Technology-Inspired Smart Learning for Future Education: 29th National Conference on Computer Science Technology and Education, NCCSTE 2019, Kaifeng, China, October 9–11, 2019, Revised Selected Papers

The ‘Plan for Educating and Training Excellent Engineers 2.0’ implemented by the Ministry of Education (hereinafter referred to as excellent engineer training plan 2.0) is a milestone in the development of higher education in China. The new industrial revolution has raised new demands and challenges for university engineering education. According to the signal of large-scale development of excellent engineer training, this paper, from the training objectives of computer majors in the excellent engineer training plan 2.0, analyzes the key problems in the implementation of the training plan for students majoring in computer science in our university and discusses the reform method of the training plan, which brings forth new ideas in the excellent engineer training plan and explores a path of sustainable development.

[1]  Bert F. Green,et al.  Baseball: an automatic question-answerer , 1899, IRE-AIEE-ACM '61 (Western).

[2]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[3]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[4]  Alexander J. Smola,et al.  Support Vector Regression Machines , 1996, NIPS.

[5]  Thorsten Joachims,et al.  A Probabilistic Analysis of the Rocchio Algorithm with TFIDF for Text Categorization , 1997, ICML.

[6]  Mikel L. Forcada,et al.  Asynchronous translations with recurrent neural nets , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).

[7]  Boris Katz,et al.  From Sentence Processing to Information Access on the World Wide Web , 1997 .

[8]  Yoshua Bengio,et al.  A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..

[9]  Joakim Nivre,et al.  Deterministic Dependency Parsing of English Text , 2004, COLING.

[10]  Kien A. Hua,et al.  Decision tree classifier for network intrusion detection with GA-based feature selection , 2005, ACM Southeast Regional Conference.

[11]  Sarah E Yates Scaling the tower of babel fish: An analysis of the machine translation of legal information , 2006 .

[12]  A M Turing,et al.  Computing Machinery and Intelligence A.M. Turing , 2007 .

[13]  Hyuncheol Park,et al.  Performance Analysis of MIMO System with Linear MMSE Receiver , 2008, IEEE Transactions on Wireless Communications.

[14]  C. Kit,et al.  Comparative Evaluation of Online Machine Translation Systems with Legal Texts , 2008 .

[15]  Hermann Kopetz The Rationale for Time-Triggered Ethernet , 2008, 2008 Real-Time Systems Symposium.

[16]  Yang Bingru New method for sentence similarity computing and its application in question answering system , 2008 .

[17]  Erhan Akin,et al.  Rough particle swarm optimization and its applications in data mining , 2008, Soft Comput..

[18]  Antonio Fini,et al.  The Technological Dimension of a Massive Open Online Course: The Case of the CCK08 Course Tools , 2009 .

[19]  B. Alatas,et al.  Chaotically encoded particle swarm optimization algorithm and its applications , 2009 .

[20]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[21]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[22]  Yoshihiro Kawahara,et al.  Prototype implementation of ambient RF energy harvesting wireless sensor networks , 2010, 2010 IEEE Sensors.

[23]  Federico Casalegno,et al.  The Three Dimensions of Book Evolution in Ubiquitous Computing Age: Digitalization, Augmentation, and Hypermediation , 2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing.

[24]  Wanxiang Che,et al.  LTP: A Chinese Language Technology Platform , 2010, COLING.

[25]  R. J. Kuo,et al.  Application of particle swarm optimization to association rule mining , 2011, Appl. Soft Comput..

[26]  Lei Zhang,et al.  Topology design of industrial ethernet networks using a multi-objective genetic algorithm , 2011, 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM).

[27]  Rui Zhang,et al.  MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2011, IEEE Transactions on Wireless Communications.

[28]  Kyu Ho Park,et al.  A Cooperative Clustering Protocol for Energy Saving of Mobile Devices with WLAN and Bluetooth Interfaces , 2011, IEEE Transactions on Mobile Computing.

[29]  Jeffrey Pennington,et al.  Dynamic Pooling and Unfolding Recursive Autoencoders for Paraphrase Detection , 2011, NIPS.

[30]  Xiong Hua-gang Research on Time-Triggerd-Ethernet Synchronization and Scheduling Mechanism , 2011 .

[31]  Le Thi Hoai An,et al.  Network Intrusion Detection Based on Multi-Class Support Vector Machine , 2012, ICCCI.

[32]  Manish Gupta Application of Weighted Particle Swarm Optimization in Association Rule Mining , 2012 .

[33]  Liu Mingzhen New network intrusion detection algorithm based on support vector machine and particle swarm optimization , 2012 .

[34]  Hongming Zhou,et al.  Extreme Learning Machine for Regression and Multiclass Classification , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[35]  Alan E Gelfand,et al.  Space‐Time Data fusion Under Error in Computer Model Output: An Application to Modeling Air Quality , 2012, Biometrics.

[36]  Jing Yang,et al.  Energy Cooperation in Energy Harvesting Communications , 2013, IEEE Transactions on Communications.

[37]  Jian Guo,et al.  Research on Improved A Priori Algorithm Based on Coding and MapReduce , 2013, 2013 10th Web Information System and Application Conference.

[38]  Rui Zhang,et al.  Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff , 2012, IEEE Transactions on Communications.

[39]  Jeffrey Dean,et al.  Efficient Estimation of Word Representations in Vector Space , 2013, ICLR.

[40]  Karen Fasimpaur Massive and Open. , 2013 .

[41]  Hang Li,et al.  A Deep Architecture for Matching Short Texts , 2013, NIPS.

[42]  Philip G. Schrag MOOCs and Legal Education: Valuable Innovation or Looming Disaster? , 2013 .

[43]  Jeffrey Dean,et al.  Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.

[44]  Phil Blunsom,et al.  Recurrent Continuous Translation Models , 2013, EMNLP.

[45]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[46]  Vadlamani Ravi,et al.  Association rule mining using binary particle swarm optimization , 2013, Eng. Appl. Artif. Intell..

[47]  Jin Jin,et al.  Power Allocation in Multiuser MIMO Systems for Simultaneous Wireless Information and Power Transfer , 2013, 2013 IEEE 78th Vehicular Technology Conference (VTC Fall).

[48]  Shuguang Cui,et al.  Throughput Maximization for the Gaussian Relay Channel with Energy Harvesting Constraints , 2011, IEEE Journal on Selected Areas in Communications.

[49]  Yoshua Bengio,et al.  Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.

[50]  Hyungsik Ju,et al.  User cooperation in wireless powered communication networks , 2014, 2014 IEEE Global Communications Conference.

[51]  Hyungsik Ju,et al.  Optimal Resource Allocation in Full-Duplex Wireless-Powered Communication Network , 2014, IEEE Transactions on Communications.

[52]  Yoon Kim,et al.  Convolutional Neural Networks for Sentence Classification , 2014, EMNLP.

[53]  Phil Blunsom,et al.  A Convolutional Neural Network for Modelling Sentences , 2014, ACL.

[54]  Hyungsik Ju,et al.  Throughput Maximization in Wireless Powered Communication Networks , 2013, IEEE Trans. Wirel. Commun..

[55]  Kee Chaing Chua,et al.  Multi-Antenna Wireless Powered Communication With Energy Beamforming , 2013, IEEE Transactions on Communications.

[56]  Michael Paulitsch,et al.  Time-Triggered Ethernet , 2014 .

[57]  Quoc V. Le,et al.  Sequence to Sequence Learning with Neural Networks , 2014, NIPS.

[58]  Rong Gu,et al.  YAFIM: A Parallel Frequent Itemset Mining Algorithm with Spark , 2014, 2014 IEEE International Parallel & Distributed Processing Symposium Workshops.

[59]  Peilin Hong,et al.  RPA-RA: A Resource Preference Aware Routing Algorithm in Software Defined Network , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[60]  Kaibin Huang,et al.  Energy Harvesting Wireless Communications: A Review of Recent Advances , 2015, IEEE Journal on Selected Areas in Communications.

[61]  Vikram Kumar Kamboj,et al.  Solution of non-convex economic load dispatch problem for small-scale power systems using ant lion optimizer , 2016, Neural Computing and Applications.

[62]  Gao Ye,et al.  Application of hybrid ant colony algorithm for mining maximum frequent item sets , 2015, 2015 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).

[63]  Christopher D. Manning,et al.  Improved Semantic Representations From Tree-Structured Long Short-Term Memory Networks , 2015, ACL.

[64]  Manohar Kaul,et al.  R-Apriori: An Efficient Apriori based Algorithm on Spark , 2015, PIKM@CIKM.

[65]  Seyed Mohammad Mirjalili,et al.  The Ant Lion Optimizer , 2015, Adv. Eng. Softw..

[66]  Hussain Shareef,et al.  Lightning search algorithm , 2015, Appl. Soft Comput..

[67]  Fei Li,et al.  A distributed frequent itemset mining algorithm based on Spark , 2015, 2015 IEEE 19th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[68]  Rui Zhang,et al.  Optimized Training Design for Wireless Energy Transfer , 2014, IEEE Transactions on Communications.

[69]  Paul Pop,et al.  Fault-tolerant topology selection for TTEthernet Networks , 2015 .

[70]  Hae-Chang Rim,et al.  Knowledge-based question answering using the semantic embedding space , 2015, Expert Syst. Appl..

[71]  Yoshua Bengio,et al.  Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.

[72]  Wei Luo,et al.  Mining Fuzzy Association Rules Based on Parallel Particle Swarm Optimization Algorithm , 2014, Intell. Autom. Soft Comput..

[73]  Rui Zhang,et al.  Placement Optimization of Energy and Information Access Points in Wireless Powered Communication Networks , 2015, IEEE Transactions on Wireless Communications.

[74]  H. Schmeets,et al.  Empirical Legal Research: A Guidance Book for Lawyers, Legislators and Regulators , 2016 .

[75]  Bowen Zhou,et al.  ABCNN: Attention-Based Convolutional Neural Network for Modeling Sentence Pairs , 2015, TACL.

[76]  Luca Cagliero,et al.  Modeling Correlations among Air Pollution-Related Data through Generalized Association Rules , 2016, 2016 IEEE International Conference on Smart Computing (SMARTCOMP).

[77]  Sanda M. Harabagiu,et al.  Medical Question Answering for Clinical Decision Support , 2016, CIKM.

[78]  Shueng-Han Gary Chan,et al.  Wi-Fi Fingerprint-Based Indoor Positioning: Recent Advances and Comparisons , 2016, IEEE Communications Surveys & Tutorials.

[79]  F. Karimipour,et al.  Mapping the Vulnerability of Asthmatic Allergy Prevalence Based on Environmental Characteristics through Fuzzy Spatial Association Rule Mining , 2016 .

[80]  Indrajit N. Trivedi,et al.  Optimal power flow with enhancement of voltage stability and reduction of power loss using ant-lion optimizer , 2016 .

[81]  Ye Zhang,et al.  A Sensitivity Analysis of (and Practitioners’ Guide to) Convolutional Neural Networks for Sentence Classification , 2015, IJCNLP.

[82]  Won-Sik Yoon,et al.  Full-duplex Distributed Massive MIMO System with Optimal Beamforming and Resource Allocation for WPCN , 2017 .

[83]  Yuan Yang,et al.  CMU LiveMedQA at TREC 2017 LiveQA: A Consumer Health Question Answering System , 2017, ArXiv.

[84]  Mennan Güder,et al.  Multi-modal video event recognition based on association rules and decision fusion , 2017, Multimedia Systems.

[85]  Howard H. Chang,et al.  Daily ambient air pollution metrics for five cities: Evaluation of data-fusion-based estimates and uncertainties , 2017 .

[86]  Mykola Beshley,et al.  Adaptive flow routing model in SDN , 2017, 2017 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM).

[87]  Hongwei Chen,et al.  Distributed pruning optimization oriented FP-Growth method based on PSO algorithm , 2017, 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).

[88]  Tao Zhang,et al.  User Cooperation in Wireless Powered Communication Networks With a Pricing Mechanism , 2017, IEEE Access.

[89]  Khaled Ben Letaief,et al.  Robust Transmit Beamforming With Artificial Redundant Signals for Secure SWIPT System Under Non-Linear EH Model , 2018, IEEE Transactions on Wireless Communications.

[90]  Khaled Ben Letaief,et al.  Coordinated Beamforming With Artificial Noise for Secure SWIPT Under Non-Linear EH Model: Centralized and Distributed Designs , 2018, IEEE Journal on Selected Areas in Communications.

[91]  Haipeng Yao,et al.  A novel sentence similarity model with word embedding based on convolutional neural network , 2018, Concurr. Comput. Pract. Exp..

[92]  Zhiwei Ye,et al.  Network Intrusion Detection Based on Lightning Search Algorithm Optimized Extreme Learning Machine , 2018, 2018 13th International Conference on Computer Science & Education (ICCSE).

[93]  Xin Liu,et al.  LCQMC:A Large-scale Chinese Question Matching Corpus , 2018, COLING.

[94]  Yinghua Ma,et al.  Learning Automata Based Feature Selection for Network Traffic Intrusion Detection , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).

[95]  Manuj Mishra,et al.  Association Rules Optimization using Particle Swarm Optimization Algor , 2018 .

[96]  Yong Deng,et al.  Evaluation method based on fuzzy relations between Dempster–Shafer belief structure , 2018, Int. J. Intell. Syst..

[97]  Wei Zhou,et al.  Research on Multi-Source Data Fusion in the Field of Atmospheric Environmental Monitoring , 2018, 2018 13th International Conference on Computer Science & Education (ICCSE).

[98]  Zhi Zhang,et al.  Bag of Tricks for Image Classification with Convolutional Neural Networks , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[99]  Pin-Chao Liao,et al.  Fusion Model for Hazard Association Network Development: A Case in Elevator Installation and Maintenance , 2019 .

[100]  Yang Deng,et al.  MedTruth: A Semi-supervised Approach to Discovering Knowledge Condition Information from Multi-Source Medical Data , 2019, CIKM.

[101]  Iraj Mahdavi,et al.  Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms , 2019, J. King Saud Univ. Comput. Inf. Sci..

[102]  Wei Zhou,et al.  Research on Association Rules Mining of Atmospheric Environment Monitoring Data , 2019 .