Loading...
Acta Metallurgica Sinica
Home
IMR Journals
Subscription
Advertisement
Contact us
中文
Search
Citation
Fig/Tab
adv Search
Just Accepted
|
Current Issue
|
Archive
|
Featured Articles
|
Special Collection
|
Most Read
|
Most Downloaded
|
Most Cited
Table of Content
10 August 2015, Volume 1 Issue 8
Previous Issue
Next Issue
For Selected:
View Abstracts
Download Citations
EndNote
Reference Manager
ProCite
BibTeX
RefWorks
Toggle Thumbnails
Select
A FragileWatermarking Algorithm Based on Chaotic System
Kuai Ligang, Liang Jiadong, Zhao Pan
Computer & Telecommunication. 2015,
1
(8): 23-26.
Abstract
PDF
(0KB)
Digital watermarking is a kind of technology of hiding technology which is used to protect the copyright of digital products. In this paper, a new fragile digital watermarking algorithm based on hybrid visual bistable system is proposed. It divides the image into non-overlapped blocks, calculates the luminance of each block to decide the embedding depth and the length of chaotic sequence. For each pixel, an initial value is determined based on its prominent chrominance value, the position index, and the image protection key. Watermarking sequence is embedded into the embedding space of R,G,B respectively. Then it detects the temper by comparing the extracted watermarking and the produced one, until the error image is attained. Theoretical analysis and experiment result show that this algorithm is in high quality and locates the tamper position exactly.
Related Articles
|
Metrics
Select
An Improved LSB of Image DigitalWatermarking Technology
Yang Shuguo, Li Hao, Zhang Qi
Computer & Telecommunication. 2015,
1
(8): 27-29.
Abstract
PDF
(0KB)
The digitization of information media provides a lot convenience for the information preservation and extraction. With the development of digital media transfer space expanding, the transfer time has been shorted. Digital products are easily infringed, pirated or juggled in the process of transmission. This paper aims at protecting the image information, the ownership of copyright and content integrity, uses the LSB technology to solve the problem of image information authentication, to realize the function of protecting the copyright of the digital information.
Related Articles
|
Metrics
Select
Research on the Algorithm of Semi Fragile DigitalWatermarking Based on DCT conversion
Zhang Qi, Li Hao
Computer & Telecommunication. 2015,
1
(8): 30-32.
Abstract
PDF
(0KB)
This paper puts forward an algorithm of semi fragile digital watermarking based on DCT conversion. The origial image is splited and generates watermark by DCT conversion. And the image blocks are embedded with matrix generated by the keys. It utilizes the differences between the distorted halftone image and the extracted watermark to locate the tempering position. The experiments show that this algorithm gets high accuracy of the temper location.
Related Articles
|
Metrics
Select
The DigitalWatermarking Based on Shearlet Transform and the Information Security
Guo Junfeng, Li Jing, Wu Xinhui
Computer & Telecommunication. 2015,
1
(8): 33-37.
Abstract
PDF
(0KB)
Related Articles
|
Metrics
Select
Research on the Talents Training Mode of School Enterprise Cooperation in Computer Specialty
Cai Zhifeng
Computer & Telecommunication. 2015,
1
(8): 35-37.
Abstract
PDF
(0KB)
As the base of personnel training, colleges and universities have invested considerable human, material and financial support in the field of computer science, forming the talents cultivation mode of school enterprise cooperation with computer industry as the chain. But in the present, there are still many problems such as weak government leading role, difficult practice for students, lack of school enterprise cooperation and un-fixed cross field school enterprise cooperation. Therefore, aiming at these problems, this article studies on the talents training mode of school enterprise cooperation for computer specialty, finds out solution to the existing problems, hoping to deepen the school enterprise cooperation mode, promoting the docking between computer professional talents and enterprise post, and improving the employment rate
Related Articles
|
Metrics
Select
Design and Implementation of Distributed Automated Test System about Violence in Public Places
Han Xiaoying, Wu Fengjie, Zhu Jing
Computer & Telecommunication. 2015,
1
(8): 38-48.
Abstract
PDF
(0KB)
According to the actual need, this paper firstly designs the security monitoring system based on distributed network video. Then it particularly describes the working principle and flow of video camera with functions of image analysis, and improves the violence testing system in public places. Finally, violence is judged according to the changes in the optical flow field and the aggregated state of moving objects. The experimental results show that the embedded system has good accuracy, real- time performance and high reliability for recognition
Related Articles
|
Metrics
Select
Discussion on Development Strategy of 2G Network in 4G Era
Wang Baoyin, Mo Chong
Computer & Telecommunication. 2015,
1
(8): 41-42.
Abstract
PDF
(0KB)
With the construction promotion and business promotion of 4G network, data services and voice services gradually shift to the 4G network. According to the development trend of the network, the business carried by 2G network will become more and less until eventually disappear. In this process, there should be a clear idea of the development of 2G network: how to assist the growth of 4G network while rationally allocating the original resources, and how to improve the efficiency of refarming the 800m and 900m frequency. This thesis discusses on the development strategy combining with the characteristics of 2G network and the development of 4G network.
Related Articles
|
Metrics
Select
Analysis and Optimization of Distributed Computer Network Structure
WuWeiwei
Computer & Telecommunication. 2015,
1
(8): 43-45.
Abstract
PDF
(0KB)
Network sharing is an important symbol of contemporary network. How to better realize the network information transmission and management becomes an important research object in the computer industry. Among them, distributed computer network structure is the upgrade version of a normal computer. It has been very widely used in all walks of life as an important form for realizing information sharing. This paper first outlines the distributed computer network structure, then discusses on its performance and optimization respectively.
Related Articles
|
Metrics
Select
Customization of MRGT Network Flow Monitor Chart
LiuWeijing, Xu Bin He, Yunpu
Computer & Telecommunication. 2015,
1
(8): 46-48.
Abstract
PDF
(0KB)
This paper researches on the popular network flow monitor software-MRTG, introduces its working principle. Then according to the actual needs, it introduces how to customize MRGT to realize the addition and subtraction of equipment ports, so as to get the flow chat of actual port on demand.
Related Articles
|
Metrics
Select
Full Service Operation -- Design of the IDC Network of Mobile Corporation
Chen Fenglian, Liu Tao
Computer & Telecommunication. 2015,
1
(8): 49-56.
Abstract
PDF
(0KB)
With the development of full service operation of China Mobile, IDC platform is becoming more and more urgent. This paper first introduces the definition of IDC network, network architecture and main business, and then sets up the IDC network construction principle, and finally puts forward the design scheme of IDC network
Related Articles
|
Metrics
Select
Discussion on the Embedded Mobile Database Technology
Zhang Fenglai
Computer & Telecommunication. 2015,
1
(8): 54-56.
Abstract
PDF
(0KB)
With the emergence of mobile computing technology, database technology has changed greatly, and embedded mobile database technology emerges as the times require.. This paper firstly introduces the basic concepts of embedded mobile database, and then describes the architecture of the embedded mobile database, finally discusses on some of the key technologies.
Related Articles
|
Metrics
Select
Research on the Financial FMIS System Security Upgrade
Yang Dagen
Computer & Telecommunication. 2015,
1
(8): 57-61.
Abstract
PDF
(0KB)
In order to improve the safety of the financial system, three layer structures with Java client, application server, database server are designed. And the encryption and certification are used to improve the application level security. Firewall is installed in front of the server, the security access policy is set up, and the database backup host is added to improve the database security.
Related Articles
|
Metrics
Select
Research on the Application of Exchange Visits of Educational Training Institutions Based on VPN Technology
ZuoWentao, Zhao Xiaoping, Peng Yuling
Computer & Telecommunication. 2015,
1
(8): 59-61.
Abstract
PDF
(0KB)
This paper describes the basic principle of VPN technology, related security technology and VPN implementation. Base on the current VPN technology commonly used methods and several typical applications, and combining with the specific circumstances of the education training institutions, it explores the problems of resource sharing of education training institutions and mobile office user remote access to the core digital resources of training institutions.
Related Articles
|
Metrics
Select
Research on the Question Types of IT Network System Administration ofWorld Skills Competition
LiWenyuan
Computer & Telecommunication. 2015,
1
(8): 62-66.
Abstract
PDF
(0KB)
Since our institute is confirmed as the China training base by the government for IT network system administration of World Skills Competition, the computer network technology professional group of our department has done some deep researches in the question types; Defines the requirements of IT network system administration competition; Sort out the relevant technology of computer network, and introduce these technical documents to the computer network technology professional teaching program, so as to promote the development of large quantities of talents with the world skills competition level of network technology
Related Articles
|
Metrics
Select
Study on the Enterprise Mobile Application Security Scheme
Zhong Gengfang
Computer & Telecommunication. 2015,
1
(8): 64-66.
Abstract
PDF
(0KB)
In today's society, market competition is increasingly fierce, while the enterprise management is increasingly sophisticated. As one of the important means of improving the efficiency of enterprises, enterprise mobile applications develop rapidly. However, mobile application security problems in the entire IT industry are not paid enough attention to. This paper mainly discusses on the security scheme of enterprise mobile applications, and uses some technical means to improve the security of enterprise mobile applications.
Related Articles
|
Metrics
Select
Research and Design of the Student Achievement Push System Based on Android Platform
Fu Juanjuan
Computer & Telecommunication. 2015,
1
(8): 67-76.
Abstract
PDF
(0KB)
With the popularity of mobile smart phones and increase of scalability, in order to facilitate students' real-time query results, this paper presents a student achievement push system based on Android. It uses Push technology and B / S structure, completes network communication between the application server and the client based on TCP / IP long link, and then combines with the actual needs of the client to complete the entire process with application server, mobile client and proxy server.
Related Articles
|
Metrics
Select
Discussion on the Planning and Construction of the Digital System of Urban Management ——Taking Meizhou Digital Urban Management as an Example
Chen Haifeng
Computer & Telecommunication. 2015,
1
(8): 70-72.
Abstract
PDF
(0KB)
By the overall planning and design of the digital urban management information system and the function construction of nine core basic application systems, the problems are solved which are faced by Meizhou city management with long management, information lag, and difficult coordination. Meizhou digital urban management is implemented, creating efficient, accurate and scientific management mode.
Related Articles
|
Metrics
Select
Discussion on Earthing Design of Low-voltage Power Distribution Systems forWater Supply andWastewater Engineering
Bai Jingzhong
Computer & Telecommunication. 2015,
1
(8): 73-76.
Abstract
PDF
(0KB)
Related Articles
|
Metrics
Select
Development of Small Chain Supermarket Cashier System
Zhao Quan
Computer & Telecommunication. 2015,
1
(8): 77-78.
Abstract
PDF
(0KB)
Small chain supermarket cashier system located in small chain supermarket has the functions of system management, shift management, commodity sales, promotion management, payment management, query and so on. This paper determines the system requirements, studies on the system flow, and discusses on the modules functions and related problems in development process
Related Articles
|
Metrics
Select
Teaching Mode Reform of Web Design Course
Zhou Lai, Liu Bingli
Computer & Telecommunication. 2015,
1
(8): 79-81.
Abstract
PDF
(0KB)
From the teaching status of web design and production, this paper puts forward the strategy of project-driven teaching mode reform, and considers the use of the teaching mode in course, which has a certain generalization ability and practical value.
Related Articles
|
Metrics
Select
Problems and Countermeasures of Network Teaching in Colleges and Unive
Ma Yinqiang, Qu Benqing
Computer & Telecommunication. 2015,
1
(8): 82-83.
Abstract
PDF
(0KB)
Network teaching has a very important role in the current college teaching. But problems expose as the network teaching popularizes, especially in the aspects of resource development, education implementation as well as teachers, which require changing the traditional educational philosophy and education mode. It needs to continuously integrate the information resources to achieve network teaching system, to improve teaching effectiveness. This paper analyzes the problems in college teaching, and then analyzes the countermeasures for problems.
Related Articles
|
Metrics
News
More
Links
More
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd