Loading...
  • Table of Content
      28 May 2024, Volume 1 Issue 3 Previous Issue   
    For Selected: View Abstracts Toggle Thumbnails
    CSI-based Indoor Localization Method Using IDW Interpolation and Amplitude-phase Fusion Network
    RU Chun-rui  DANG Xiao-chao
    Computer & Telecommunication. 2024, 1 (3): 1-6.  
    To address the problem of poor localization performance caused by the small number of fingerprint points and the lack of representativeness of fingerprint features in the offline phase of fingerprint-based indoor localization, a CSI-based indoor localiza‐ tion method is proposed using Inverse Distance Weighted (IDW) interpolation and amplitude-phase fusion network. The IDW inter‐ polation algorithm is used to generate a large-capacity fingerprint library. Then, a parallel convolutional neural network (CNN) is used to process the amplitude and phase to obtain the positional fingerprint features. Finally, a novel integrated architecture fusing Random Forest (RF) and Multilayer Perceptron (MLP) is used for classification to obtain the estimated positions of the target loca‐ tion samples.
    Related Articles | Metrics
    The Implementation of IPv6 Network Deployment and IPv4 Network Security Reinforcement for Web Application Systems Based on Intelligent DNS and Reverse Proxy
    WU Guo-song
    Computer & Telecommunication. 2024, 1 (3): 7-.   DOI: 10.15966/j.cnki.dnydx.2024.03.001
    Based on the core technology of the next generation Internet IPv6, which has the characteristics of large enough address space, higher security, better service quality and supporting mobile terminal equipment, the information development of universities is gradually promoting the IPv6 network deployment and IPv6 network application of information system. However, in the process of promoting IPv6 network deployment and access of application systems in universities, there are still some problems that some un‐ derlying network devices do not support IPv6 protocol, and security devices cannot achieve comprehensive control. In order not to change the current school network architecture, without affecting the current IPv4 network access, this paper puts forward the imple‐ mentation of IPv6 network deployment and access for college Web application system based on the intelligent DNS and reverse proxy. This technology has the characteristics of simple principle, strong stability, high security and easy maintenance. Through link‐ age deployment, IPv6 network access and IPv4 access security reinforcement of the school application system are realized, which provides reference practice for the deployment of IPv6 network application.
    Related Articles | Metrics
    Analysis of Public Sentiment in Libraries Based on Text Mining
    WANG Long-jun WANG Jing LI Guang-hua CHEN Liang
    Computer & Telecommunication. 2024, 1 (3): 13-.   DOI: 10.15966/j.cnki.dnydx.2024.03.020
    With the increasing influence of mobile Internet on young readers in university libraries, the proportion of new generation readers using QQ instant messaging software is increasing, text mining of library QQ group text information can be used to under‐ stand the public sentiment of the library, which can be used for library public sentiment warning and provide strong public sentiment response capabilities for library decision-makers. Web crawler technology is used to crawl chat records in QQ groups from Septem‐ ber 2022 to December 2022 as library public sentiment data, then performing data preprocessing operations such as deduplication and cleaning on the original public sentiment data. Then, Tsinghua University's Thulac segmentation technology is used to extract keywords and calculate their weights from the public sentiment data, and them the WordCloud library is used for visualization. Next, the spaCy library is used to to calculate specific emotional tendencies and scores for public opinion data, and finally the emotional tendencies of library public opinion are analyzed through experiments.
    Related Articles | Metrics
    Research on Virtual Simulation Experiment Teaching of Cloud Computing and Automatic Operation and Maintenance Course Group
    LIU Chun TAN Kun ZHANG Li-hua LI Hong-bo AN Yuan
    Computer & Telecommunication. 2024, 1 (3): 17-.   DOI: 10.15966/j.cnki.dnydx.2024.03.003
    This paper explores the construction of virtual simulation experiments based on course groups, optimizes and integrates the experimental teaching content of core courses within the course groups from a systematic and global perspective, focuses on the connection and collaboration of experimental content between courses, and establishes a progressive virtual simulation experimental teaching platform through the organization and implementation of experimental teaching for course groups. It provides a good solu‐ tion for the experimental teaching reform of cloud computing and automated operation and maintenance course group under the background of New Engineering.
    Related Articles | Metrics
    Research on the Reform of Practical Teaching System of the Crossover of Computer Major and Modern Medicine for New Engineering Education: A Case Study of Fuzhou Institute of Technology
    ZHANG Bi-xian
    Computer & Telecommunication. 2024, 1 (3): 21-.   DOI: 10.15966/j.cnki.dnydx.2024.03.016
    With the rapid development of computer science and technology, computer technology has enormous potential in the field of education, especially in the application of modern medical practice. This paper aims to explore the reform of the practical teach‐ ing system of integrating basic medical theories and applications into computer science in the context of New Engineering, achiev‐ ing the integration of information technology practical teaching and medical knowledge, improving students' learning effectiveness, promoting practical ability improvement, and cultivating students' innovative thinking. The methods and achievements of the reform around the determination of talent cultivation goals for the crossover of computer major and modern medicine, the construction of practical teaching system, and the exploration of the education model for the integration of industry and education are introduced in the paper.
    Related Articles | Metrics
    Research on the Ideological and Political Education in the Courses of Embedded System in Applied Undergraduate
    LIU Ping WANG Shi-wei JIANG Meng-yun
    Computer & Telecommunication. 2024, 1 (3): 24-.   DOI: 10.15966/j.cnki.dnydx.2024.03.004
    Related Articles | Metrics
    Design of Intelligent Sleep Massage Pillow System Based on Brainwave Monitoring
    JIANG Jian-ting DENG Wen-qiang ZENG Teng-xiang DAI Zhen-hua
    Computer & Telecommunication. 2024, 1 (3): 31-.   DOI: 10.15966/j.cnki.dnydx.2024.03.005
    This study designs an intelligent sleep massage pillow system, aiming to provide users with effective sleep protection. The system adopts TGAM brain wave detection, temperature and humidity control, massage control, Bluetooth, WIFI and other module technologies to control smart sleep products in real time. It is a highly intelligent and fully automated process. In addition, the Sleep Care APP also has a sleep staging algorithm, automatically generates sleep depth analysis reports, and provides users with personal‐ ized sleep plans. It also uses an AI smart assistant to analyze users’ sleep conditions in real time, helping users improve their sleep experience more scientifically.
    Related Articles | Metrics
    Collaborative Communication Scheme Based on Generalized Carrier-indexed Differential Chaotic Shift Keying
    YANG Bo-han
    Computer & Telecommunication. 2024, 1 (3): 36-.  
    With the development of communication technology, chaotic communication technology has attracted the interest of many researchers for its resistance to multipath fading and strong confidentiality, among which Differential Chaos Shift Keying (DCSK) is the most widely studied non-coherent digital modulation scheme. Generalized Carrier Index Differential Chaos Shift Key‐ ing (GCI-DCSK) is the integration of the index modulation technique on the basis of DCSK, which further improves the system per‐ formance. In this paper, the GCI-DCSK modulation scheme is combined with the relay collaboration technique to extend the cover‐ age of the communication network and improve the communication quality.
    Related Articles | Metrics
    Research on Course Fusion Mode Based on Holographic Projection Technology
    YANG Su-hui LUO Shao-ye
    Computer & Telecommunication. 2024, 1 (3): 41-.   DOI: 10.15966/j.cnki.dnydx.2024.03.007
    In traditional teaching, due to differences in teachers, the knowledge connections between different courses are often over‐ looked, resulting in excessive repetition or failure to integrate new and old knowledge points. To make the knowledge points more smoothly connected in teaching, we help students to establish a knowledge connection system. Firstly, we organize a teaching salon where teachers fill out a teaching knowledge connection table to find fusion points between courses. Secondly, we use holographic projection technology to build a holographic projection pyramid. Finally, we use holographic projection during the teaching to help students recall previously learned knowledge and better integrate it with new knowledge, and understand new information. To sum up, holographic projection technology visualizes models in courses, deepens students' impressions, increases visual stimulation dur‐ ing learning, and enhances students' interest in learning. This innovative form of teaching tool and teaching method helps to deepen students' understanding and absorption of knowledge.
    Related Articles | Metrics
    A Fine-grained Network for Person Re-identification
    WU Shu-li
    Computer & Telecommunication. 2024, 1 (3): 45-.   DOI: 10.15966/j.cnki.dnydx.2024.03.019
    To solve the problem that the recognition efficiency of different types of attention mechanisms is too low in the person reidentification task, and the focus is too much on extracting single-granularity information, which makes it difficult to extend to realworld application scenarios, a fine-grained module based on local attention is proposed. The obtained coarse-grained feature repre‐ sentation is divided into multiple parts, guiding the network to extract finer-grained local clues. In addition, considering the short‐ comings of a single branch in extracting multi-granularity clues, a multi-branch fine-grained network is designed to further extract richer clues. Experimental results on mainstream datasets verify the effectiveness of the network proposed in this article
    Related Articles | Metrics
    Research on the Iterative Teaching Model of Multi-course Fusion Project 
    YUAN Yi-xia
    Computer & Telecommunication. 2024, 1 (3): 52-.   DOI: 10.15966/j.cnki.dnydx.2024.03.009
    In response to the current situation of multiple computer major courses with strong correlation being mutually indepen‐ dent and lacking comprehensive application in teaching, this article proposes an iterative teaching model of multi-course fusion proj‐ ect. The teaching of multiple courses revolves around the same large project, breaks down the large project into a series of iterative teaching tasks from easy to difficult, adopts an online and offline hybrid teaching method, and introduces the popular TAPD research and development platform in the industry as teaching assistance. Take the integration teaching of JAVA Program Design and Data‐ base Principles and Applications for example, this article introduces the teaching design and specific implementation process of this model in detail. 
    Related Articles | Metrics
    The Literature Review about Sentiment Analysis in Network Public Opinion Research in China
    YOU Dan-dan LUO Shao-ye
    Computer & Telecommunication. 2024, 1 (3): 64-.   DOI: 10.15966/j.cnki.dnydx.2024.03.006
    With the popularization of the internet and social media, the impact of network public opinion on the social level cannot be underestimated, and sentiment analysis in network public opinion is of utmost importance. This paper collects, organizes, and summarizes relevant literature on sentiment analysis in network public opinion research in China, adopting bibliometric methods to analyze the quantity of literature, co-occurrence of high-frequency keywords, and evolution of theme keywords. Following the pro‐ cess of sentiment analysis in network public opinion research, this study analyzes the main research content, ideas, and methods in data collection, data processing, sentiment recognition(classification/tendency),sentiment evolution. Finally, this study points out fu‐ ture research directions, and gives the working directions of next steps.
    Related Articles | Metrics
  News More  


  Links More  


Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd