Loading...
  • Table of Content
      10 December 2017, Volume 1 Issue 12 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    Design and Implementation of Home Transfer Robot Based on Internet of Things
    LIWei-heng, WU Meng, CHENG Zhao-xun , FENG Yi-xuan, ZHANG Yue-xia
    Computer & Telecommunication. 2017, 1 (12): 1-4.  
    Abstract     PDF(0KB)
    Aiming at the problem that the weight of the furniture is generally large and the transportation is time-consuming and laborious, this paper presents a home transfer robot based on the Internet of things. The system consists of two parts: hardware and software. The hardware includes motion module, WiFi module, robot arm module, video module and sensor module. The software includes system initialization, instruction reading and parsing, control sub function and so on. Through the co-design of hardware and software, it realizes the control of robot in grasping objects, video surveillance and transmission line inspection, obstacle avoidance and other functions. The test shows that the robot is easy to use, low-cost and widely used, and has great potential for application.
    Related Articles | Metrics
    Design and Realization of Small Rotor Unmanned Aerial Vehicle System
    ZHANG Xiang, WU Jia-min, WANG Hui, JIN Jia-cheng, ZHANG Yue-xia
    Computer & Telecommunication. 2017, 1 (12): 5-9.  
    Abstract     PDF(0KB)
    In order to solve the problem that the traditional rotorless unmanned aerial vehicles are large in size, complicated in structure and costly, a miniature rotor unmanned aerial vehicle system (MUAV) is designed. The system is based on STM32 microcontroller.The hardware consists of micro-controller, attitude sensor, communication, motor, map and other modules; software includes the main cycle, control cycle and feedback cycle. The ground operation side connects to the UAV through Bluetooth or 2.4G radio frequency, and the microcomputer calculates the attitude data and control data, to achieve UAV control. Then the UAV returns back the image and attitude data to the ground side through the 5.8G map. After testing, the system is stable, reliable and easy to operate.
    Related Articles | Metrics
    Research on DiscreteWorkshop Multi-objective Scheduling Algorithm
    JIN Jia-cheng, ZHANG Yue-xia, DAI Zuo-jun
    Computer & Telecommunication. 2017, 1 (12): 10-13.  
    Abstract     PDF(0KB)
    With the rapid development of science and technology and the continuous improvement of customer demand, the traditional mode of mass production has gradually been eliminated. The small-scale production mode of discrete manufacturing will gradually become one of the mainstream forms of manufacturing industry. China's manufacturing industry has developed rapidly in recent years and has created a "made in China" brand in the world. This mainstream model of discrete manufacturing will also become one of the development goals for China's manufacturing industry. In this paper, the development background of discrete shop scheduling is reviewed. And then the model of multi- objective scheduling in discrete shop is expounded. After that, two kinds of multi-objective scheduling algorithms, which are particle swarm optimization algorithm and shuffled frog-leaping algorithm, are introduced.Afterwards the improved algorithms of the two algorithms are analyzed in detail. At the end, some suggestions on the research direction of multi-objective scheduling algorithm in discrete shop are put forward.
    Related Articles | Metrics
    The Design and Research on School Bus Safety Monitoring and Management System
    PENG Zhen-wu, ZHANG Jun-ling, HOU Run-jia, ZHU Ling-zhi
    Computer & Telecommunication. 2017, 1 (12): 14-16.  
    Abstract     PDF(0KB)
    Nowadays, the school bus accidents emerge frequently, but the traditional school bus safety monitoring and management system cannot be applied efficiently because of the high cost. Aiming at this problem, a new school bus safety monitoring and management system is studied and designed.Firstly the overview architecture and functions of the system are introduced, and then the detailed principle and method are introduced. Finally, the merits and demerits of the system are pointed out.
    Related Articles | Metrics
    Design and Implementation of Virtual Experiment App Server Architecture
    LIN Yu-man, QIN Hao-huan, HUANG Jin-peng, WU Chu-qin, RAO Hao
    Computer & Telecommunication. 2017, 1 (12): 17-19.  
    Abstract     PDF(0KB)
    With the rapid development of Internet technology and the popularity of Android smart-phones, Mobile App has the characteristics of rapid development and rapid growth of users, but the background server development of App network service is a difficult problem. The design and implementation of server technologies of Android Virtual Experiment are introduced, which include interface design, architecture environment selection, object storage service and user authentication scheme.
    Related Articles | Metrics
    Research on Grid Task Scheduling Based on Ant Algorithm
    JIN Zhi
    Computer & Telecommunication. 2017, 1 (12): 20-22.  
    Abstract     PDF(0KB)
    Under the multi-objective task condition, the grid task scheduling not only completes the multi-objective optimization work, but also enhances the ant algorithm resource utilization rate. Grid task scheduling based on ant algorithm belongs to cluster computer processing system, in which each database distribution node has high independence. This paper mainly studies the grid task scheduling based on ant algorithm. By analyzing the improvement strategy of ant algorithm, the effectiveness and simulation results of the grid task scheduling of ant algorithm are obtained.
    Related Articles | Metrics
    Design and Implementation of Government Key Project Online Management System Based on .NET
    LI Zhen
    Computer & Telecommunication. 2017, 1 (12): 23-25.  
    Abstract     PDF(0KB)
    With the increase of government investment projects, the traditional project management scheme become more difficult in management for administrators. In order to complete the project on schedule, and reduce the management difficulty, project management should be the key research direction of the government. This paper mainly introduces the "government key project online management system" developed by B/S framework. The system mainly provides the functions of project information management,image progress management, project graphics display management, project list management, etc, allowing government to manage the investment projects conveniently and efficiently.
    Related Articles | Metrics
    Research on the Teaching Quality Monitoring System of Higher Vocational Colleges Based on Modern Information Technology Platform
    PENG Xiao-hong
    Computer & Telecommunication. 2017, 1 (12): 26-28.  
    Abstract     PDF(0KB)
    The research on the teaching quality monitoring system under the modern information technology platform, and the discussion on realizing teaching quality monitoring using modern information technology, can improve the level of teaching quality monitoring and management in higher vocational colleges. This article analyzes the present situation and existing problems in the teaching quality monitoring system; points out ideas to solve these problems; and build the system framework based on modern information technology. It has a certain reference for improving the teaching quality monitoring in higher vocational colleges, providing a way to realize the internationalization of education.
    Related Articles | Metrics
    The Application of PBL Teaching Method in Software Development Comprehensive Training in Higher Vocational Colleges
    HAO Ai-yu
    Computer & Telecommunication. 2017, 1 (12): 29-31.  
    Abstract     PDF(0KB)
    At present, PBL teaching method is widely used in Software Development Comprehensive Training in Higher Vocational Colleges. This paper firstly introduces the concept and characteristics of the PBL teaching mode; then designs the PBL teaching procedures according to characteristics of this course; finally, the practice conclusion and the validity of PBL teaching method are given. It is hoped that this study can provide some suggestions to the relevant staff.
    Related Articles | Metrics
    Research and Realization of Remote Login System of Linux Based on Java
    WENG Qiu-hua, YU Yong-cheng, OU Hai-yan
    Computer & Telecommunication. 2017, 1 (12): 32-35.  
    Abstract     PDF(0KB)
    For the enhancements of maintaining a Linux operating system with quick and high performance and realizing a customized remote login functionality, this paper proposes the design and implementation of a Java-based Linux remote login system.The system not merely enables automatic server login, but also provides different operating interfaces according to the servers. The functional buttons on the interface can be utilized to operate and maintain the system conveniently. The experimental results, compared with putty and SecureCRT, indicate that the proposed system covers all the functions and realizes customized server operations.It makes the system operations and maintenance more effortless, convenient and efficient. Accordingly, the system can significantly reduce the difficulty of server maintenance and also improve the level of server management.
    Related Articles | Metrics
    Design of Camera Calibration System
    GAO Lei, MO Bing
    Computer & Telecommunication. 2017, 1 (12): 36-38.  
    Abstract     PDF(0KB)
    In order to solve the problem of the application in vision measuring, high precision calibration of camera must be realized.A camera calibration system is established in this paper. First, based on the theory of camera calibration technique, the principle of camera calibration is discussed. And the basic principle of the Zhang Zhengyou’s calibration method is analyzed and summarized.Then, the calibration toolbox of Matlab and an 8x12 checkerboard pattern (each square is 26mm x 26mm) is used to calibrate the designed camera system. Finally, the error of the calibration system is analyzed, and the design of the system is verified as well.Experimental results indicate that the principal point coordinate errors of the camera are [-0.02425; 0.05059], and the pixel errors in calibration of external parameters are [0.23081; 0.16866]. It can satisfy the system requirements of stability and reliability, higher precision and strong anti-jamming, as well as portability, etc. And it lays the foundation for the following application to vision measuring.
    Related Articles | Metrics
    Research on the Demand Forecasting System Based on Matlab
    LI Yu-xiang , WANG Yu, SHEN Nan, BO Jing-yi, DU Jian-ying , LI Ke-qiang
    Computer & Telecommunication. 2017, 1 (12): 39-41.  
    Abstract     PDF(0KB)
    In view of the increasing demand for talents in various regions, the demand prediction of talents has become a difficult problem in the current society. In view of this problem, this paper studies on the talent demand forecasting system based on Matlab.First of all, the basic elements of talent are analyzed. Secondly, the framework of talent demand forecasting system is analyzed,and the algorithm flow of BP neural network is described. Finally, the implementation of the system is introduced. This paper has certain positive significance to the regional talent introduction department and software designers.
    Related Articles | Metrics
    Design and Application of Students'Work Platform in Higher Vocational Colleges Based onWeChat Public Account
    HUAYan
    Computer & Telecommunication. 2017, 1 (12): 42-44.  
    Abstract     PDF(0KB)
    With the continuous development of mobile network and the popularization of terminal equipment, the college students with intelligent mobile phones are very normal. The construction of College Students’Work Platform sufficiently utilizing the advantages of new media technology, network technology and information technology, which plays a very important role to improve the college management level and efficiency. This paper designs a College Students’Work Platform based on WeChat public account,combining the education theory with the content and method of management. The platform is useful and easy to use, giving full play to the students’work.
    Related Articles | Metrics
    Research on the Construction of E-Commerce Project Teaching Resource Database
    YANG Ya-ping
    Computer & Telecommunication. 2017, 1 (12): 45-47.  
    Abstract     PDF(0KB)
    With the rapid development of information technology, higher vocational education begins to introduce the teaching resource database for e-commerce practice teaching. Based on the network information transmission platform, teaching resource database completes the corresponding teaching activities through resource integration in the network. This paper mainly discusses on the construction of e-commerce project teaching resource database. By analyzing the problems existing in the teaching resources integration,it puts forward related schemes.
    Related Articles | Metrics
    Research on the Detection and Prevention of Network Anonymous Proxy
    WANG Kun
    Computer & Telecommunication. 2017, 1 (12): 47-49.  
    Abstract     PDF(0KB)
    Anonymous proxy technology is the main means of bypassing network supervision. The abuse of anonymous proxy has disturbed the normal order of network society. Many network crimes are based on the anonymous proxy technology. In this article,we enumerate several means of detecting and preventing the anonymous proxy.
    Related Articles | Metrics
    Research on the EarlyWarning and Control System of Information Security Incident Based onWebsite
    ZHANG Shi-jun
    Computer & Telecommunication. 2017, 1 (12): 50-52.  
    Abstract     PDF(0KB)
    In view of the problem that the security of the website is constantly threatened, this paper designs an early warning and control system for information security incident. First of all, the requirements of the system are analyzed in detail. Secondly, the system is designed from three aspects of system architecture, network architecture and system functions. Finally, the implementation of some modules of the system is given.
    Related Articles | Metrics
    Research on the Framework and Application of Computer Network Space Security System
    YANG Fan
    Computer & Telecommunication. 2017, 1 (12): 53-55.  
    Abstract     PDF(0KB)
    The computer network security architecture includes multiple interoperable levels of hardware and software. It relies on the transmission control/Internet Interconnection Protocol for the communication and transmission activities of the internet. In this paper, the framework and application of computer network space security system are researched. Through the analysis of network security system framework, security level, etc., it puts forward the network security service and management model.
    Related Articles | Metrics
    Analysis of Abnormal Traffic Identification Technology Based on Network Protocol
    LIU Xiao-xiao
    Computer & Telecommunication. 2017, 1 (12): 56-58.  
    Abstract     PDF(0KB)
    This paper presents the abnormal traffic identification model based on network protocol; analyzes the network data layer combining with network protocol analysis and network intrusion detection technology; discovers the abnormal traffic IP address set through frequent IP address clustering, and counts the amount of abnormal data packets. With the simulation test of DDOS attack, it is proved that the model has high recognition ability and has good performance in terms of efficiency and calculation.
    Related Articles | Metrics
    Discussion on the Communication Security ofWireless Sensor Network
    MENG Na
    Computer & Telecommunication. 2017, 1 (12): 59-61.  
    Abstract     PDF(0KB)
    The rapid development of wireless sensor network brings more security problems, especially the security of communication.Because of the difference between wireless sensor network and traditional network, it is difficult to apply the security mechanism and protocol directly, so it faces more challenges. This paper analyzes the communication security problems of wireless sensor networks, and discusses on the key technologies.
    Related Articles | Metrics
    Network Security Analysis Method for Big Data
    TANG Jun-ming
    Computer & Telecommunication. 2017, 1 (12): 62-63.  
    Abstract     PDF(0KB)
    With the rapid development and progress of Internet technology, big data platform has begun to enter our vision.Cloud computing, cloud storage, distributed computing and other platforms have gradually formed a complete system. Based on the three aspects of the current situation of big data network security, the related analysis types, and the big data scenarios, this paper provides a theoretical basis for finding network vulnerabilities accurately and solving these insecurity factors timely.
    Related Articles | Metrics
    Discussion on Data Security in Cloud Computing Environment
    ZHANG Yuan-yuan
    Computer & Telecommunication. 2017, 1 (12): 64-66.  
    Abstract     PDF(0KB)
    According to the widely usage of data, data security has brought a series of problems. This paper firstly gives a brief analysis of data security in cloud computing environment; then gives the corresponding data safety protection strategy. It is hoped that this article can provide some suggestions and ideas for the relevant staff.
    Related Articles | Metrics
    An Anomaly Detection Algorithm Based on Artificial Immune Intelligence
    LIU Li-ping
    Computer & Telecommunication. 2017, 1 (12): 67-70.  
    Abstract     PDF(0KB)
    Network anomaly detection model can be used to detect unknown attacks, which has good scalability and it is the hot spot of intrusion detection system research. However, the existing anomaly detection methods have some problems such as high false positive rate and low detection efficiency, which can not meet the needs of high-speed network real-time detection. Combining artificial immune algorithm with network anomaly technology, an anomaly network detection algorithm based on artificial immune network (AIAIK) is proposed. Theoretical analysis and experimental results show that the algorithm has good characteristics such as immune network, nonlinear, immune memory and clonal selection of natural immune system, and the experimental detection effect is good.
    Related Articles | Metrics
    A Digital Fingerprinting System Based on Multicarrier Non-orthogonal Spread Spectrum
    HUANG Ling-zhen
    Computer & Telecommunication. 2017, 1 (12): 71-73.  
    Abstract     PDF(0KB)
    This paper introduces a digital fingerprinting system based on multicarrier non-orthogonal spread spectrum. Firstly,the application of digital fingerprinting and traditional techniques are briefly introduced, followed by descriptions of the different parts, key technologies and advantages of the non-orthogonal spread spectrum digital fingerprinting system. Finally, some open issues in this field are discussed.
    Related Articles | Metrics
    Design and Development of Advertising Auction Platform for Search Engine
    ZHU Ze-yu
    Computer & Telecommunication. 2017, 1 (12): 74-78.  
    Abstract     PDF(0KB)
    Search engine is one of the most important advertising media. The development of search engine advertising auction platform is conducive to the effective use of advertising resources. In this paper, a search engine advertising auction platform is designed to support the advertising users' self-quotation, and the distribution and pricing of advertisements are realized on the basis of collecting the bidding information. Then, the functional modules of the system are divided and defined according to the actual application background and business processes of auctions. Finally, the system is achieved based on the developing tools of MyEclipse6.0 and the back-end database of MySQL.
    Related Articles | Metrics
    Mobile Network Disk Client Design Based on Swift Object Storage
    DU Ji-kui
    Computer & Telecommunication. 2017, 1 (12): 79-81.  
    Abstract     PDF(0KB)
    Swift is an object storage system that provides a RESTful HTTP interface. It is an important component of Openstack.Swift storage has the advantages of data access flexibility, high data durability, high scalability, no single point of failure and so on.This article starts with the SDK analysis, then constructs a simulation file system for object storage, and discusses on the development of Android mobile network disk client based on open source object storage.
    Related Articles | Metrics
    Network Implementation of Remote Data Acquisition System Based on EmbeddedWeb Server
    ZHOU Qiu-sheng
    Computer & Telecommunication. 2017, 1 (12): 82-84.  
    Abstract     PDF(0KB)
    Based on practical work experience, the advantages of embedded Web Server system are briefly analyzed from three aspects: volume, system cost and embedded system operation. At the same time, the main configuration of embedded Web Server system is explored from Web Server architecture, embedded Web Server selection, and CGI working principle analysis. Finally,based on the LINUX platform, the development and network implementation of Web Server remote data acquisition system are analyzed,the realization process is pointed out, and the design experience is further summarized.
    Related Articles | Metrics
    Research on Single Sign-on Model in Cloud Computing Environment
    XU Da-xin
    Computer & Telecommunication. 2017, 1 (12): 85-87.  
    Abstract     PDF(0KB)
    Cloud environment construction is to manage the resource and service of different business systems in a unified way,to provide a unified interface for users. To ensure the safety of resources and services in cloud environment, and for the convenience of users to use these resources and services, the design for a single sign-on model is necessary. It can avoid repeated verification. On the basis of the analysis of the demand for cloud computing single sign-on, this paper designs the overall structure and process of the system.
    Related Articles | Metrics
    Research on Intelligent Scheduling Based on Improved Genetic Algorithm
    WANG Hai-bo
    Computer & Telecommunication. 2017, 1 (12): 88-91.  
    Abstract     PDF(0KB)
    This paper analyzes the soft constraints and hard constraints of the course scheduling problem, and abstracts the mathematical model for solving the problem of intelligent scheduling. The genetic algorithm is deeply analyzed. In view of the traditional genetic algorithm, the initial population is improved in the aspects of homogenization, fitness function, and mutation operator. The experiment proves that the improved algorithm is completely suitable for intelligent scheduling problem, and it has high efficiency,which provides a new idea for the development of scheduling problem.
    Related Articles | Metrics
    Research on the Teaching of Computer Graphics and Image Technology in University
    WANG Kai-yu
    Computer & Telecommunication. 2017, 1 (12): 92-93.  
    Abstract     PDF(0KB)
    According to the current teaching status of Computer graphics and Image Technology in university, this paper points out some problems in the teaching, puts forward corresponding measures for improvement, and explores the new teaching mode for universities in current stage.
    Related Articles | Metrics
    The Application of Computational Thinking in the Concept Teaching of Information Technology
    ZHU Li-hua
    Computer & Telecommunication. 2017, 1 (12): 94-96.  
    Abstract     PDF(0KB)
    The computational thinking is one of the important elements of the core accomplishment of the information technology subject. The new curriculum standard has established the "subject concept" system of information technology. In this paper, the basic model of "concept class" is put forward, and the whole subject theory system is constructed from the basic concept. We design scenarios, meaningful and valuable questions, guide students to think deeply in computational thinking mode, help them form computational thinking consciousness and improve computational thinking ability in analyzing and solving problems.
    Related Articles | Metrics
    Exploration on the New Teaching Methods of Vocational Animation Courses under the Background of "Internet +"
    HU Li-wen
    Computer & Telecommunication. 2017, 1 (12): 97-98.  
    Abstract     PDF(0KB)
    Combined with the demand of higher vocational students training under the background of“Internet +", this paper analyzes the status of animation course teaching, explores on the teaching reform from the aspects of teaching materials, teaching mode and training course. By using the innovative teaching concept and mode, it can improve the level of animation production
    Related Articles | Metrics
    A Project-driven, Incremental, Iterative, and Corrective Approach for C++ Teaching
    YU Yong-tao, ZHANG Yong-jun , LI Fen-fen
    Computer & Telecommunication. 2017, 1 (12): 99-101.  
    Abstract     PDF(0KB)
    C++ Programming is an important foundation course for computer and its related majors. C++ programming language is flexible and complicated, thus, students might feel difficult in learning this course. However, traditional teaching approaches mainly focus on knowledge imparting while ignoring to cultivate students to obtain abilities of analyzing and solving problems. This paper proposes a new C++ teaching approach, which aims to solve problems in practical projects. This approach combines function points in projects and C++ knowledge points; then by evolving project contents, the proposed approach can integrate knowledge imparting and ability cultivation of analyzing and solving problems. Practical teaching results demonstrate that the proposed approach can effectively enhance the teaching results of C++ programming course.
    Related Articles | Metrics
    The Simulation Experimental Analysis of High Frequency Electronic Circuit
    MAHai-yan, YANG Xi
    Computer & Telecommunication. 2017, 1 (12): 102-104.  
    Abstract     PDF(0KB)
    According to the characteristics and existing problems of high-frequency electronic circuit experiment teaching, corresponding simulation experiments are designed. It mainly uses the Simulink software, as well as the Pspice simulation software with analog and digital circuits to carry out the Matlab simulation experiment. This article mainly discusses on the high frequency electronic circuit simulation experiment, analyzes the process of Matlab simulation experiment of communication system and the circuit simulation experiment, and explains the experiment method.
    Related Articles | Metrics
    Study of the Difficulties and Measures at ARCH Remote B2B Market
    LIUWei-na
    Computer & Telecommunication. 2017, 1 (12): 105-108.  
    Abstract     PDF(0KB)
    This paper analyzes two of the biggest difficulties during ARCH remote selling: how to win the trusts from clients’ decision-making team, and how to turn the business chance into the real projects to promote? The author summarizes her experiences and draws the lessons during working these years, and puts forward her personal advises and considering about how to overcome those difficulties efficiently, hoping these suggestions in the paper be useful for the sales team.
    Related Articles | Metrics
    Research on Intelligent Modeling Methods
    LIWen-ting
    Computer & Telecommunication. 2017, 1 (12): 109-111.  
    Abstract     PDF(0KB)
    Intelligent modeling method is an effective way to realize the modeling of complex systems and is one of the key technologies to realize intelligent control. From the perspective of simulating and learning biology, this paper summarizes the current commonly used intelligent modeling and optimization algorithms; introduces the application and advantages and disadvantages of artificial neural networks, fuzzy logic, genetic algorithms and particle swarm optimization; points out the research hot spots and trends of intelligent modeling methods.
    Related Articles | Metrics
  News More  


  Links More  


Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd