Loading...
  • Table of Content
      10 July 2020, Volume 1 Issue 7 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    Research on the Intrusion Detection Method Based on Machine LearningAlgorithm
    WANG Yu HE Zhen-xiang
    Computer & Telecommunication. 2020, 1 (7): 1-3.  
    Abstract     PDF(0KB)
    In recent years, "WannaCry" and other ransomware network security problems have emerged in an endless stream, causing immeasurable damage to the Internet. The network intrusion detection system plays an important role in protecting the computer as an effective second gate to make up the firewall against network threats. This article firstly introduces the definition and research sta- tus of intrusion detection. Secondly, it introduces the machine learning algorithms and their general processes for solving cyberspace security problems. The specific applications of machine learning in intrusion detection are introduced, especially random forest algo- rithm, Bayesian algorithm and other mainstream machine learning algorithms in the progress of intrusion detection; finally, the de- velopment direction of machine learning algorithms in intrusion detection systems is discussed.
    Related Articles | Metrics
    Exploration on Experiment Teaching Reform Based on Computer Network Teaching Platform
    HOU Hui-ling
    Computer & Telecommunication. 2020, 1 (7): 4-6.  
    Abstract     PDF(0KB)
    With the widespread application of computer technology, the training of computer network technology personnel has be- come the main goal of university teaching reform. Computer network teaching is an important way to train technical talents. Most of the universities and colleges have generally opened computer network courses, but there are still many problems in the experimental teaching, resulting in unsatisfactory experimental teaching effect. Aiming at the problems and shortcomings in the experiment teach- ing of computer network course, this paper designs the reform content of experiment teaching and computer network teaching, and puts forward the experiment teaching reform strategies based on computer network teaching platform.
    Related Articles | Metrics
    Design and Implementation of Commodity Pinyin Search System Based on Solr
    YU Li-yi
    Computer & Telecommunication. 2020, 1 (7): 7-10.  
    Abstract     PDF(0KB)
    In the commodity search system based on Solr full-text search technology, this paper uses the third-party Chinese word breaker on the Chinese search information entered by the user segmentation, inquiry commodity index database based on segmenta- tion results, but it ignores the case which the user enters pinyin to search. By analyzing the grammatical structure of Chinese pinyin, the pinyin word segmentation methods are designed, using a proprietary lexicon of e-commerce to construct a Chinese pinyin li- brary, and implementing a commodity search system based onAjax pinyin input prompts to improve the deficiencies in the search in- put method.
    Related Articles | Metrics
    Cultivation of College Students' Multimedia InnovationAbility under the Background ofApplied Talents
    ZHAO Man-xu
    Computer & Telecommunication. 2020, 1 (7): 11-13.  
    Abstract     PDF(0KB)
    At present, most of the newly-established local universities focus on training high-quality applied talents, and the basic knowledge teaching and innovative application ability training of applied talents need to be realized by the computer general educa- tion course. The general education related to computer is a hot research topic in the current education field. This paper analyzes the current situation and existing problems of public computer general education courses in our school. It promotes the reform from the aspects of teaching target reform, teaching method selection, teaching content setting, and the improvement of assessment and evalu- ation system, to cultivate the multimedia innovative application ability of college students.
    Related Articles | Metrics
    ANovelAdaptive Beamforming OptimizationAlgorithm for 5G
    LIANG Huan-hui JIAN Bi-yuan
    Computer & Telecommunication. 2020, 1 (7): 14-16.  
    Abstract     PDF(0KB)
    5G standard uses millimeter wave band to realize communication. In order to cover more reasonable in 5G communication system, beamforming technology must be adopted. To speed up the convergence, a novel algorithm based on the SWO criterion is proposed which can be applied in millimeter wave communication. The simulation results show that compared with other beamform- ing algorithms, the proposed algorithm can achieve higher convergence speed and is more realizable.
    Related Articles | Metrics
    Design of Vehicle Retrieval System Based on VGGNet Color Recognition
    GU Si-si HU Le-hua
    Computer & Telecommunication. 2020, 1 (7): 17-20.  
    Abstract     PDF(0KB)
    The Convolution Neural Network(CNN) in Deep Learning has a strong anti-jamming ability for image translation, rota- tion and other transformations. Compared with the traditional vehicle recognition technology, it can extract deeper and richer image information. Based on the VGGNet structure and simulating the order of human eyes' perception of vehicle characteristics, this pa- per designs a hierarchical retrieval system for vehicle image database. Firstly, a CNN which can recognize eight kinds of colors is constructed and trained to recognize the color of the target vehicle. Then, SIFT and LBP features are combined to match and retrieve the same color candidate vehicle database. The hierarchical retrieval mode of the system can effectively reduce the scope of retrieval and improve the efficiency of retrieval. The fusion of multi features can also guarantee the extraction of enough image information and ensure the accuracy of retrieval.
    Related Articles | Metrics
    Research on the Intrusion Detection Method Based on Machine LearningAlgorithm
    JIANG Yi ZHU Jun-wu
    Computer & Telecommunication. 2020, 1 (7): 21-24.  
    Abstract     PDF(0KB)
    In recent years, "WannaCry" and other ransomware network security problems have emerged in an endless stream, causing immeasurable damage to the Internet. The network intrusion detection system plays an important role in protecting the computer as an effective second gate to make up the firewall against network threats. This article firstly introduces the definition and research sta- tus of intrusion detection. Secondly, it introduces the machine learning algorithms and their general processes for solving cyberspace security problems. The specific applications of machine learning in intrusion detection are introduced, especially random forest algo- rithm, Bayesian algorithm and other mainstream machine learning algorithms in the progress of intrusion detection; finally, the de- velopment direction of machine learning algorithms in intrusion detection systems is discussed.
    Related Articles | Metrics
    Research and Exploration on Smart FinancialAid in Colleges and Universities in the Background of Big Data
    ZHENG Dan ZHOU Xiao-long
    Computer & Telecommunication. 2020, 1 (7): 25-27.  
    Abstract     PDF(0KB)
    Student financial aid of universities plays an important role in ensuring the fairness and justice of higher education. With the development of society and the times, the traditional student financial aid methods have fallen into trouble, and the realization of precise aid has become the new trend. Informatization means and big data can improve the accurate identification of poverty-striken college students, and then achieve accurate aid. The application of big data technology in student financial aid will provide new ideas and technical support for innovative of student financial aid, and it will also be an innovative model for strengthening student financial aid management.
    Related Articles | Metrics
    The Fifth RMB Face Value Recognition System Design Based on MATLAB
    LIU Li-pei MAYu-xing LU Ya-ting WANG Qiang YANG Zhuang
    Computer & Telecommunication. 2020, 1 (7): 28-31.  
    Abstract     PDF(0KB)
    To solve the problems of accuracy and speed of the fifth set of RMB face value recognition, a design method of RMB face value recognition system based on MATLAB and image processing technology is given. The collected banknote images are pro- cessed by five modules: rotation correction, image preprocessing, image positioning, face value cutting and face value recognition. The experimental results show that the system can accurately calculate the total amount of money input while recognizing the face value of banknotes quickly in real time.
    Related Articles | Metrics
    Research on the Digital Learning Resources Cloud Classroom Practice of Community Education
    YUAN Liang
    Computer & Telecommunication. 2020, 1 (7): 32-34.  
    Abstract     PDF(0KB)
    The renewal and development of the Internet new media information dissemination make the education content and teach- ing method of the network community change to the direction of digitalization, miniaturization and synergy. With the help of online learning platform, some regions have built up perfect cloud classroom teaching and learning management platform, breaking through the limitation of time and space of professional theory and social practice education, paying attention to the summary and planning of the important and difficult knowledge of the curriculum, strengthening the coordinated promotion of the teaching con- tents, teaching methods and management modes inside and outside the curriculum, and developing the teaching evaluation of teach- ers and learning subjects in the cloud classroom platform, to improve the quality of community expertise and vocational education.
    Related Articles | Metrics
    The Construction of Intelligent Talent Cultivation Plan Compilation and Revision System in Colleges
    TANG Huai
    Computer & Telecommunication. 2020, 1 (7): 35-38.  
    Abstract     PDF(0KB)
    In view of the shortcomings of the traditional way of using office software to compile talent cultivation plan, this paper de- velops a talent cultivation plan compilation and revision system based on B/S architecture, and makes distributed management and storage of accumulated data during years of talent training, which is conducive to data analysis and utilization. Based on the actual situation of talent cultivation plan compilation and revision in colleges under the background of big data, this paper makes a detailed demand analysis of talent cultivation plan compilation system, puts forward the overall structural design scheme of the system and elaborates some core functions. Through practical application, the system can effectively complete the work of talent training pro- gram compilation, and carry out data analysis and extraction, reduce the repetitive work in the program formulation process, and im- prove the work efficiency and quality.
    Related Articles | Metrics
    The Operation Management System of Electric Vehicle Based on NB-IoT
    WANG Hao ZHONG Yu-qing LIN Ze-bing CHEN Li-ye ZHOU Teng
    Computer & Telecommunication. 2020, 1 (7): 39-42.  
    Abstract     PDF(0KB)
    In recent years, the reduction of the earth’s available resources has restricted social development, and domestic energy de- mand is far greater than energy production. In order to change the single mode of energy and accelerate the transformation of the en- ergy system, China's electric vehicle industry develops rapidly and the number of electric vehicles increases significantly. But the in- frastructure of electric cars including charging and monitoring is still lagging behind. Combining electric vehicles with "Internet +" to form NB-IoT electric vehicle operation management system can expand its development prospects in the consumption of renew- able energy and energy storage, break through the limitations of current development of electric vehicles, and make great achieve- ments in charging management, remote monitoring and rental charge of electric vehicles.
    Related Articles | Metrics
    Practical Exploration on the Second Classroom Based on Classroom Teaching of Electronic Information
    LI Zhu ZHANG Jin-jun JI Ya-fang WEI Yong-xia
    Computer & Telecommunication. 2020, 1 (7): 43-46.  
    Abstract     PDF(0KB)
    In order to improve the all-round development of students' knowledge, ability and quality, based on the discussion on the ne- cessity and practice principle of the second classroom, this paper mainly introduces two kinds of second classroom practice activities. According to the analysis of the questionnaire, most students consider that the second classroom practice is conducive to self-develop- ment.At last, it also gives the points that should be paid attention to when carrying out the second classroom practice activities.
    Related Articles | Metrics
    Design of Precision Control Drive Circuit for LED High Power Lamp
    ZENG Su-qiong LIN Jian-bing LI Yu-peng
    Computer & Telecommunication. 2020, 1 (7): 47-50.  
    Abstract     PDF(0KB)
    This paper designs a precise control drive circuit for LED high power lamp. It takes the STC89C52 single chip microcom- puter chip as the control core, selects the PT4115 as the LED power supply chip, uses the PWM to adjust the brightness mode, and re- alizes the adjustment of brightness. The LED has good characteristic of constant current, little change of light color. The circuit can be controlled by key or infrared light, and provides over-voltage and over-current protection. Through experiments, the circuit has good stability and can be adjusted by software program, which can realize multi-stage and even stepless dimming and achieve accurate dim- ming.
    Related Articles | Metrics
    Consumption Behavior Guidance and Risk Prevention of College Students Based on Big Data
    WANG Chen-hao JIAHai-tian
    Computer & Telecommunication. 2020, 1 (7): 51-.  
    Abstract     PDF(0KB)
    Students' personal information, learning information, behavior track and other data which originally recorded in isolated business application systems will be extracted, cleaned and transformed in the data center of smart campus. The "virtual image of the main body" is realized through big data technology, which supports decision analysis and early warning research and judgment di- rectly or indirectly. Based on the limited consumption related behavior data of students in school, this paper studies on how to reflect the consumption level of students in time, predict the consumption trend, and guide them to open up sources and reduce expenditure. Finally, a formula is designed for assessing risk when deal with the risk websites which committed by students themselves using big data processing.
    Related Articles | Metrics
    Research on the DoubleActive TechnologyArchitecture of Data Center of Guizhou Vocational Technology Institute
    ZENG Fan-hui
    Computer & Telecommunication. 2020, 1 (7): 55-57.  
    Abstract     PDF(0KB)
    The importance of data processing and storage to colleges and universities is increasing day by day. However, many colleg- es and universities are still at a low level in the process of data recovery and application reduction, and its RPO and RTO indicators need to be improved by adopting the dual active technology architecture. Taking the Guizhou Vocational Technology Institute as an example, this paper focuses on the analysis of the architecture of the double active data center, aiming at the actual situation of the college, and gradually realizes multiple disaster recovery level of data level, application level and business level.
    Related Articles | Metrics
    An Optimization Method forArming Power Signal Identification in ESAD
    SUN Guo-xian ZHAO Yong-chang
    Computer & Telecommunication. 2020, 1 (7): 58-61.  
    Abstract     PDF(0KB)
    In order to solve the problem that the voltage amplitude of the unsecured power signal cannot be accurately identified in the process of ESAD unsecured power signal, an optimization method for the unsecured power signal identification in ESAD is pro- posed. The method adopts the "digital + analog" recognition methods, using optical coupling isolation circuit as a way to identify digital quantity, AD sampling circuit as a way to identify analog quantity, "digital + analog" signal as the arming condition. By using analog recognition value as the threshold of initial judgment and digital signal to judge effectively, the reliability of ESAD function can be improved. The verification test shows that the identification method of "digital + analog" can effectively identify the signal and ensure the reliability of ESAD.
    Related Articles | Metrics
    Security Research on Internet of Things Based on NB-IoT Network
    LI Jun-tao
    Computer & Telecommunication. 2020, 1 (7): 62-64.  
    Abstract     PDF(0KB)
    With the continuous development of technology, the traditional Internet of things has been unable to meet the application of massive equipment, thus NB-IoT emerges. This paper introduces the technical characteristics and system architecture of NB-IoT, points out the security risks in detail, and puts forward the security protection measures. With the continuous development of technol- ogy and the continuous improvement of the Internet of things application ecosystem, NB-IoT is bound to have a profound impact on society.
    Related Articles | Metrics
    Research on the Construction ofATM Data Center Based on Virtualization Technology
    HAN Xuan-zong
    Computer & Telecommunication. 2020, 1 (7): 66-69.  
    Abstract     PDF(0KB)
    Based on the analysis of the current situation of the informatization construction of civil aviation air traffic control indus- try, combined with the personnel qualification, hardware resource utilization, data integrity analysis and data security problems in the field of air traffic control industry, this paper puts forward a data center construction framework based on VMware virtual cloud platform. This paper studies on the revolutionary change of the traditional data center brought by the virtualization technology of VMware, and gives a specific case analysis for the application of its advantages in the air traffic control, especially for the special non-stop air traffic control construction situation. The high availability migration of VMware can effectively improve the resource utilization and security guarantee of the data center, and effectively improve the air traffic control's Safe operation level.
    Related Articles | Metrics
    FuzeAcceleration Sensor Based on Double SAW Sevices
    ZHAO Yong-chang SUN Guo-xian
    Computer & Telecommunication. 2020, 1 (7): 70-73.  
    Abstract     PDF(0KB)
    In view of the shortcomings of silicon micro acceleration sensor based on piezoresistive effect and capacitance principle, such as temperature drift, low resolution and poor anti-interference ability, a fuze acceleration sensor based on dual SAW devices is proposed. The sensor adopts a dual saw device structure, one is coated with a sensitive film for measurement, the other is an uncoat- ed reference channel for compensation of environmental temperature, pressure, humidity and other factors. The experimental results show that the maximum linear error is only 1.6%, the sensitivity is 54.3Hz/g, and the maximum hysteresis error is less than 1%. Compared with piezoresistive accelerometer and capacitive accelerometer, the linear error of the accelerometer is small, the sensitivi- ty is high, and it has strong anti-interference ability.
    Related Articles | Metrics
    Exploration and Practice of Mixed Golden Course of Computer Foundation
    XU Xin-xin
    Computer & Telecommunication. 2020, 1 (7): 74-76.  
    Abstract     PDF(0KB)
    This paper studies on the exploration and practice of the mixed "golden course" construction of Computer Foundation. Combined with the connotation of "golden course" and teaching objectives of Computer Foundation, taking students as the main body and ability cultivation as the goal, the paper discusses on the mixed "golden course" curriculum design of Computer Founda- tion from three aspects of pre-class, in-class and after-class. It also discusses on the practical process of the course from three as- pects: "golden course" teaching construction, universal "golden course" construction and project practice-oriented "gold course" con- struction.
    Related Articles | Metrics
    The Integration of Creative Training and Curriculum Learning in Computer Network Teaching in the DigitalAge
    LIU Yi
    Computer & Telecommunication. 2020, 1 (7): 77-79.  
    Abstract     PDF(0KB)
    The combination of digital technology and education promotes the field of education to enter the stage of innovation and development. For educators and learners of computer network major, in order to give full play to their professional advantages in the digital age, it needs to break through the limitations of existing educational models, educational ideas and educational resources, and break the dilemma of computer network innovation teaching. It needs to enrich the way of knowledge acquisition by creative train- ing mode; establish a learner-centered internal driving model to change the traditional teaching and learning methods; and make full use of educational resources to create a scientific and intelligent teaching environment.
    Related Articles | Metrics
  News More  


  Links More  


Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd