjusted according

to the experimental results. That is, under the

condition that the process conditions are not

changed, the amount of water is adjusted and the

raw water is continuously injected until the amount

of water reaches the predesigned quantity. At the

same time, the input amount of O3 should be

adjusted so as to save the input resources. O3 is

adjusted to the appropriate dose that can meet the

process requirements. Then, the DO, temperature

and other adjustable conditions are adjusted based

on the actual test results to ensure that these

conditions can guarantee the best experimental

results. After meeting the design requirements, the

impact test can be used to find the maximum

operating point. In order to supplement the

nutrients needed for microbial growth in MBBR,

the industrial grade KH2PO4 must be continuously

added after the system is stable. Every treatment of

1t wastewater requires the addition of 1.5g

KH2PO4.

Page 19: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

15

Parameter control:

Temperature: about 25℃.

Sludge volume: In the initial stage of the system,

nutrients should be increased to improve the sludge

concentration. After the system runs stably, the

water can be increased and the nutrient solution is

reduced until the nutrient is stopped completely.

PH value and alkalinity: The pH value of waste

water is determined by pH on-line monitor. Dosing

pump is used to automatically add Na2CO3 to

control pH value of wastewater, and pH value is set

between 6~7.

Aeration rate: The system dissolved oxygen is

maintained at 1~2mg/L during the initial start-up

and biofilm formation. When the influent load is

increased to the design load, the dissolved oxygen

is maintained at 2~5mg/L.

Ozone control: According to the experimental data,

the amount of O3 is adjusted and the dosage of O3

is reduced as much as possible to ensure the

removal rate.

Analysis method:

The water quality indexes of this experiment are

measured by national standard analysis method.

Specifically, the potassium dichromate method is

used to determine COD; the mass concentration of

NH3+-N is measured by the dichromate titration

method of sodium reagent; the pH is measured by

glass electrode method; and the content of DO is

measured by a dissolved oxygen meter.

(4) Treatment effect

After the completion of biochemical microorganism

domestication and biofilm formation on MBBR

filler, sampling analysis began in June 1, 2017, and

the analysis data were shown in table 3.

Table 3 Experimental data

Date Inlet flow

(m3/h)

Ozone

(g/h)

Oxidation influent COD

(mg/L)

Oxidation effluent

COD

(mg/L)

Biochemical effluent

COD (mg/L)

1 4.0 0 162 133

2 4.0 0 192 147

3 4.0 0 168 164

4 4.0 0 165 148

5 4.0 0 183 175

6 4.0 0 129 112

7 4.0 0 207 181

8 4.0 0 149 125

9 4.0 8.68 175 138 120

10 4.0 8.68 186 143 122

11 4.0 8.68 152 120 98.3

12 4.0 8.68 168 123 81.8

13 4.0 8.68 164 119 73.8

14 4.0 8.68 122 77.6 65.3

15 5.0 85 114 81.8 49.1

16 5.0 85 94 90 65.4

17 5.0 85 102 94 61.3

18 6.0 85 135 131 69

19 6.0 3.101 126 94 61.5

Page 20: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

16

20 6.0 3.101 123 77.7 85.8

21 8.0 3.101 137 80 45

22 8.0 3.101 105 55 31

23 8.0 3.101 119 75 39

24 8.0 3.101 136 73.7 44.2

25 8.0 3.101 120 63.4 38.7

26 8.0 8.90 127 69.8 41.5

27 8.0 8.90 152 80.6 48.7

28 5.0 8.60 165 80.6 37.2

29 5.0 8.60 168 85.7 43.5

30 5.0 8.60 167 79.5 39.4

31 5.0 8.60 175 82.6 43.8

32 5.0 45 127 65.4 40

33 5.0 45 126 68 42

34 5.0 45 136 78.9 36

35 5.0 45 144 74 44

36 5.0 45 152 82.3 48

37 5.0 45 146 84 44

28 5.0 45 140 78 38

29 5.0 45 134 70.2 40.9

30 5.0 45 136 76.4 40

Through the analysis for table 3, it can be found

that when the influent is normal, the influent COD

is about 141mg/L. Through the catalytic effect of

O3, the effluent is about 77. 2mg/L, and the

removal rate of catalytic oxidation is about 43.9%.

The biochemical effluent is about 41 mg/L, and the

biochemical removal rate is about 46.3%. When the

high pressure pump is opened, the influent COD is

about 170.6mg/L, and the catalytic oxidation

effluent is about 83.7mg/L. The removal rate of

catalytic oxidation is about 50.9%, the biochemical

effluent is about 41.9mg/L, and the biochemical

removal rate was about 49.9%. The effluent COD is

less than 60mg/L, which meets the national

emission standard.

The basic reason for this result is that the amount of

O3 dissolved in water increases substantially

because of the addition of O3. When the catalyst is

added, the oxidation of O3 will result in the

decomposition of many hydroxyl radicals [6]. The

higher the content of the molecule is, and, the more

organic matter it touches, which means that the

amount of organic matter that can be treated

increases with the removal rate [7]. In addition,

increasing the amount of O3 can degrade the

intermediate products accumulated in the process to

inhibit the degradation of pollutants and produce

CO2 and H2O. The degradation of these

intermediate products will be more beneficial to the

decomposition of harmful substances by

microorganisms, that is, to promote the reaction.

This can also improve the removal rate to a certain

extent [8].

After the treatment of MBBR process, using the

advantages of K3 carrier filler, the wastewater COD

can be further treated until it reaches the standard

[9]. At the same time, ozone dosage is 45 g/h, and

the power of ozone generator SKW is adjusted to

13%, that is, the power consumption of 0.65KW

tons of water is about 1 yuan. There is no blower in

power consumption equipment. Relative to the

engineering design, the operation cost is 0.11 yuan

/t.H2O. This shows that the cost of dealing with a

ton of water is relatively cheap, and the operating

Page 21: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

17

cost is relatively low [10].

3. CONCLUSION

In order to solve the problem that COD is not up to

standard in the concentrated wastewater discharged

from some petrochemical refinery wastewater

treatment plants, the ozone MBBR process is

adopted to treat the wastewater in depth, and the

effect of the process on the treatment of reverse

osmosis concentrated water is investigated. The

experimental results show that the process has a

significant effect on the degradation of COD. Under

normal influent conditions, the removal rate of

catalytic oxidation is about 43.9%, and the

biochemical removal rate is about 46.3%. When the

high pressure pump is opened, the removal rate of

catalytic oxidation is about 50.9%, and the

biochemical removal rate is about 49.9%. O3 can

oxidize this kind of sewage. After MBBR treatment,

the effluent quality is up to standard, and it tends to

stable. The effluent COD is less than 60mg/L,

which meets the national emission standard. At the

same time, through the calculation of the equipment

loss and investment cost in the process of

wastewater treatment, it is concluded that the

investment cost of dealing with a ton of water is

relatively cheap, and the operation cost is relatively

low.

REFERENCE

[1]Fazal, S., Zhang, B., Zhong, Z., Gao, L., & Chen,

X. (2015). Industrial wastewater treatment by using

mbr (membrane bioreactor) review study. Journal

of Environmental Protection, 06(6), 584-598.

[2]Mirbagheri, S. A., Bagheri, M., Boudaghpour, S.,

Ehteshami, M., & Bagheri, Z. (2015). Performance

evaluation and modeling of a submerged membrane

bioreactor treating combined municipal and

industrial wastewater using radial basis function

artificial neural networks. Journal of Environmental

Health Science & Engineering, 13(1), 1-15.

[3]Alkmim, A. R., Costa, P. R. D., & Ricci, B. C.

(2015). The application of filterability as a

parameter to evaluate the biological sludge quality

in an mbr treating refinery effluent. Desalination &

Water Treatment, 53(6), 1440-1449.

[4]Amaral, M. C. S., Borges, C. P., Cerqueira, A. C.,

& Torres, A. P. (2015). Treatment of refinery

effluents by pilot membrane bioreactors: pollutants

removal and fouling mechanism investigation.

Desalination & Water Treatment, 56(3), 583-597.

[5]Hoinkis, J. (2015). Membrane bioreactors for

water treatment, in: advances in membrane

technologies for water treatment: materials,

processes and applications. Journal of Water Reuse

& Desalination, 3(3), 260-267.

[6]Zaffaroni, C., Daigger, G., Nicol, P., & Lee, T. W.

(2016). Wastewater treatment challenges faced by

the petrochemical and refinery industry, and

opportunities for water reuse. Water Practice &

Technology, 11(1), 104-117.

[7]Pakravan, P., Akhbari, A., Moradi, H.,

Azandaryani, A. H., Mansouri, A. M., & Safari, M.

(2015). Process modeling and evaluation of

petroleum refinery wastewater treatment through

response surface methodology and artificial neural

network in a photocatalytic reactor using poly

ethyleneimine (pei)/titania (tio 2) multilayer film on

quartz tube. Applied Petrochemical Research, 5(1),

47-59.

[8]Rezvantalab, S., & Bahadori, F. (2015). Natural

gas refinery wastewater treatment by zeolites.

Progress in Agricultural Engineering Sciences,

11(1), 1-8.

[9]Deng, F., Qiu, S., Chen, C., Ding, X., & Ma, F.

(2015). Heterogeneous catalytic ozonation of

refinery wastewater over alumina-supported mn

and cu oxides catalyst. Ozone Science &

Engineering, 37(6), 546-555.

[10]Wang, L., Shen, X., Ni, K., & Li, X. (2015).

Treatment of oil-refinery wastewater by

heterogeneous catalytic ozonation process. Chinese

Journal of Environmental Engineering, 9(5),

2297-2302.

Page 22: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

18

Association Rules Redundancy Processing

Algorithm Based on Hypergraph in Data

Mining

Ankit Agrawal1,*, Alok Choudhary1

1Department of Electrical Engineering and Computer Science, Northwestern University, Evanston, IL 60201,

United States

*E-mail: [email protected]

Abstract: In order to achieve the research from

individual data to data system and from passive

verification of data to active discovery, taking high

dimensional data oriented data mining technology as

the research object, an association rule redundancy

processing algorithm based on hypergraph in data

mining technology is studied according to the project

requirements. The concepts of hypergraph and

system are introduced to explore the construction of

hypergraph on 3D matrix model. In view of the

characteristics of big data, a new method of super

edge definition is adopted, which improves the ability

of dealing with problems. In the association rules

redundancy and loop detection based on directed

hypergraph, the association rules are transformed into

directed hypergraph, and the adjacency matrix is

redefined. The detection of redundancy and loop is

transformed into the processing of connected blocks

and circles in hypergraph, which provides a new idea

and method for the redundant processing of

association rules. The new method is applied to the

data processing of practical projects. The

experimental results show that the 3D matrix

mathematical model and related data mining

algorithms in this paper can find new high-quality

knowledge from high-dimensional data.

Keywords: Data mining; hypergraph; association rules;

redundant processing

1. INTRODUCTION

Energy is exhausted in consumption, which leads to

the scramble for energy and the fear of the crisis.

Data will not only be exhausted by possession, but

will continue to grow with the use and dissemination

of data. It's conceivable that data will be the DNA of

the world in the future. However, the Matthew effect

caused by data size, quality and application will lead

to obvious data resource segmentation and

competitive advantage. Therefore, big data has

become the next strategic front for all countries. This

is a war without smoke of gunpowder. With the rise

of "smart economy", the collection, mastery and

application of data will become the core

competitiveness of the state, enterprises and units [1].

Big data is a kind of data information which is

difficult to be processed or analyzed by traditional

methods or tools. With the changing times, in

addition to business data, we also record the location,

temperature, web pages and other information.

Complex data and information make up big data.

Because big data is complex, it needs enough

imagination to make up. So far, there is no uniform

definition. People’s understanding on big data is not

comprehensive and in-depth cognition. Everyone

knows only one part of big data. As for the meaning

of big data, there are several kinds of meaning at

present. Amazon big data scientist John Rosser

believes that big data refers to a huge amount of data

that exceeds the processing power of a computer. Dan

Bin, the chief product consultant of Informatica in

China, believes that big data is the sum of massive

data and complex data type [2].

We need to understand the features of big data to

better navigate this huge data. As far as we know

today, big data has 4 features: volume, variety,

velocity and value. Volume refers to the huge amount

of data, and is mainly reflected in the large amount of

data access and calculation. Data storage can jump

from the TB level to the PB level. Variety contains

structured data tables, semi-structured and

unstructured text, video, images and other

information [3]. The exchange of data is very

frequent and widespread. Velocity: On the one hand,

it means that data is constantly updated, and the

growth rate is fast. On the other hand, it means that

data has fast processing speed on data access and

transmission. Value means the value density of the

data is very low. Taking video as example, in

continuous monitoring, the useful data is only one or

two seconds [4].

Big data is not only a surge in data volume (it

gradually expands to increase the Internet data from

the initial ERP/CRM data, then includes to the related

information data such as Internet of things sensors),

but also a promotion of data complexity. Big data is a

large scale qualitative change after it is accumulated

to a certain extent. The data types of big data are rich

and varied, including the structured information such

Page 23: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

19

as the original database data and the unstructured

information such as text and video. Moreover, the

speed of data acquisition and processing is also

getting faster and faster [5].

Big data contains the mean of massive data and is

beyond the massive data in the content. In short, big

data is the sum of massive data and complex data

type. Big data refers to all data sets including

transaction and interactive data set. The size or

complexity degree is beyond the ability of using

common technologies to capture, manage and process

these data sets at reasonable cost and time limits [6].

Big data consists of three major technologies:

Massive transaction data: Based on the online

transaction processing (OLTP) and analysis system

from the ERP application process to the data

warehouse application process, the traditional

relational data, unstructured and semi-structured

information continue to grow. As more data and

business processes move to the public and private

sectors, the situation becomes more complex. The

internal business transaction information mainly

includes online transaction data and online analytical

data. It is a structured static historical data that is

managed and accessed through relational databases.

Through these data, we can understand what

happened in the past. Massive interactive data: This

new force is made up of social media data such as

Facebook, Twitter and LinkedIn. It includes a call

detail record (CDR), equipment and sensor

information, GPS and geolocation mapping data, the

massive image files transmitted by ManageFile

Transfer protocol, Web text, click stream data,

scientific information and e-mail. These data can tell

us what will happen in the future. Massive data

processing: A variety of light databases are used to

receive data from the client and import it into a

centralized large distributed database or distributed

storage cluster. Then, the distributed database is used

to query and classify the concentrated mass data that

stored in it. In this way, most common analytical

requirements are met. At the same time, the data

mining based on the previous query data can meet the

needs of high-level data analysis [7]. For example,

YunTable is a new generation of distributed database

based on traditional distributed database and new

NoSQL technology. It can build a hundred level

distributed cluster to manage massive data at PB

level.

According to the characteristics of big data, a new

method of super edge definition is adopted to

improve the ability of dealing with problems. Since

most mining algorithms use only support and

confidence to evaluate association rules, there is a

large amount of redundancy and loop between the

generated rules. This is particularly true when the two

threshold is set very low, which makes it difficult for

users to analyze and use these rules. To solve this

difficult problem, the concept of hypergraph is

introduced in this paper. The association rules are

represented by directed hypergraph, and the

adjacency matrix is redefined and constructed. On

this basis, the association rules loop and redundancy

detection are realized by using the properties of

directed hypergraph and graph theory, which greatly

improves the quality of association rules.

2. METHODS

(1) Brief introduction to hypergraph

At present, most of the association rule mining

algorithms use only the support and confidence to

evaluate the association rule, which cannot guarantee

that all of the mined association rules can arouse

user’s interest. It may include a large number of

redundant and meaningless association rules, which

has become one of the most important issues

affecting the efficiency of rule generation. A

mechanism for detecting redundancy and loop rules

is established, and the mechanism is used to judge the

generated Association rules. If there is redundancy or

loop rules, the rule is deleted. This method is a kind

of typical processing methods. After the generation of

association rules, the algorithm is filtered according

to the established rules of users, and the redundancy

and loop rules are deleted. Post processing method is

an important means of filtering association rules, and

has caused many experts and scholars to carry out

extensive and in-depth research. This is also one of

the important applications of this project.

Hypergraph is a subset system of finite set, which is a

generalization of graph theory and plays a very

important role in discrete mathematics. The term

"hypergraph" was first proposed by Berge in the

monograph Hypergraphs in 1966. At first, the

purpose was to generalize some classical results in

graph theory. Later, people gradually realized that

some theorems in graph theory could be generalized

in the unified form of hypergraph. Thus, the prelude

to the study of hypergraph theory has been opened up,

which has become a huge new branch of the theory.

Compared with general graphs, hypergraph research

is more complex. Some important structures and

properties in general graphs do not exist in

hypergraph, thus many similar problems of graph

theory are also more complex.

(2) Brief introduction to association rule

Association rule mining is an important branch of

data mining. It was first proposed by R.Agrawal in

1993 for the analysis of the market basket problem,

and used to analyze the shopping habits of customers.

It is used to discover interesting relationships

between items or attributes in a database. These

relationships are pre-unknown and hidden. That is to

say, it cannot be obtained by logical operations of the

database (such as the connection of tables) or

statistical methods. With the continuous collection

and storage of data, the scale of data is expanding

rapidly. Many industry people are more and more

interested in mining association rules from massive

Page 24: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

20

and high-dimensional databases. About the research

on association rule mining, the research department

of famous university research institutions in the

world and the major IT companies have invested a lot

of energy to carry on the exploration, and a lot of

research results are used to practical applications.

The intelligent database system laboratory of

Stanford University has developed a large number of

commercial data mining systems, such as DBMiner

mining system. It contains many advanced mining

algorithms and has the following characteristics:

Because the underlying mining details are opaque to

the user, users can use the software without in-depth

study of statistical knowledge. There are many

types of knowledge mining, including association

rules, cluster analysis and time series analysis. Due to

the adoption of advanced research result, the speed of

the product is claimed to be 20 times as much as its

competitors. In addition, the system can run on many

platforms, and is integrated with many mainstream

database systems (such as SQL-Sever and Oracle). At

the same time, the online analysis mining technology

is introduced to make the system give full play to the

advantages of data warehouse analysis.

The Quest project at IBM's Almaden labs is also a

leader in data mining research. The project includes

association rules, sequence patterns, classification

and clustering of time series. Its representative

product is DB2 Intelligent Miner of Data. This

product is applied on DB2 platform of IBM, and also

has similar products under WindowsNT.

Association rule mining is applied to massive and

high-dimensional data sets, especially in the era of

big data. It explores the real valuable information

hidden behind it. It is a long-term goal for scholars

engaged in the research of association rule mining.

Due to the particularity of massive and

high-dimensional large data, it inevitably leads to a

huge number of combinations between projects. It

takes a lot of time to search for frequent item sets.

Therefore, how to improve the efficiency of

generating frequent item sets and reduce the number

of database scanning and memory space occupied by

candidate item sets are the direction that experts and

scholars in the field of association rule mining need

to work hard. With the increasing of the dimension of

database, the search space of mining algorithm and

the possibility of blind discovery are also increased.

Therefore, we must use professional knowledge to

extract and discover tasks related data, delete data

irrelevant to task discovery, and effectively reduce

the dimension of the problem. At present, most

association rules mining algorithms use only support

and confidence to evaluate association rules. This

does not guarantee that the mining association rules

are all interested in the user. It may include a large

number of redundant and meaningless association

rules, which has become one of the most important

issues affecting the efficiency of rule generation.

The task of association rule mining in definition 1: It

refers to finding strong association rules with

minimal support and confidence provided by users in

the database D . The corresponding item set of

strong association rules →:R X Y is X Y ,

which must be a very complex item set. The

confidence of the association rule →:R X Y

derived from the item set X Y is also computed

by the support of the frequent item sets X and

X Y . Therefore, association rule mining can be

decomposed into two steps:

It is necessary to find the frequent item sets satisfying

the minimum support provided by the user in the

database.

On the basis of frequent item sets, all association

rules satisfying minimum confidence provided by

users are generated.

The basic model of association rule mining is shown

in figure 1.

Database Algorithm 1Frequent

itemsetsAlgorithm 2

Association

rules

Set the minimum support Set the minimum confidence level Evaluation

User

Step1 Step2

Figure 1. The basic model of association rule mining.

The task of Step 1 is to quickly and efficiently find all

frequent item sets in a database D . This is the

central problem of association rule mining, and is the

main index to measure the efficiency of association

Page 25: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

21

rule mining algorithm. At present, most of the

researches on mining association rules are aimed at

the first sub problem. It is also the main research

content of this paper: that is, to maximize the

efficiency of the algorithm.

The algorithm of Step 2 is relatively simple. It is only

an enumeration probe procedure of strong rule

produced by frequent item sets. Concrete

implementation method: For each frequent data item

set L , all its nonempty sets are found. For each

nonempty subset a , if the ratio between Support (L)

and Support (a) is greater than the minimum

confidence, then the following rules can be formed:

→ −( )a L a .

That is, a subset of any frequent data item set is used

as the premise of the rule, and the remaining part is

used as the rule conclusion.

3. REDUNDANT ALGORITHM OF

ASSOCIATION RULES BASED ON

HYPERGRAPH

(1) Redundant rule detection

At present, most association rules mining algorithms

only use support and confidence to evaluate

association rules, so that there is a large amount of

redundancy between the generated rules, especially

when the two thresholds are set very low. Rules that

are mined by association rules often contain items

that are not required by users. The rules are consistent

with the prior knowledge that the user is already

familiar with. The resulting multiple rules express the

same meaning. This kind of rules cannot provide

more useful information and any effective help for

decision makers. Therefore, it is regarded as a

redundant rule. Under the background of big data,

this situation is more serious. Redundant rules do not

bring new information. However, in many cases, the

number of redundant rules is greater than the number

of meaningful rules. The results will not only lead to

waste of mining resources, but also affect the

selection and use of association rules, thus reducing

the effectiveness of mining results. Therefore, how to

distinguish the redundant rules, and how to cut

unnecessary rules and improve the efficiency and

effectiveness of mining association rules while

ensuring the integrity of information have become

one of the hot research field. This will also be one of

the key technologies in the era of big data.

Assuming that there is an association rule

→1:R X Y and →

2:R X Y . If the rule meets

( ) ( )A B X Y and X A , them the total

number of redundant rule is − −(3 2 1)Y Y

. Y is

the number of items contained in item set Y.

The theorem proves that there are a large number of

redundant rules that can be deleted in the mining

association rules under the existing evaluation criteria.

The total number of redundant rules is analyzed

theoretically.

(2) Directed hypergraph representation of association

rules

In this paper, a method based on spanning tree is used

to remove the redundancy of association rules. This is

a new redundancy check method for association rules,

which can effectively check redundant rules:

subordinate rules and repetitive path rules. The

adjacency matrix of directed hypergraph is mainly

applied to simple graphs, where there are compound

points for directed hypergraph. Therefore, the

compound rule can only be expressed by directed

hypergraph, and the adjacency matrix must be

redefined. The adjacency matrix defined in this paper

is to take the compound point as a row or a column

just like the simple point. In this way, the information

of association rules can be accurately expressed. At

the same time, the adjacency matrix is ensured to be

the 0-1 matrix to eliminate the difficulty of the

algorithm caused by the non 0-1 matrix and the

ambiguity of the expression. After removing the

redundancy by algorithm, the adjacency matrix can

be reduced to association rules. The redefined

adjacency matrix and its directed hypergraph are

shown in figure 2.

a: Redefined adjacency matrix

b: Directed hypergraph

Figure. 2. Redefined adjacency matrix and directed

hypergraph

Page 26: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

22

(3) Graphical representation and processing of

redundant rules

The adjacency matrix of directed hypergraph

completely characterizes the adjacency relations

among vertices in a graph. In the directed hypergraph

based on association rules, the adjacency matrix

reflects the relation among all the association rules to

be detected.

Definition 2: The road. Assuming that there is

= ( ( ), ( ))G V G E G , and its approach is a finite

nonempty sequence =

0 1 1 2...

k kW v ev e e v

, that is, an

alternate sequence between vertices and edges. There

is ( )

ie E G

and ( )

jv V G

. ie

is associated

with −1iv

and iv

. 1 ,0i k j k

means that the point 0( , )

kv v

is regarded as the

starting point and ending point of road W .

−1 2 1, ,...,

kv v v

is called the default point of the

path W . k is called the length of W . If the

1 2, ,...,

ke e e

of road is different, then it is called

the trace. If the starting point and the ending point are

the same, the path is called the closed path (closed

track, closed circuit). Closed loop is also called

circle.

Definition 3: Connected graph. If there is a path

between u and v (two vertices) in G, then u and v are

connected. If any vertex of the graph G is connected,

then G is connected graph.

Definition 4: The tree. If there is no loop in a

connected graph, it is called a tree. According to the

definition of tree, the following properties are

obtained directly: There is at most one edge between

any two nodes in a tree. The number of edges is less

than 1 of the number of nodes in the tree. If any edge

is removed from a tree, it becomes an unconnected

graph. Adding one edge at any point in the tree will

form a loop.

From the definition of graph theory, it is found that

the processing of redundant rules in directed

hypergraph based on association rules can be

transformed into finding connected blocks in

hypergraph. Meanwhile, it also can be transformed

into spanning tree. Each edge of a directed

hypergraph represents an association rule. When the

connected graph is changed into a spanning tree, the

edges need to be deleted. This edge is the redundant

rules in association rules, and the redundant rules can

be deleted by this method.

Definition 5: Hyper tree. Assuming there is a

hypergraph ( )= = 1 2, ,{ , }

nH X ,X x x x and

= 1 2

{ , , , }m

E E E E , H is called hyper tree if it is

connected and does not contain any hyper loop.

Definition 6: Sub-hypergraph. Hypergraph H(V,E) is

defined as a new hypergraph HA=(VA,EA) by the

part hypergraph derived from the super edge subset

EA E .

In the above definition, when VA is exactly V, HA is

called the spanning sub graph of H. HA and H have

the same vertex set, but the super edge set of HA is

the super edge subset of H.

Definition 7: Connected hypergraph. The spanning

hyper tree T of connected hypergraph H= (V,E) is

defined as a spanning sub-hypergraph of H. It

satisfies the definition of hyper tree, that is, T is

connected without hyper loop.

Definition 8: Bipartite graph. The bipartite graph

corresponding to the hypergraph H= (V,E) refers to

take the vertex set V and the super edge set E of H as

the vertex set. When i iv e in H, vertex

iv is

connected with vertex ie in bipartite graph. The

bipartite graph corresponding to H is represented by

G<H>.

Graph 3 shows the relation between hypergraph and

its corresponding bipartite graph.

a: Hypergraph

b: Bipartite graph

Figure. 3. Hypergraph and its corresponding bipartite

graph

In graph theory, connectivity is of special importance,

and it can be used to map the connectivity of graphs.

Many scholars have studied it deeply since ancient

times. The directed hypergraph generated by this

project cannot be a connected graph. We need to find

connected blocks and process the spanning tree on

the basis of connected blocks. The search of

connected blocks is achieved by adjacency matrix.

From the above code, it is found that the adjacency

matrix of the spanning tree can be obtained after

Page 27: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

23

inputting the adjacency matrix of connected block.

The adjacency matrix of the spanning tree is obtained.

Through reduction, the deletion of association rules

redundancy is realized. Combined with the current

algorithm, we assign smaller weights to the edges

corresponding to the important association rules. The

association rules with unimportant and

non-interesting are assigned with larger weights.

Finally, the minimum spanning tree is calculated with

Prim algorithm.

In the graph, H=(V,E) and (u,v) represents the edge of

vertex u and vertex v, that is, ( , )u v E . However,

W(u,v) represents the weight of the edge. If there is a

subset of T as E, then T E belongs to a loop free

diagram. The ( )W T of

= ( , )

( ) ( , )u v T

W T W u v is the

smallest. T is called as the minimum spanning tree of

H. The minimum spanning tree is actually the

abbreviation of the minimum weight spanning tree:

1.11 11.12 10.28 10.21 10.14

Through practice, it is found that the minimal

spanning trees are different in their edge sets

sometimes. The weights are introduced to deal with

the minimum spanning tree, which plays an important

role in preserving important and interesting rules

(4) Algorithm flow

As shown in figure 4, a flow chart of the removal of

redundant association rules classification method

based on spanning tree is presented, and the steps are

as follows:

The experimental data is scanned and association

rules are generated. The directed hypergraph is used

to represent the association rules, and the adjacency

matrix is redefined.

The adjacency matrix of the pre-processing is

obtained by removing the subordinate rule algorithm.

A spanning tree without loop and connectivity is

obtained by spanning tree algorithm.

The adjacent matrix of the generated tree is reduced

to the corresponding association rules, and the final

processing result is obtained.

Experimental data

Generate association

rules

Super graph

Adjacency matrix

Preprocess adjacency

matrix

Spanning Tree

Restore rules by

adjacency matrix

Using directed

hypergraph to represent

association rules

Deletion of subordinate

rules

High quality rules

Figure. 4. Flow chart of redundancy detection for

association rules

An algorithm using redefining adjacency matrix to

remove subordinate rules is proposed. Each

association rule is defined as an edge of a directed

hypergraph, and the redefined adjacency matrix is

obtained according to the upper section. The row of

adjacency matrix represents the antecedent of

association rules, the column of adjacency matrix

represents the consequent of association rules. The

algorithm is as follows:

For each column of adjacency matrix (association

rule consequent), it is necessary to query whether its

value is 1. The intersection operations are performed

for the rows corresponding to the positions of the 1

(the antecedent of association rules). If there is

intersection, the corresponding row (the antecedent of

association rules) that contains more items for the

position 1 is set to 0. In the same way, the process is

performed for each column.

It is necessary to traverse whether the row and

column values in each item are all 0, and if so, the

row and column needs to be deleted.

Finally, the column and row are traversed from the

tail end respectively. If a column / row is all 0, then

we need to delete the column / row until the 1 column

/ row is encountered.

The output matrix is the adjacency matrix after

deleting the subordinate rule, and the composite node

in the adjacency matrix has no intersection with other

nodes. This makes it independent in subsequent

processing just like simple nodes, so it can be treated

as simple node processing.

Page 28: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

24

This removes all the subordinate rules in the

redundant rules. The flow chart of the algorithm is

shown in figure 5. Through this algorithm, all the

subordinate rules in the redundant rules can be

deleted, and the pre-processing adjacency matrix can

be obtained.

Association rules

Directed hypergraph

Redefine the adjacency matrix

Whether the location of

the bank is 1

Whether the position

of this column is 1

Whether there is

intersection

Whether there is

intersection

Is it the last

line?

Is it the last

column?

Corresponds to the back

of the calculation

Corresponding to the

previous operation

Set to 0 by the owner Set to 0 by the owner

Is there any

row / column all

0?

Traverse forward from the end of

the column / row

Is there a

column / row?

Preprocess adjacency

matrix

Delete the row / column

Delete traversed

columns / rows

Yes Yes

Yes

Yes

Yes Yes

Yes Yes

No

No

No

No

No

No

No

No

Figure 5. Flow chart for removing subordinate rules

4. RESULTS

In this paper, the method of removing association

rules redundancy based on spanning tree is divided

into three modules: redefined adjacency matrix

module, removing subordinate rule module and

spanning tree module. The first two modules are

Page 29: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

25

implemented by VB programming, and the

spanning tree module is implemented by Matlab.

The specific contents are shown in figure 6.

Redefine adjacency

matrix module

Matrix restore Spanning Tree Module

Remove the dependency

rules module

Figure 6. Module composition of classification

removing redundancy method

2 UCI data are selected, namely Balloons data set

and Shuttle-landing-control data set. The minimum

support and confidence of the Balloons dataset are

5%. There are 4 attributes in the dataset, and 18

association rules are obtained by Aprioir algorithm.

The minimum support of Shuttle-landing-control

data set is 40%, and the minimum confidence is

100%. There are 7 attributes in the dataset, and 15

association rules are obtained by Aprioir algorithm.

Taking Balloons data set as an example, the

redefined adjacency matrix is obtained according to

18 association rules (V2=SMALL is represented by

V2, others and so on).

After removing subordinate rule algorithm and

spanning tree algorithm, the spanning tree without

loop connectivity is obtained. The specific process

of spanning tree algorithm and the corresponding

directed hypergraph are shown in figure 7. In the

figure, the left half part is the spanning tree

algorithm in Matlab screenshot, and the adjacency

matrix that has completely removed redundancy is

obtained by the pre-treatment adjacency matrix (the

result of removal subordinate rule algorithm). The

right part is the change of the directed hypergraph

before and after the spanning tree algorithm.

a: Matlab simulation

b: Matlab directed hypergraph Figure.7. Matlab simulation and directed

hypergraph

Through the method introduced in this paper, two

data sets have removed the redundant rules

accurately and quickly, and the specific results are

shown in table 1.

Table 1 Properties of raw materials

Balloons Shuttle-landing-control

Total number

of association

rules

18 15

Subordination

rule

8 9

Repeat path

rule

7 2

Number of

removing

redundant

rules

15 11

Number of

residual

association

rules

3 4

5. CONCLUSION

Taking the high dimensional data oriented data

mining technology as the research object, the data

preprocessing is discussed and the problem of data

fusion is solved. A three-dimensional matrix model

is established, which lays the foundation for the

subsequent algorithm research. The method of

association rule analysis based on co evolution is

adopted, and good results are obtained in the

analysis of high-dimensional data. After

introducing the concept of hypergraph and system,

the hypergraph is established on the 3D matrix

model. The clustering analysis is realized by using

the HMETIS algorithm of undirected hypergraph.

The problem of redundancy and loop detection of

association rules is solved by directed hypergraph,

and high quality association rules are obtained.

These methods, models and algorithms have some

scalability, which lay a foundation for the analysis

of large data. In the association rules redundancy

and loop detection based on directed hypergraph,

the association rules are transformed into directed

hypergraph, and the adjacency matrix is redefined.

Page 30: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

26

The detection of redundancy and loop is

transformed into the processing of connected

blocks and circles in hypergraph, which provides a

new idea and method for the redundant processing

of association rules.

Some data preparation, mathematical models and

algorithmic tools proposed in this paper try to find

and analyze problems from the perspective of

system. These thinking has great significance and

the possibility of realization in big data era.

Obviously, the challenge of knowledge and tools is

also greater. We also make some useful

explorations on the observability, controllability

and global convergence, parameter optimization

and weight balance of data systems. These will be

verified and applied in the future practice.

REFERENCES

[1]Henriques, R., Antunes, C., & Madeira, S. C.

(2015). A structured view on pattern mining-based

biclustering. Pattern Recognition, 48(12),

3941-3958. DOI.org/10.1016/j.patcog.2015.06.018

[2]Shekhar, S., Jiang, Z., Ali, R. Y., Eftelioglu, E.,

Tang, X., Gunturi, V., & Zhou, X. (2015).

Spatiotemporal data mining: a computational

perspective. ISPRS International Journal of

Geo-Information, 4(4), 2306-2338.

DOI:10.3390/ijgi4042306

[3]Tang, G., Pei, J., Bailey, J., & Dong, G. (2015).

Mining multidimensional contextual outliers from

categorical relational data. Intelligent Data Analysis,

19(5), 1171-1192. DOI: 10.3233/IDA-150764

[4]Zamora, M., Baradad, M., Amado, E., Cordomí,

S., Limón, E., Ribera, J., ... & Gavaldà, R. (2015,

October). Characterizing chronic disease and

polymedication prescription patterns from

electronic health records. In Data Science and

Advanced Analytics (DSAA), 2015. 36678 2015.

IEEE International Conference on (pp. 1-9). IEEE.

[5]Xun, Y., Zhang, J., Qin, X., & Zhao, X. (2017).

FiDoop-DP: data partitioning in frequent itemset

mining on hadoop clusters. IEEE Transactions on

Parallel and Distributed Systems, 28(1), 101-114.

[6]Al-Najdi, A., Pasquier, N., & Precioso, F. (2016,

June). Frequent Closed Patterns Based Multiple

Consensus Clustering. In International Conference

on Artificial Intelligence and Soft Computing (pp.

14-26). Springer, Cham. DOI :https://doi.org/10.1007/978-3-319-39384-1_2

[7]Hu, J., Jia, S., & Wu, K. (2015). Semantic-based

requirements content management for cloud

software. Mathematical Problems in Engineering,

2015. DOI.http://dx.doi.org/10.1155/2015/474157

Page 31: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

27

Research and review on the knot of Innovation

and Entrepreneurship Training Program

project in Leshan Normal University in

November 2018

Zhao Li xin1,2, 3,4,5,6*

1 Leshan Normal University, Leshan, 614000 ,China

2 Sichuan Conservatory Of Music, Chengdu, 610021, China

3Sichuan Agricultural University, Yaan,625014, China

4 Sichuan University ,Shuangliu,610207, China

5 Chengdu College of University of Electronic Science And Technology of China ,611731 , China

6 Sichuan Vocational college of Art ,Wenjiang,611131,China

*E-mail: [email protected]

Abstract: Based on the 130 topic materials in the

Innovation and entrepreneurship training of Leshan

Normal University in the 2018, this paper organizes

and analyzes the collation and depth of the functional

basis in the study of the integration of the 130

twinning materials as the research object. Objective:

After the thinking evaluation of artistic music

structure combined with 130 topic materials as the

basic research index in the deep periodic "path

analysis under the idea of music creation practice

Project" Midterm experimental report in the "X

Matrix 《金陵十三钗》" Art practice research as the

foundation of the study modelled, At the same time,

taking the practice of innovative Entrepreneurship

Training project of college students in Leshan

Normal University as the main practice project as the

main body, taking the practice of Zheng Haiyan

Music Studio in Leshan Normal University as an

example, this paper makes a series of experimental

practical functions and reviews of related materials.

Keywords: innovation; entrepreneurship; scientific

research experiments; musician scientific research;

path analysis;

1. STUDY

Generally speaking, on the analysis of the cognitive

structure of the whole concept of innovation and

entrepreneurship, on the one hand, in the formation of

the cognitive function of thinking structure, the

development of the thinking function of education

and teaching with a certain foundation is constructed,

which lays the foundation of this research. On the

other hand, in the establishment of functional basic

cognition, the feature shows the expansion of

innovative entrepreneurship in the career function. At

the same time, in the function of integrating the

structure of the integrated structure, the paper

constructs the review and integration in the study of

the structure of the horizontal function with the basic

function as the function of the career structure in the

holistic research perspective, generally speaking,

Based on the perspective of the development of

structural cognition and the comprehensive

perspective of the structure of the deep integrated

structure, taking Leshan Normal University as the

cognitive expression of the horizontal structure, this

paper studies the deep integration of the research

promoted in the development of integrated functions

as the fundamental research wholeness in the general

structure, In the promotion of the structure of the

phenotypic system in the development of the general

cognition of the structure as a basic display in the

cognitive structure of the development of the function

of cognitive integration, the formation of structural

education teaching as the subjective structure of the

hierarchical research in the basic exploration of the

construction of artistic functional development,

generally speaking, In the function of the structure of

the exhibition of Art in the past five years, the

development of the research on the integrity of the

scientific research project in the development of the

art structure in depth and the integration of the

Page 32: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

28

integrated structure in the general exploration is

based on the integration of the integrated structure in

the depth and the study of the subjectivity of the

study. Similarly, under the function of the integrated

structure, which is reviewed from the structural

function of biology, it promotes the functional

exploration of the research and development from the

perspective of the subjectivity of the development

cognition of the structure, and in the view of the

structure of biotechnology, the study of green

synthesis of acetylene ether in aqueous phase, the

study on the synthesis of the new method of

Quinolones derivatives, The study on breeding and

genetics of Panlong ginseng in endangered medicinal

plants and the butterfly of "using parasitic bees to

prevent and control dishes" have constructed the

integration of the thinking structure model in the

development of the cognitive model of functional

structure, Thus it shows that the study of the structure

of structural patterns formed in the field of research

as the subject of the depth of exploration and

cognitive biological research as the main body of the

description of the whole exploration of research in

the study of the development of biological patterns of

the subject, the same, Under the function of

integrating the integration sequence with the research

in the development of the integrated structure as the

main research mode, the functional continuation of

the biological machine rationality continuation of the

integration of the thinking mode in this research is

formed, on the other hand, There is also an integrated

study of the development of a model of basic

research thinking as a fundamental study of the

concept of the manifestation of biological structure

and cognitive concepts in the basic study of

integrated text in-depth thinking, Diameter structure

in the analysis of scientific research mode, the

integration of the artistic perspective of the formation

of multiple thinking dimensions is formed from the

perspective of the research on the structure of

scientific research and design, and the research on the

basis of the research from the perspective of basic

thinking is explored in depth.

2. PROFESSIONAL EVALUATION OF PROJECT

FOUNDATION AND SERVICE SPECIALTY

STRUCTURE BASED ON STRUCTURAL

CLASSIFICATION PERSPECTIVE STRUCTURE Similarly, the Project Foundation from the

perspective of evaluation-based classification

constructs more available research from the

perspective of basic research and in-depth research

and development in the study of service structure,

which is a basic assessment. On the one hand, it

continues to review the research mode in the

professional function of the service structure with the

structural project comprehensive functional cognition,

on the other hand, it studies the integrated

development of the exploration thinking structure

which is used to study the perspective in the general

research from the perspective of the integrated

classification in the structural view. This paper

constructs a comprehensive exploration of the

integrated structure of ground sequence and basic

research in the development of general cognition, In

the study of the integration structure of the general

study as the perspective of subjectivity and the study

of the development of visual threshold cognition as

the integral exploration of the integration structure,

this paper constructs the professional evaluation of

the subjectivity construction in the construction of the

general research, The formation of the general

structure of the cognitive perspective of the holistic

study and in-depth integration of the development of

functional exploration. In the research and

development of functional review from the

perspective of chemistry as the rational structure of

machine, the synthesis and properties of responsive

polymers stimulated by temperature-light-ph value In

this paper, the aesthetics of thinking structure as a

more basic cognitive development in the study of the

integrity of the responsive polymer functional group

in the research of the integration and research of the

general structure in the development of the holistic

study of the general structure of the in-depth

cognition of the TiO2 complex in the development of

the structure of the G structure symbol x function

cognition The function of the structure of the material

in the subjective material of the cognitive and

thinking of the structure of the synthesis and aesthetic

structure of the whole study in the study of the

integrity of a class of structures aesthetic perspective

of the in-depth discussion, on the one hand, This

paper fully demonstrates the study of the functional

integrity of metallic electrical factors in the function

of Rhodamine Schiff, which is induced by the study

as the subjectivity of subjectivity, and the functional

nature of the functions of the formation of the body is

studied, At the same time, in the research perspective

of the new structure, in the in-depth study, the

integration of the function of integrated structure in

the cognitive development as a perspective

exploration of the research model of the integrated

research perspective of the integration to study as the

subjectivity of the structural function in the basic

research model of the depth and development of the

overall exploration. such as "G-c3n4/tio2 composites

photodegradation Organic Pollutants Research",

"Metal ion induced rhodamine Schiff alkali

photochromic Properties Study", "Chitosan based

new adsorbent on acidic red 3 b adsorption study"

Related scientific research in the study of the factor

structure of biological structure as the study of

subjectivity in the study of the function of

exploratory structure in the integrated research of the

integration of the study of integration and functional

description in the general study of the aesthetic nature

Page 33: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

29

of the multi-thinking structure with the integration of

the main structure of the integrated cognition of the

exploration of the development of a comprehensive

review Integration of perspective.

3. A REVIEW OF THE PROJECT STRUCTURE OF

THE INNOVATION AND ENTREPREURSHIP

TRAINING PROGRAM IN LESHAN NORMAL

UNIVERSITY IN THE VIEW OF THE

STRUCTURE FUNCTION OF THE PATH

ANALYSIS IN THE MUSICAL CONTEXT

STRUCTURAL THINKING

Obviously, further to the test object in terms of the

structure of the experimental function, The music is

constructed in the functional group of the harmonic

structure. In the study of the multiple combinations of

the integral functional groups in the research

perspective, the integration of the integration in the

basic research perspective from the perspective of

research has been formed. The development of the

model is formed in the development of the basic

research perspective of the cognitive function of the

formation of the model of the study in the structure of

the development of the subjective innovation and

entrepreneurship of the formation of the music

context The study of structure, under the

development of holistic path analysis as the research

mode of contextual thinking of the musical structure

of subjectivity structure, constructs and forms the

integration in this research field, and forms the

deepening and development of the model of multiple

thinking structure, from the point of view of the

function of the structure of innovative

entrepreneurship, With the director of Sichuan

Conservatory of Music, Professor GeerLin, the team

went to the academic exchange of Leshan Normal

University, respectively, in the view of four operas

"Zhuo Wenjun", opera "Xue Tao", opera " Du Shi

Niang" and Opera "Yang Sheng An", and constructed

the research of basic mode as the subjectivity.

Analysis and possible sub-path model of the

continuation of the evaluation function the

exploration of the research perspective, with the

study of the processing functional structure of the

model, has formed a review of the research and

development of the integrated structure based on the

synthesis and review of the integration structure of

this structural functional factor form in the

development of the model. Moreover, from the point

of view of the function of experimental structure, the

model of the structure of the path analysis thinking is

used in the development of the cognitive structure of

the research on the influence structure of the new

media technology in the development of the

cognition of the perspective of the study on the

structural nature of the research perspective

constructed in the material cognition of the integrated

structure of the study, It has formed the integration

from the perspective of folk culture research, and the

same way, in view of the multi-dimensional thinking

research model structure of Guo Moruo culture in the

context of musical structure, constitutes the social

functional investigation of the phenomenon of

agro-industrial structure system formed as the basic

structure in the development of this research

perspective. In order to promote the innovation in the

integration research of regional structure branding

model of musical structure, The study of the holistic

structure of the exploration and development of the

general structure was formed in the exploration of the

structural function group as a review of the integrated

research and exploration of the structural functional

group of the study of the GHD structure of the study

of the structure and the exploration of the integrated

structure and the study of the integration of the

structure of the integrated model for the study of the

general structure Description of the hierarchical

structure function under the contextual thinking level

of the cognitive functional structure of the cable.

There is no doubt, obviously, the general use of "SYB

training teaching Auxiliary materials-college students

entrepreneurship story sitcom" "Wenchuan Memory:

5.12 earthquake scene report reporter video and oral

history data collection" "Leshan Yi Area Primary and

secondary school Putonghua promotion and Usage

survey and research" The functional thinking of the

research perspective of regional structure,

Constructing the holistic thinking constructed in the

perspective of the holistic study from the perspective

of general research the integration in the development

cognition of the research perspective is integrated in

the study of the development of LED as symbolic

function and the integration of the research model, as

the view of the basic structure function and the

deepening and development of the thinking structure

in the formation of this research perspective. The

exploration of sex in the study of the functional

exploration of the formation of the subjectivity of the

formation of the general structure of the study of the

research model of the development of the functional

group of the integration model, at the same time in

the "gradient type of ultra-surface properties and

application research" "high-speed serial car accident

early Warning system" "practical Electronic

measuring ruler design" Automatic Feeding Machine

Control system "solar intelligent Environmental

protection ecosystem" "The effect of crystal structure

on the luminous performance of LED fluorescent

powder" functional group, Constructs a functional

report on the core level of the functional group of this

research structure, which is based on the perspective

of the study of the functional group of clinical

structures formed in the visual angle of this research.

The exploration of the thinking structure of the

holistic development of this research perspective, as

the integration and deepening of the holistic structure

of the model of the subjectivity structure, is

Page 34: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

30

obviously based on the cognitive and modeling

structure of the thinking structure formed in the

development of the core structure formed in the

expansion of the horizontal structure in the field of

innovation and entrepreneurship.

In the same way, in the cognition of the development

of structural patterns, the development of research

functions based on the main perspective of study,

such as the development of the research model of

natural subjects, as the research function of the

subjectivity of the integrated structure of the factor in

the development of the integration structure of the

model of the research function, formed with the "

Investigation on the factors of adjusting the flowering

period of peony Phoenix with oil, generally speaking,

the research in this field has formed from the function

of experimental structure, which is based on the

model of studying the perspective of natural subject,

From the research of FLP structure in the integration

and development of sequence structure in the study of

abcts structure function group, this paper probes into

the synthetic functional structure of the general

Coumarin formation, taking the study as the

subjectivity of the study in the development of the

general research as the integration of the basic

structure in the formation of the " Study on synthesis

and reactivity of bridge-linked FLP "study on the

addition and reaction of green husigen ring in water

phase", in depth, in this field, it is generally

constructed to construct the development of

integrated structure in the study of structural

modeling factors of model engineering in the study of

the structure of the review as the main body of the

research report, The integration of a holistic research

perspective into the study of the core exploration of

the general research structure functional development

in the experimental exploration of "ultrasonic

synthesis of sulfonamides sodium" can be seen, based

on the continuation of the development of the

characteristics of the research perspective of the

functional factor structure of ultrasound as the main

structure. The study of the general structure as a

review function of subjectivity as the function of

subjectivity is the integration of NHR active structure

system in the path of structural mode with abcts, and

the same is done under the function of the practical

electrochemical experiment detection and analysis

structure of the structure. It also explains in depth the

research of this comprehensive structure research as

the main body of the research review model and the

development of structural functions. Obviously, in

Leshan "All the way to you-Leshan Volunteer

alliance", based on the function of service-oriented

structure of the integrity of the experiment, fully

demonstrated as the basic structure of the study in the

general exploration of integration, the construction of

this research perspective based on the integration of

the function of the deepening, policy-oriented

structure of the research perspective, " Study on

poverty alleviation project of ecological Wuji

Chicken breeding industry in Muchuan, "study on

selection and cultivation of economic tree red

Tsubaki trees", "isolation and purification of worm

kinase active bacteria in earthworm intestine" In the

study of the cultivation of the general structure and

the structure of the active functional group structure

of the biological structure in the separation and

purification structure formed in the cognition of the

poverty-alleviation function of the general chicken

structure, this research perspective is constructed in a

deep exploration of the integration of the cognitive

perspective of the separation of purification cognition

in the depth of the functional development of the

general structure , formed as a certain research

perspective as the subject of the practical structure of

the exploration of integration in the general as the

structure of college students Service project collation

and review in the general research perspective of the

holistic function of the synthetic thinking of the

structural review and in-depth exploration, the

general structure of the depth and research

perspective of the exploration, This paper forms the

possible research and in-depth review of the

possibility perspective of the new subjectivity

discoloration material in the perspective of

coexistence from the perspective of the development

and deep cognition of the holistic sequence structure

from the perspective of basic research. It has been

formed in the study of the general structure as a basic

research perspective in the study of the holistic

research perspective of the research in the perspective

of the general level of thinking of the overall

structure of the development and study of the

development of functional models and holistic

exploration. At the same time, "study on the

domestication and application of a dung straw high

efficiency methane production compound fungus",

the green Synthesis of 1,2,3-, which is the

participation of acetylene acid decarboxylase in

aqueous phase It also fully demonstrates the

integration of the integrated functions of Leshan

Normal University in the study of the function of

subjectivity structure, the function of integrated

structure from the perspective of general structure

and the in-depth development of the function of

holistic structure in the exploration of general

functional thinking review the integration of the

model function of the whole structure under the

structure function and the X function of the research

perspective in general In the in-depth study of the

structure of the integrated structure system in the

integration of the model of the development of the

overall function of the study as a fundamental

exploration of the integration and depth.

4. COMPREHENSIVE EVALUATION OF THE

INTEGRATED RESEARCH PERSPECTIVE OF

INNOVATION AND ENTREPRENEURSHIP

Page 35: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

31

BASED ON THE VISUAL THRESHOLD

FUNCTION STRUCTURE OF STUDIO AND

HIGHER EDUCATION TRAINING

If the study of studio model is taken as the research

of subjectivity in the research of general innovation

and entrepreneurship Big Data integration research,

this paper forms the integration in the comprehensive

structure with the evaluation as the subjectivity

research, Formation and construction of integration in

the general perspective of the training of colleges and

higher education in the view of the integrated

research model based on the integration of innovation

and entrepreneurship big Data as an integrated

exploration in the study of the research of subjectivity

research, in general, in the review report of the

development cognition based on the deconstruction

model, This paper forms a review of the function

integration in the study of the dynamic function of

research as a model in the overall structure of the

general structure. From the development of the

review research model of comprehensive structure as

a research report, For example, the function review in

the active structure explores the integration function

in the research perspective in the general oxidation

function of the soybean model in the development of

the study of the formation of the general structure of

the development of the integration of the integrated

functional land research as a review of functional

research in the general structure of the whole

exploration, In order to explore the integration

function of the integrated structure with the

integration of the basic research perspective, the

study of the integration of the integrated structures in

the experimental device, which is based on the

integration of the combination of the main study as

the research of the subjectivity, is a review, The

research model formed in the function of a certain

basic structure is formed in the exploration of the

development of functional cognition of the large data

structure of the general structure, which, as the

structural function of the basic research, In the

development of the cognitive environment structure

in the formation of this research report, the

exploration of the function of the structure of the

research expression thinking is based on the study of

the perspective as the holistic thinking level of the

general structure in the general structure of the

thinking function of the holistic thinking function of

the integration and research as a certain structure of

the development perspective of the development of

general cognition With the study as the function of

subjectivity structure, there is no doubt that the study

on the tolerance performance and regulation of

nitrifying bacteria under environmental stimulation,

"preparation of C60 and its test device in two

Chloromethane", "study on preparation and

antibacterial activity of coumarin

derivatives-nano-silica hybrid materials", is the main

evaluation project, on the one hand, Stimulated in the

present as a group of social structural functions in the

General experimental function group in the study of

the integrated structure formed by DGS in the

development of structural cognition, the integration

of this research perspective constructed in the

cognition of the general structure is integrated in the

general research function, At the same time, from the

research and development of evaluation structure as

the research perspective of subjectivity structure

under the integrated function, It has formed a review

of the integration function from the perspective of

subjectivity research. The integration and

development of integrated functional research in

general structure the study of the integration and

research perspective from the perspective of

subjectivity research as the active function of the

study of subjectivity is the integrated development of

environmental structure and the report of integrated

structure in stimulating structural functional group

performance in the perspective of relevant research

Functional research and development of the holistic

thinking assessment perspective. To see in depth,

From the perspective of the art structure, the study of

the level of thinking thought as the main body in the

development of the subject as the main body of the

research function as a certain organism in the

structural function group of the study as the

subjectivity of the study of the function of thinking

level of research in the general structure of the

perspective of the integration of the study as the

function of subjectivity thinking , the functional

transformation of the function of the integrated

structure, which is based on the perspective of

subjectivity research in the practice of Studio mode,

is formed in the study of the whole research and

exploration of the report structure as the perspective

of subjectivity research. Generally speaking, in the

study of the exploration of research functions, it has

formed the integration of structural cognition in this

field of research. From the studio of holistic research,

"innovative art education and training base" "Yi Ming

Culture and creative workshop" "Jiayi Xuan Tea

Culture Communication Studio" "Seven Color square

art therapy studio" "Ya Ya Children Handmade

headwear Studio" "Da Data Service Studio" "Jiazhou

Sunshine Youth Integration Workshop" The

functional group of the integrated structure is seen in

the art education and training base, the cultural

creative workshop and the tea Culture

Communication studio, the art therapy studio and the

decorative structure of the studio, Integration of DA

data service structure in general structure research in

the study of basic structure workshop as the

evaluation report of subjectivity structure in the

general formation of the hierarchical function of the

review structure of the research and development of

the whole, This paper forms the development of the

holistic function of the structure of the perspective of

Page 36: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

32

the study in the development of the functional model

of the perspective of the study as a function of a

certain economic structure in the development of the

function of increasing the value of production to

promote the development of the structure of the

overall study as an exploration of the general

structure of the development of structural integrity

and integration of the structure , it is based on the

formation of a general structure of the cognitive and

integrated structure of the deep understanding,

formed a general structure of the research perspective

in a class of experimental structure of the functional

group formed in the development of the cognitive

report formed in the research perspective of the

composition of the integration model, Has formed a

general study as a cognitive function in the

development of the integration and functional review

of the integrated research structure, which is used as

the perspective of subjectivity research. "Slyz Image

Studio" "Picking up the small Courtyard Creative

Workshop" "British Pub Cultural Experience

classroom" there is no doubt that, from the

perspective of this research function, from the

perspective of the study of the structure of the

economy as a review of the study of the subject, from

the research of the studio, This paper constructs the

cognition and development of a mental structure of

pub functional culture experience integration formed

in the functional group of this research perspective in

the study of the creative function of the holistic

structure of the exploration as the subjectivity,

forming the studio, The model takes the research

perspective in the formation of the subjectivity to

study the thinking function of the development of the

research function of the integrated structure in the

general as the formation of the research perspective

of the report in the formation of the review of

functional structures as the integration of the research

perspective of subjectivity.

5.EVALUATION AND INTEGRATION OF THE

MIDTERM EXPERIMENTAL REPORT AND THE

PHASED INTEGRATION OF THE RESEARCH

EVALUATION ON THE MUSIC CREATION

PRACTICE PROJECT UNDER THE IDEA OF

PATH ANALYSIS

From the point of view of the practice project of

music creation under the idea of path path analysis,

this paper forms a functional study, which takes the

perspective of research as the subjectivity research

structure, as a holistic study, as a review of the

cognitive development of the structure of cognitive

structure, and the development of the holistic

structure formed in the study. This paper forms the

development and integration of the whole structure of

the general structure cognitive symbol function,

which is used for the research perspective, and forms

the understanding of the holistic structure of this

research perspective in the study of the cognitive

structure of the G32 structure as a perspective

structure in the study of the functional research

perspective of the horizontal widening. In an

integrated manner, based on this study, the function

of cognitive structure formed in different stages of

experiments from the creation of works as a basic

structure in the development of exploratory research

perspective, In the study of the integrated structure

with the function of mass as the subjectivity structure

under the different hormone structure, the integrated

thinking function of the research perspective is

discussed in the development of the whole research

structure of the formation. This perspective is

constructed to explore the quality of the production

function model formed by the basic function in the

recognition of the economic cognition of the structure

of the integrated structure of the comprehensive

model in the development of the "humanization" as a

basic structure of the study of the comprehensive

function of the integrated structure formed in this

field review, The research on the integration of the

whole structure formed in this field and the research

and development in the exploration of the integrated

function of the sequence structure is the continuation

of the cognitive thinking level of the integrated

functional structure as the research perspective of the

subjectivity structure. Obviously, the project of music

creation practice under the idea of path analysis is

constructed from the perspective of this research, and

the functional embodiment of the integrated structure

of the development of the general structure and the

integration of cognition is constructed from the

perspective of the study of the main functional

formation of the holistic structure of the research with

basic continuation. There is no doubt, as far as the

understanding of deep exploration is concerned,

Taking Leshan Normal University as the research of

college students ' innovative entrepreneurship as the

subjective structure, the different hormones formed in

the seed dormancy of the treatment structure, the

analysis and research of the composition of the

research from the perspective of the study of the

function and perspective of the structure of rapeseed

lignin and fiber in the study of the structure of the

production function in the research perspective The

research perspective formed in the continuation of the

"cobweb" composition of the integrated structure in

the integrated structure of the symbolic cognition of

the structural perspective of the integration of

graduate students integrated research function group

in the experimental device structure from the

perspective of the development of subjectivity.

Obviously, as a similar structural functional group in

the evaluation effect formed in the basic study of the

perspective of structural cognition in the development

of the cognitive perspective of the integration of

biological functions in the activity of looking at your

research perspective of the structure level of

multi-dimensional integration structure, The

integration of the research and development model of

Page 37: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

33

the thinking level constructed in the development

from the perspective of the research of the basic

structure in this research perspective of the

construction function of hierarchical research shows

the integration of thinking and research function

in-depth and exploration of functional research

perspective of the development and evaluation of the

holistic structure of the holistic structure in the study

as a fundamental structure of the overall exploration

of the Development of cognition Cable. There is no

doubt that from the structural system of the report of

the holistic research function, "investigation on the

popularization of credit and education for college

students in Sichuan province", "a probe into the

present situation of Yi Culture inheritance in the

construction of new countryside of Yi nationality",

"Chengdu Jinli Special Snack album and

characteristic seal design conception" "Two goods"

campus WeChat Flea Market " A preliminary study

on the effect of bamboo allelopathy "investigation on

the status of traditional arranged marriages of Yi

nationality under the new era", "research on" human

yoke "in rural areas of Sichuan Province," a study on

the status quo of Gelao culture and language

protection under the great integration of nationalities

"," research on emergency investigation and

pretreatment of empty nest elderly in the region "

Marketing strategy of small Liangshan organic

agricultural products under the background

"investigation on the management of waterlogging in

Sichuan three or four-line cities" Fully constructed in

this study as the subjectivity of the structure also

functions in the general cultural function in the policy

Service category as well as in the design conception

environment of the snack structure to form the

cultural function on the one hand multidimensional

examination of the structure perspective of the

language research perspective of the level of the

study structure of the integration of functional

thinking and the study of functional structure of the

Cognitive development environment The research

perspective formed in the function integrates the

overall integration of the technical structure of the

general study. It is used to promote the deepening of

the holistic structure in the development environment

of general cognition and to explore the integration of

holistic exploration in structural cognition and the

evaluation in the cognition and research of functional

development.

6 . TAKING THE INNOVATION AND

ENTREPRENEURSHIP OF ZHENG HAIYAN

MUSIC STUDIO IN LESHAN NORMAL

UNIVERSITY AS AN EXAMPLE,THE DEEP

PRACTICE OF BROADENING THE PRACTICE

OF MUSIC CREATION UNDER THE “PATH

ANALYSIS MUSIC THOUGHT”IS REVIEWED

Obviously, taking the innovative entrepreneurship of

Zheng Haiyan Music Studio in Leshan Normal

University as an example, the author, in helping

Zheng Haiyan carry out the innovation structure of

music entrepreneurship, has modified the practice of

using the music analysis structure as the basic path

structure in the development of advertising design

and research mode, on the one hand, To enhance the

functional value of the market structure as a basic

research perspective in the formation of the

integrated structure of the context, Similarly, the

function of stimulating college students ' innovative

entrepreneurship as the subjectivity structure is

formed in the transformation of the social function of

practical service in this research field, the

multidimensional integration of the

multi-dimensional structure of the structure is formed

in the research of the Integrated Exploration Service

of the formed structure, and the development of the

multidimensional structure is formed in the deep

economic growth. The long perspective used to break

through, obviously, is combined in the perspective of

the function of the innovative entrepreneurial

structure of college students to promote the

horizontal widening of this research perspective, it is

clear that Zheng Haiyan also graduated from Leshan

Normal University and was taught in Natalia and Olia

two outstanding Ukrainian musicians, In the

development of horizontal structure has formed the

basic function, on the other hand, based on the

characteristics of the perspective of this research

perspective assessment research, the formation of

multi-thinking hierarchy dimension of the structure of

the integration of the practice of music

entrepreneurial structure, no doubt, as a class of

structural integration of cognitive thinking level, This

paper forms the functional nature of the hierarchical

context of the basic multidimensional structure of the

study, such as the model of shared bicycle delivery in

the city, the community situation of college students

and the prevention and control of insect pathogenic

research formed in the study of the optimization

system of language training in children with autism,

which goes deep into the function of Western

structure. At the same time, it fully shows the

description of the core level of the study of the

multidimensional perspective of the holistic study of

the motivation function of Japanese majors in the

structure of enrollment. Are formed in this research

perspective of the integrated study of functional

thinking structure integration and in-depth

continuation and exploration of the mechanism of

structural functional groups in the development of the

possibility of continuity the basic nature, such as the

text analysis and the analysis of the historical

structure formed in the product development of the

new media team, the function and whole of the

hierarchical structure under the contextual thinking of

the eastern Sichuan soil text The presentation of the

model, but also shows the development of the

integrated structure in the function of the outdoor

structure of the functions of the new media team

Page 38: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

34

structure in the study of the functional basis of the

integrated structure in the research perspective of the

integrated thinking structure of the review and

integration, there is no doubt that the perspective of

this cultural structure has a certain integration type,

Similarly, from Sichuan Opera in the structure of the

non-legacy model, for the continuation of the level of

music thinking, "Jiajiang plank New Year's

inheritance and revitalization", "the text analysis and

historical study of the river Trumpet" "Sichuan Tujia

characteristic music instrument" gathering grass

gongs and drums "Regional Culture Research" " 《寰

宇通志》《全宋诗》 Research and inheritance of

Tibetan folk songs in Danba County, Ganzi

Prefecture "Research on the formation and teaching

mode of instrumental music associations in primary

schools"--a probe into the campus mode of the

non-legacy musical culture into the primary

school--taking Sichuan opera as an example "the

expression of network culture" culture "is integrated

from the music structure ...《全宋诗》 《寰宇通志》

7.SUMMARY

There is no doubt that, in the light of the current

situation and policy structure, from the three primary

color education resource network structure function

in the evaluation function system of the structure of

the wheat winter medicinal materials to deal with the

structural characteristics of the catalytic material in

the cognitive development of the subjective design

structure of the formation of microwave technology

treatment of catalytic materials integration,

Simultaneous formation of the integration of liquid

biochemical treatment "dr.com Assistant type"

Propagation and research the development of

integrated structure of perspective functional group

and the research on the functional system of

integrated structure as a basic research perspective of

college students in the platform structure of the

development of the model structure of the mapping of

the shape of the form of the ecological structure of

the agricultural functional group of the level of

thinking and the development of the subjective

structure of the exploration. From "college students '

self-help learning school answering platform" "The

discovery and traceability of hotspot review based on

graph", "the development and design of ecological

agriculture curriculum under the background of

research travel-taking Leshan Shawan District as an

example", "" Meng Bao Germination "early teaching

school, can be embodied in in-depth research report,

and through several stages of" path analysis "Also in

the practice of multiple thinking as the research

perspective of the main structure of the integration of

functional research review function of the

development of thinking level, formed in the normal

structure of the function of the empirical research as

the main body of research and cultivation, there is no

doubt that in this field of research perspective,

formed a multidimensional level of integration and

research perspective of the deep widening Has

formed the multi-dimensional integration of the basic

research perspective formed in the deep exploration

of the basic structure, in the function of the

development cognition of this structure, and also

constructs the integration of this research practice

report in the research function of college students '

innovative Entrepreneurship Training Project with

"Music creation practice under the path analysis

music thought" as the subjectivity structure. At the

same time, also connected with the integration of

other related entrepreneurship, and finally in-depth in

the Leshan Municipal committee secretary Peng Lin

in 2018 city at all levels of the assessment meeting,

said, Leshan at the end of 2018 sprint three goals, one,

GDP rapid and stable growth, second, the prevention

and control of African swine fever; Shawan and Big

Buddha Scenic Area traffic complete hidden danger

of sound. Obviously, in terms of GDP, Leshan

Normal University November 2018 summary of the

material materials summed up a total of 130 projects,

in terms of innovative entrepreneurial projects for

college students, it is expected to break through

GDP300 million yuan.

ACKNOWLEDGMENT

Author profile: ZhaoLixin male (199209-) Leshan

Normal University research department project

researcher(614000); PhD,Sichuan Conservatory of

Music(610021); Director, Research Laboratory of

Osmanthus music production and big data

communication, Sichuan Agricultural University

(625014);PhD, Institute of Symbols and media,

Sichuan University(610207); University researcher,

Department of Arts and Technology,Chengdu College

of University of Electronic Science And Technology

of China ( 611731 ) Choreographer,Sichuan

Vocational college of Art (611131);

The research project is a report on the topic of music

creation practice under the idea of "path analysis" of

college students ' innovative entrepreneurship project

in the 2017;

REFERENCES

[1]Ashihara, H., Li, X., Ukaji, T. (1988). Effect of

inorganic phosphate on the biosynthesis of purine and

pyrimidine nucleotides in suspension-cultured cells

of Catharanthus roseus.Annals of botany 61,

225-232.

[2]Arbona, V., Manzi, M., Ollas, C., Gómez-Cadenas,

A. (2013). Metabolomics as a tool to investigate

abiotic stress tolerance in plants. International journal

of molecular sciences 14, 4885-4911.

[3]Baek, D., Kim, M.C., Chun, H.J., Kang, S., Park,

H.C., Shin, G., Park, J., Shen, M., Hong, H., Kim,

W.Y., Kim, D.H., Lee, S.Y., Bressan, R.A., Bohnert,

H.J., Yun, D.J.(2013). Regulation of miR399f

transcription by AtMYB2 affects phosphate

Page 39: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is

The Frontiers of Society, Science and Technology

35

starvation responses in Arabidopsis. Plant Physiol 161, 362-373

Page 40: The Frontiers of Society, Science and Technologyvarious intrusion detection techniques are analyzed. A computer intrusion detection system based on an improved genetic algorithm is