Loading...
  • Table of Content
      10 August 2015, Volume 1 Issue 8 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    A FragileWatermarking Algorithm Based on Chaotic System
    Kuai Ligang, Liang Jiadong, Zhao Pan
    Computer & Telecommunication. 2015, 1 (8): 23-26.  
    Abstract     PDF(0KB)
    Digital watermarking is a kind of technology of hiding technology which is used to protect the copyright of digital products. In this paper, a new fragile digital watermarking algorithm based on hybrid visual bistable system is proposed. It divides the image into non-overlapped blocks, calculates the luminance of each block to decide the embedding depth and the length of chaotic sequence. For each pixel, an initial value is determined based on its prominent chrominance value, the position index, and the image protection key. Watermarking sequence is embedded into the embedding space of R,G,B respectively. Then it detects the temper by comparing the extracted watermarking and the produced one, until the error image is attained. Theoretical analysis and experiment result show that this algorithm is in high quality and locates the tamper position exactly.
    Related Articles | Metrics
    An Improved LSB of Image DigitalWatermarking Technology
    Yang Shuguo, Li Hao, Zhang Qi
    Computer & Telecommunication. 2015, 1 (8): 27-29.  
    Abstract     PDF(0KB)
    The digitization of information media provides a lot convenience for the information preservation and extraction. With the development of digital media transfer space expanding, the transfer time has been shorted. Digital products are easily infringed, pirated or juggled in the process of transmission. This paper aims at protecting the image information, the ownership of copyright and content integrity, uses the LSB technology to solve the problem of image information authentication, to realize the function of protecting the copyright of the digital information.
    Related Articles | Metrics
    Research on the Algorithm of Semi Fragile DigitalWatermarking Based on DCT conversion
    Zhang Qi, Li Hao
    Computer & Telecommunication. 2015, 1 (8): 30-32.  
    Abstract     PDF(0KB)
    This paper puts forward an algorithm of semi fragile digital watermarking based on DCT conversion. The origial image is splited and generates watermark by DCT conversion. And the image blocks are embedded with matrix generated by the keys. It utilizes the differences between the distorted halftone image and the extracted watermark to locate the tempering position. The experiments show that this algorithm gets high accuracy of the temper location.
    Related Articles | Metrics
    The DigitalWatermarking Based on Shearlet Transform and the Information Security
    Guo Junfeng, Li Jing, Wu Xinhui
    Computer & Telecommunication. 2015, 1 (8): 33-37.  
    Abstract     PDF(0KB)
    Related Articles | Metrics
    Research on the Talents Training Mode of School Enterprise Cooperation in Computer Specialty
    Cai Zhifeng
    Computer & Telecommunication. 2015, 1 (8): 35-37.  
    Abstract     PDF(0KB)
    As the base of personnel training, colleges and universities have invested considerable human, material and financial support in the field of computer science, forming the talents cultivation mode of school enterprise cooperation with computer industry as the chain. But in the present, there are still many problems such as weak government leading role, difficult practice for students, lack of school enterprise cooperation and un-fixed cross field school enterprise cooperation. Therefore, aiming at these problems, this article studies on the talents training mode of school enterprise cooperation for computer specialty, finds out solution to the existing problems, hoping to deepen the school enterprise cooperation mode, promoting the docking between computer professional talents and enterprise post, and improving the employment rate
    Related Articles | Metrics
    Design and Implementation of Distributed Automated Test System about Violence in Public Places
    Han Xiaoying, Wu Fengjie, Zhu Jing
    Computer & Telecommunication. 2015, 1 (8): 38-48.  
    Abstract     PDF(0KB)
    According to the actual need, this paper firstly designs the security monitoring system based on distributed network video. Then it particularly describes the working principle and flow of video camera with functions of image analysis, and improves the violence testing system in public places. Finally, violence is judged according to the changes in the optical flow field and the aggregated state of moving objects. The experimental results show that the embedded system has good accuracy, real- time performance and high reliability for recognition
    Related Articles | Metrics
    Discussion on Development Strategy of 2G Network in 4G Era
    Wang Baoyin, Mo Chong
    Computer & Telecommunication. 2015, 1 (8): 41-42.  
    Abstract     PDF(0KB)
    With the construction promotion and business promotion of 4G network, data services and voice services gradually shift to the 4G network. According to the development trend of the network, the business carried by 2G network will become more and less until eventually disappear. In this process, there should be a clear idea of the development of 2G network: how to assist the growth of 4G network while rationally allocating the original resources, and how to improve the efficiency of refarming the 800m and 900m frequency. This thesis discusses on the development strategy combining with the characteristics of 2G network and the development of 4G network.
    Related Articles | Metrics
    Analysis and Optimization of Distributed Computer Network Structure
    WuWeiwei
    Computer & Telecommunication. 2015, 1 (8): 43-45.  
    Abstract     PDF(0KB)
    Network sharing is an important symbol of contemporary network. How to better realize the network information transmission and management becomes an important research object in the computer industry. Among them, distributed computer network structure is the upgrade version of a normal computer. It has been very widely used in all walks of life as an important form for realizing information sharing. This paper first outlines the distributed computer network structure, then discusses on its performance and optimization respectively.
    Related Articles | Metrics
    Customization of MRGT Network Flow Monitor Chart
    LiuWeijing, Xu Bin He, Yunpu
    Computer & Telecommunication. 2015, 1 (8): 46-48.  
    Abstract     PDF(0KB)
    This paper researches on the popular network flow monitor software-MRTG, introduces its working principle. Then according to the actual needs, it introduces how to customize MRGT to realize the addition and subtraction of equipment ports, so as to get the flow chat of actual port on demand.
    Related Articles | Metrics
    Full Service Operation -- Design of the IDC Network of Mobile Corporation
    Chen Fenglian, Liu Tao
    Computer & Telecommunication. 2015, 1 (8): 49-56.  
    Abstract     PDF(0KB)
    With the development of full service operation of China Mobile, IDC platform is becoming more and more urgent. This paper first introduces the definition of IDC network, network architecture and main business, and then sets up the IDC network construction principle, and finally puts forward the design scheme of IDC network
    Related Articles | Metrics
    Discussion on the Embedded Mobile Database Technology
    Zhang Fenglai
    Computer & Telecommunication. 2015, 1 (8): 54-56.  
    Abstract     PDF(0KB)
    With the emergence of mobile computing technology, database technology has changed greatly, and embedded mobile database technology emerges as the times require.. This paper firstly introduces the basic concepts of embedded mobile database, and then describes the architecture of the embedded mobile database, finally discusses on some of the key technologies.
    Related Articles | Metrics
    Research on the Financial FMIS System Security Upgrade
    Yang Dagen
    Computer & Telecommunication. 2015, 1 (8): 57-61.  
    Abstract     PDF(0KB)
    In order to improve the safety of the financial system, three layer structures with Java client, application server, database server are designed. And the encryption and certification are used to improve the application level security. Firewall is installed in front of the server, the security access policy is set up, and the database backup host is added to improve the database security.
    Related Articles | Metrics
    Research on the Application of Exchange Visits of Educational Training Institutions Based on VPN Technology
    ZuoWentao, Zhao Xiaoping, Peng Yuling
    Computer & Telecommunication. 2015, 1 (8): 59-61.  
    Abstract     PDF(0KB)
    This paper describes the basic principle of VPN technology, related security technology and VPN implementation. Base on the current VPN technology commonly used methods and several typical applications, and combining with the specific circumstances of the education training institutions, it explores the problems of resource sharing of education training institutions and mobile office user remote access to the core digital resources of training institutions.
    Related Articles | Metrics
    Research on the Question Types of IT Network System Administration ofWorld Skills Competition
    LiWenyuan
    Computer & Telecommunication. 2015, 1 (8): 62-66.  
    Abstract     PDF(0KB)
    Since our institute is confirmed as the China training base by the government for IT network system administration of World Skills Competition, the computer network technology professional group of our department has done some deep researches in the question types; Defines the requirements of IT network system administration competition; Sort out the relevant technology of computer network, and introduce these technical documents to the computer network technology professional teaching program, so as to promote the development of large quantities of talents with the world skills competition level of network technology
    Related Articles | Metrics
    Study on the Enterprise Mobile Application Security Scheme
    Zhong Gengfang
    Computer & Telecommunication. 2015, 1 (8): 64-66.  
    Abstract     PDF(0KB)
    In today's society, market competition is increasingly fierce, while the enterprise management is increasingly sophisticated. As one of the important means of improving the efficiency of enterprises, enterprise mobile applications develop rapidly. However, mobile application security problems in the entire IT industry are not paid enough attention to. This paper mainly discusses on the security scheme of enterprise mobile applications, and uses some technical means to improve the security of enterprise mobile applications.
    Related Articles | Metrics
    Research and Design of the Student Achievement Push System Based on Android Platform
    Fu Juanjuan
    Computer & Telecommunication. 2015, 1 (8): 67-76.  
    Abstract     PDF(0KB)
    With the popularity of mobile smart phones and increase of scalability, in order to facilitate students' real-time query results, this paper presents a student achievement push system based on Android. It uses Push technology and B / S structure, completes network communication between the application server and the client based on TCP / IP long link, and then combines with the actual needs of the client to complete the entire process with application server, mobile client and proxy server.
    Related Articles | Metrics
    Discussion on the Planning and Construction of the Digital System of Urban Management ——Taking Meizhou Digital Urban Management as an Example
    Chen Haifeng
    Computer & Telecommunication. 2015, 1 (8): 70-72.  
    Abstract     PDF(0KB)
    By the overall planning and design of the digital urban management information system and the function construction of nine core basic application systems, the problems are solved which are faced by Meizhou city management with long management, information lag, and difficult coordination. Meizhou digital urban management is implemented, creating efficient, accurate and scientific management mode.
    Related Articles | Metrics
    Development of Small Chain Supermarket Cashier System
    Zhao Quan
    Computer & Telecommunication. 2015, 1 (8): 77-78.  
    Abstract     PDF(0KB)
    Small chain supermarket cashier system located in small chain supermarket has the functions of system management, shift management, commodity sales, promotion management, payment management, query and so on. This paper determines the system requirements, studies on the system flow, and discusses on the modules functions and related problems in development process
    Related Articles | Metrics
    Teaching Mode Reform of Web Design Course
    Zhou Lai, Liu Bingli
    Computer & Telecommunication. 2015, 1 (8): 79-81.  
    Abstract     PDF(0KB)
    From the teaching status of web design and production, this paper puts forward the strategy of project-driven teaching mode reform, and considers the use of the teaching mode in course, which has a certain generalization ability and practical value.
    Related Articles | Metrics
    Problems and Countermeasures of Network Teaching in Colleges and Unive
    Ma Yinqiang, Qu Benqing
    Computer & Telecommunication. 2015, 1 (8): 82-83.  
    Abstract     PDF(0KB)
    Network teaching has a very important role in the current college teaching. But problems expose as the network teaching popularizes, especially in the aspects of resource development, education implementation as well as teachers, which require changing the traditional educational philosophy and education mode. It needs to continuously integrate the information resources to achieve network teaching system, to improve teaching effectiveness. This paper analyzes the problems in college teaching, and then analyzes the countermeasures for problems.
    Related Articles | Metrics
  News More  


  Links More  


Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd