Loading...
  • Table of Content
      10 April 2015, Volume 1 Issue 4 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    The Application of RFID and BeiDou (COMPASS) Navigation Satellite System in Internet of Things
    Qin Tong Qiao Xudong
    Computer & Telecommunication. 2015, 1 (4): 19-22.  
    Abstract     PDF(0KB)
    As a new concept supported at the end of last century, internet of things owns a short history. This thesis is based on the internet-of-things project and the logistics and distribution of Royalstar. In the process, the technology of Radio Frequency Identification (RFID) is applied to identify each product. In addition, in order to solve the collision of response in the RFID system, ALOHA is applied not to miss or repeat the signal from one RFID label. Moreover BeiDou(COMPASS)Navigation Satellite System is applied to locate the trucks and the products on the way timely. So that the risk of losing product is reduced while the expense of each product reduces and the profit of company increases.
    Related Articles | Metrics
    Research on the Development and Trends of RFID Middleware
    Chen Yang
    Computer & Telecommunication. 2015, 1 (4): 23-38.  
    Abstract     PDF(0KB)
    This paper describes the concepts and characteristics of RFID middleware, reviews the development of RFID middleware, analyzes RFID middleware products that are developed by domestic and foreign research institutions and corporations. This paper also gives an overview of the current research status and development trends of RFID middlewa
    Related Articles | Metrics
    The Design of Embedded Face Recognition Entrance Guard System Based on OpenCV
    Gu Sisi, Hu Lixia
    Computer & Telecommunication. 2015, 1 (4): 33-35.  
    Abstract     PDF(0KB)
    Aiming to the defects and potential safety hazard of traditional entrance guard system , this paper designs an entrance guard management system based on the technology of face recognition. The embedded development platform choses S3C2440B as microprocessors, WInCE6.0 as an operating system. At the same time, the system transplants OpenCV, invokes the AdaBoost and functions of PCA algorithm, in order to complete face image detection and face recognition. Finally, the recognition result will acts on the door lock switch control. Compared to the traditional entrance guard management system, the design is safer and more automatic, which brings easier and more convenient experience to users.
    Related Articles | Metrics
    The Application of 4K and H.265 in Video Surveillance
    Huan Xiaoda, Xiao He
    Computer & Telecommunication. 2015, 1 (4): 36-38.  
    Abstract     PDF(0KB)
    】The video surveillance are used more and more widely, while related technical equipment is developing very fast. The establishment and promotion of technical standards for 4K and H.265 in recent years will bring a new round of leap. The new technologies hae a good application prospect in this field, accelerating the process of standardization in video surveillance system.
    Related Articles | Metrics
    Development ofWeb-based Art Archives Management System for Ceramic Celebrities in Higher Education
    Tan Xiaoping, Wu Benrong, Zou Jincheng, Xiong Guoguo
    Computer & Telecommunication. 2015, 1 (4): 39-41.  
    Abstract     PDF(0KB)
    Based on Asp.net technology, a management system for art archives of ceramic celebrities in higher education has been developed through object-oriented analysis and design on the platform of Studio 2008, using SQL Server 2005 as background database server,providing a user-friendly service platform for managing art archives of ceramic celebrities.
    Related Articles | Metrics
    Explore on IT Operation and Maintenance Management of Medium-sized Enterprise
    Pan Xiaoxia, Zhou Liangbiao
    Computer & Telecommunication. 2015, 1 (4): 42-44.  
    Abstract     PDF(0KB)
    The rapid development of computer technology brings the challenges and opportunities to the IT operation and maintenance management of medium-sized enterprise. Effectively improving the management efficiency and level of operation and maintenance information sector is what medium-sized enterprises concerned about. This paper discusses the current situation of IT operation and maintenance management in medium-sized enterprise, analyzes the status of the platform, and finally proposes effective countermeasures.
    Related Articles | Metrics
    Research on KM Teaching in the Cultivation of Discrete Math Thinking Mode
    Cheng hong Gong Xiongxing
    Computer & Telecommunication. 2015, 1 (4): 45-46.  
    Abstract     PDF(0KB)
    KM teaching is to join the knowledge according to the internal connection, then deduce by mind maps, and illustrate the abstract and difficult knowledge in an intuitive way that fits logic thinking; meanwhile, computational thinking ability will be enhanced in this new model of teaching process."KM teaching + Computational Thinking" is a new teaching model which aims to train the ability, and requires students to use discrete structure to create abstract models.Through analysis of examples and effect tracking,we draw the conclusion that this teaching promotes the reform of the training model of applied talents.
    Related Articles | Metrics
    Review on Research Status and Application ofWireless Sensor Networks
    Zhao Na
    Computer & Telecommunication. 2015, 1 (4): 47-65.  
    Abstract     PDF(0KB)
    As an important part of Internet of Things, wireless sensor networks has a very wide range of applications, so more and more industry and academia are engaged in the development. Firstly the basic concepts and characteristic of wireless sensor networks are introduced, then the research status and the key technology of wireless sensor networks are analyzed. Finally, the application fields of wireless sensor networks are described so as to provide reference for the research personnel.
    Related Articles | Metrics
    A Method for Pedestrian Detection Based on Fast Feature Computation
    Cui Jian Hou Xiaorong
    Computer & Telecommunication. 2015, 1 (4): 50-65.  
    Abstract     PDF(0KB)
    University of Electronic Science and Technology of China, Chengdu, Sichuan, 611731
    Related Articles | Metrics
    Research on the DirectFB Graphics Engine Transplant Based on BCM7241 Platform
    LiangWensen,
    Computer & Telecommunication. 2015, 1 (4): 53-55.  
    Abstract     PDF(0KB)
    This paper describes in detail how to implement the DirectFB transplantation on BCM7241 hardware platform of the graphics engine hardware acceleration; and gets the promotion in the performance of the system after the transplantation and compares with the performance before transplantation, illustrating the function of DirectFB in optimizing BCM7241 hardware platform GUI performance.
    Related Articles | Metrics
    Design and Implementation of Data Analysis System Based on Text Verdict
    Yao Jiaming, Ye Ronghua, Chen Chun
    Computer & Telecommunication. 2015, 1 (4): 56-59.  
    Abstract     PDF(0KB)
    In order to effectively manage and analyze massive judgment data information, this paper designs and implements the judgment data analysis system. This system is developed based on Asp.net mvc mode and the information of text verdict, using c # language. The system realizes to upload original information of text verdict, export the modified information, upload standard information, import and manage the information of listed company, analyze and count the judgment data, and complete the correlational analysis and so on. Application results show that the judgment data analysis system can achieve ideal result, and has a certain application prospect.
    Related Articles | Metrics
    Analysis of Float Attribute Based on CSS Box Model
    Jiang YunXin
    Computer & Telecommunication. 2015, 1 (4): 60-62.  
    Abstract     PDF(0KB)
    This paper introduces the conception of box-model and normal document stream, and states the position principle of box in normal document stream. It analyzes the float attribute of CSS, and gives the method of using float by specific case.
    Related Articles | Metrics
    The Application of DataWarehouse in Aviation Meteorology
    Liu Zhutao Huang Nan
    Computer & Telecommunication. 2015, 1 (4): 66-70.  
    Abstract     PDF(0KB)
    This paper introduces the conceptions and characteristics of data warehouse, and proposes the design scheme of aviation meteorology data warehouse according to the airport meteorological station and the characteristics of aviation meteorology.
    Related Articles | Metrics
    Exploration on the Computer Simulation of the Amplitude of Three-dimensional Information Storage Signal
    Yue Miao
    Computer & Telecommunication. 2015, 1 (4): 68-70.  
    Abstract     PDF(0KB)
    Since the current information storage has low capacity and rate, 3d information storage method arises, with the unity of array laser, wavelength division multiplexing technology and multi-layer coating. This method mainly uses the optical fiber coupling lens to pull the focus of flare closer automatically, so that to read and write huge amounts of information. It will play an important role to reduce the three-dimensional storage seeking time. This article analyzes the principle of storage system and the theory of scalar diffraction of cd-rom system, and explores on the simulation results.
    Related Articles | Metrics
    Design and Implementation of Shallow Observation ROV
    Xin Guanghong, Feng Dezhong, Pan Ruonan
    Computer & Telecommunication. 2015, 1 (4): 71-76.  
    Abstract     PDF(0KB)
    This paper mainly expounds the function and design of shallow observation ROV. It introduces the design and simulation of ROV module, principle and design of magnetic coupling waterproof propeller. The main function of ROV is image acquisition and transmission to the ground station. This scheme has changed the traditional way of analog image transmission, using digital image acquisition and TCP/IP protocol instead. In order to improve the transmission distance, it uses the optical cable. Digital image acquisition is realized by open source openwrt system. This scheme can effectively improve the efficiency of data transmission, and realize the synchronous transmission control signal.
    Related Articles | Metrics
    Study on the Control of Modern Enterprise Information Security Ri
    Zhang Zheng
    Computer & Telecommunication. 2015, 1 (4): 74-76.  
    Abstract     PDF(0KB)
    Informatization construction is an important focal point of the modern enterprise development, while the problem of information security risk weakens the important role of information technology. From the hacker attack, the internal control management, application system security and other aspects, this article analyzes the information security risk in modern enterprises, and on this basis, expounds the control strategy. This paper aims to strengthen the understanding of enterprise information security risk, and provide certain references for enterprise to construct the information security system, deepening the informationzation construction of modern enterprises.
    Related Articles | Metrics
    Discussion on Knowledge Ability Training for Students Majored in Information Management in the Knowledge Age
    Song Yanhui
    Computer & Telecommunication. 2015, 1 (4): 77-78.  
    Abstract     PDF(0KB)
    In this paper, combined with the background of the era of knowledge and the big data in 2013, we propose that students majored in information management should pay attention to the knowledge management and knowledge measurement in the knowledge age, in order to meet the social demand for information management talents. We further put forward the training mode from three aspects: theoretical knowmetrics, knowmetrics technique and methods, application knowmetrics
    Related Articles | Metrics
    Project Teaching Practice on Effectively Docking Professional Teaching and Enterprise Demands ----Exploration on Curriculum Reform of Network IntegratedWiring
    Yu Liyan
    Computer & Telecommunication. 2015, 1 (4): 79-80.  
    Abstract     PDF(0KB)
    With the rapid development of social science information, the rise of intelligent building engineering, and the importance of integrated wiring technology, Network Integrated Wiring is becoming a core subject for computer science in secondary vocational schools. Traditional teaching methods can not adapt well to the modern occupation education teaching mode. Therefore, it is necessary to reform the teaching method. The project teaching method is put forward which can give full play to students' subjectivity and creativity. The project teaching method, as a kind of teaching model of secondary vocational education, its teaching situation mainly takes students as the main body and makes the integration of theory and practice so that students can efficiently master learning theory and occupation skills. This text will lead Project Teaching mode of learning into Network Integrated Wiring course teaching in the secondary vocational schools.
    Related Articles | Metrics
    The Convertion from Physical Machine to VMware Server
    Xue Jian, Qu Shouning
    Computer & Telecommunication. 2015, 1 (4): 81-83.  
    Abstract     PDF(0KB)
    Virtualization is an inevitable trend for the data center architecture. P2V (Physical to Virtual) is the first step to achieve virtualization. P2V is the process of converting physical machines to virtual machine. First,this paper discusses P2V; then elaborates how to achieve the convertion from physical machine to VMware ESX server.
    Related Articles | Metrics
  News More  


  Links More  


Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd