Loading...
  • Table of Content
      10 May 2015, Volume 1 Issue 5 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    Localization Algorithm Based on the Distance Probability ofWireless Sensor Networks
    Hu Liangliang
    Computer & Telecommunication. 2015, 1 (5): 13-23.  
    Abstract     PDF(0KB)
    The propagation model based on experience has multi-valued problems in the practical application, which causes the RSSI and the distance not one- to-one mapping. This paper proposes an improved MDS-MAP localization algorithm, which uses propagation model based on distance interval ranging probability to eliminate the influence of multi-valued problems to ranging accuracy of the model, thereby improving measurement accuracy of ranging model. The simulation results show that the improved algorithm has better positioning accuracy when compared with the traditional MDS - MAP localization algorithm.
    Related Articles | Metrics
    Comprehensive Survey on Artificial Bee Colony Algorithm
    Yang Suhan, Jiang Hongwei
    Computer & Telecommunication. 2015, 1 (5): 15-18.  
    Abstract     PDF(0KB)
    Swarm intelligence algorithm develops rapidly these years and solve many large scale complex problems. Artificial bee colony algorithm is a new swarm intelligence algorithm, which gets wide attention for its superior performance, for example, strong global convergence, greedy heuristic search feature and quickly problem solution. The biological background is introduced briefly; modeling thought is given through the comparision between bees foraging behavior and problems solution; and algorithm model is introduced in detail; the research status quo is discussed from improvement and application of the algorithm these years; at last, research prospects are given about artificial bee colony algorithm, and improvement direction and application field are put forward from the weekness analysis of algorithm.
    Related Articles | Metrics
    Design and Research on Information Security Course Experiment Teaching
    Zhang Tao, Yin Mengjia, Chen Xiaowen
    Computer & Telecommunication. 2015, 1 (5): 19-21.  
    Abstract     PDF(0KB)
    Experiment teaching should be integrated in new knowledge, new technology and new experiment teaching methods. Based on the practice, this paper summaries and studies on the experimental teaching of Information Security course, analyzes the targets of experiment teaching; then designs the concrete experimental contents. It makes students to carry on the experiments in different levels and different directions. Through the experiments, students improves the practical ability and masters relevant theoretical knowledge.
    Related Articles | Metrics
    Analysis of Network Service Quality Optimizati
    Ye Yuhua
    Computer & Telecommunication. 2015, 1 (5): 22-23.  
    Abstract     PDF(0KB)
    With the development of science and technology, computer has been gradually entered thousands of families, and has been widely used in many fields of society, while the Internet is becoming the primary mean of communication. When the network is congested, there will emerge many quality problems of network service. Therefore, we research on the methods of optimizing the network service quality, in order to ensure the quality of network service.
    Related Articles | Metrics
    Web Site Analysis —— How to Optimize the Flow Acquisition
    Yang Jiaying
    Computer & Telecommunication. 2015, 1 (5): 24-26.  
    Abstract     PDF(0KB)
    While judging the operation status of web site and considering strategy, the idea and opinion of the site operators are very important. But they may not always make the correct judgment. So, it is important to analyze the trace of users to take concrete and effective measures. This article analyzes user behaviors and the transformation rate (the degree measuring desirable access vs. total access), and discusses on the way to optimize the flow acquisition.
    Related Articles | Metrics
    The Application of VPN Technology in Computer Network Information Security
    Li Yingjie
    Computer & Telecommunication. 2015, 1 (5): 27-28.  
    Abstract     PDF(0KB)
    Virtual Private Network (VPN) is mainly applied in departments and sub-departments of enterprises, realizing remote operation among different divisions, strengthening the level of information security, as well as enabling employees to get remote access to enterprise network. Due to different VPN protocols, service types and customer demands, there are generally two types of VPN. This paper provides a detailed discussion on the application of these two types of VPN technology in network information security
    Related Articles | Metrics
    Flexible Application of VFP and Excel in Enrollment
    Yi Xuewen
    Computer & Telecommunication. 2015, 1 (5): 29-30.  
    Abstract     PDF(0KB)
    Facing with complicated enrollment work, it can achieve with minimum fuss and maximum efficiency using computer technology skillfully. This paper discusses how to flexibly use VFP and Excel, using their characteristics of dealing with data to finish the enrollment work more efficiently.
    Related Articles | Metrics
    Study on the Application of Multifunctional Recording-broadcasting System in Construction of Excellent Resource-sharing Cou
    Jing Linyan, Liao Junjie, Ma Jianli
    Computer & Telecommunication. 2015, 1 (5): 31-34.  
    Abstract     PDF(0KB)
    Teaching video is the core of excellent resource–sharing course, however, there are still some problems existing. By analyzing the characters of multifunctional recording-broadcasting system, it is strongly suggested that it may improve the deficiency of current teaching video. Combined with the situation of our college, a detailed study is conducted in this study, including its application mode and management mechanism.
    Related Articles | Metrics
    Design and Implementation of the Theme Video Based on Premiere
    Li Junzhou, Shi Jun
    Computer & Telecommunication. 2015, 1 (5): 35-37.  
    Abstract     PDF(0KB)
    Premiere is an excellent video editing software launched by Adobe, which is widely used in video production. This paper uses Premiere to design an example of theme video, introduces the basic functions of Premiere with the examples, and discusses on the production process of the video.
    Related Articles | Metrics
    Research and Implementation of the Information Management System of University Teaching Material Based on SOA
    Wang Dejian
    Computer & Telecommunication. 2015, 1 (5): 38-40.  
    Abstract     PDF(0KB)
    The information management system of teaching material based on SOA can shelve the differences of various subsystems, so that the institutes of higher education can visit each other’s system and share teaching information and resources. This paper applies SOA in the practical system development and uses BizTalk Server as ESB product innovatively
    Related Articles | Metrics
    Research on the Library Management System Based on .NET
    Huang Chunhua, Qiao Jinghua
    Computer & Telecommunication. 2015, 1 (5): 41-43.  
    Abstract     PDF(0KB)
    Aiming at the problems of the current confusion within the campus library management, this paper designs the library management system to solve this problem. Firstly, it analyzes from two aspects of functional requirements and performance requirements; secondly, it analyzes on the system architecture, the overall design, database design; finally, it gives the realization of two modules of pre- borrowing books management and library management. This paper has certain positive role in the librarians and maintenance personnel.
    Related Articles | Metrics
    Handwritten Chinese Character Recognition Based on Neural Network Experiment System
    Zheng Shaolan
    Computer & Telecommunication. 2015, 1 (5): 44-46.  
    Abstract     PDF(0KB)
    Handwritten Chinese characters recognition based on neural network is to convert Chinese characters dot matrix graphic to electrical signals, then input to the digital signal processor or computer for processing. On the basis of classification algorithm, it is recognized by matching with the Chinese characters. This paper expounds the design target of handwritten Chinese characters recognition experiment system, analyzes the pretreatment and the principle of handwritten Chinese characters, introduces the feature extraction of handwritten Chinese characters in detail
    Related Articles | Metrics
    The Application of Data Mining Technology in the Analysis of the Status of Secondary Vocational School Studen
    Liu Xianyu
    Computer & Telecommunication. 2015, 1 (5): 47-49.  
    Abstract     PDF(0KB)
    A lot of important information that can influence the effect of education is hidden in mass student data. Data mining technology can find useful data from multiple dimensions and multiple levels of student information, providing information support for the development of science and education strategy. Based on the analysis of information that influences the effectiveness of education, this paper introduces the method of data mining, analyzes the results, and puts forward educational suggestions.
    Related Articles | Metrics
    Realization of HGTMS Card Power on Sequence Control and Voltage Monitoring
    Xu Hui
    Computer & Telecommunication. 2015, 1 (5): 50-54.  
    Abstract     PDF(0KB)
    Several complex chips need to be use for HGTMS card. Each chip has the special power on sequence. According to the power on sequence, EPLD POWER1220AT8 is used to control the power on timing and voltage monitoring, so as to make sure the board can start up successful. This design is in common use in other systems for power on sequence and voltage monitor
    Related Articles | Metrics
    Computer Simulation of the Braided Composite Structure with Three-dimensional Four-step Approach
    Yue Miao Fu Rao Luo Yu
    Computer & Telecommunication. 2015, 1 (5): 52-54.  
    Abstract     PDF(0KB)
    This article mainly analyzes the characteristics of the four-step braided technology, and simulates the motion track of the yarn according to the braiding characteristics in computer. It uses computer graphic technology to show the 3d braided structure, and simulates the design and implementation of braided composites with three-dimensional four-step approach. On the basis of the relationship of braiding parameters, simulation parameters are set in the computer software, so as to generate the 3d braided model in variety of sizes and angles, which can be infinitely close to the real structure model of the braid.
    Related Articles | Metrics
    Design of Embedded Intelligent Home Control System
    Zhang Jianbing
    Computer & Telecommunication. 2015, 1 (5): 55-57.  
    Abstract     PDF(0KB)
    This paper introduces the technology of embedded system, and the development status and trend of intelligent home and its control system, focusing on the elaboration of design of embedded intelligent home control system. This system has good functions of realizing indoor temperature monitoring, gas monitoring, lighting monitoring and access monitoring etc in applications.
    Related Articles | Metrics
    Exploration on the Integration Curriculum Construction of Network Equipment Installation and Commissioning
    Ye ChunXiao
    Computer & Telecommunication. 2015, 1 (5): 58-60.  
    Abstract     PDF(0KB)
    This paper analyzes the current employment situation of graduates majored in computer science or equivalent in vocational colleges, describes the concept and idea of curriculum design. To cultivate the talents for the job requirements, the organization and arrangement of teaching content should be combined with professional features. From the view of occupational action structure, this paper summarizes the work process into typical tasks, and then transforms the typical tasks into integration courses, designs the courses suitable for jobs related to network equipment installation and commissioning.
    Related Articles | Metrics
    Exploration on the Teaching Reform of C# Program Design
    Tian Shuhua LanLianyi
    Computer & Telecommunication. 2015, 1 (5): 61-63.  
    Abstract     PDF(0KB)
    The traditional teaching methods mainly focus on imparting knowledge with "chalk and talk" style which are not able to stimulate students' enthusiasm and initiative, thus making students feel dull and dry. This paper introduces the reforms of the course of C# Programming Design in terms of teaching content, methods, styles as well as other aspects. With this reform, students’ enthusiasm is stimulated, practical skills are improved and professional quality are trained.
    Related Articles | Metrics
    Reform and Development Planning of Multimedia Classr
    Li Ying
    Computer & Telecommunication. 2015, 1 (5): 64-67.  
    Abstract     PDF(0KB)
    Information education is strengthened by our country constantly. As the carrier of information teaching, intelligent multimedia classrooms also emerge as the times require, along with increasing scale. The common multimedia classrooms are being phased out. Combined with the actual situation of our university, and according to my own practical experience engaged in multimedia classroom management for many years, this paper briefly discusses the transformation of multimedia classroom in our university this year and the future development planning.
    Related Articles | Metrics
    Research on the Teaching Reform of Computer Culture Basis in Colleges and Universities
    Gao Jing Xia Huili
    Computer & Telecommunication. 2015, 1 (5): 68-82.  
    Abstract     PDF(0KB)
    Computer culture basis is a compulsory course for college non-computer majors. It can train students' computer skills, improve the basic quality of college students. Through the analysis of the teaching mode and the existing problems of computer culture basis in some colleges, this paper puts forward some feasible schemes for the teaching reform of the course.
    Related Articles | Metrics
    The Application of VB Programming in Computer Teaching Management
    Chen Jiang
    Computer & Telecommunication. 2015, 1 (5): 70-73.  
    Abstract     PDF(0KB)
    In the maintenance of computer system in multi-media classroom, there are the primary tasks for computer room administrator that how to prevent the misoperation, to avoid the unauthorized modification of computer system setting, to eliminate the appearance of playing computer games in class, to share the unauthorized document, to maintain the normal teaching order, and to guarantee a smooth teaching procedure for teachers. This paper aims to provide comprehensive management function for computer classroom. It completes unified distribution of computer system and achieves quick and efficient management, so that to reduce the burden of computer room administrator, to guarantee the system safety, and to maintain the normal teaching order and class discipline of the computer room.
    Related Articles | Metrics
    Research on the Effectiveness of the Application of Language Teaching Strategy in Computer Course
    Sun Zhuo
    Computer & Telecommunication. 2015, 1 (5): 74-82.  
    Abstract     PDF(0KB)
    The rational use of language by teachers can greatly enhance the students' interest in learning, improving teaching efficiency. Research on the improvement of the language ability for computer course teaching is of great importance to improve teachers' personal charm, strengthen the communication between teachers and students, and create a good learning atmosphere.
    Related Articles | Metrics
    Comparative Study on School Enterprise Cooperation and Daily Teaching in Computer Science
    Du Danlei
    Computer & Telecommunication. 2015, 1 (5): 76-78.  
    Abstract     PDF(0KB)
    With rapid development of school enterprise cooperation, it makes more and more educators to reflect that many students keep very positive learning state in enterprise unlike in school. It’s due to the particularities of the enterprise base. This paper analyzes the different characteristics of learning in enterprises and in school, and based on these, proposes some effective methods to improve the school teaching.
    Related Articles | Metrics
    Survey of Construction Status and Analysis of Development Strategy in EMR ——Taking Henan Province as an Example
    Yang Ruixian, Chen Yu, Li Haoyu
    Computer & Telecommunication. 2015, 1 (5): 79-82.  
    Abstract     PDF(0KB)
    As the main source of resident’s health records, Electronic Medical Records (EMR) is the key to improve health services. Henan province is the first batch of pilot areas. However, its EMR develops so slow that it has lagged behind the country’s average level. So it’s extremely urgent to build a complete EMR system to promote the development of EMR in Henan. This paper surveys the construction status of EMR based on the questionnaires from five cities in Henan, the interview of health department and the lecture of Dr. Hong. It analyzes the problems of EMR system and barriers of push. It applies theories and methods of information organization and information retrieval to put forward the suggestion on solving the development predicament of EMR from the management and technology levels.
    Related Articles | Metrics
    Research on the Innovation of Smart campus Informatization Construction in Colleges and Universities Based on Big Data
    Wang Jun
    Computer & Telecommunication. 2015, 1 (5): 83-87.  
    Abstract     PDF(0KB)
    As a new type of data processing technology, big data plays an important role in "smart campus" construction based on cloud computing and Internet of things. "Smart campus" is the informatization construction direction of education entity, having great value in big data mining. Based on the analysis of smart campus informatization, this paper analyzes the smart campus structure and the significance brought by big data, hoping to promote the innovativation of smart campus informatization construction in colleges and universities under the perspective of big data.
    Related Articles | Metrics
    Investigation of the Optical Cable Profile Cutover Technology
    Pan Denggao
    Computer & Telecommunication. 2015, 1 (5): 85-87.  
    Abstract     PDF(0KB)
    With the increasing of cutover times in transit network optimization, new construction of optical cables and line transfer etc., it is likely to cause non-connection point failure of cable line or normal line transfer and cutover. The traditional interrupt service cutover repairing method has not meet with the practical requirements. The optical cable profile cutover technology is discussed in this paper. And the technology works under the premise of not interrupting the operation of normal core system, solving the line transfer and cutover in the cable accident.
    Related Articles | Metrics
    Analysis on Automatic Identification Technology of Intelligent Building Access Control System
    Zhang Hui
    Computer & Telecommunication. 2015, 1 (5): 88-90.  
    Abstract     PDF(0KB)
    The access control system of intelligent building is a necessary facility, which provides security protection, automatic control and so on. Fingerprint identification system is a new artificial intelligence system, providing technological measures for the automatic identification of access control system. This paper analyzes the development trend of intelligent building and the basic structure of fingerprint identification system, introduces the application of automatic recognition technology in intelligent building access control system.
    Related Articles | Metrics
    Research on the Skills Competition System in Vocational School
    Zhou Yanfang
    Computer & Telecommunication. 2015, 1 (5): 91-93.  
    Abstract     PDF(0KB)
    In view of the current problems of skills competition in vocational school with heavy task and difficult evaluation, this paper designs a skill competition system of typing test. Firstly, it analyzes the system needs from the functional requirements and non functional requirements; secondly, it analyzes the system architecture and overall design; finally, it analyzes the system implementation. This paper has certain positive role for software developers and the vocational school teachers
    Related Articles | Metrics
    Unreliability Analysis of Computer Software Technology
    Xu Lei
    Computer & Telecommunication. 2015, 1 (5): 94-95.  
    Abstract     PDF(0KB)
    There is the problem that software technology and hardware technology develop discordantly. In other words, hardware technology is hard to match with software technology. This paper introduces the unreliability of software technology, and puts forward the solutions.
    Related Articles | Metrics
  News More  


  Links More  


Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd