Loading...
Acta Metallurgica Sinica
Home
IMR Journals
Subscription
Advertisement
Contact us
中文
Search
Citation
Fig/Tab
adv Search
Just Accepted
|
Current Issue
|
Archive
|
Featured Articles
|
Special Collection
|
Most Read
|
Most Downloaded
|
Most Cited
Table of Content
10 March 2018, Volume 1 Issue 3
Previous Issue
Next Issue
For Selected:
View Abstracts
Download Citations
EndNote
Reference Manager
ProCite
BibTeX
RefWorks
Toggle Thumbnails
Select
Discussion on the Influence Maximization of Social Network in the Teaching of Information Technology in Universities
CHEN Bo-lun, HUA Yong, YUAN Yan, LI Fen-fen, ZHANG Zheng-wei
Computer & Telecommunication. 2018,
1
(3): 1-3.
Abstract
PDF
(0KB)
The modeling and analysis of the influence maximization in social network is one of the key issues in social network analysis. Its research has great significance in both theory and practical application. In this paper, we use different characteristics to apply it to information teaching in colleges and universities, forming the social big data needed for theoretical analysis in the learning environment, and at the same time, these data lay a theoretical foundation. Through the results of theoretical research, the interests of the learners are recommended and the corresponding learning plans are made for some learners.
Related Articles
|
Metrics
Select
Analysis and Design of the Security System of the University Apartment
YIN Zong-ping
Computer & Telecommunication. 2018,
1
(3): 4-6.
Abstract
PDF
(0KB)
The security of students' apartment is the key work of the university. In this context, the study of the apartment safety information system will help to improve the efficiency and the level of the work. First of all, this paper carries out the demand analysis.According to the personal and property, group events, ideas and other security issues, the adopted methods are: video surveillance,electronic access control, fire alarm, dormitory distribution, asset management and maintenance, the mental health test, instant messaging, Internet behavior management, internal forum, big data security analysis. Then the system is designed. It is necessary to build a relatively independent security network of apartments, to meet the needs of users through different modules, and to realize the integration of modules.
Related Articles
|
Metrics
Select
Demodulation of Autocorrelation Signal Using RAKE Receiver
CAO Lei, TU Ze-xin, Li Zhi
Computer & Telecommunication. 2018,
1
(3): 7-9.
Abstract
PDF
(0KB)
This thesis analyzes the demodulation of autocorrelation signal aiming at short wave multipath effect,with RAKE receiver algorithm and characteristics of autocorrelation signals,the autocorrelation signal is demodulated by channel estimation, channel evaluation, multipath filtering and grouping. Simulation show that the processing of 3 - path signals can increase the demodulation success rate by 18%.
Related Articles
|
Metrics
Select
Teaching Reform and Practice of Integration in Mobile Application Development Courses under“Internet Plus”
CHEN Rong-zheng
Computer & Telecommunication. 2018,
1
(3): 10-12.
Abstract
PDF
(0KB)
Under the new economic form of Internet plus, this paper analyzes the development trend of mobile application development and the present situation of curriculum teaching. The teaching content of“standard leading and gradual progress”is formed;the cooperative curriculum model of“two sides involved, full of multidimensional, production and education integration”is put forward;innovative teaching methods of“contextualized project- based teaching as guiding, mobile teaching as supplement”is proposed;the course mobile learning platform with“digital campus + cloud computing + big data”is build; the evaluation criteria of classroom teaching behavior based on big data technology is established; and the curriculum teaching practice involved innovation and entrepreneurship education is implemented. Through the integration of teaching reforms, it improves the timeliness of teaching and enhances the employability of students.
Related Articles
|
Metrics
Select
Exploration and Practice of the Training Mode of Electronic Information Engineering Specialty Based on Post Demand——Taking the Electronic Information Engineering Specialty of Anyang Institute of Technology as an Example
DUAN De-gong, GAO Su-ling
Computer & Telecommunication. 2018,
1
(3): 13-15.
Abstract
PDF
(0KB)
Taking the post demand of electronic information as the breakthrough, this paper studies on the relevant positions and their descriptions in enterprises, by investigating the post demands for electronic information engineering specialty and combining with local realities. It explores on the innovative mode of training talents of electronic information engineering specialty, to provide reference and help for schools and professional teachers, and to serve for the cultivation of applied talents that adapt to the development of society and the needs of enterprises.
Related Articles
|
Metrics
Select
Design of Traffic Light Control System Based on KingView and PLC
WANG Liang-cheng, LI Shuo
Computer & Telecommunication. 2018,
1
(3): 16-18.
Abstract
PDF
(0KB)
Aiming at the requirements of traffic control at the busy intersection, this project designs a traffic light control simulation system based on KingView and PLC, which has also has the tidal lane control function besides the basic traffic control function.Through the co-simulation of Mitsubishi PLC and KingView, the project realizes the traffic control of intersection traffic and pedestrians.The real-time online monitoring is realized by using the simulation software of KingView to display the monitoring screen in real time. The project finally realizes the four-way intersection traffic light control system with tidal lane control function.
Related Articles
|
Metrics
Select
Study on the Security of Smart Home System
ZHENG Jian-guo
Computer & Telecommunication. 2018,
1
(3): 19-20.
Abstract
PDF
(0KB)
With the development of Internet of Things, the smart home system has been widely used, providing users with an intelligent home life experience. However, the smart home system also has some security risks. Therefore, it is necessary to strengthen the smart home system security program design, enhancing the security of smart home system. This article briefly describes the concept and architecture of smart home system, analyzes the its security model, and explores on the design of system security program,hoping to provide some reference.
Related Articles
|
Metrics
Select
Research on the Key Technologies of Mobile Intelligent Campus Service Platform
LUO Jin-ling, LIU Luo-ren
Computer & Telecommunication. 2018,
1
(3): 21-23.
Abstract
PDF
(0KB)
This paper studies on the key technologies of mobile intelligent campus service platform. It provides personalized information service for teachers and students by information mining, reducing information overload pressure; provides automatic adaptation to push information using mobile communication technology; unifies identity authentication framework and constructs open API interface, supporting the seamless integrated application for campus intelligent equipment; accesses to campus hot topic using clustering technology for the correct guidance of public opinion.
Related Articles
|
Metrics
Select
A Two-way Trimming Circuit Used for Bandgap Reference
CAI Liang-wei, LI Wen-jing, DENG Xiao-ying, LUO Rao-yu
Computer & Telecommunication. 2018,
1
(3): 24-27.
Abstract
PDF
(0KB)
A new two-way trimming circuit for bandgap reference is presented in this paper. This method is different from the one-way trimming used before, which makes the two-way trimming come true by the two-way resistance controlled by MOS switch. It can counteract the effect of production process very well. Under the simulation environment with 0.35um CMOS technology, results show that this circuit can greatly reduce the influence of technology fluctuation for the output voltage. Before trimming, the output voltage offset can arrive -5%~+7% under the worst-technology-case.This method that won’t consume additional power can promote output stability within ±2% after trimming.
Related Articles
|
Metrics
Select
Exploration and Research on Open Operation Teaching Mmodel Based on POPBL Concept
GUO Jie, ZHANG Mei-feng, HU Sheng-yao, GE Wei-min, ZHANG Yan, LIU Ke-qin
Computer & Telecommunication. 2018,
1
(3): 28-30.
Abstract
PDF
(0KB)
This paper analyzes on the necessity of establishing an open practice teaching mode, introduces the idea of POPBL into practice teaching, and runs through practical practice with problem-oriented and project-driven teaching. This paper puts forward a new train of thought for the operation of open practical teaching platform, reflects on the problems in operation,and gives some reasonable suggestions.
Related Articles
|
Metrics
Select
Study on the Teaching Reform of Electrical Engineering Foundation Based on the Cultivating Mode for Application-oriented Talents
AO Zhang-hong, SONG Si-jia, YANG Min-sheng, LI Jian-ying
Computer & Telecommunication. 2018,
1
(3): 31-33.
Abstract
PDF
(0KB)
Under the demand of the transformation and development of the applied university in our university, this paper probes into the teaching reform of the course of Electrical Engineering Foundation in our college. The main contents include teaching in small classes, encouraging students to teach, teaching with examples, explaining with simulation software, and combining teaching with certificate. These methods greatly improve the students' enthusiasm for learning, expand their knowledge, and cultivate students' abilities in many aspects, making students meet the requirements of applied talents cultivation.
Related Articles
|
Metrics
Select
Design and Implementation of Bandwidth Measurement System in Multi-Link Metropolitan Area Network
HUANG Jin-can, LU Ming-dian, DAI Chun-rong, DU Xiao-hong, HUANG Xian-xiang, BAIMA Duo-ji
Computer & Telecommunication. 2018,
1
(3): 34-36.
Abstract
PDF
(0KB)
This paper discusses on the design and implementation of a software system for automatic measurement of multi-link bandwidth in the Metropolitan Area Network with master and backup data communication links, using router policy routing function and operating system static routing function. The result shows that the system can reduce the influence of manual measurement on service and improve the working efficiency of network maintainers.
Related Articles
|
Metrics
Select
Analysis and Consideration of the Maintenance of Voice Core Network
CAOWei-jun
Computer & Telecommunication. 2018,
1
(3): 37-39.
Abstract
PDF
(0KB)
With the continuous development of telecommunications industry, building a voice core network structure and achieving a safe and stable operation environment are the important parts of the development of telecom industry in the new era. At present,Telecom Group is striving to build efficient network operation capability, and the effective maintenance of voice core network is the key to improve the safety and stability of network operation. From the two aspects of voice problem and network security problem,this paper analyzes the problems and their causes. On this basis, it expounds the maintenance and management measures of the voice core network, to ensure the safety and stability of the network.
Related Articles
|
Metrics
Select
IDC Core Network Design for Telecom Carriers
CHENWen-yao
Computer & Telecommunication. 2018,
1
(3): 40-42.
Abstract
PDF
(0KB)
From the basic telecom service to the IDC service, the telecom carriers have realized the transformation from the telecom hardware products to the telecom integrated services. The core network design is an important component of the construction for IDC. Based on several important principles of building a core system for IDC, in this paper, the key points of the design of core network architecture are put forward, around the four parts of the Internet access layer, the core layer, the server access layer and the operation management platform. The applications of firewall technology, virtual network congestion control and energy saving technology are also prospected from the future development of IDC and the key demand of customers. Through the good design of the core network, the telecom carriers can improve the core competitiveness of the enterprise and realize the sustainable and healthy development of IDC business.
Related Articles
|
Metrics
Select
Method of Integral Image Polynomial to Compute Central Moments and Hu Moments
GUO Yu-hang
Computer & Telecommunication. 2018,
1
(3): 43-45.
Abstract
PDF
(0KB)
Central moments are important features of image, from which Hu moments can be derived. A method of integral image polynomial is proposed to compute central moments of different regions in image and is applied to the computation of Hu moments.This method reduces the computation time of Hu moments in different positions and sizes. It can be used in image matching,object localization, etc.
Related Articles
|
Metrics
Select
An Enhanced Data Mining Method for Text Clustering
WEI Shuang
Computer & Telecommunication. 2018,
1
(3): 46-48.
Abstract
PDF
(0KB)
Text mining is based on the statistical analysis of a term. Usually in text mining techniques, the basic measure like term frequency of a term (word or phrase) is computed to judge the importance of the term in the document. But with statistical analysis,the original semantics of the term may not carry the exact meaning of the term. To overcome this problem, a new framework has been introduced which can efficiently find significant matching and related concepts between documents.
Related Articles
|
Metrics
Select
Brief Analysis on Key Storage Technologies of Large-scale Graph Data
XIN Gang
Computer & Telecommunication. 2018,
1
(3): 49-52.
Abstract
PDF
(0KB)
The storage paradigm of large-scale graph data directly affects the efficiency of graph data access, query and mining.With the development of the applications of large-scale graph data, distributed storage systems for large-scale graph data face more severe challenges. Many problems are very urgent to be resolved. This paper mainly focuses on three issues. Firstly, the background of the generation of large-scale graph data is introduced and the main challenges for distributed storage techniques are stated. Secondly,the state-of-art solutions to distributed storage of large-scale graph data are analyzed. Finally, remaining problems are summarized and possible directions for future research are discussed.
Related Articles
|
Metrics
Select
Research on University File Storage System Based on Blockchain
LIANG Zhi-yong
Computer & Telecommunication. 2018,
1
(3): 53-54.
Abstract
PDF
(0KB)
Blockchain technology comes from Satoshi Nakamoto and Bitcoin. It contains distributed data storage, point-to-point transmission, consensus mechanisms, encryption algorithms and other technologies. It is also one of the most secure information storage solutions now. The perfect combination of IPFS and blockchain enables users to use IPFS to store a large number of files, to ensure both the security of the file and the uniqueness of the file. This paper is based on IPFS, to improve and explore the traditional university file storage system.
Related Articles
|
Metrics
Select
Research on Geodetic Database System Based on WEB
CHEN Jiang
Computer & Telecommunication. 2018,
1
(3): 55-57.
Abstract
PDF
(0KB)
Aiming at the problems of insufficient information level in geodetic database system, this paper designs a geodetic database system based on WEB by combining network technology with database technology. Firstly, it designs the geodetic survey database,analyzes the database content and organizes relevant data; secondly, it analyzes and designs the network structure and functions;finally, partial implementation of the system is given. This paper has a certain positive significance for database managers and data researchers.
Related Articles
|
Metrics
Select
Research on the Application of Stereoscopic Display in Virtual Training System ofWatercraft
GONG Lin
Computer & Telecommunication. 2018,
1
(3): 58-60.
Abstract
PDF
(0KB)
In order to further enhance the scene reality of the virtual training system of watercraft and improve the efficiency of training, this paper firstly researches on the principle of stereoscopic display. Then based on the characters of the virtual training system of watercraft, it researches on the implementation of software and hardware in details. Finally, it probes into the technical difficulties in the operation process.
Related Articles
|
Metrics
Select
Research and Application of AO Parts Matching Based on JIT
ZHONG Hua
Computer & Telecommunication. 2018,
1
(3): 61-63.
Abstract
PDF
(0KB)
Based on the implementation of paperless parts matching project in the production process of enterprise JIT system,the paper studies on the paperless demand of AO bill in the assembly process of aviation enterprise. Through the manufacturing data of the collaborative platform PDM, the data source of assembly parts is guaranteed to be unique, which provides strong guarantee for the realization of JIT production in enterprises.
Related Articles
|
Metrics
Select
Research on the Application of Computer Software Data Interface
SONG Shi-mao
Computer & Telecommunication. 2018,
1
(3): 64-66.
Abstract
PDF
(0KB)
In recent years, with the rapid development of computer and network technology, computers are more active in people's vision, and the number of computer software is increasing. However, different types of computer software require different operating environments, seriously affecting the normal use of software by users. After the application of appropriate computer software data interface, the usage effect can be significantly improved. This paper describes the basic concept of computer software data interface and the principles to be followed in design, and analyzes its application status. The application mode is also discussed.
Related Articles
|
Metrics
Select
Executable Files Generating Methods in VFP
ZHAO Qing-qi
Computer & Telecommunication. 2018,
1
(3): 67-69.
Abstract
PDF
(0KB)
In view of the current VFP database programming, most programming methods encounter some problems due to improper control. This paper gives a brief analysis on the project manager; then followed by design, programming, production and repeated debugging, it makes the system installation disk, developing a complete application system with detachable VFP environment.It is also easy to be used.
Related Articles
|
Metrics
Select
Exploration on the Construction of Practical Teaching System of Computer Specialty in Applied Undergraduate Colleges
LU Xiao-ya
Computer & Telecommunication. 2018,
1
(3): 70-72.
Abstract
PDF
(0KB)
Practice teaching plays an important role in cultivating students' ability and ability to innovate. According to the professional brand construction of Computer Science and Technology in Shangqiu Institute of Technology, this paper expounds some methods in the practice of curriculum system and practice teaching reform, constructing the practice teaching system with the characteristics of "cooperation between school and enterprise, combination of internal and external", to provide reference for computer professionals of local application-oriented colleges.
Related Articles
|
Metrics
Select
Research on Mobile Terminal Software Development Based on Java
ZHANG Ling-zhi
Computer & Telecommunication. 2018,
1
(3): 73-75.
Abstract
PDF
(0KB)
The production of a large number of mobile devices has made more and more people pay their attention to the development of mobile software. By developing various kinds of mobile terminal software, they can effectively meet people's needs in life,learning and production, which have greatly promoted the social and economic growth. This paper discusses on the application advantages of Java in mobile terminal software development, analyzes the impact of Java on mobile terminal software architecture,and takes the development of mobile terminal encryption software as an example to explore the development process of mobile terminal software based on Java.
Related Articles
|
Metrics
News
More
Links
More
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd