Loading...
Acta Metallurgica Sinica
Home
IMR Journals
Subscription
Advertisement
Contact us
中文
Search
Citation
Fig/Tab
adv Search
Just Accepted
|
Current Issue
|
Archive
|
Featured Articles
|
Special Collection
|
Most Read
|
Most Downloaded
|
Most Cited
Table of Content
10 May 2023, Volume 1 Issue 5
Previous Issue
Next Issue
For Selected:
View Abstracts
Download Citations
EndNote
Reference Manager
ProCite
BibTeX
RefWorks
Toggle Thumbnails
Select
Research on Mixed Teaching Model of Computational Thinking-oriented —— Take Data Structure for Example
SHI Zhen-tao SHAO Zi-jian HE Xiao-juan
Computer & Telecommunication. 2023,
1
(5): 1-4. DOI: 10.15966/j.cnki.dnydx.2023.05.002
Abstract
Related Articles
|
Metrics
Select
Exploration on the "Order-based Class" Talent Training Mode Based on Industry-education Integration under the "Strong Provincial Capital" Strategy
XUE Hai-ying
Computer & Telecommunication. 2023,
1
(5): 9-11. DOI: 10.15966/j.cnki.dnydx.2023.05.001
Abstract
Related Articles
|
Metrics
Select
Construction and Application of Knowledge Graph of River Pollution
ZHANG Jing-wu SONG Jin-ling, JIA Dong-yan, MENG Hai-tao ZHANG Chen-lu
Computer & Telecommunication. 2023,
1
(5): 12-. DOI: 10.15966/j.cnki.dnydx.2023.05.014
Abstract
In response to the problem of weak correlation between related elements in current river pollution incidents, a river pollution knowledge graph is constructed and applied based on the advantages of knowledge representation in knowledge graphs. Firstly, the construction methods of the pattern layer and data layer of the knowledge graph are sorted out. Then, take the Mulanxi River Basin for example, the pattern layer of the river pollution knowledge graph is constructed in a top-down manner, the data layer is constructed using structured data and unstructured data extraction techniques, and the knowledge is stored and applied using the Neo4j graph database. Finally, rapid tracing of a pollution event in the Mulanxi River Basin is achieved using this knowledge graph. The experiment shows that the construction of this river pollution knowledge graph solves the problems of scattered data and weak correlation in water pollution events effectively, which can provide certain application value for rapid tracing of water pollution events.
Related Articles
|
Metrics
Select
Electronic Training Teaching Reform and Practice Based on Discipline Competition
GUO Gen GUO Li-qiao WANG Jun-jie ZHOU Zhen CHEN Qian-yu
Computer & Telecommunication. 2023,
1
(5): 18-. DOI: 10.15966/j.cnki.dnydx.2023.05.010
Abstract
Take Zhengzhou University of Light Industry for example, aiming at the problems existing in the traditional electronic training teaching mode, this paper proposes the teaching concept of "project driven+subject competition", and explores the open experimental mode after class to increase students' interest in learning, improves their autonomous learning and comprehensive analysis abilities, and cultivates students' unity and cooperation, hands-on ability, and innovation awareness. Based on our advantageous discipline competition experience, the teaching units of electricians and electronics are closely connected, thereby mobilizing students' enthusiasm to participate in discipline competitions. Teachers' teaching skills, teaching level, and comprehensive ability are improved in the teaching reform.
Related Articles
|
Metrics
Select
Research on the Factors Influencing the Application Efficiency of E-learning Space for Primary and Secondary School Teachers Based on ISM Model
LI Gao-xiang WU Yu
Computer & Telecommunication. 2023,
1
(5): 21-. DOI: 10.15966/j.cnki.dnydx.2023.05.006
Abstract
Network learning space is the product of the deep integration of information technology and learning science. The application efficiency of teachers' network learning space has a strong practical significance in promoting digital teaching. Based on the review of relevant literature, combined with expert interviews, this paper uses Interpretative Structural Modeling to build a hierarchical structure model that affects the effectiveness of online learning space application of primary and secondary school teachers. The research shows that space resources, self-efficacy, perceived usefulness are the direct factors that affect teachers' use of online learning space; School concept and the support of relevant policies are the basic influencing factors; Teacher related training, infrastructure conditions, space management, teacher incentive strategies and so on are indirect influencing factors. Based on the analysis of the structural characteristics, this paper gives some suggestions to promote the construction and high-quality development of online learning space for primary and secondary school teachers.
Related Articles
|
Metrics
Select
Teaching Reform and Practice for Industrial Robot Virtual Simulation Guided by Innovation and Entrepreneurship
Computer & Telecommunication. 2023,
1
(5): 28-. DOI: 10.15966/j.cnki.dnydx.2023.05.004
Abstract
Related Articles
|
Metrics
Select
Reform and Practice of Ideological and Political Education in Equipment Configuration and Management
YAN Hai-yan YAN Zhen-ping WU Xian-wen
Computer & Telecommunication. 2023,
1
(5): 32-. DOI: 10.15966/j.cnki.dnydx.2023.05.012
Abstract
The course of Equipment Configuration and Management is very professional and practical. This course guides students' value orientation while imparting professional knowledge and skills. In this course, the standards of enterprise employment, industry norms, project implementation process, the truth of being human, learning strategies and methods, professional skills training and other contents are imperceptibly influenced in every class with professional knowledge and skills. It achieves real teaching and education.
Related Articles
|
Metrics
Select
Research and Implementation of Imitation Learning Algorithm
ZHANG Yu-meng JI Xiao-jun
Computer & Telecommunication. 2023,
1
(5): 38-. DOI: 10.15966/j.cnki.dnydx.2023.05.020
Abstract
In order to optimize reinforcement learning for the great errors causing by the unclear reward function, this paper deeply studies and implements the behavior cloning algorithm and data aggregation algorithm in the imitation learning algorithm. The algorithm flow is modeled by activity diagram, the relationship between classes is modeled by class diagram, and the core interaction process is modeled by sequence diagram. According to the experimental results, this paper compares the advantages and disadvantages of the behavior cloning algorithm and the data aggregation algorithm, and discovers that the behavior cloning algorithm offline training can avoid interaction with the real environment, but error accumulation will lead to error results; data aggregation algorithms must interact with the environment online, and select the corresponding state of the observation value according to the strategy to solve the problem of error accumulation.
Related Articles
|
Metrics
Select
Operation of Mediation and Regulation Effect Based on Python Language
ZHONG Zhi-qiang GAO Hong
Computer & Telecommunication. 2023,
1
(5): 45-. DOI: 10.15966/j.cnki.dnydx.2023.05.013
Abstract
Based on the operation of mediation and regulation effect in Python language, the analysis process of mediation and regulation effect is realized by using Pandas library and Statsmodels library of Python language, and the basic principles and analysis steps of mediation and regulation effect are clarified. It mainly demonstrates the bootstrap method instead of Sobel test in intermediary test, the realization of grouping regression by weighted least square method in adjustment test, as well as the commonly used two factor analysis of variance and interactive multiple regression analysis.
Related Articles
|
Metrics
Select
Text Feature Selection Algorithm Based on Gradient Descent and Multi-index Fusion
LIU Shi-xing
Computer & Telecommunication. 2023,
1
(5): 50-. DOI: 10.15966/j.cnki.dnydx.2023.05.011
Abstract
Related Articles
|
Metrics
Select
An Anonymous Traffic Detection Method Based on Entropy Estimation
YIN Zhen
Computer & Telecommunication. 2023,
1
(5): 58-. DOI: 10.15966/j.cnki.dnydx.2023.05.008
Abstract
Anonymous communication can effectively protect personal privacy and data security, but it is also used by criminals to evade network censorship and engage in various illegal activities because of its concealment. The characteristics of anonymous traffic protocols are concealed, traffic characteristics are confused, and detection of anonymous traffic is difficult. In order to strengthen the supervision of anonymous traffic, this paper proposes an anonymous traffic detection method based on entropy estimation. Through the analysis of the packet entropy characteristics of the network session, the entropy value of the encrypted message sequence is used as the input feature of the classifier, and combined with the eXtreme Gradient Boosting Tree (XGBoost) algorithm, the detection of anonymous traffic is realized. Different from the existing anonymous traffic feature detection methods based on protocol features and traffic features, this method extracts the characteristics of the traffic itself for research. The experimental results show that the accuracy of this method can reach 98%.
Related Articles
|
Metrics
Select
Design and Implementation of Multi-core Parallel Particle Filter Algorithm
BIAN Ze-tao CHEN Hua
Computer & Telecommunication. 2023,
1
(5): 63-. DOI: 10.15966/j.cnki.dnydx.2023.05.019
Abstract
Related Articles
|
Metrics
Select
Research on Teaching Reform of Embedded System Based on OBE Concept
CAO Peng-fei
Computer & Telecommunication. 2023,
1
(5): 70-. DOI: 10.15966/j.cnki.dnydx.2023.05.007
Abstract
Related Articles
|
Metrics
Select
The Innovative Practice of Integrating "Four Self-confidence" into the Teaching Mode of Network Supervision and Control
WANG Cai-ling
Computer & Telecommunication. 2023,
1
(5): 73-. DOI: 10.15966/j.cnki.dnydx.2023.05.005
Abstract
The course of Network Supervision and Control is one of the core courses of network security and law enforcement major in public security colleges. By analyzing the teaching status of this course, and on the basis of expounding the key contents of "Four self- confidence", this paper organically integrates "four self- confidence" into the classroom teaching of Network Supervision and Control, so as to realize the purpose of sublimating the teaching connotation of the course and building a new curriculum framework. This teaching mode can improve the overall design of the course, strengthen students' ideals and beliefs, ensure the teaching effect of the course, and lay a solid foundation for the training of network security professionals.
Related Articles
|
Metrics
Select
Assessment of the Impact of Enterprise Management Information System Integration on the Supply Chain and the Extraction of Order Parameters
KUANG Yun-ying LUO Guo-qiang
Computer & Telecommunication. 2023,
1
(5): 77-. DOI: 10.15966/j.cnki.dnydx.2023.05.016
Abstract
Related Articles
|
Metrics
Select
Research and Application of "One Case to the End" Teaching Method in UML Practical Teaching
HUANG Yan-hong
Computer & Telecommunication. 2023,
1
(5): 85-. DOI: 10.15966/j.cnki.dnydx.2023.05.009
Abstract
Related Articles
|
Metrics
Select
Research on Negative Charge Prediction Method Based on ResNet+GRU Combination Model
LIU Yi-qing CHEN Xin-fang ZHAO Han-qing
Computer & Telecommunication. 2023,
1
(5): 89-. DOI: 10.15966/j.cnki.dnydx.2023.05.021
Abstract
Related Articles
|
Metrics
Select
Evaluation of Campus One-card Service Based on AHP and Fuzzy Comprehensive Evaluation
WU Chuan-chuan
Computer & Telecommunication. 2023,
1
(5): 100-. DOI: 10.15966/j.cnki.dnydx.2023.05.018
Abstract
Related Articles
|
Metrics
Select
A Method of Network Resource Retrieval for Distance Multimedia Education Based on Knowledge Map
QIAO Wen-zeng
Computer & Telecommunication. 2023,
1
(5): 105-. DOI: 10.15966/j.cnki.dnydx.2023.05.017
Abstract
Related Articles
|
Metrics
News
More
Links
More
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd