• Featured ArticlesMore>>   
Current Issue Just Accepted Archive Most Download Most Cited
  10 June 2024, Volume 1 Issue 6 Previous Issue   
For Selected: View Abstracts Toggle Thumbnails
Driver Fatigue Driving Detection System Based on EAR Algorithm
XU Jin-qun XIE Ye-nan ZHOU Ying GU Xiu-xiu
Computer & Telecommunication. 2024, 1 (6): 1-.   DOI: 10.15966/j.cnki.dnydx.2024.06.004
Related Articles | Metrics
TrustOCCR: Social One Class Collaborative Ranking Recommendation Algorithm by Trust
LI Gai GUO Ze-hao
Computer & Telecommunication. 2024, 1 (6): 7-10.   DOI: 10.15966/j.cnki.dnydx.2024.06.008
 The problem with previous studies of social One Class Collaborative Ranking (OCCR) algorithms is that they simply integrated the user's social network information into their model, without taking into account the transmission of social trust networks between users. To solve this problem, a new social one class collaborative ranking recommendation algorithm (TrustOCCR) based on CLiMF model and the newest TrustMF model is proposed, which aims to improve the performance of social one class collaborative ranking recommendation by integrating twofold sparse data, i.e., implicit feedback data and the transitive social trust network data. Experimental results on practical dataset show that our proposed TrustOCCR algorithm outperformed existing state-of-the-art OCCF approach over di?erent evaluation metrics, and that the TrustOCCR algorithm possesses good expansibility and is suitable for processing big data in the ?eld of internet information recommendation. 
Related Articles | Metrics
Building Method for Data Lineage Based on Data Table Similarity Calculation 
PAN Qi CAI Si-bo WEI Fang-fang
Computer & Telecommunication. 2024, 1 (6): 11-.   DOI: 10.15966/j.cnki.dnydx.2024.06.015
In the era of big data, it has become a consensus that various business departments can stimulate data value based on the accumulation of existing business data. However, due to the lack of uni?ed data standards across di?erent business systems, disorganized metadata, data silos, and low-quality data problems constantly emerge, hindering the e?ective utilization of data and necessitating necessary governance. Among them, data lineage analysis is one of the key tasks of metadata management, which is of great signi?cance for data traceability and data governance. However, traditional methods for constructing data lineage often face high computational complexity, poor accuracy, and high execution costs. To overcome these issues, a data lineage construction method based on the similarity calculation of data tables is proposed: by text feature representation of the three elements of data table naming, table structure, and data ?elds, using TFIDF to calculate the similarity of data tables, and further constructing the data table lineage relationship through the improved Jaro-Winkler Distances algorithm to verify the ?eld overlap and table name similarity. The results show that the algorithm has a signi?cant e?ect on the construction of data table lineage, facilitating the smooth progress of data governance work.
Related Articles | Metrics
Improved Sparrow Search Algorithm for Hybrid Flow-shop Scheduling Problem with Peak Clipping Demand Response 
HUANG He-lie HUANG Ge-wen CHEN Zhi-hua YAO Zu-fa
Computer & Telecommunication. 2024, 1 (6): 16-.   DOI: 10.15966/j.cnki.dnydx.2024.06.011
Power demand response is an important means to maintain the balance of power supply and demand in the peak period, and peak clipping is the main way of smart grid to achieve power demand response. In order to enable enterprises using hybrid ?ow-shop production to better participate in peak clipping demand response(PCDR) and optimize production scheduling, this paper introduces PCDR in the hybrid ?ow-shop scheduling problem, establishes a new problem model, and proposes an improved Sparrow Search Algorithm(ISSA) for model solving. Aiming at the problem that the standard SSA is prone to local optimization, the ISSA improves the local search ability of SSA by adding KMeans clustering replacement strategy. The experimental results show that the proposed model and algorithm can provide a better peak clipping production scheduling scheme, meeting the needs of enterprises to implement PCDR scheduling.
Related Articles | Metrics
Risk Analysis and Prevention of Unauthorized Access to Docker API and SpringBoot Actuator
JIA Mei-juan ZHU Qing JIANG Shan ZHANG Li-hua ZHANG Bai-shun
Computer & Telecommunication. 2024, 1 (6): 22-.   DOI: 10.15966/j.cnki.dnydx.2024.06.012
With the popularization of cloud computing technology and the development of containerization technology, Docker and SpringBoot have become indispensable tools for modern software development and deployment. However, this widespread use also comes with security risks. This article provides an in-depth analysis of the unauthorized access risks of Docker API and SpringBoot Actor. When these critical components are exposed to unauthorized access, attackers may exploit these vulnerabilities to perform malicious operations, such as deploying malicious containers, tampering with application con?gurations, or stealing sensitive information. These behaviors may not only lead to service interruption and data leakage, but also cause serious reputation and ?nancial losses to the enterprise. 
Related Articles | Metrics
Research on DDoS Attack Detection Technology based on SDN 
JIN Yan
Computer & Telecommunication. 2024, 1 (6): 26-30.   DOI: 10.15966/j.cnki.dnydx.2024.06.018
SDN adopts a centralized control method, achieving visualization and dynamism of network management, and is currently a new type of network architecture. However, at the beginning of SDN design, security issues were not considered. In the current situation where DDoS attacks are so prevalent, it is necessary to conduct research on attack detection under SDN architecture. After analyzing the SDN architecture mechanism, this article studies the location deployment of attack detection modules and designs a multi-level collaborative detection scheme for DDoS attacks. It designs an independent modeling scheme based on ensemble learning algorithms to address the problem of attack detection modeling. It extracts two sets of samples from the KDDCUP99 dataset without replacement, and uses SVM and adaBoost algorithms for independent modeling and sample combination modeling. The use of the adaBoost algorithm has a certain improvement in the classi?cation performance of samples, and modeling alone has no impact on the classi?cation performance of samples. It also shows higher classi?cation performance than the total samples on teardrop. The experimental results show that independent modeling for collaborative detection of forwarding plane and control plane has certain feasibility. This scheme starts from reducing the burden on the SDN centralized control center, providing a guarantee for e?ective network management, and has certain guiding signi?cance for attack detection of SDN architecture. 
Related Articles | Metrics
A Trust Service Adaptation Method Based on Security Proxy
DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li
Computer & Telecommunication. 2024, 1 (6): 31-34.   DOI: 10.15966/j.cnki.dnydx.2024.06.017
With the large-scale application of various services, protocol adaptation and security issues are becoming increasingly prominent. It has become a focus of attention in related industries to establish an uni?ed mechanism for trust service adaptation, and improve the availability and security of service adaptation. In the construction of industry network trust systems, the combination of di?erent services together forms a complete network trust service system, and there are increasingly more scenarios for forming distributed service systems. The interaction between trust services is frequent, and directly transplanting traditional service adaptation mechanisms to the trust service system will greatly reduce interaction e?ciency and scalability. Therefore, a trust service adaptation method based on secure proxies is proposed, which mainly solves the technical problems of service adaptation usability, scalability, and security. This scheme can meet the adaptive changes in service status, improve the availability of service adaptation, while ensuring the identities of both parties in the interaction and ensuring data security during the interaction process. 
Related Articles | Metrics
DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network 
LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang
Computer & Telecommunication. 2024, 1 (6): 35-.   DOI: 1008-6609(2024)06-0035-05
In recent years, network security is facing increasing challenges, among which Distributed Denial of Service (DDoS) attack is a common form of network threats. In order to deal with this challenge, this paper proposes a DDoS attack detection method based on Multi-scale Convolutional Neural Network (MSCNN). The model is trained on the CICDDoS2019day1 dataset, and the model detection performance is tested on the CICDDoS2019day2 dataset. By using MSCNN to predict and classify network tra?c, DDoS attacks can be e?ectively identi?ed and false positive rate can be reduced. Experiments show that the MSCNN method is superior to DNN, CNN and LSTM in terms of accuracy, recall and F1 score performance metrics.
Related Articles | Metrics
A Quantum Bit Visualization Simulation Model Based on Vizard 
SUN Li-wei HUANG Ze ZHAN Mei GUO Ling LIN Li-jun
Computer & Telecommunication. 2024, 1 (6): 40-43.   DOI: 10.15966/j.cnki.dnydx.2024.06.009
In order to conduct scienti?c research and educational teaching on quantum computing, simulation tools for quantum computing have emerged. Vizard is a virtual reality development platform software that is suitable for building 3D models and can be quickly developed using Python language. A quantum bit visualization simulation model for candy boxes is proposed based on the Vizard platform. This model uses quantum state lollipops to describe the probability amplitude of quantum bits. The candy radius represents the modulus and the angle between the candy stick and the horizontal plane represents the auxiliary angle. Opening the box lid causes the quantum state lollipop to collapse. Using quantum state lollipops, quantum gate components are simulated and quantum circuits are constructed using quantum gate components. The candy box model is easier to describe the superposition state of quantum bits than traditional Bloch balls, and it is interesting and easy to understand, suitable for quantum technology beginners and teenagers to popularize quantum technology education.
Related Articles | Metrics
Design of Waveform Type Recognition and Parameter Measurement Device Based on STM32F407 
ZHAO Zi-peng
Computer & Telecommunication. 2024, 1 (6): 44-48.   DOI: 10.15966/j.cnki.dnydx.2024.06.013
This device uses STM32F407 as the core to achieve waveform recognition and parameter measurement of periodic signals. The device consists of a core calculation module, buttons, display, signal conditioning circuit, and zero crossing detection circuit. It can achieve multi-channel gain sampling of periodic signals, measure parameters such as peak to peak value and frequency of waveforms, and identify waveform types such as sine waves, square waves, and triangular waves. This system achieves precise measurement of a wide range of voltage through a multi gain signal conditioning circuit, precise measurement of frequency through a hardware zero crossing circuit, real-time waveform acquisition through frequency calculation of sampling frequency, and recognition of waveform types through model matching. It has the advantages of wide voltage and frequency measurement range, high measurement accuracy, accurate waveform recognition, and fast response speed.
Related Articles | Metrics
Water Quality Safety Modeling Prediction Based on Extra Tree Classifier
YANG Li-jia CHEN Xin-fang ZHAO Han-qing WANG Shi-wei
Computer & Telecommunication. 2024, 1 (6): 57-.   DOI: 10.15966/j.cnki.dnydx.2024.06.006
With the rapid development of industrialization and urbanization, water quality safety issues have attracted increasing attention. This study uses a water quality analysis data set containing 7999 data records, covering various chemical substance concentration measurements and safety thresholds, as well as "safe or not" classi?cation variables, and uses the Extra Tree Classi?er model to conduct water quality safety modeling prediction and data analysis. The purpose of this study is to provide a reliable model to help policymakers and relevant departments better monitor and maintain water quality safety, thereby ensuring public health and environmental sustainability.
Related Articles | Metrics
Research on Text Abstract Generation Based on T5 PEGASUS and DeepKE 
ZHANG Qi WANG Ling SHEN Jie
Computer & Telecommunication. 2024, 1 (6): 62-67.   DOI: 10.15966/j.cnki.dnydx.2024.06.016
In order to solve the problem of false information and duplication in the summarizations generated by the T5 PEGASUS model, a text summarization model based on T5 PEGASUS and DeepKE - T5 PEGASUS-DK is proposed. This model combines the T5 PEGASUS model with DeepKE framework. Firstly, the Pkuseg segmentation method is used to improve the segmentation performance. Then, the DeepKE framework is used to extract triads from text. Finally, the word vector set of triads is concatenated with the representation vector of text. By establishing a mapping relationship between text and triads, the model can extract factual knowledge and extract information that is more consistent with the original content as a summary. The experimental results show that the T5 PEGASUS-DK model has the highest ROUGE value, and the generated abstracts are more authentic, coherent, and consistent with the original content.
Related Articles | Metrics
LSTM-based Groundwater Level Prediction and Anomaly Analysis of Earthquake Precursors 
ZHAO Han-qing CHEN Xin-fang YANG Li-jia WANG Shi-wei LIU Yi-qing
Computer & Telecommunication. 2024, 1 (6): 68-72.   DOI: 10.15966/j.cnki.dnydx.2024.06.001
Due to the in?uence of earthquakes, groundwater levels can undergo abnormal changes. The prediction study of water level change has important theoretical and practical signi?cance for the analysis of possible earthquake precursors and the mitigation of secondary disasters. In this study, the earthquake selected occurred on April 13, 2015, at 10:28 a.m., in Jianshui County, Honghe Hani and Yi Autonomous Prefecture, Yunnan Province. By obtaining groundwater level data from observation wells in the vicinity of the earthquake, the dataset is divided based on the theoretical concepts of earthquake active and non-active periods. Subsequently, an LSTM model is employed for training. The di?erences between the predicted values and the actual values are observed. Experimental results indicate that the model can identify abnormal changes in groundwater levels caused by earthquakes, providing valuable insights into studying groundwater level anomalies as earthquake precursors. 
Related Articles | Metrics

Please wait a minute...
111 PDF (0KB)
Analysis on theAir Quality ofAnhui Province in 2018 Based on GIS PDF (0KB)
FANG Jia-wei LIAO Dong LING Yun
Research on Trust Evaluation of Cloud Service Based on Context Provenance and Semantic Rules PDF (0KB)
HUANG Yi
Application of MultidimensionalTechnology in Graphic Design and Its CaseAnalysis PDF (0KB)
LIDan LINYun-gui RAOHao
Analysis on the Technology Development andApplication Strategy of "Internet + Smart Campus" in Colleges and Universities PDF (0KB)
XU Yong
2024
Vol.1
No.3 
2024-05-28
pp.1-96
No.5
2024-05-10
pp.1-0
No.4
2024-04-10
pp.106-0
No.1
2024-02-01
pp.1-84
2023
Vol.1
No.12 
2023-12-10
pp.1-92
No.11
2023-11-10
pp.1-88
No.10
2023-10-10
pp.1-102
No.6
2023-06-10
pp.1-0
No.5
2023-05-10
pp.1-110
No.4
2023-04-10
pp.1-0
No.3
2023-03-10
pp.1-0
No.1-2
2023-02-10
pp.1-0
2022
Vol.1
No.12 
2023-02-10
pp.1-98
No.11
2022-11-01
pp.1-0
No.10
2022-10-01
pp.1-0
No.9
2022-09-01
pp.1-0
No.8
2022-08-10
pp.1-0
No.7
2022-07-10
pp.1-0
No.6
2022-06-10
pp.1-0
No.5
2022-05-10
pp.1-0
No.4
2022-04-10
pp.1-96
No.3
2022-03-01
pp.1-92
No.1-2
2022-02-10
pp.1-0
2021
Vol.1
No.12 
2021-12-10
pp.1-0
No.11
2021-11-10
pp.1-0
2021
Vol.0
No.10 
2021-10-10
pp.1-0
2021
Vol.1
No.9 
2021-09-01
pp.1-90
No.8
2021-07-01
pp.1-70
No.6
2021-06-01
pp.1-90
No.7
2021-06-01
pp.1-80
No.5
2021-05-01
pp.1-82
No.4
2021-04-01
pp.1-86
No.3
2021-03-10
pp.1-80
No.1
2021-01-10
pp.1-72
2020
Vol.1
No.12 
2020-12-10
pp.1-80
No.11
2020-11-10
pp.1-80
No.10
2020-10-10
pp.1-78
No.9
2020-09-10
pp.1-78
No.8
2020-08-10
pp.1-90
No.7
2020-07-10
pp.1-80
No.6
2020-06-10
pp.1-92
No.5
2020-05-10
pp.1-82
No.4
2020-04-10
pp.1-74
No.3
2020-03-10
pp.1-0
No.1-2
2020-01-10
pp.1-72
2019
Vol.1
No.12 
2019-12-10
pp.1-68
No.7
2019-07-10
pp.1-74
No.6
2019-06-10
pp.1-88
No.5
2019-05-10
pp.1-80
No.4
2019-04-10
pp.1-80
No.3
2019-03-10
pp.1-82
No.1-2
2019-02-10
pp.1-86
2018
Vol.1
No.12 
2018-12-10
pp.1-94
No.11
2018-11-10
pp.1-0
No.10
2018-10-10
pp.1-78
No.9
2018-09-10
pp.1-70
No.7
2018-07-10
pp.1-82
No.6
2018-06-10
pp.1-90
No.5
2018-05-10
pp.1-90
No.4
2018-04-10
pp.1-96
No.3
2018-03-10
pp.1-76
No.1-2
2018-02-10
pp.1-82
2017
Vol.1
No.12 
2017-12-10
pp.1-112
No.11
2017-11-10
pp.1-98
No.10
2017-10-10
pp.1-92
No.9
2017-09-10
pp.1-0
No.8
2017-08-10
pp.1-88
No.7
2017-07-10
pp.1-0
No.6
2017-06-10
pp.1-0
No.5
2017-05-10
pp.1-0
No.4
2017-04-10
pp.1-0
No.3
2017-03-10
pp.1-0
No.1-2
2017-02-10
pp.1-0
2016
Vol.1
No.12 
2016-12-10
pp.1-0
No.11
2016-11-10
pp.1-0
No.10
2016-10-10
pp.1-0
No.9
2016-09-10
pp.1-0
No.8
2016-08-10
pp.1-0
No.7
2016-07-10
pp.1-0
No.6
2016-06-10
pp.1-0
No.5
2016-05-10
pp.1-0
No.4
2016-04-10
pp.1-0
No.3
2016-03-10
pp.1-0
No.1-2
2016-02-10
pp.1-0
2015
Vol.1
No.12 
2015-12-10
pp.1-0
No.11
2015-11-10
pp.1-0
No.10
2015-10-10
pp.1-0
No.9
2015-09-10
pp.1-84
No.8
2015-08-10
pp.1-84
No.7
2015-07-10
pp.1-94
No.6
2015-06-10
pp.1-90
No.5
2015-05-10
pp.1-96
No.4
2015-04-10
pp.1-84
No.3
2015-03-10
pp.1-94
No.1-2
2015-02-10
pp.1-104
2012
Vol.1
No.3 
2012-03-10
pp.
No.1、2
2012-02-10
pp.
2011
Vol.1
No.12 
2011-12-10
pp.
No.11
2011-11-10
pp.
No.10
2011-10-10
pp.
No.09
2011-09-10
pp.
No.08
2011-08-10
pp.
No.07
2011-07-10
pp.
No.06
2011-06-10
pp.
No.05
2011-05-10
pp.
No.04
2011-04-10
pp.
No.03
2011-03-10
pp.
No.02
2011-02-10
pp.
No.01
2011-01-10
pp.


»
 
  Computer & Telecommunication. 2022 Vol. 1 (12): 44-
» Prediction of Total Ionospheric Electron Content Based on Informer
  MA Yan LIU Hai-jun HE Ren CUI Chun-jie WANG Gao-yuan YANG Yue-qiao
  Computer & Telecommunication. 2024 Vol. 1 (1): 17-20
»
Research on Teaching Reform of Data Structure Based on OBE
  LU Hong LIU Hong-ying
  Computer & Telecommunication. 2022 Vol. 1 (4): 29-
»
 
  Computer & Telecommunication. 2021 Vol. 1 (11): 30-32

  News More  


  Links More  


Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd