Loading...
  • Table of Content
      10 May 2019, Volume 1 Issue 5 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    Chinese Text Feature Classification Based on Distributed Framework
    ZHANG Hui-fang ZONG Cai-le ZHANG Xiao-lin
    Computer & Telecommunication. 2019, 1 (5): 1-7.  
    Abstract     PDF(0KB)
    The study uses Fudan Chinese text and Sogou Chinese document as the research object. It improves the Chinese text classification accuracy and recall rate. And it analyzes and obtains the best contribution value of the feature words. Based on naive Bayes classification method, improved TFIDF keyword extraction and weight calculation, the TNBIF model classification method is proposed and implemented on the Spark platform. The experimental results show that the Chinese text classification is applied by the TNBIF model. The accuracy is as high as 95.49%, which is 5.41% higher than the traditional text classification method and the recall rate is increased by 6.64%. This study obtains an optimal contribution of 0.95.
    Related Articles | Metrics
    Research and Design of Online Interactive Learning Platform Based on SCROM
    ZHANG Liang ZHAO Yan
    Computer & Telecommunication. 2019, 1 (5): 8-11.  
    Abstract     PDF(0KB)
    Based on the actual situation of Ningxia Finance Economics Professional Technology Institute, this paper puts forward the goal of building on-line interactive learning platform of higher vocational college based on SCROM, aiming at solving the problem of the student online learning, the examination at school and the teaching resource sharing. Through the method of software engineering, the online interactive learning platform is built. The platform improves the deficiency of the existing online learning system of the college, makes full use of the network bandwidth and storage space of the campus network, and facilitates the teaching activities of teachers and students. Finally, the development prospects and future directions of the platform are analyzed and prospected.
    Related Articles | Metrics
    Research on the Application of MOOC in the Teaching of College Computer
    WANG Wen-pu WANG Xin-long
    Computer & Telecommunication. 2019, 1 (5): 12-15.  
    Abstract     PDF(0KB)
    At present, the rapid rise of MOOC in the world has had a great impact on the teaching concept and teaching mode of colleges and universities. College Computer is a public course that all majors except computer major in our country must learn at present. It is of great help to cultivate students computational thinking ability and applied practical ability. This paper analyzes MOOC and the course of College Computer, and explores the application of MOOC in College Computer and relative improvement.
    Related Articles | Metrics
    Comprehensive Teaching Reform and Research of Modern Switching Technology
    YAN Lei ZHU Xiang-qin ZHANG Qiang-zhi
    Computer & Telecommunication. 2019, 1 (5): 16-17.  
    Abstract     PDF(0KB)
    This paper mainly analyzes and summarizes the problems existing in the course of Modern Switching Technology in our school. Combining with the needs of current industry development, the ideas and solutions of corresponding reform are given in various aspects such as the design of teaching content, the improvement of teaching methods, the content and the equipment of practical teaching.
    Related Articles | Metrics
    An Exploration of the Research Reform of Computer Network Curriculum Based on the Three-stage Teaching Model of "Subject Inquiry"
    LI Jie
    Computer & Telecommunication. 2019, 1 (5): 18-20.  
    Abstract     PDF(0KB)
    The 21st century is an era of information technology, every citizen should master certain computer application ability, and understand the use of network technology. The school should introduce the research teaching when carrying out the computer network course, give full play to the subject of the students in the course, and let them explore the relevant content of the computer network course. Combining with the author’s own teaching experience, the research reform of computer network course based on the three-stage teaching model of "subject inquiry" is discussed, which is intended to play a certain reference function.
    Related Articles | Metrics
    Research on Cloud Service Architecture for Education Informatization Resources Co-construction and Sharing
    LUO Gui-qiong
    Computer & Telecommunication. 2019, 1 (5): 21-23.  
    Abstract     PDF(0KB)
    On the basis of exploring the development of cloud computing to promote education in China, this paper analyzes the new characteristics of the construction and sharing of educational information resources in China and the composition of digital education resource sharing system, and proposes the educational resources to build a shared cloud service system for educational information, providing reference for research on resource co-construction and sharing.
    Related Articles | Metrics
    Design and Implementation of Student Community Organization Platform Based on the Recommendation by Collaborative Filtering
    DING Ming-ji HE Ming-chang FEI Si-yao YU Tao
    Computer & Telecommunication. 2019, 1 (5): 24-28.  
    Abstract     PDF(0KB)
    Contemporary college students have a very rich campus life, with a variety of organizations. Most students have participated in at least one community organization. However, the current organizations and clubs of all universities and colleges have rather cumbersome work procedures, resulting in management inefficiency. In addition, they are acting without sharing information with each other. In order to solve these problems, an Org community organization and cooperation platform is developed. Through the combination of online and offline, different users are given corresponding permissions, providing functions such as news release, activity check-in, goods leasing, schedule arrangement, community exchange and so on. The platform is developed based on Android Studio and server is built using Linux, Apache, MySql and PHP.
    Related Articles | Metrics
    Research on College Intelligent Dormitory Allocation Based on K-means Algorithm
    SUN Hui-ting MA Jian
    Computer & Telecommunication. 2019, 1 (5): 29-32.  
    Abstract     PDF(0KB)
    Firstly, this paper discusses on the importance of intelligent dormitory management system in colleges and universities, then studies on the K-means algorithm, and applies the algorithm to the intelligent dormitory allocation. At last, the data of individual students are collected through questionnaire survey and preprocessed and normalized. K-means algorithm is used to cluster the data of individual students. The validity and relevance of the algorithm in the three-dimensional space of data set dimensions, emotional stability and ID are discussed.
    Related Articles | Metrics
    Research on Dynamic Gesture Recognition Based on Hidden Markov Model
    DING Ze-yu GONG Wei
    Computer & Telecommunication. 2019, 1 (5): 33-36.  
    Abstract     PDF(0KB)
    With the rapid development of virtual reality technology, more and more researchers are devoting themselves to the research of dynamic gestures recognition. Gesture recognition is a natural and friendly way of human-computer interaction. In this paper, a dynamic gesture recognition system based on Hidden Markov Model (HMM) is built. This system collects dynamic gesture data through Leap Motion and can recognize 36 letters and numbers of gestures (digits 0-9 and A-Z). A lot of experiments show that the system has strong robustness and can recognize individual hands. The recognition rate of potential can reach 93.2%.
    Related Articles | Metrics
    Research on Personal Information Security on Internet
    WU Hai-jun
    Computer & Telecommunication. 2019, 1 (5): 37-39.  
    Abstract     PDF(0KB)
    With the development and progress of the economy and society and the arrival of the network era, we have fully enjoyed the convenience brought by the information age, and the influence of information on people's lives have become increasingly prominent. However, the risk of improper use of personal information is increasing, such as the credit card theft, mobile phone fraud, and so on. The serious leakage of personal information not only involves personal reputation, but also disturbs the normal order of production and life. Therefore, this paper analyzes the existing countermeasures to prevent the leakage of personal information on the Internet, and on this basis, puts forward a more perfect solution, and uses domestic cryptography technology to realize the omni-directional protection of personal information security on Internet.
    Related Articles | Metrics
    Personal Data Security Management in Insurance Enterprises
    WAN Qiang
    Computer & Telecommunication. 2019, 1 (5): 40-44.  
    Abstract     PDF(0KB)
    The personal data security management in insurance enterprises are explained through the data security management organization structure, department and post settings, management system and norms, protection technology solutions and other aspects. The key points of control and future work are highlight by focusing on the management and protection of personal data in insurance enterprises. Furthermore, the idea of security management and protection of personal data in insurance enterprises are clarified.
    Related Articles | Metrics
    Discussion on the Omni-directional Defense for Virus Defense
    GAO Pan LIN Li
    Computer & Telecommunication. 2019, 1 (5): 45-47.  
    Abstract     PDF(0KB)
    The traditional virus defense measures are only aimed at the individual virus defense, lacking omni-directional defense measures, resulting in an inability to effectively protect the virus. This paper discusses on a kind of omni-directional virus defense scheme, improving the virus defense ability.
    Related Articles | Metrics
    Man-in-the-middle Attack and Defense Methods in Wireless Networks
    JIANG Lin-zhou
    Computer & Telecommunication. 2019, 1 (5): 48-50.  
    Abstract     PDF(0KB)
    Nowadays, Wi-Fi and cellular mobile network have become universal, so wireless network security is becoming more and more important. At present, the Man-in-the-the-Middle Attack on the wireless network has existed in a large amount, and it is also an attack means with a great threat. This paper discusses on the Man-in-the-the-Middle Attack of the wireless network from the aspects of the technical principle, the attack mode, and the defense methods.
    Related Articles | Metrics
    Design and Implementation of Vehicle Search Engine in Insurance System Based on ElasticSearch
    LIU Xiao-qiang
    Computer & Telecommunication. 2019, 1 (5): 51-55.  
    Abstract     PDF(0KB)
    With the continuous expansion of information technology in the insurance industry, more and more business data is available in vertical areas, which inevitably brings great challenges to the storage and query efficiency of traditional structured databases. How to realize data redundancy backup and fast and efficient query has become a major problem of enterprise information technology. This paper presents a distributed search engine based on ElasticSearch, which combines with Logstash to collect data. It can filter, store and index vehicle data, and provide a unified query entry and efficient retrieval service for insurance policy issuing system. Practice shows that the system can achieve redundant backup of data and improve the efficiency of retrieving vehicle data. At present, it has been applied in the core system of insurance industry and achieved good results.
    Related Articles | Metrics
    Design and Implementation of Online Training System for College Teachers
    GAO Xu
    Computer & Telecommunication. 2019, 1 (5): 56-58.  
    Abstract     PDF(0KB)
    In order to improve the overall quality of college teachers, this paper designs an online training system for college teachers. In addition to the traditional training-related business logic, this paper adds data analysis, overall analysis of the course, and individual analysis of specific students. Through practical application, it proves that the online training system for college teachers designed in this paper has high stability and a certain practical value.
    Related Articles | Metrics
    Implementation of the Cloud Printing Platform Based on Android
    JIA Bang-wen
    Computer & Telecommunication. 2019, 1 (5): 59-63.  
    Abstract     PDF(0KB)
    With the introduction and the maturity of cloud computing concepts, technologies such as cloud printing have also emerged. This paper firstly introduces the concept and basic framework of cloud printing, and then builds a cloud printing platform from the client and the server respectively. It meets the requirements for uploading the files to be printed from the client and the management of the print order from the server, and it solves the problems of integration and distribution of printing resources and geographical restrictions of traditional network printing from a technical level. The cloud printing platform system with Android mobile phone as the client realizes online printing anytime and anywhere, which greatly satisfies the needs of users.
    Related Articles | Metrics
    A Moving Target Detection Technology Based on Compressed Sensing
    DAI Xiao-fang
    Computer & Telecommunication. 2019, 1 (5): 64-67.  
    Abstract     PDF(0KB)
    Moving target detection is a research hotspot in computer vision, image processing and other related fields. The core is to study and process each frame of image in video image. The main research idea of this paper is to compress and sample the two-dimensional image of each frame into a one-dimensional signal with a small amount of information, and reconstruct the image. Finally, the moving target extraction is performed on the image of each frame by the target detection technique. Simulation experiments show that the method is feasible and effective, and can greatly reduce the amount of data recorded in the target detection, and solve the problem of storage and transmission of massive data.
    Related Articles | Metrics
    Smart Fire Protection Based on NB-IoT
    LANG Hai
    Computer & Telecommunication. 2019, 1 (5): 71-74.  
    Abstract     PDF(0KB)
    There are some pain spots in fire protection, including delay of fault alarm processing, difficulty in management & maintenance of device. The development of IoT technology and commercial deployment of NB-IoT network by carrier provide new way to resolve those questions. The fire protection device and the place with fire hazard is real-time perceptible now. The article describes how to choice the IoT technology and protocol, and how to reduce the power consumption of IoT terminal equipment which uses battery.
    Related Articles | Metrics
    Analysis on the Head of the Web
    HUANG Xiao-hua
    Computer & Telecommunication. 2019, 1 (5): 75-77.  
    Abstract     PDF(0KB)
    Based on the high quality content of web page, this paper introduces the tag of web page title, the base tag of base address, the link tag of linked file and so on. Through the detailed introduction of each tag, the importance of high quality content of web page is explained, which plays an important role as the main body of web page.
    Related Articles | Metrics
    Evaluation of Graduates' Core Competence in Sydney Agreement Certification
    LU Feng-wei JIN Zhong-wei ZHANG Xiu-jie
    Computer & Telecommunication. 2019, 1 (5): 78-80.  
    Abstract     PDF(0KB)
    The Sydney Agreement is one of the most influential mutual recognition systems in the field of international engineering education. It is applicable to the engineering and technical majors of higher vocational education in China. At present, although China has not yet joined the agreement, in order to strengthen the international recognition of professional education, in line with the trend of talent internationalization, the entry of higher vocational education into the Sydney Agreement has become an inevitable trend of professional development. This paper proposes a “5+2” model for the assessment of the achievement of graduates' core competencies in the certification of the Sydney Agreement, ensuring the objectivity and effectiveness of the assessment results, and continuously improving the core competence of the students. Cultivation provides an effective basis.
    Related Articles | Metrics
  News More  


  Links More  


Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd