30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

In last 2 years
Please wait a minute...
For Selected: Toggle Thumbnails
Prediction of Total Ionospheric Electron Content Based on Informer
MA Yan LIU Hai-jun HE Ren CUI Chun-jie WANG Gao-yuan YANG Yue-qiao
Computer & Telecommunication    2024, 1 (1): 17-20.   DOI: 10.15966/j.cnki.dnydx.2024.z1.008
Abstract146)            Save
Related Articles | Metrics
Design of Driver Fatigue Recognition Algorithm Based on YOLOv8 and Face Key Points Detection
HE Zong-xi JIANG Ming-zhong XIE Ming-xia PANG Jia-bao CHEN Qiu-yan HU Yi-bo
Computer & Telecommunication    2023, 1 (11): 1-6.  
Abstract531)            Save
According to statistics, the accident rate caused by fatigue driving and mental inconcentration in traffic accidents accounts for 93%. To solve this problem, 68 key points of face are introduced in this paper. Based on deep learning and machine vision algorithm concepts, combined with YOLOv8 model and related fatigue driving judgment mechanism, PERCLOS algorithm, MAR algorithm, EAR algorithm and HPE algorithm are used to improve the accuracy and reliability of the system. A set of algorithms for recognizing tired driving behavior is successfully constructed.
Related Articles | Metrics
Design and Implementation of Campus Ordering Backend System Based on Microservice
SU Bing
Computer & Telecommunication    2023, 1 (11): 23-28.   DOI: 10.15966/j.cnki.dnydx.2023.11.008
Abstract302)            Save
In order to alleviate the problem of seat tension in university canteens, it is urgent to develop a kind of software to solve this problem and improve the dining experience for students. This article discusses the use of the current mainstream microservice framework Spring Boot, combined with technologies such as MyBatis Plus and Vue.js, to design and implement a campus ordering system backend, which facilitates platform administrators and merchant administrators to manage dishes, packages, orders, etc., providing a solution for the problem of tight dining for college students.
Related Articles | Metrics
A Named Entity Recognition Model Based on Rotational Attention
LAI Xiao-meng WEI Jia-yin
Computer & Telecommunication    2024, 1 (1): 21-25.   DOI: 10.15966/j.cnki.dnydx.2024.z1.011
Abstract151)            Save
Addressing the issue of inadequate classification accuracy in named entity recognition via entity word-to-relationship modeling, we propose a method using rotational attention. Firstly, the text is encoded using the BERT model and Bi-LSTM, fol‐ lowed by extraction of features from input text using convolutional neural networks. Subsequently, the extracted feature sequence is inputted into the rotational attention model for output probability calculations, and the MLP layer is used for output classification. The study's outcomes affirm the efficacy and feasibility of the technique proposed in this paper, as it successfully yields superior re‐ sults on mainstream English databases including CADEC, GENIA and CoNLL2003, for named entity recognition exercise. 
Related Articles | Metrics
Safety Helmet Detection Based on Lightweight YOLOv8
ZHANG Bi-chuan LIU Wei-dong MI Hao JING Ya-ning
Computer & Telecommunication    2024, 1 (1): 35-39.   DOI: 10.15966/j.cnki.dnydx.2024.z1.017
Abstract340)            Save
Helmet detection is a computer vision task with important application value, involving safety management in many fields such as construction sites, mines, and electric power. However, helmet detection also faces many challenges, such as large changes in target size and aspect ratio, rapid changes in target velocity, target occlusion, and background interference. In order to solve these problems, this paper proposes a safety helmet detection method based on YOLOv8, which uses the characteristics of high speed and high precision of YOLOv8 combined with the characteristics of safety helmets to achieve effective detection and identification of safety helmets.
Related Articles | Metrics
Facial Expression Recognition Algorithm Based on Multi-scale Feature Deep Learning
WANG Jin WANG Rui
Computer & Telecommunication    2024, 1 (5): 75-.   DOI: 10.15966/j.cnki.dnydx.2024.05.013
Abstract112)            Save
Recognizing emotions through facial expressions has been widely applied in normal life. Among deep learning algo‐ rithms, Convolutional Neural Networks (CNN) have achieved great success in the field of facial expression recognition. However, it still faces the problem of information redundancy and data deviation, which affects the performance of facial expression recognition algorithm. Therefore, a Multi-scale Image Convolutional Network (GCN) based on landmarks extracted from facial images is pro‐ posed. The proposed method is simulated on CK+, JAFFE, FER2013 and RAF-DB datasets. The results show that the proposed method is superior to AUDN, BDBN, SCNN and other traditional deep learning frameworks, and has higher accuracy on different data sets.
Related Articles | Metrics
Research on Intelligent Financial System Based on OCR and Large Language Model
HUANG Zi-cong CHEN Dian-can OU Run-feng LUO Jing PENG Xin-dong
Computer & Telecommunication    2024, 1 (1): 1-3.   DOI: 10.15966/j.cnki.dnydx.2024.z1.005
Abstract205)            Save
With the rapid development of information technology and the growing demand for financial management and financial analyses, bookkeeping is no longer limited to ordinary handwriting or manual recording in software. In order to meet the needs and development of today's era, an intelligent financial system based on OCR and large language model is designed. The system is suit‐ able for mobile phones, with financial management functions as the starting point and simplified management operations as the pur‐ pose, and realizes a system that is mainly based on OCR recognition scanning and recording bookkeeping functions, supplemented by financial analysis functions of big language model, big data consumption classification trends, and multi-version switching of ver‐ sions suitable for people of different age groups. The system not only greatly improves the efficiency of people's bookkeeping, but also promotes the intelligent financial transformation of society.
Related Articles | Metrics
Research on Course Fusion Mode Based on Holographic Projection Technology
YANG Su-hui LUO Shao-ye
Computer & Telecommunication    2024, 1 (3): 41-.   DOI: 10.15966/j.cnki.dnydx.2024.03.007
Abstract122)            Save
In traditional teaching, due to differences in teachers, the knowledge connections between different courses are often over‐ looked, resulting in excessive repetition or failure to integrate new and old knowledge points. To make the knowledge points more smoothly connected in teaching, we help students to establish a knowledge connection system. Firstly, we organize a teaching salon where teachers fill out a teaching knowledge connection table to find fusion points between courses. Secondly, we use holographic projection technology to build a holographic projection pyramid. Finally, we use holographic projection during the teaching to help students recall previously learned knowledge and better integrate it with new knowledge, and understand new information. To sum up, holographic projection technology visualizes models in courses, deepens students' impressions, increases visual stimulation dur‐ ing learning, and enhances students' interest in learning. This innovative form of teaching tool and teaching method helps to deepen students' understanding and absorption of knowledge.
Related Articles | Metrics
The Literature Review about Sentiment Analysis in Network Public Opinion Research in China
YOU Dan-dan LUO Shao-ye
Computer & Telecommunication    2024, 1 (3): 64-.   DOI: 10.15966/j.cnki.dnydx.2024.03.006
Abstract216)            Save
With the popularization of the internet and social media, the impact of network public opinion on the social level cannot be underestimated, and sentiment analysis in network public opinion is of utmost importance. This paper collects, organizes, and summarizes relevant literature on sentiment analysis in network public opinion research in China, adopting bibliometric methods to analyze the quantity of literature, co-occurrence of high-frequency keywords, and evolution of theme keywords. Following the pro‐ cess of sentiment analysis in network public opinion research, this study analyzes the main research content, ideas, and methods in data collection, data processing, sentiment recognition(classification/tendency),sentiment evolution. Finally, this study points out fu‐ ture research directions, and gives the working directions of next steps.
Related Articles | Metrics
An Anonymous Traffic Detection Method Based on Entropy Estimation
YIN Zhen
Computer & Telecommunication    2023, 1 (5): 58-.   DOI: 10.15966/j.cnki.dnydx.2023.05.008
Abstract232)            Save
Anonymous communication can effectively protect personal privacy and data security, but it is also used by criminals to evade network censorship and engage in various illegal activities because of its concealment. The characteristics of anonymous traffic protocols are concealed, traffic characteristics are confused, and detection of anonymous traffic is difficult. In order to strengthen the supervision of anonymous traffic, this paper proposes an anonymous traffic detection method based on entropy estimation. Through the analysis of the packet entropy characteristics of the network session, the entropy value of the encrypted message sequence is used as the input feature of the classifier, and combined with the eXtreme Gradient Boosting Tree (XGBoost) algorithm, the detection of anonymous traffic is realized. Different from the existing anonymous traffic feature detection methods based on protocol features and traffic features, this method extracts the characteristics of the traffic itself for research. The experimental results show that the accuracy of this method can reach 98%.
Related Articles | Metrics
A Method of Network Resource Retrieval for Distance Multimedia Education Based on Knowledge Map
QIAO Wen-zeng
Computer & Telecommunication    2023, 1 (5): 105-.   DOI: 10.15966/j.cnki.dnydx.2023.05.017
Abstract164)            Save
Related Articles | Metrics
The Implementation of IPv6 Network Deployment and IPv4 Network Security Reinforcement for Web Application Systems Based on Intelligent DNS and Reverse Proxy
WU Guo-song
Computer & Telecommunication    2024, 1 (3): 7-.   DOI: 10.15966/j.cnki.dnydx.2024.03.001
Abstract149)            Save
Based on the core technology of the next generation Internet IPv6, which has the characteristics of large enough address space, higher security, better service quality and supporting mobile terminal equipment, the information development of universities is gradually promoting the IPv6 network deployment and IPv6 network application of information system. However, in the process of promoting IPv6 network deployment and access of application systems in universities, there are still some problems that some un‐ derlying network devices do not support IPv6 protocol, and security devices cannot achieve comprehensive control. In order not to change the current school network architecture, without affecting the current IPv4 network access, this paper puts forward the imple‐ mentation of IPv6 network deployment and access for college Web application system based on the intelligent DNS and reverse proxy. This technology has the characteristics of simple principle, strong stability, high security and easy maintenance. Through link‐ age deployment, IPv6 network access and IPv4 access security reinforcement of the school application system are realized, which provides reference practice for the deployment of IPv6 network application.
Related Articles | Metrics
Analysis of Public Sentiment in Libraries Based on Text Mining
WANG Long-jun WANG Jing LI Guang-hua CHEN Liang
Computer & Telecommunication    2024, 1 (3): 13-.   DOI: 10.15966/j.cnki.dnydx.2024.03.020
Abstract119)            Save
With the increasing influence of mobile Internet on young readers in university libraries, the proportion of new generation readers using QQ instant messaging software is increasing, text mining of library QQ group text information can be used to under‐ stand the public sentiment of the library, which can be used for library public sentiment warning and provide strong public sentiment response capabilities for library decision-makers. Web crawler technology is used to crawl chat records in QQ groups from Septem‐ ber 2022 to December 2022 as library public sentiment data, then performing data preprocessing operations such as deduplication and cleaning on the original public sentiment data. Then, Tsinghua University's Thulac segmentation technology is used to extract keywords and calculate their weights from the public sentiment data, and them the WordCloud library is used for visualization. Next, the spaCy library is used to to calculate specific emotional tendencies and scores for public opinion data, and finally the emotional tendencies of library public opinion are analyzed through experiments.
Related Articles | Metrics
CSI-based Indoor Localization Method Using IDW Interpolation and Amplitude-phase Fusion Network
RU Chun-rui DANG Xiao-chao
Computer & Telecommunication    2024, 1 (3): 1-6.  
Abstract170)            Save
To address the problem of poor localization performance caused by the small number of fingerprint points and the lack of representativeness of fingerprint features in the offline phase of fingerprint-based indoor localization, a CSI-based indoor localiza‐ tion method is proposed using Inverse Distance Weighted (IDW) interpolation and amplitude-phase fusion network. The IDW inter‐ polation algorithm is used to generate a large-capacity fingerprint library. Then, a parallel convolutional neural network (CNN) is used to process the amplitude and phase to obtain the positional fingerprint features. Finally, a novel integrated architecture fusing Random Forest (RF) and Multilayer Perceptron (MLP) is used for classification to obtain the estimated positions of the target loca‐ tion samples.
Related Articles | Metrics
Aerial Vehicle Detection in Low Light Environment Based on Yolov5
XIN Bo-fu
Computer & Telecommunication    2024, 1 (1): 78-83.   DOI: 10.15966/j.cnki.dnydx.2024.z1.010
Abstract124)            Save
An improved algorithm is proposed to address the problem that yolov5 detects UAV aerial images with poor monitoring performance for low light background targets. Firstly, data normalization is performed on the target dataset visdrone2019 to improve the detection effect. Then the dynamic convolution kernel with Mish activation function and the C3_DSConv module using distrib‐ uted offset convolution to replace the C3 block are introduced, and the above two convolution structures are fused into the yolov5 network; the BiFormer attention mechanism is embedded to improve the accuracy of small target detection. In summary, the MODByolov5 model is finally obtained, and the experimental results prove that the model's mAP and recall are both improved, and the ac‐ curacy of detecting vehicles in shadows and dark environments is significantly increased, and the FPS is high, which ensures that the model can still be used for rapid detection or real-time monitoring.
Related Articles | Metrics
Research on Upgrading Method of E-government Extranet Based on SPN and Super SIM Zero Trust Security Gateway
WANG Ning GUO Gong-hua
Computer & Telecommunication    2024, 1 (1): 56-61.   DOI: 10.15966/j.cnki.dnydx.2024.z1.006
Abstract151)            Save
Government extranet is an important infrastructure of e-government in China. In the new era, Guangdong Province pro‐ poses to build a new generation government extranet with "resilience, comprehensive integration and extensive coverage", which puts forward higher requirements for the coverage, stability and security of the network. Therefore, combining SPN technology and Super SIM zero trust security gateway technology, this paper discusses the planning, design and construction of a new generation of government extranet.
Related Articles | Metrics
Computer & Telecommunication    2024, 1 (3): 93-.   DOI: 10.15966/j.cnki.dnydx.2024.03.017
Abstract141)            Save
Related Articles | Metrics
Computer & Telecommunication    2024, 1 (3): 65-.   DOI: 10.15966/j.cnki.dnydx.2024.03.015
Abstract125)            Save
Related Articles | Metrics
Four-step Matlab Modeling of 3D Woven Composites
HU Jia-bin
Computer & Telecommunication    2024, 1 (5): 14-.   DOI: 10.15966/j.cnki.dnydx.2024.05.018
Abstract101)            Save
Based on the basic principles of the four-step method (1×1) weaving technology, a detailed analysis is conducted on the periodic motion of the yarn carrier and the trajectory of the yarn in space during the weaving process. Utilizing Matlab software, two binary variables are defined to track the regular movement of the yarn carrier in a programmatic form. Based on a series of hypotheti‐ cal conditions for the yarn, the internal structure of three-dimensional woven composite materials is represented using an inner cell characterization, and a three-dimensional four-directional structure unit cell model is established. Meanwhile, by providing the spa‐ tial coordinates of the yarn, the modeling of the three-dimensional woven composite material preform is completed using Texgen software.
Related Articles | Metrics
Research and Implementation of Imitation Learning Algorithm
ZHANG Yu-meng JI Xiao-jun
Computer & Telecommunication    2023, 1 (5): 38-.   DOI: 10.15966/j.cnki.dnydx.2023.05.020
Abstract184)            Save
In order to optimize reinforcement learning for the great errors causing by the unclear reward function, this paper deeply studies and implements the behavior cloning algorithm and data aggregation algorithm in the imitation learning algorithm. The algorithm flow is modeled by activity diagram, the relationship between classes is modeled by class diagram, and the core interaction process is modeled by sequence diagram. According to the experimental results, this paper compares the advantages and disadvantages of the behavior cloning algorithm and the data aggregation algorithm, and discovers that the behavior cloning algorithm offline training can avoid interaction with the real environment, but error accumulation will lead to error results; data aggregation algorithms must interact with the environment online, and select the corresponding state of the observation value according to the strategy to solve the problem of error accumulation.
Related Articles | Metrics
Operation of Mediation and Regulation Effect Based on Python Language
ZHONG Zhi-qiang GAO Hong
Computer & Telecommunication    2023, 1 (5): 45-.   DOI: 10.15966/j.cnki.dnydx.2023.05.013
Abstract221)            Save
Based on the operation of mediation and regulation effect in Python language, the analysis process of mediation and regulation effect is realized by using Pandas library and Statsmodels library of Python language, and the basic principles and analysis steps of mediation and regulation effect are clarified. It mainly demonstrates the bootstrap method instead of Sobel test in intermediary test, the realization of grouping regression by weighted least square method in adjustment test, as well as the commonly used two factor analysis of variance and interactive multiple regression analysis.
Related Articles | Metrics
Research on Introducing Educational Robots into C Language Programming Teaching
XIE Chang-ying WANG Chun-ling
Computer & Telecommunication    2024, 1 (1): 14-16.   DOI: 10.15966/j.cnki.dnydx.2024.z1.013
Abstract128)            Save
By analyzing the problems in the traditional teaching mode of C Language Programming, this paper discusses the teach‐ ing framework and implementation plan of applying educational robots to C Language Programming teaching, and discusses the transformation of teacher roles.By introducing educational robots, it is possible to stimulate students' interest in learning, mobilize their internal drive for learning, improve their problem-solving ability, strengthen their teamwork awareness and innovative spirit, and effectively improve teaching effectiveness.
Related Articles | Metrics
Construction and Application of Knowledge Graph of River Pollution
ZHANG Jing-wu SONG Jin-ling, JIA Dong-yan, MENG Hai-tao ZHANG Chen-lu
Computer & Telecommunication    2023, 1 (5): 12-.   DOI: 10.15966/j.cnki.dnydx.2023.05.014
Abstract191)            Save
In response to the problem of weak correlation between related elements in current river pollution incidents, a river pollution knowledge graph is constructed and applied based on the advantages of knowledge representation in knowledge graphs. Firstly, the construction methods of the pattern layer and data layer of the knowledge graph are sorted out. Then, take the Mulanxi River Basin for example, the pattern layer of the river pollution knowledge graph is constructed in a top-down manner, the data layer is constructed using structured data and unstructured data extraction techniques, and the knowledge is stored and applied using the Neo4j graph database. Finally, rapid tracing of a pollution event in the Mulanxi River Basin is achieved using this knowledge graph. The experiment shows that the construction of this river pollution knowledge graph solves the problems of scattered data and weak correlation in water pollution events effectively, which can provide certain application value for rapid tracing of water pollution events.
Related Articles | Metrics
Electronic Training Teaching Reform and Practice Based on Discipline Competition
GUO Gen GUO Li-qiao WANG Jun-jie ZHOU Zhen CHEN Qian-yu
Computer & Telecommunication    2023, 1 (5): 18-.   DOI: 10.15966/j.cnki.dnydx.2023.05.010
Abstract167)            Save
Take Zhengzhou University of Light Industry for example, aiming at the problems existing in the traditional electronic training teaching mode, this paper proposes the teaching concept of "project driven+subject competition", and explores the open experimental mode after class to increase students' interest in learning, improves their autonomous learning and comprehensive analysis abilities, and cultivates students' unity and cooperation, hands-on ability, and innovation awareness. Based on our advantageous discipline competition experience, the teaching units of electricians and electronics are closely connected, thereby mobilizing students' enthusiasm to participate in discipline competitions. Teachers' teaching skills, teaching level, and comprehensive ability are improved in the teaching reform.
Related Articles | Metrics
Research on the Factors Influencing the Application Efficiency of E-learning Space for Primary and Secondary School Teachers Based on ISM Model 
LI Gao-xiang WU Yu
Computer & Telecommunication    2023, 1 (5): 21-.   DOI: 10.15966/j.cnki.dnydx.2023.05.006
Abstract212)            Save
Network learning space is the product of the deep integration of information technology and learning science. The application efficiency of teachers' network learning space has a strong practical significance in promoting digital teaching. Based on the review of relevant literature, combined with expert interviews, this paper uses Interpretative Structural Modeling to build a hierarchical structure model that affects the effectiveness of online learning space application of primary and secondary school teachers. The research shows that space resources, self-efficacy, perceived usefulness are the direct factors that affect teachers' use of online learning space; School concept and the support of relevant policies are the basic influencing factors; Teacher related training, infrastructure conditions, space management, teacher incentive strategies and so on are indirect influencing factors. Based on the analysis of the structural characteristics, this paper gives some suggestions to promote the construction and high-quality development of online learning space for primary and secondary school teachers.
Related Articles | Metrics
Knowledge Graph Construction for Data Science and Big Data Technology
WANG Zi-ming XIAO Da-wei LIU Ya-nan
Computer & Telecommunication    2024, 1 (1): 32-34.   DOI: 10.15966/j.cnki.dnydx.2024.z1.007
Abstract171)            Save
Knowledge graph has been innovated in knowledge representation and management, and is widely used in fields such as intelligent search and question answering, but it has relatively few applications in the field of education and teaching. Based on knowledge graph and natural language processing technology, the main components of the course teaching plan are sorted out, the in‐ formation such as course entities, attributes and relationships are extracted from the talent training scheme and the course teaching plan, and the ontology model of the data science and big data technology professional course system is designed, which realizes the construction of the knowledge graph of the data science and big data technology professional course system.
Related Articles | Metrics
Design of SCN Facial Expression Recognition System Based on WeChat APP
YU Yan LIU Zhong-xu
Computer & Telecommunication    2024, 1 (1): 67-71.   DOI: 10.15966/j.cnki.dnydx.2024.z1.012
Abstract180)            Save
In view of facial expression recognition technology, the advantages of self-repair network (Self-Cure Network, SCN) fa‐ cial expression recognition algorithm model are used to realize the application of SCN on mobile terminal devices, using the trained model to build facial expression recognition system, and develop a wechat small program as the system platform.After the system test, the results show that the system has high expression recognition accuracy, convenient operation, smooth operation and complete functions.The SCN face expression recognition system based on wechat small program has a wide range of application prospects.
Related Articles | Metrics
Computer & Telecommunication    2024, 1 (6): 49-.   DOI: 10.15966/j.cnki.dnydx.2024.06.010
Abstract136)            Save
Related Articles | Metrics
Research on the Transformation of Scientific and Technological Achievements in Software Quality Inspection Based on Visual Knowledge Graph
ZHAO Chang-ping XU Ying-mei KUANG Bi-qin
Computer & Telecommunication    2024, 1 (1): 72-77.   DOI: 10.15966/j.cnki.dnydx.2024.z1.009
Abstract134)            Save
This paper uses the CiteSpace tool and literature statistical methods to conduct a visual knowledge graph analysis of the literature on the transformation of scientific and technological achievements in software quality inspection for the past 10 years. The high-frequency keywords "information security"、"software testing" and "network security" are current research hotspots with strong centrality, and the future will shift to "data encryption" which prominence intensity is 2.71. To promote the transformation of scien‐ tific and technological achievements, third-party quality testing institutions should cooperate deeply with research and development institutions, and leverage the data advantages of market testing and practical capabilities of achievement transformation, and strengthen detailed research on different sub characteristics in the field of quality inspection, and conduct more specific and intuitive analysis of each sub feature at the software application, and establish standards for testing technology through big data analysis. At the same time, it can also rely on artificial intelligence for cross penetration of sub features, achieving the sharing and complementar‐ ity of research and development resources. This paper summarizes the research strength, hotspots and cutting-edge trends of soft‐ ware quality inspection, and provides some reference value for promoting the transformation of subsequent achievements.
Related Articles | Metrics
Text Feature Selection Algorithm Based on Gradient Descent and Multi-index Fusion
LIU Shi-xing
Computer & Telecommunication    2023, 1 (5): 50-.   DOI: 10.15966/j.cnki.dnydx.2023.05.011
Abstract183)            Save
Related Articles | Metrics
Design and Implementation of Multi-core Parallel Particle Filter Algorithm
BIAN Ze-tao CHEN Hua
Computer & Telecommunication    2023, 1 (5): 63-.   DOI: 10.15966/j.cnki.dnydx.2023.05.019
Abstract149)            Save
Related Articles | Metrics
Research on Teaching Reform of Embedded System Based on OBE Concept
CAO Peng-fei
Computer & Telecommunication    2023, 1 (5): 70-.   DOI: 10.15966/j.cnki.dnydx.2023.05.007
Abstract210)            Save
Related Articles | Metrics
Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security
BAO Hai-yan
Computer & Telecommunication    2024, 1 (1): 4-7.   DOI: 10.15966/j.cnki.dnydx.2024.z1.001
Abstract213)            Save
With the rapid development of information technology, computer network security has become a focus of social attention. This article explores the teaching innovation and practice of Computer Network Security from the perspective of "ideological and po‐ litical guidance, integration of industry and education", aiming to cultivate outstanding talents with high awareness and skills of net‐ work security. The course utilizes Xuexi Tong APP to carry out blended online and offline teaching. Through the reconstruction of course content, improvement of teaching modes, innovation of teaching methods, integration of ideological and political elements, reform of teaching evaluation, and promotion of teaching effectiveness, the educational philosophy of "moral education first, studentcentered, integration of industry and education, and continuous improvement" is adopted to achieve the deep exploration of ideologi‐ cal and political elements in the course while imparting professional knowledge, integrate professional knowledge of network and se‐ curity with production practice, strengthen school enterprise cooperation, continue teaching reform, and build a learning community for teachers and students.
Related Articles | Metrics
Research on the Blended Examination Mode of Programming Courses in Applied Universities under the Background of New Engineering 
GUO Yun-di FU Xiang-hua
Computer & Telecommunication    2024, 1 (6): 95-98.   DOI: 10.15966/j.cnki.dnydx.2024.06.019
Abstract94)            Save
This paper analyzes the focus and relevance of traditional theoretical written exams and emerging online evaluation exams for programming courses in applied universities. Each exam mode focuses on di?erent abilities and can only re?ect one aspect of student capabilities. To adapt to the new engineering education concept and the needs of applied talent training, this paper proposes and practices a blended examination mode and designs a comprehensive exam system for it. Practice shows that this blended examination mode can better re?ect students’ comprehensive mastery of programming course knowledge, and the exam system provides strong support for the implementation of the blended examination mode.
Related Articles | Metrics
Driver Fatigue Driving Detection System Based on EAR Algorithm
XU Jin-qun XIE Ye-nan ZHOU Ying GU Xiu-xiu
Computer & Telecommunication    2024, 1 (6): 1-.   DOI: 10.15966/j.cnki.dnydx.2024.06.004
Abstract185)            Save
Related Articles | Metrics
Computer & Telecommunication    2024, 1 (5): 38-.  
Abstract56)            Save
Related Articles | Metrics
TrustOCCR: Social One Class Collaborative Ranking Recommendation Algorithm by Trust
LI Gai GUO Ze-hao
Computer & Telecommunication    2024, 1 (6): 7-10.   DOI: 10.15966/j.cnki.dnydx.2024.06.008
Abstract129)            Save
 The problem with previous studies of social One Class Collaborative Ranking (OCCR) algorithms is that they simply integrated the user's social network information into their model, without taking into account the transmission of social trust networks between users. To solve this problem, a new social one class collaborative ranking recommendation algorithm (TrustOCCR) based on CLiMF model and the newest TrustMF model is proposed, which aims to improve the performance of social one class collaborative ranking recommendation by integrating twofold sparse data, i.e., implicit feedback data and the transitive social trust network data. Experimental results on practical dataset show that our proposed TrustOCCR algorithm outperformed existing state-of-the-art OCCF approach over di?erent evaluation metrics, and that the TrustOCCR algorithm possesses good expansibility and is suitable for processing big data in the ?eld of internet information recommendation. 
Related Articles | Metrics
Evaluation of Campus One-card Service Based on AHP and Fuzzy Comprehensive Evaluation
WU Chuan-chuan
Computer & Telecommunication    2023, 1 (5): 100-.   DOI: 10.15966/j.cnki.dnydx.2023.05.018
Abstract147)            Save
Related Articles | Metrics
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd