Top access

  • Published in last 1 year
  • In last 2 years
  • In last 3 years
  • All

Please wait a minute...
  • Select all
    |
  • YANG Li-kang LIU Wan-song
    Computer & Telecommunication. 2025, 1(1-2): 1. https://doi.org/10.15966/j.cnki.dnydx.2025.01.019
    Artificial Intelligence-enabled vocational education brings new demands for compound talents in the process of intelligent training, but it still faces many challenges in the process of integrating Artificial Intelligence and vocational education. In order to promote the deep integration of Artificial Intelligence and vocational education and meet the needs of economic development and so‐ ciety for diversified technical and skilled talents, on the basis of summarizing the mechanism of action and analyzing the practical problems, this paper puts forward the combination of Artificial Intelligence and professional curriculum construction, giving full play to the potential of teachers to use intelligent technology, and promoting the development of students' personality based on Artifi‐ cial Intelligence to implement the application of Artificial Intelligence in vocational education. 
  • QI Yu HUANG Jia WANG Li-qiu TU Yan-li CHEN Zi-yu
    Computer & Telecommunication. 2025, 1(1-2): 9. https://doi.org/10.15966/j.cnki.dnydx.2025.01.005
    With the rapid development of AI large models, the demand for computing power has sharply increased. Focusing on the pain points of low utilization of computing power resources and security concerns caused by sensitive data leaving the park, this ar‐ ticle proposes a solution based on storage and lossless network technology. By constructing an intelligent computing experimental network and adopting an innovative mode of simultaneous transmission and training, real-time data processing and rapid model up‐ dates have been achieved. The experimental results show that this scheme significantly improves the efficiency of computing power usage, reduces single task training time by 50%, increases data transmission rate to 7.3 Gbps, and can still maintain efficient opera‐ tion under 200 KM distance conditions. However, challenges such as data security and privacy protection still need to be addressed in the future. This study provides new ideas and methods for addressing the computing power demand in the era of large models.
  • CHANG Da-quan
    Computer & Telecommunication. 2025, 1(1-2): 5. https://doi.org/10.15966/j.cnki.dnydx.2025.01.006
    The application of various AI products or technologies in the field of education will drive a more profound digital transfor‐ mation and innovation in education, which is an inevitable requirement for advancing high-quality education development in the era of Artificial Intelligence. The intervention of AI large language model technology in higher vocational education has overturned the traditional paradigms and methods of educational technology intervention in this field from multiple dimensions such as precise modeling, intelligent interaction, emotional identification, and has facilitated the transformation and sublimation of the educational model in higher vocational education. However, the inherent weaknesses of AI large language models also pose potential risks and challenges to higher vocational education and teaching in areas such as ideology, values, scientific ethics, and more. Therefore, while integrating AI large language model technology and seizing the opportunity for high-quality development in higher vocational educa‐ tion, it is also crucial to establish design norms for technology application. This study puts forward the construction method of inte‐ grating AI technology into the curriculum system of higher vocational education from three dimensions: curriculum content, learning mode and curriculum environment. On the basis of analyzing the potential risks, this paper implements the path of promoting the digital transformation of higher vocational education through top-level design, content construction, audit algorithm and strengthen‐ ing supervision by implementing AI large language model.
  • WANG Qing-bing, LIU Bing-qian, ZHANG Tao
    Computer & Telecommunication. 2025, 1(9): 7-15.
    Online peer assessment provides new theoretical and technical means for the development of critical thinking, and peer evaluation and peer interaction are the main activities implemented by online peer assessment. The article proposes a model of online peer assessment for critical thinking development around peer evaluation and peer interaction, uses social network and epistemic network analysis methods, and explores the development process of critical thinking in online peer assessment from the temporal dimension and role dimension, respectively, using the interactive comments as the analysis content. The findings show that (1) critical thinking shows a progressive and continuous development process in online peer assessment; (2) peer interaction is the main driver for critical thinking development; (3) critical thinking has progressive differences in different stages and groups of online peer assessment; and (4) critical thinking has a significant structural pattern. The article reveals the development process of critical thinking from the perspective of online peer assessment, and provides a theoretical basis and practical reference for improving the quality of online peer assessment and the development level of critical thinking.
  • LI Shan-bin, GAO Xiao-hong
    Computer & Telecommunication. 2025, 1(5): 55-60.
    Current heating control systems relying on traditional PID control exhibit suboptimal performance, leading to poor heating effectiveness and significant energy wastage. This paper addresses these limitations by employing the Seagull Optimization Algorithm (SOA) to optimize PID controller parameters. To mitigate the inherent shortcomings of SOA, such as limited convergence accuracy and slow convergence speed, an Improved Seagull Optimization Algorithm (IGSOA) is proposed. The IGSOA incorporates a cosine function convergence factor during the seagull migration phase to sustain exploratory capabilities while accelerating convergence in later stages. In the predatory phase, a combination of a greedy strategy and a weighted-average updating mechanism is introduced to guide the population toward promising regions of the search space. Furthermore, a golden-section-based sine strategy is integrated to guide population position updates, thereby enhancing local search capabilities. To evaluate the proposed approach, a mathematical model of a heating control system is established. Experimental data obtained from the system is used to derive its transfer function. The IGSOA-PID controller is then implemented and simulated using Simulink in MATLAB. Experimental results demonstrate that the proposed controller exhibits a faster response, lower overshoot, and improved stability, ultimately enhancing the control effectiveness of the heating control system.
  • LI Meng
    Computer & Telecommunication. 2025, 1(4): 55-60.
    The S14 Global Finals serve as a significant cultural touchstone and emotional anchor for LPL fans. This article aims to delve into and examine the emotional responses and social interactions of audiences during the tournament. Take the bullet comments data of the 2024 League of Legends Global Finals for example, this article conducts word frequency analysis, word cloud visualization, and topic analysis based on LDA model, and uses SnowNLP for emotional semantic analysis. Research shows that fans pay attention to game results and game characters, and engage in in-depth discussions on tactics and performance related topics. Based on LDA theme analysis, combined with perplexity calculation and pyLDAvis visualization display, the optimal number of themes is 4, and 4 themes related to the competition are identified. In addition, the emotion analysis ratio chart and histogram show the emotional interaction behind the bullet screen. Although the 2024 League of Legends Global Finals ended with the defeat of the all-Chinese class BLG, the fans' emotions were relatively depressed, but the overall emotional tendency was still relatively positive.
  • WANG Jia, BAN Rui, WANG Xin, HUA Run-duo, LIN Xin
    Computer & Telecommunication. 2025, 1(5): 10-15.
    Cloud computing and virtualization technologies are developing rapidly in the computer field. Docker container technology has become the focus of the research direction. As the traffic load of cloud data center changes at any time, network congestion may frequently occur, resulting in network equipment resource tension, and the decline of application throughput, increase of packet loss and delay, affecting the communication performance and the quality of the entire cloud platform server. Aiming at these problems, this paper improves the network congestion by transferring the Docker container mounted on the physical machine, and a network-aware Docker container rescheduling algorithm is proposed to improve the communication capability of the physical machine to improve the global communication efficiency. The algorithm improves the communication capability between physical machines by migrating fewer virtual machines to improve the overall communication performance of the entire data center.
  • LIANG Hong-yan, LI Lian-jie, WANG Qiang, WANG Sai-sai, JIANG Bin, WANG Zong-qiang
    Computer & Telecommunication. 2025, 1(4): 76-80.
    With the development of information technology, mainframes still play a pivotal role in civil aviation information systems. The host database is a file-based database composed of multiple database files. It often occurs that the space of a certain database file is abundant, while the space of individual Freespace Record is insufficient, which has an adverse impact on business. FSMonitor is a system used to monitor the Freespace Record space of host database files. It introduces W8236 encoding, RLE compression, and Checksum verification to transfer the FS$SYS file, which records the usage of database files, from the host system to the open system. The file is parsed in the open system for database file usage prediction and intelligent alarm, so as to ensure sufficient database space and the stable operation of the system. At the same time, it reduces the high-cost resource consumption of mainframes.
  • WANG Xin-zhe, LI Shu-kai, YUAN Rui-qing, CHENG Yong
    Computer & Telecommunication. 2025, 1(4): 81-87.
    In the application of phase shifters, phase shifters with filtering characteristics can be employed to select signals at the receiving frequency and achieve stable phase shift values within the phase shift bandwidth. This paper is based on the structure of a transmission line ultra-wideband (UWB) phase shifter and utilizes the principles of filtering phase shift values and the closed-form expression for the phase shift slope to design, simulate (both circuit and electromagnetic), and test a filtering-type UWB phase shifter. The measured center frequency of the designed filtering-type UWB phase shifter is 6.85 GHz, capable of achieving phase shifts of 22.5° (with a phase shift bandwidth of 66.4%), 45° (with a phase shift bandwidth of 103.7%), and 90° (with a phase shift bandwidth of 93%). The results demonstrate that the fabricated filtering-type UWB phase shifter closely aligns with the simulation outcomes, exhibiting characteristics of ultra-wideband performance, filtering capability, and a simple structure, indicating its potential for practical applications.
  • LIU Li-jun, ZHANG Yang-ming, ZHANG Zi-xuan, TIAN Bao-hui, GUO Hu-feng
    Computer & Telecommunication. 2025, 1(5): 39-42.
    As an important part of road traffic, bridges need to be regularly inspected and maintained during their service life. Among them, the crack width of bridges is an important inspection index. Traditional crack width detection requires special vehicles to occupy fixed lanes, which affects traffic and incurs high costs. In this paper, a rotor UAV is used as the platform, and a distance sensor and relevant protective measures are added. The image information of bridge cracks is collected through close proximity photography. After image processing, correction, and calibration with professional instruments, the crack width is calculated. Through the detection of the actual crack width and comparison with the traditional detection method, it is shown that the UAV close proximity photography method can meet the identification requirements for the crack width of bridges larger than 0.2 mm, realizes low-cost detection, and has certain application prospects.
  • HUANG Mian-chao, ZHANG Shu-rong, LI Chun-ping
    Computer & Telecommunication. 2025, 1(5): 66-73.
    Based on the Outcome-based Education (OBE) concept, this study addresses key challenges in Computer Introduction teaching in private colleges and universities, such as significant student heterogeneity, strong practical preferences, and insufficient learning autonomy, then constructs a "Three-in-One" curriculum reform framework. The framework integrates: (1) a three-tier teaching organization mechanism ("standard instruction-tiered training-personalized tutoring") to unify core knowledge standardization and personalized learning paths; (2) a trinity task system ("professional cognition-vocational skills-research methods") that combines tool application with disciplinary thinking; (3) a three-phase motivation system ("task-driven-team interaction-flipped certification") to activate learning engagement. Teaching practice demonstrates that this framework significantly enhances students' knowledge mastery, tool application skills, and career planning awareness. The study provides a replicable reform approach for introductory computer courses in private universities, offering practical guidance for cultivating application-oriented computing professionals.
  • SHI Ji-zheng, LIANG Jing, CUI Jun
    Computer & Telecommunication. 2025, 1(5): 74-80.
    In the current context of information and innovation, in order to meet the needs of information and innovation development, the "Tripartite Education Reforms" of the course of Computer Network Technology in vocational colleges are urgently needed. This article analyzes the problems of theoretical and practical disconnection and lack of teaching resources in the teaching process of Computer Network Technology. It proposes to empower the "Three Education Reform" with virtual simulation technology, introduces the advantages and effectiveness of Huawei eNSP virtual simulation technology in "Three Education Reform", and elaborates on the specific application of virtual simulation technology in course teaching with a typical teaching case. Practice has proven that the application of eNSP virtual simulation technology effectively enhances students' learning interest, practical ability, and innovation ability, expands their learning space and time, and promotes the improvement of teaching quality.
  • LIU Chun-lan, ZHANG Hai-bo, HU Yan-wei, LONG Hong-mei
    Computer & Telecommunication. 2025, 1(5): 81-86.
    There are practical difficulties in the integration of industry and education in higher vocational education, such as data silos and lack of credit, inefficient resource sharing and property rights disputes, and lack of collaborative education mechanisms between schools and enterprises. Blockchain technology can provide ideas and paths for the integration of industry and education in higher vocational education to a certain extent. This study uses case analysis and interview methods to construct a four level and five module integration model. Based on four case studies, it proposes a three-stage evolution path of blockchain technology through infrastructure construction, application deepening, and ecological maturity, as well as three key innovation paths of institutional innovation, technological integration, and ecological cultivation, to promote the reform of industry and education integration. Research has shown that during the infrastructure construction period, the construction of an alliance chain network for government supervision, vocational colleges, enterprises, and third-party certification nodes should be completed; The rate of data on student training records, enterprise resource investment, and other data being stored on the blockchain is 92%; Develop ten standard contract templates for credit mutual recognition, equipment sharing, etc., and improve the efficiency of signing school enterprise agreements by 58%. In the future, it is necessary to further deepen the application of blockchain technology, improve cross chain standards, privacy computing and other technological adaptations, and promote the formation of a self-driven industry education integration ecosystem.
  • WU Yan
    Computer & Telecommunication. 2025, 1(6): 1-4.
    This paper focuses on the three-order evolution of educational agents, including tool embedding, agent symbiosis, and infrastructure, and constructs a theoretical framework for the evolution of educational agents, and deeply explores the connotation and dynamic mechanism of its paradigm transition. The driving force of paradigm transition comes from the synergistic effect of technological iteration, educational demand upgrading and institutional innovation, and the transitional contradiction between different paradigms is the explicit game between technical logic and educational law. In the end, the ultimate form of educational agents will realize the ecological revolution of the education system from technology empowerment to intelligent endogenous, promote the qualitative change of educational equity from resource balance to ability equality, and its development will eventually blur the boundary between technology and civilization, and become an accelerator for human cognitive evolution.
  • LI Ju, QIAN Li-xing
    Computer & Telecommunication. 2025, 1(5): 16-21.
    The current face expression recognition methods mainly focus on the spatial domain when facing scenes such as emotional computing, human-computer interaction, intelligent monitoring. However, the spatial domain method has the problem of being difficult to deal with the noise, while the frequency domain processing is limited to the details that cannot be well taken into account in the global. In order to solve this problem, a multi-channel face expression recognition method based on frequency domain low-pass filtering and Gabor feature fusion is proposed, which is able to combine the global structural information of the image in the low-pass frequency domain filtering and the global detail information in the Gabor filtering through channel fusion under the premise of small changes in network overhead, so as to make up for the defects of the conventional processing methods, and ultimately improve the face expression recognition model. Finally, the accuracy of the face expression recognition model is improved. The experimental results show that the method improves the accuracy by 0.78% and 1.86% on the publicly available face expression recognition datasets FER2013 and RAF-DB, respectively. It is also demonstrated by means of ablation experiments that this combination method can make up for the defects of each other to a certain extent, which shows that this fusion method has a better effect.
  • XU Xin, YANG Cheng
    Computer & Telecommunication. 2025, 1(5): 22-27.
    With the development of deep learning and large models, the training of the model needs enough samples in speaker recognition, and when the training set is limited, it often fails to achieve good convergence. To solve the problem of a small training set, a speaker recognition method based on the combination of deep bidirectional gated recurrent unit neural network and SE block (Squeeze and Excitation block) is proposed. In this method, the deep bidirectional gated recurrent unit neural network mainly realizes the extraction of multiple information in different directions and depths of input speech, and then assigns different weights to the obtained information through SE-block, and finally uses the information to perform classification and recognition tasks. The experimental results show that the recognition accuracy reaches 90.34% when each speaker has only 6 trained speech, which shows that the model can achieve good results under a small number of training samples.
  • WANG Fei, LI Xue-long
    Computer & Telecommunication. 2025, 1(5): 28-33.
    With the exponential growth of global patent application, conducting domain-specific patent analysis to uncover latent information in patent data, identify emerging productive forces, and explore technological innovation pathways has become a critical focus for national strategies, industrial sectors, and research institutions. However, current conventional patent analysis tools increasingly reveal significant limitations, including static analytical methods, insufficient interactivity, and difficulties in representing technological correlations. This study concentrates on patent relevance algorithms and D3.js visualization techniques to construct a patent analysis technical solution based on dynamic network graphs, achieving core functionalities such as deep correlation mining, dynamic real-time interaction, massive data processing, and multidimensional patent clustering analysis. Validation through a uranium mining patent visualization case demonstrates that the underlying algorithms exhibit high data accuracy, clear representation, and robust performance. The dynamic network graphs effectively visualize core patent identification, technology branch analysis. This technical solution demonstrates substantial practical value and research significance, potentially advancing patent analysis from "static statistics" to a new phase of "dynamic decision-making".
  • ZHEN Rui, LI Bo
    Computer & Telecommunication. 2025, 1(4): 93-98.
    This paper explores the development of courses, resources, and textbooks of Network Fundamentals and Application under the integration of work, study, competition, and certification(WSCC) framework. The aim is to enhance the effectiveness of vocational education and technical skills training by organically integrating job training (work), course instruction (study), skills competitions (competition), and professional qualification certification (certification). Based on research into industry enterprises, examination points from skills competitions, and content from junior network engineer certification programs, this study proposes principles for modular curriculum design and emphasizes the importance of multimedia teaching resources, experimental training resource construction, and the integration of online and offline resources. An analysis of three years of teaching practice indicates that this model significantly improves students' theoretical knowledge and practical operational skills, thereby enhancing their employability. Additionally, a comprehensive system for monitoring teaching quality and an effective feedback mechanism have been established to ensure continuous improvement in educational quality.
  • LIN Wei
    Computer & Telecommunication. 2025, 1(4): 99-104.
    Aiming at the low degree of industry-education matching, lagging technology iteration, single dimension of practice evaluation and other core problems currently prevailing in network engineering majors of applied undergraduate colleges and universities, we aim to build a four-stage spiral practice teaching system empowered by "industry-university-research-use" in-depth synergy and generative AI technology, and to explore ways to solve the problem of disjointed technology supply in traditional practice teaching. By integrating the resources of the government, universities and enterprises, a four-stage progression path of "basic experiment, comprehensive practical training, project battle and industrial application" is designed, forming a closed loop of ability cultivation. This study proposes a new engineering practice teaching paradigm driven by generative AI, which provides a replicable technical solution and collaborative mechanism for similar specialties.
  • LI Xin, FU Dan-dan, LI Hong-bo, JIA Mei-juan, LIU Chun
    Computer & Telecommunication. 2025, 1(4): 105-109.
    In response to the challenges faced by application-oriented universities in cultivating software engineering major, such as inadequate practical skills, limited innovation capabilities, and narrow interdisciplinary perspectives, this paper systematically investigates the development pathway for a "first-class undergraduate majors" grounded in Outcome-based Education (OBE). Using Daqing Normal University's software engineering major as a case study, this paper elaborates on specific measures and outcomes of major construction from three key areas: refining training objectives, optimizing the "three-stage progressive" curriculum system, and enhancing industry-education integration and collaborative education mechanisms. Through these comprehensive professional development initiatives, the overall strength of the major has significantly improved, with a clear focus on serving the petroleum and petrochemical industries. Consequently, students' professional competencies and employability have been notably enhanced. The OBE-based approach to professional construction effectively addresses the mismatch between talent supply and industrial demand, providing a replicable and scalable model for similar universities.
  • SONG Yong-Qi, WANG Si-duo, WANG Qi, LU Jia-hao, CUI Yan
    Computer & Telecommunication. 2025, 1(5): 1-5.
    This study proposes a human posture action detection system based on image processing and machine learning, designed to automate fitness exercise counting and eliminate errors associated with manual tracking. The framework begins by capturing and decomposing test videos into sequential motion frames using OpenCV. The acquired images undergo preprocessing for enhancement, followed by the detection and normalization of 33 skeletal keypoints via the Mediapipe library. The normalized keypoint coordinates are then transformed into embedding vectors as model input. A K-Nearest Neighbors (KNN) algorithm compares these vectors against a reference database to classify and count exercise repetitions. Temporal smoothing refines the classification output, ensuring robust action recognition and accurate repetition counting. The system culminates in a user-friendly UI that visually presents the processed video stream alongside real-time analytics. By addressing the limitations of conventional counting methods, this research delivers an efficient, integrated solution for automated posture recognition and repetition tracking. Its practical implementation offers significant societal and economic value by enhancing workout efficiency and promoting health-conscious fitness practices.
  • ZHANG Gang, YUAN Ting, XIAO Ning-jie, YANG Hong-kai, YANG Zong-jun
    Computer & Telecommunication. 2025, 1(6): 37-41.
    This study focuses on optimizing third-party model integration and GPU acceleration strategies in the Mediapipe framework. As an open-source mobile AI framework developed by Google, Mediapipe achieves low-latency, high-precision real-time processing on mobile devices through its pipeline architecture. However, the framework exhibits significant limitations in supporting third-party model integration. To address this issue, we propose an innovative model integration layer design and successfully implement three models: YOLOv11, YOLOv11-Pose, and RTMPose. Regarding GPU acceleration strategies, this research explores two key aspects: model inference parameter optimization and inference result parsing, proposing a comprehensive performance optimization solution. Experimental results demonstrate that on the Android platform, this integration solution achieves significant improvements in model execution efficiency while maintaining excellent deployment convenience.
  • CUI Fang-fang, WANG Xiao-ying, ZHANG Qing-jie, GU Rui-ze
    Computer & Telecommunication. 2025, 1(4): 38-42.
    Network intrusion detection is a crucial approach in the field of cybersecurity, with anomaly traffic detection being a key technique in intrusion detection. To address the issues of high false alarm rates and low efficiency in traditional detection models, this paper proposes an anomaly traffic detection model based on MA-GRUCNN. XGBoost is used for feature dimensionality reduction, and the reduced-dimensional data is then fed into the MA-GRUCNN model. CNN is employed to extract high-dimensional features from the traffic data, an attention mechanism is used to capture global dependencies, and GRU is utilized to capture long-term dependencies in the time series. Experimental results on the NSL-KDD dataset demonstrate that the proposed method outperforms other approaches in terms of detection accuracy, precision, recall, and F1 score, achieving a detection accuracy up to 97.45%.
  • WU Li-sheng, E Chen
    Computer & Telecommunication. 2025, 1(4): 17-22.
    Multi-label feature selection improves the performance of learning models by eliminating irrelevant features. However, most existing methods assume that the labels in the training set only contain simple logical values and that all relevant labels have the same effect on instances. In addition, in practical applications, the influence of different labels on instances may vary. Based on this, this paper proposes a feature selection method based on fuzzy neighborhood information entropy and mutual discriminant index. Firstly, the original multi-label datasets are transformed into label distribution datasets by using label enhancement technology. Then, the neighborhood information entropy is used to quantify the similarity relationship between samples in the label space. Finally, the feature space and the label space are combined by using the fuzzy neighborhood mutual discriminant index to identify the feature subset with significant discrimination ability. Experiments on six datasets comprehensively show that the classification performance of this algorithm is superior to that of other algorithms.
  • WANG Bo-chao, WANG Ya-hui, ZENG Zhao-hu, ZHAO Jian-hui
    Computer & Telecommunication. 2025, 1(4): 23-29.
    This paper proposes an unsupervised log anomaly detection method based on an improved variational autoencoder generative adversarial network (VAE-GAN) to address the issues of instability and interdependence in log sequence data. The proposed model combines the advantages of GAN and VAE by embedding the temporal convolutional network module into the encoder, decoder, and discriminator, effectively capturing the distribution of log sequence data and optimizing the sequence mapping in the latent space, thereby achieving high-precision reconstruction of normal log sequences. The model continuously improves the reconstruction ability of the variational autoencoder through adversarial training mechanism, enabling it to identify abnormal patterns in the log more accurately. The experimental results show that compared with other unsupervised methods, this method has better performance on public log datasets.
  • YANG Yan-yu, REN Jian-jun, SUN Guo-xian
    Computer & Telecommunication. 2025, 1(3): 18-21.
    Aiming at the two problems of poor real-time performance and calculation accuracy caused by insufficient processor computing power and limited effective bits when implementing traditional integrated navigation simulation algorithms on hardware platforms built with MEMS inertial devices and industrial-grade processors, this study quantifies the noise and error magnitudes of MEMS inertial devices, simplifies Kalman filter error equations, and adopts UD decomposition algorithm. The optimized algorithm achieves 17% improvement in computational speed, effectively demonstrating its validity. Ultimately it is implemented on a low-cost attitude measurement system composed of MEMS devices. Vehicle tests verify that the heading angle accuracy reaches 0.5° and horizontal attitude angle accuracy reaches 0.2°, successfully resolving the issues of real-time navigation data output and computational precision.
  • JIN Xiao-yan
    Computer & Telecommunication. 2025, 1(7): 74-80.
    Under the background of industrial digital transformation, database technology, as a key area of information technology innovation, is crucial for talent cultivation and industry chain security. Enterprises urgently need high-quality talents with practical skills and the ability to solve complex problems. However, current MySQL Database courses in vocational colleges face challenges such as disconnection between teaching content and industry needs, single-dimensional evaluation mechanisms, and superficial integration of ideological and political education. Therefore, this paper proposes a teaching model of "four-dimensional driving, dual-chain integration", based on a project-based teaching system integrated with job training, competitions, and certifications, guided by a "three-stage, four-dimension, six-phase, seven-cultivation" teaching approach, supported by a "project-based, task-driven, capability-enhancing" teaching content system, led by a "three-lines, four-stage" ideological and political education system, and ensured by a comprehensive evaluation and resource system. Through the implementation of this model, students' mastery of core knowledge and ability to solve complex problems have significantly improved, cultivating a rigorous technical style, enhanced awareness of data security, ethical decision-making, and cultural confidence.
  • HUANG Mian-chao, HUANG Wei-feng, LUO Hui-huang
    Computer & Telecommunication. 2025, 1(9): 16-20.
    A multi-sensor fusion model based on Bidirectional Long Short-Term Memory (BiLSTM) and gated attention mechanism is proposed to address the challenges of heterogeneous data fusion and insufficient real-time performance in multi-sensor human activity recognition. This method captures bidirectional long-term dependencies through BiLSTM and employs gated attention to achieve adaptive weighting of multi-source features, effectively enhancing feature representation capability and fusion efficiency. Experimental results demonstrate that the proposed approach achieves a highest accuracy of 95.3%,in addition, under a comparable lightweight setting, the proposed model exhibits lower parameter count and faster inference latency than the Transformer baseline, thereby achieving a more favorable balance between accuracy and efficiency.Ablation studies further confirm the critical role of BiLSTM and the attention mechanism in improving performance. This research provides a solution that balances recognition accuracy and inference efficiency for behavior recognition in complex scenarios, showing strong potential for practical applications.
  • HUANG Ri-shun, CHEN Shi-guo
    Computer & Telecommunication. 2025, 1(7): 29-34.
    To address the issue of low detection accuracy in smart classroom behavior detection due to dense student populations, mutual occlusion, and large differences in target scales, an improved YOLO11-based classroom behavior detection model, ADU-YOLO11, is proposed. Firstly, the partial convolutional downsampling layers are replaced with the Adown downsampling module to reduce model complexity and minimize the loss of key feature information. Secondly, the dynamic detection head DyHead (Dynamic Head) is adopted, which enhances detection capabilities through scale, spatial, and task-aware attention. Finally, the UIoU (Unified-IoU) loss function is used to optimize the training convergence speed and improve the regression accuracy of the predicted bounding boxes. Experimental results show that ADU-YOLO11 achieves mAP50 and mAP50-95 improvement of 1.1% and 1.6% respectively, along with a precision increase of 2.7% and a recall increase of 0.6% compared to the original YOLO11n on the STBD-08 student-teacher behavior dataset. Moreover, it outperforms other object detection algorithms, demonstrating its effectiveness and superiority in smart classroom behavior detection.
  • CUI Jun, SHI Ji-zheng
    Computer & Telecommunication. 2025, 1(7): 53-57.
    The ''Posts, Courses, Competitions, and Certificates'' comprehensive education model is the focus and feature of the current reform of vocational education, which is a kind of teaching and training model that integrates the work position, educational curriculum, skills competition and vocational skills certificate in depth. Take the course of Microcontroller Technology and Application for example, based on the ''Posts, Courses, Competitions, and Certificates'' model, this paper integrates the requirements of job ability, combines the vocational skills competition and skill level certificate, reconstructs the course content and the ability standard. Based on the ''Posts, Courses, Competitions, and Certificates'' education model, the course is integrated with the requirements of job competence, combined with the vocational skills competition and the skill level certificate. Piloting the reformed model, the practice shows that the reform and practice of the course meet the requirements of industrial development ability, and the students' ability in theoretical knowledge and practical skills meets the expectation, which improves the students' vocational competence.
  • WEI Shao-han
    Computer & Telecommunication. 2025, 1(7): 58-63.
    At present, the content of the three courses, namely, the Fundamentals of Programming, Data Structure, and Algorithm Analysis and Design, is disconnected, which is not conducive to enhancing students' comprehensive algorithmic ability. To break down the knowledge barriers among the courses and strengthen the achievement of the training objectives, a teaching reform idea of content reconstruction of the course group is proposed. Guided by the OBE concept, an algorithm-based course group is constructed, and the main thread of algorithms is integrated into the knowledge of the course group for reconstruction. The course content is connected through cases, and the knowledge points of competitions are deeply integrated into the course group content. The students' interest and learning effect are enhanced through practice. The teaching reform effect is good, as indicated by the improved pass rate, excellent rate of the courses and the achievements in algorithm competitions. Constructing a course group with algorithms as the main thread not only helps to achieve systematic cultivation of algorithmic ability but also provides a practical path for the optimization of the software engineering curriculum system and the achievement of course objectives.
  • TAN Yu-Chun, GU Yu-qing, ZHANG Lei
    Computer & Telecommunication. 2025, 1(9): 58-62.
    The "Curriculum-Training-Competition-Innovation-Industry"(CTCI²) innovation and entrepreneurship practice teaching model, driven by digital-intelligent empowerment and competitions in higher vocational computer-related disciplines, aims to effectively integrate digital-intelligent technologies, skills competitions, and innovation/entrepreneurship practices. Its goal is to cultivate high-level technical and skilled talents equipped with innovative thinking and precise career orientation, capable of adapting to the new-era industrial environment. This model explores the construction of a five-in-one innovation and entrepreneurship practice teaching framework based on digital-intelligent empowerment and competition-drive, the establishment of a digital-human interactive CTCI² innovation platform, and the development of an integrated educational effectiveness evaluation system. It seeks to propel higher vocational computer education into a new stage characterized by enhanced quality and excellence, value-added empowerment, and ultimately achieve high-quality development in vocational education.
  • ZHANG Gen
    Computer & Telecommunication. 2025, 1(9): 45-51.
    Aiming at the core pain points of current car owners, such as scattered maintenance records and lack of targeted reminders, and combining with the diversified development trend of China's automobile aftermarket in 2024, an intelligent record and recommendation system for automobile maintenance is designed and implemented. With intelligent recording and accurate reminders as the core, the system constructs a three-layer architecture consisting of a perception layer, a data layer, and an application layer: The perception layer collects image documents, integrates YOLOv8 to locate and correct document areas, and uses OCR (Optical Character Recognition) technology to extract VIN (Vehicle Identification Number) codes. The data layer adopts MySQL master-slave architecture, Redis cache, and Alibaba Cloud OSS (Object Storage Service) to store information such as vehicle files and maintenance records. The application layer generates accurate reminders based on three-dimensional factors and dynamically iterates the system message reminder strategy in combination with user feedback.Test results show that the recognition accuracy of key information in system documents reaches 99.5%, and the record query response time is less than 1 second. The system can effectively reduce manual entry operations, solve the problems of low efficiency of traditional maintenance management and lack of targeted reminders, and provide car owners with a lightweight and highly user-friendly one-stop maintenance management service.
  • YANG Li-jia, CHEN Xin-fang, ZHAO Han-qing, WANG Shi-wei, WU Di-bai, SHEN Mei-yi
    Computer & Telecommunication. 2025, 1(5): 49-54.
    The change in groundwater level is considered an important potential signal for earthquake precursors, and studying its relationship with seismic activity is of great significance for earthquake prediction. An anomaly detection method based on TCN-GRU model is proposed to identify the abnormal changes in groundwater level, and combined with EWMA control chart to accurately locate the time of anomaly occurrence. The experimental results show that the TCN-GRU model is most sensitive to abnormal fluctuations, has significant robustness and real-time detection ability, and can adapt to complex changes under different well conditions. The study reveals the close relationship between abnormal groundwater level and seismic activity, providing scientific basis for early identification of earthquake precursor signals and having important application value for earthquake prediction and disaster reduction.
  • SUN Yu
    Computer & Telecommunication. 2025, 1(9): 52-57.
    Aiming at the problems existing in the current teaching of database course, such as single teaching mode, disjointed theory and practice, and one-sided evaluation method, this paper puts forward a project-driven teaching mode based on constructivism theory. This model takes "supermarket management system" as the teaching project carrier, and designs and implements the whole process teaching scheme covering project start-up, exploration construction and achievement evaluation, aiming at guiding students to actively construct database knowledge through active exploration and collaborative communication in real situations. Teaching practice shows that this model can effectively improve students' ability of problem solving, teamwork and knowledge transfer, and provides an effective path with both theoretical support and practical value for the teaching reform of database course.
  • YANG Cheng-cheng, CHEN Yong, LI Sheng, YAN Da-shun, LIU Tong-lai, HU Zeng
    Computer & Telecommunication. 2025, 1(9): 63-67.
    The Linux laboratory course is a fundamental core course for computer science and information related majors, characterized by strong practicality and complex operational chains. Traditional evaluation systems mainly rely on students' submitted lab reports, which are result-oriented, lacking process analysis and contextual awareness, making it difficult to comprehensively and dynamically reflect students’ actual abilities and learning status. To this end, this paper proposes an evaluation system for Linux laboratory courses that integrates knowledge graphs with multimodal perception. It integrates key technologies such as code behavior analysis, speech and facial emotion recognition, system operation trajectory extraction, and knowledge graph reasoning. The system takes multimodal inputs—including student behavior logs, oral defense speech, facial expressions, operation flows, and error types—and applies focal contrastive learning and a Neo4j-based knowledge graph model to achieve comprehensive scoring and personalized feedback. Experimental results demonstrate that the proposed system significantly improves evaluation accuracy, consistency, and the stimulation of students’ learning motivation, providing a new paradigm and technological support for teaching reform in Linux and other system-oriented laboratory courses.
  • CHEN Chun-yan
    Computer & Telecommunication. 2025, 1(9): 68-74.
    This article aims to explore an effective evaluation path that adapts to the educational goals of vocational colleges that combine moral and technical education. It organically integrates the CIPP evaluation model with the concept of "dual core of morality and technology", and constructs a three-dimensional evaluation system that covers professional qualities, skills, and career development capabilities. Take the course of Responsive Web Development for example, it conducts evaluations through four stages: background, input, process, and outcome, and combines blended teaching to achieve full-cycle data collection and dynamic optimization. Practice shows that this system can enhance students' technical abilities and professional qualities, providing theoretical and practical paths for the implementation of "dual core of morality and technology" in professional courses in vocational colleges.
  • HUA Lei, GAO Fan-qin, MA Guo-feng, ZHANG Yan-li
    Computer & Telecommunication. 2025, 1(9): 75-82.
    In response to the disconnection between traditional electronic technology experiment teaching content and complex engineering problems, this paper restructures the experimental courses in a task-chain-based hierarchical manner to enhance students' practical abilities and comprehensive professional competencies. During the restructuring process, the curriculum design adopts the perspective of engineers' professional qualities and technical skills, promoting the deep integration of experimental content with engineering demands. The experimental content has been reorganized into five progressive levels: basic experimental projects, compound experimental projects, comprehensive experimental projects, AI-enhanced innovative experimental projects, and real competition questions from electronic design contests. Simultaneously, the course promotes innovation and reform in teaching methods and evaluation systems, moving away from a single assessment model toward a multidimensional framework that integrates theoretical knowledge, practical skills, innovative thinking, and teamwork. Through systematic reform, the electronic technology experiment course not only enhances students' hands-on abilities, but also consistently strengthens their comprehensive competencies in analyzing and solving engineering problems. Ultimately, these efforts lay a solid foundation for cultivating high-quality, interdisciplinary, and application-oriented talent in private universities, effectively bridging the gap between talent development and industry needs.
  • ZHANG Jing
    Computer & Telecommunication. 2025, 1(9): 83-87.
    Under the background of the "Double High Plan" construction, the disconnect between higher vocational talent cultivation and industrial technology iteration urgently needs to be addressed. Based on the "Five Golds" (elite majors, high-quality courses, outstanding teachers, advanced practice bases, and innovative teaching materials) integrated resource optimization framework, and relying on the reform practice of the Internet of Things major at Suzhou Polytechnic University, this study explores the construction of an educational ecosystem featuring "integration of industry and education, and integration of certificates and curricula". The model aims to achieve deep coupling between professional chains and industrial chains, dynamic synchronization between course content and technological development, and effective integration of faculty capabilities with industry practices. Practical results demonstrate that this approach enhances the alignment of students' occupational competence with enterprise demands, providing a replicable pathway for the digital transformation of higher vocational education. As a foundational project for high-quality development in vocational education, the "Five Golds" initiative requires systematic integration and dynamic adaptation mechanisms to drive vocational education from adaptive reform toward innovative leadership[1].
  • WEI Li-mei, ZHANG Shu-rong
    Computer & Telecommunication. 2025, 1(9): 88-94.
    With the rapid development of technologies such as cloud computing and artificial intelligence (AI), the education sector is undergoing profound changes. As an essential component of the information technology major, the teaching reform and practice of Linux technology courses are of great significance for cultivating high-quality talents that meet the demands of the new era. This paper focuses on the teaching innovation in the field of information technology and deeply explores the teaching reform paths and practical methods of Linux technology courses in a private cloud environment, empowered by AI technology. By analyzing the existing problems in the current teaching of this course, it expounds on the necessity and feasibility of the cloud-intelligence integrated teaching model. It elaborates on specific measures such as building a teaching environment based on a private cloud platform, optimizing teaching content and resources with AI assistance, and innovating teaching methods and means. Through the analysis of actual teaching cases, it compares the teaching effects before and after the reform, aiming to provide beneficial references and inspirations for improving the teaching quality of Linux technology courses and cultivating high-quality talents that adapt to the demands of the times.