Loading...
  • Table of Content
      10 December 2018, Volume 1 Issue 12 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    Research on IIC Parallel Signal Transformation Method Based on Circuit System Network
    CHEN Zhi-hong WUFeng-jie CHEN Wei-tao LIANGZi-hui
    Computer & Telecommunication. 2018, 1 (12): 1-3.  
    Abstract     PDF(0KB)
    This paper describes how to use the circuit system network to decode the IIC serial signal in non-acknowledge mode into a parallel signal for microcomputer reception. In the process of signal transmission, the working time of receiving IIC signal can be reduced as much as possible without changing the original information and transmission time, so as to save computer resources and improve working efficiency.
    Related Articles | Metrics
    Design of Intelligent Home Control System Based on STM32
    LIZhi-kai JIANGGui-sheng YU Li-hong LIJian-hua
    Computer & Telecommunication. 2018, 1 (12): 4-7.  
    Abstract     PDF(0KB)
    In order to design a smart home control system that is easy for users to use, this system takes STM32F103 microcontroller as the control center and combines hc-05 Bluetooth module, non-ad hoc voice recognition module and GSM module to form a set of multi-functional control system.The system usesMQ-2 smoke sensor, HC-SR501 human induction module, DHT11 temperature and humidity sensor and relay to detect and process the indoor environment, and then displays the indoor environment status through TFT display screen.The system can control indoor lighting, curtains and fans through mobile phones with Bluetooth function and user voice.In an emergency, alert the user by sending an alarm text message within 10 seconds using the GSM network. The system has the advantages of good performance, simple operation, low cost and so on.
    Related Articles | Metrics
    Simulation Analysis of Power Amplifier Circuit Based on Multisim
    LIU Jia-ju HOU Ya-ling
    Computer & Telecommunication. 2018, 1 (12): 8-10.  
    Abstract     PDF(0KB)
    In this paper, the Multisim software simulation method is used to simulate and analyze the class B complementary symmetrical amplifier circuit. Through analyzing the output waveform of the circuit load, the crossover distortion easily occurred in the power amplifier is observed. After two diodes are connected in series to the bases of the two triodes, the bias voltage is provided to set the static operating point slightly higher than the cutoff point, so that the amplifier operates in the class A and B amplification state, effectively eliminating the crossover distortion. Simulation and analysis show that Class B power amplifier is an important way to realize miniaturization, high efficiency and high power amplifier.
    Related Articles | Metrics
    Promoting the Construction of Innovative Software Teaching Team by Combining Teaching and Scientific Research——A Case Study of Guangzhou City Polytechnic
    HUANG Ren-wei
    Computer & Telecommunication. 2018, 1 (12): 11-14.  
    Abstract     PDF(0KB)
    Higher vocational colleges shoulder the responsibility of training high-quality skilled personnel. Teaching team is the core force of personnel training. It plays an important role in professional construction, curriculum construction, teacher construction, teaching research, scientific research and social services. Starting with the definition of teaching team, this paper introduces the general situation of software teaching team in Guangzhou City Polytechnic, expounds the necessity of the combination of teaching and scientific research and the construction of teaching team, and summarizes the concrete aspects of system construction, teacher team, student training, teaching research, scientific research, social service, etc.
    Related Articles | Metrics
    Research on the Construction of Java Knowledge Map in the Background of Big Data
    LI Xiao-hong LU Xiang-feng DONGBao-lian
    Computer & Telecommunication. 2018, 1 (12): 15-17.  
    Abstract     PDF(0KB)
    Aiming at the problems of students' poor grasp of organizational structure, insufficient understanding of knowledge difficulty, unplanned learning and weak learning purpose in the course of Object-oriented Programming(Java).The research on the construction of Java knowledge map is proposed in this paper under the background of big data. Under the background of big data, a result-oriented Java knowledge map for teachers and students is constructed from three links of knowledge points acquisition and thermal analysis by using web crawler, knowledge point association mining by using Numpy database and knowledge map visualization.The map contains not only the relationship between knowledge points, but also the difficulty of knowledge points and students'mastery of knowledge points. It can be used not only as a navigation of learning knowledge, but also as a means of process evaluation. Through practical application, it is very useful for the design of difficult content and for the mastery of students'knowledge structure, and the breakthrough of key and difficult points in teachers' teaching. It tries to provide reference for the construction of knowledge map of other programming courses.
    Related Articles | Metrics
    AI Traffic Management System Based on Internet of Things —— Design and Implementation of Key Part of Intelligent Zebra Crossing
    HUANG Yao-lin CHEN Zhi-zhong WANG Hao-yang LIU Jun-bo SUN Jia-xue
    Computer & Telecommunication. 2018, 1 (12): 18-19.  
    Abstract     PDF(0KB)
    With the improvement of people living standards and the increasingly rapid pace of modern life, cars have almost become a necessary travel tool for every family. What follows is a sharp increase in the number of traffic accidents. The latest traffic regulations of 2018 show that there is always a contradiction between people and cars. In the face of many intersections, uninterrupted time, only rely on the traffic polices to maintain order at intersections, often unable to do their best. Through intelligent monitoring based on the Internet of things, the system can automatically monitor and warn passers-by running red light, combine with voice prompt, intelligently change the color of zebra crossing, and so on. The standard management of pedestrian crossing is realized without artificial intervention, the phenomenon of pedestrian running through red light is reduced, the probability of traffic accident is reduced, and a safe and harmonious urban traffic environment is constructed.
    Related Articles | Metrics
    Research on Algorithms of Automatic Recognition and Disambiguation of Tibetan Free Functional Words in Tibetan Historical Documents Recognition
    ZHUO Ma-ji
    Computer & Telecommunication. 2018, 1 (12): 20-22.  
    Abstract     PDF(0KB)
    Functional words, as an important component of Tibetan literature, has caused great difficulties in the process of document recognition. Based on the traditional Tibetan grammar and grammar rules, this paper mainly studies and puts forward three kinds of recognition algorithms for a large number of Tibetan free function words in Tibetan historical documents, and establishes a rule base of 284 rules for Tibetan free function words disambiguation. In the process of digitalization, the ambiguity of unfree function words in Tibetan sentences can be quickly identified and eliminated, and the accuracy of automatic identification of Tibetan documents can be improved.
    Related Articles | Metrics
    An Improve Collaborative Filtering Recommendation Algorithm Based on Item Similarity Measurement
    YANG Yao-ke
    Computer & Telecommunication. 2018, 1 (12): 23-.  
    Abstract     PDF(0KB)
    In most traditional collaborative filtering algorithms, user rating matrix is usually an only important factor in calculating users’ similarity instead of considering the impact of the correlation between items. Therefore, an improved model of collaborative filtering recommendation is presented in this paper. Firstly, a method of item similarity measurement is introduced in the process of computing the user’s nearest neighbor to get more appropriate neighbors. In addition, due to that the users interests will decay over time, time weight is added in the process of computing item ratings.Experimental results show that the proposed algorithm can obtain better performance than other traditional collaborative filtering algorithms in aspects of prediction accuracy and classification accuracy.
    Related Articles | Metrics
    Temperature and Humidity Monitoring System Based on ZigBee
    ZHAO Rong-yang LIANG Jia-hai ZHAO Hua-jun
    Computer & Telecommunication. 2018, 1 (12): 28-31.  
    Abstract     PDF(0KB)
    Based on the ZigBee wireless transmission technology, the system chooses the intelligent solution of TI company, taking CC2530 as the control core. It realizes the data acquisition of temperature and humidity through DTH11 sensor. The MySQL database is used to store the temperature and humidity information, and the functions of server side data display, query and dynamic analysis are realized. In addition, users can send control commands remotely on servers and mobile application terminals by preset thresholds, change the level signals of the corresponding I / O ports, and automatically call control modules to adjust the state of devices such as relays, infrared transmitters, etc. In order to change the heating, cooling, drying and humidifying state of the controlled appliances, the remote operation of the temperature and humidity monitoring system is completed.
    Related Articles | Metrics
    Research on the Application of WeCha tPublic Platformin Teaching Management and Reform in Colleges
    GAOWei-min
    Computer & Telecommunication. 2018, 1 (12): 32-35.  
    Abstract     PDF(0KB)
    Using modern educational technology to carry out teaching and research activities through mobile Internet media is an innovation of the working mode of teachers and an attempt and exploration of new technologies, new platforms and new models in the field of education. WeChat public platform has rich information resources and diverse sharing services. WeChat's acquaintance circle communication effect and convenient communication and sharing characteristics provide an excellent interpersonal communication atmosphere for the academic community, which can promote the exchange and communication between teachers and students in the region. The WeChat public platform creates a collaborative, relaxed and equal working atmosphere, which optimizes the teaching activities of teachers and students. The idea of designing and developing the teaching management of WeChat public number is put forward, and an interactive mobile assistant platform is constructed to change the traditional teaching and management mode of colleges.
    Related Articles | Metrics
    Research on Skill Competition System of Vocational Colleges of Computer Specialty
    YUANJing-song YANG Wei-ming
    Computer & Telecommunication. 2018, 1 (12): 36-38.  
    Abstract     PDF(0KB)
    The skill competition of vocational colleges plays an active role in promoting the professional quality of high-skilled talents and accelerating the cultivation of high-skilled personnel. This paper analyzes the current situation and existing problems of skill competition in vocational colleges for computer specialty, and has carried out a detailed study on the construction of vocational colleges' skill competition system, which is used as a reference for vocational colleges to revise the skill competition system.
    Related Articles | Metrics
    Research on Big Data Technology of Environmental Protection and Training of Applied Talents in Higher Vocational Colleges
    LIU Bei-xiong ZHANGJiang-li XIAO Qiao-ling ZENG De-sheng
    Computer & Telecommunication. 2018, 1 (12): 39-42.  
    Abstract     PDF(0KB)
    In view of the rapid development of big data technology, higher vocational colleges need to adjust the vocational education plan in time. Through in-depth visits to big data enterprises, environmental protection enterprises and higher vocational colleges, this paper studies and combs the demand for talents, jobs and knowledge skills facing big data of environmental protection, and sets up corresponding courses to provide references for setting up big data application with environmental protection characteristics, technical specialty and formulating relevant personnel training programs.
    Related Articles | Metrics
    Design and Development of Experiential Teaching Software for Computer Major in the Open University of China Based on AR
    XIAO Jian-hua
    Computer & Telecommunication. 2018, 1 (12): 43-45.  
    Abstract     PDF(0KB)
    AR is a new type of multimedia computer technology, which integrates pattern recognition technology, machine learning technology, multimedia reality technology and 3D modeling technology to create an intelligent, interactive, immersive system combining virtual and real. The design of experiential teaching software for computer specialty provides strong support for the application and dissemination of AR technology. It can create an assembled development environment according to actual needs, extend and stretch the software development environment currently used, and intuitively display the software development process with the help of various types of modeling components. The users needn't purchase or construct a large-scale application environment. The virtual world and the real world are seamlessly linked so as to improve the learning efficiency of students in the Open University of China.
    Related Articles | Metrics
    Research on the Application Strategy of Virtual Simulation Experiment Platform Driven Teaching
    HUANGNing
    Computer & Telecommunication. 2018, 1 (12): 46-49.  
    Abstract     PDF(0KB)
    Today Information technology has been widely used in higher vocational education. However, how to integrate information technology with classroom teaching to improve teaching effect is still puzzling teachers and students. In this paper, the idea of driving teaching through virtual simulation learning platform is put forward. Taking Python Programming as an example, the architecture and implementation scheme of virtual simulation learning platform are presented, and its construction and application are analyzed and discussed.
    Related Articles | Metrics
    Image Encryption of Two-direction Folded Diffusion Chaotic System Based on Shuffle Algorithm
    ZHAO Yin
    Computer & Telecommunication. 2018, 1 (12): 50-55.  
    Abstract     PDF(0KB)
    Aiming at the scrambling of pixel position, in order to weaken the periodicity of encrypted ciphertext, a two-direction folding diffusion chaotic system encryption method based on shuffling algorithm is proposed. The simulation results show that the algorithm can not only resist differential attack, statistical analysis, strong key sensitivity, but also effectively resist ciphertext attack. Moreover, the key space is large and the encryption effect is good.
    Related Articles | Metrics
    Design of an Image Retrieval System Based on Content
    WEI Shuang
    Computer & Telecommunication. 2018, 1 (12): 56-59.  
    Abstract     PDF(0KB)
    With the rapid growth of network data, the requirement of image retrieval is becoming higher and higher. This paper introduces the text-based image retrieval system and content-based image retrieval system, and puts forward a retrieval system based on image content and its implementation method. The system uses image color, texture and edge as feature information, and applies these features to retrieval after processing. This system is more accurate and more efficient than text-based retrievalsystem.
    Related Articles | Metrics
    New Mode of Interface Automation Test Based on the Layout of Test Process Flow Chart
    XIAO Chan-chanAI Di-anLIUShu-ting
    Computer & Telecommunication. 2018, 1 (12): 60-65.  
    Abstract     PDF(0KB)
    At present, the industry functional interface automation test basically relies on the development capability of the script, and has the pain points of high learning curve, high threshold, high input cost, slow response demand and small audience range. By analyzing these pain points, this paper proposes a new mode of interface automation test based on the layout of test process flow chart which is simple and efficient,and develops the corresponding application products based on this model. With the product, the real-time transaction interface, clear settlement interface and database test are realized. At last, the feasibility and advantages of the model are explored and verified from various aspects such as application practice and application effect.
    Related Articles | Metrics
    Research on Automatic Proofreading Method of Chinese Text Sensitive Information
    GONG Yong-gangWANG Xin-yuLI Yu-yingWANG Yun-qi
    Computer & Telecommunication. 2018, 1 (12): 66-69.  
    Abstract     PDF(0KB)
    Aiming at the problem of automatic proofreading of sensitive information in a large number of text content, this paper presents a method of automatic correction of sensitive information based on rule and SVM. Based on prohibited words and cautious words in News and Information Reporting of Xinhua News Agency and relevant central documents and online texts, sensitive information is classified into different categories. According to each category, classifying rule library is built, corresponding automatic rule processing algorithms are designed, and automatic correction to sensitive information is also available. Meanwhile, by applying SVM model to emotional analysis of rule processing results, false positives are greatly reduced. The test results show that the recall rate and accuracy rate of this method are 89.98% and 98.31%, and it can process more than 100,000 words per second of text content and solve the key issues and difficult problems in practical engineering applications.
    Related Articles | Metrics
    A Congestion Control Mechanism for Improving Fairness of TCP and UDP Data Flow
    Wang Gang
    Computer & Telecommunication. 2018, 1 (12): 70-73.  
    Abstract     PDF(0KB)
    UDP flows in the business gradually occupies most of the network bandwidth. How to obtain congestion control of UDP packets in network layer is very important. When network is congested, due to the lack of feedback mechanism to UDP packet itself, eventually lead to packet loss or serious consequences that seize the bandwidth of TCP datagram. In this paper, we apply the congestion control mechanism based on the transmitter buffer queue management on the network layer to balance TCP and UDP bandwidth use, and establish an efficient flow control strategy on the router ICMP network congestion error message handling, and conduct network simulation. Experimental results show that the congestion control based on the mechanism can effectively improve network bandwidth usage of different service flow unfairness.
    Related Articles | Metrics
    Construction and Research of University Card Data Monitoring Platform
    WEI Gang
    Computer & Telecommunication. 2018, 1 (12): 74-77.  
    Abstract     PDF(0KB)
    The university smart card is an important part of the smart campus construction project. One-card integrates information service, identity identification, financial services, consumer information and other important data of college students. How to monitor the smart card data is the focus of scientific management of university logistics department. In this paper, the university card data monitoring platform is studied, and the real-time monitoring and management of the card financial consumption data, identification data and book lending data are realized by using mobile Internet technology, which provides data support for the daily management of logistics departments. One-card data monitoring platform uses Storm real-time stream processing computing framework for real-time monitoring of data. Using this platform can effectively improve the daily management of logistics management departments, and provide data sources for other departments as a data sharing center.
    Related Articles | Metrics
    Design of Accounting Risk Prevention of Financial Terminal Application System
    HE Guang-rong CHI Feng-li ZHENG Ming-du
    Computer & Telecommunication. 2018, 1 (12): 78-83.  
    Abstract     PDF(0KB)
    This research is proposed on the analysis and classification of the account risk of the financial terminal to put forward the corresponding design principles and schemes of risk prevention. A new generation of a unified platform for financial terminal application integrating accounting risk prevention is developed, which is applied to the operation of tens of thousands of financial terminals of a large domestic bank. Practice shows that the risk prevention scheme proposed in this research can effectively enhance the financial security of banks and users and can significantly reduce the number of accounting disputes between banks and financial end-users.
    Related Articles | Metrics
    Analysis of WSN Network Security Management Mechanism
    FAN Miao-miao
    Computer & Telecommunication. 2018, 1 (12): 84-86.  
    Abstract     PDF(0KB)
    Most applications of WSN are based on the location information of nodes. The events monitored by WSN are closely related to the physical location information of nodes. Without location information, the monitoring data is meaningless, and the location information of nodes is closely related to network security. Therefore, the network security management of WSN is very important. This paper briefly describes the characteristics and applications of WSN, analyses the network security characteristics and requirements of WSN, and discusses two kinds of network security management mechanisms of WSN: key management and security location.
    Related Articles | Metrics
    Multi - computer Communication Technology and Anti - interference Method Based on PC and Single Chip Microcomputer
    GE Kun
    Computer & Telecommunication. 2018, 1 (12): 87-88.  
    Abstract     PDF(0KB)
    Under the new situation, the overall production level of our society has gradually improved, further affecting the application range of PC and MCU with good performance. On this basis, in order to ensure that the functionality of PC and SCM is good enough to improve its potential value, it is necessary to effectively implement the multi-machine communication technology and anti-interference method based on PC and SCM, and help to strengthen the practical application effect of the equipment, so as to improve its level in long-term practical application and further meet diversified demands. Therefore, the multi-machine communication technology and anti-interference method based on PC and MCU are fully considered, and the specific application work is carried out to ensure good application conditions. Based on this, this paper mainly probes into the multi-computer communication technology and anti-interference method based on PC and MCU.
    Related Articles | Metrics
    Exploration and Practice on the Cultivation of Innovative and Entrepreneurial Ability of Computer Majors in Secondary Vocational Schools
    ZHANG Xue-hong
    Computer & Telecommunication. 2018, 1 (12): 89-91.  
    Abstract     PDF(0KB)
    Innovation leads to the prosperity and development of the country. In recent years, the country attaches great importance to innovation and entrepreneurship education. How to cultivate students'innovation and entrepreneurship ability is the opportunity that secondary vocational schools are facing at present. Based on the reality of secondary vocational schools, this paper explores on the perspectives of educational philosophy, teaching mode, curriculum setting and educational platform, so as to promote the training of innovative and entrepreneurial talents, comprehensively enhance the knowledge and potential of secondary vocational students, and make them useful persons for social development.
    Related Articles | Metrics
    Discussion on the Integration of Traditional Culture into the Teaching of Information Technology in Secondary Vocational Schools
    Computer & Telecommunication. 2018, 1 (12): 92-94.  
    Abstract     PDF(0KB)
    The Chinese culture has a long history for thousands of years.After years of washing, a large number of excellent traditional classics have been deposited. Especially for secondary vocational school students, learning from the essence of traditional culture can cultivate their feelings of home and country and spirit of social care, help them to learn to constantly strive for self-improvement, and play an irreplaceable role in shaping their personality, cultivating their sentiments and morality. But how to integrate traditional culture education into information technology teaching in secondary vocational schools and make students understand the excellent spirit of traditional culture? After years of practice, the author brings some operable demonstrations of traditional culture teaching, which enables students to bathe in the sunshine of culture.
    Related Articles | Metrics
  News More  


  Links More  


Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd