Home Table of Contents

28 May 2024, Volume 1 Issue 3
    

  • Select all
    |
  • RU Chun-rui  DANG Xiao-chao
    Computer & Telecommunication. 2024, 1(3): 1-6.
    Abstract ( )   Knowledge map   Save
    To address the problem of poor localization performance caused by the small number of fingerprint points and the lack of representativeness of fingerprint features in the offline phase of fingerprint-based indoor localization, a CSI-based indoor localiza‐ tion method is proposed using Inverse Distance Weighted (IDW) interpolation and amplitude-phase fusion network. The IDW inter‐ polation algorithm is used to generate a large-capacity fingerprint library. Then, a parallel convolutional neural network (CNN) is used to process the amplitude and phase to obtain the positional fingerprint features. Finally, a novel integrated architecture fusing Random Forest (RF) and Multilayer Perceptron (MLP) is used for classification to obtain the estimated positions of the target loca‐ tion samples.
  • WU Guo-song
    Computer & Telecommunication. 2024, 1(3): 7. https://doi.org/10.15966/j.cnki.dnydx.2024.03.001
    Abstract ( )   Knowledge map   Save
    Based on the core technology of the next generation Internet IPv6, which has the characteristics of large enough address space, higher security, better service quality and supporting mobile terminal equipment, the information development of universities is gradually promoting the IPv6 network deployment and IPv6 network application of information system. However, in the process of promoting IPv6 network deployment and access of application systems in universities, there are still some problems that some un‐ derlying network devices do not support IPv6 protocol, and security devices cannot achieve comprehensive control. In order not to change the current school network architecture, without affecting the current IPv4 network access, this paper puts forward the imple‐ mentation of IPv6 network deployment and access for college Web application system based on the intelligent DNS and reverse proxy. This technology has the characteristics of simple principle, strong stability, high security and easy maintenance. Through link‐ age deployment, IPv6 network access and IPv4 access security reinforcement of the school application system are realized, which provides reference practice for the deployment of IPv6 network application.
  • WANG Long-jun WANG Jing LI Guang-hua CHEN Liang
    Computer & Telecommunication. 2024, 1(3): 13. https://doi.org/10.15966/j.cnki.dnydx.2024.03.020
    Abstract ( )   Knowledge map   Save
    With the increasing influence of mobile Internet on young readers in university libraries, the proportion of new generation readers using QQ instant messaging software is increasing, text mining of library QQ group text information can be used to under‐ stand the public sentiment of the library, which can be used for library public sentiment warning and provide strong public sentiment response capabilities for library decision-makers. Web crawler technology is used to crawl chat records in QQ groups from Septem‐ ber 2022 to December 2022 as library public sentiment data, then performing data preprocessing operations such as deduplication and cleaning on the original public sentiment data. Then, Tsinghua University's Thulac segmentation technology is used to extract keywords and calculate their weights from the public sentiment data, and them the WordCloud library is used for visualization. Next, the spaCy library is used to to calculate specific emotional tendencies and scores for public opinion data, and finally the emotional tendencies of library public opinion are analyzed through experiments.
  • LIU Chun TAN Kun ZHANG Li-hua LI Hong-bo AN Yuan
    Computer & Telecommunication. 2024, 1(3): 17. https://doi.org/10.15966/j.cnki.dnydx.2024.03.003
    Abstract ( )   Knowledge map   Save
    This paper explores the construction of virtual simulation experiments based on course groups, optimizes and integrates the experimental teaching content of core courses within the course groups from a systematic and global perspective, focuses on the connection and collaboration of experimental content between courses, and establishes a progressive virtual simulation experimental teaching platform through the organization and implementation of experimental teaching for course groups. It provides a good solu‐ tion for the experimental teaching reform of cloud computing and automated operation and maintenance course group under the background of New Engineering.
  • ZHANG Bi-xian
    Computer & Telecommunication. 2024, 1(3): 21. https://doi.org/10.15966/j.cnki.dnydx.2024.03.016
    Abstract ( )   Knowledge map   Save
    With the rapid development of computer science and technology, computer technology has enormous potential in the field of education, especially in the application of modern medical practice. This paper aims to explore the reform of the practical teach‐ ing system of integrating basic medical theories and applications into computer science in the context of New Engineering, achiev‐ ing the integration of information technology practical teaching and medical knowledge, improving students' learning effectiveness, promoting practical ability improvement, and cultivating students' innovative thinking. The methods and achievements of the reform around the determination of talent cultivation goals for the crossover of computer major and modern medicine, the construction of practical teaching system, and the exploration of the education model for the integration of industry and education are introduced in the paper.
  • LIU Ping WANG Shi-wei JIANG Meng-yun
    Computer & Telecommunication. 2024, 1(3): 24. https://doi.org/10.15966/j.cnki.dnydx.2024.03.004
    Abstract ( )   Knowledge map   Save
  • JIANG Jian-ting DENG Wen-qiang ZENG Teng-xiang DAI Zhen-hua
    Computer & Telecommunication. 2024, 1(3): 31. https://doi.org/10.15966/j.cnki.dnydx.2024.03.005
    Abstract ( )   Knowledge map   Save
    This study designs an intelligent sleep massage pillow system, aiming to provide users with effective sleep protection. The system adopts TGAM brain wave detection, temperature and humidity control, massage control, Bluetooth, WIFI and other module technologies to control smart sleep products in real time. It is a highly intelligent and fully automated process. In addition, the Sleep Care APP also has a sleep staging algorithm, automatically generates sleep depth analysis reports, and provides users with personal‐ ized sleep plans. It also uses an AI smart assistant to analyze users’ sleep conditions in real time, helping users improve their sleep experience more scientifically.
  • YANG Bo-han
    Computer & Telecommunication. 2024, 1(3): 36.
    Abstract ( )   Knowledge map   Save
    With the development of communication technology, chaotic communication technology has attracted the interest of many researchers for its resistance to multipath fading and strong confidentiality, among which Differential Chaos Shift Keying (DCSK) is the most widely studied non-coherent digital modulation scheme. Generalized Carrier Index Differential Chaos Shift Key‐ ing (GCI-DCSK) is the integration of the index modulation technique on the basis of DCSK, which further improves the system per‐ formance. In this paper, the GCI-DCSK modulation scheme is combined with the relay collaboration technique to extend the cover‐ age of the communication network and improve the communication quality.
  • YANG Su-hui LUO Shao-ye
    Computer & Telecommunication. 2024, 1(3): 41. https://doi.org/10.15966/j.cnki.dnydx.2024.03.007
    Abstract ( )   Knowledge map   Save
    In traditional teaching, due to differences in teachers, the knowledge connections between different courses are often over‐ looked, resulting in excessive repetition or failure to integrate new and old knowledge points. To make the knowledge points more smoothly connected in teaching, we help students to establish a knowledge connection system. Firstly, we organize a teaching salon where teachers fill out a teaching knowledge connection table to find fusion points between courses. Secondly, we use holographic projection technology to build a holographic projection pyramid. Finally, we use holographic projection during the teaching to help students recall previously learned knowledge and better integrate it with new knowledge, and understand new information. To sum up, holographic projection technology visualizes models in courses, deepens students' impressions, increases visual stimulation dur‐ ing learning, and enhances students' interest in learning. This innovative form of teaching tool and teaching method helps to deepen students' understanding and absorption of knowledge.
  • WU Shu-li
    Computer & Telecommunication. 2024, 1(3): 45. https://doi.org/10.15966/j.cnki.dnydx.2024.03.019
    Abstract ( )   Knowledge map   Save
    To solve the problem that the recognition efficiency of different types of attention mechanisms is too low in the person reidentification task, and the focus is too much on extracting single-granularity information, which makes it difficult to extend to realworld application scenarios, a fine-grained module based on local attention is proposed. The obtained coarse-grained feature repre‐ sentation is divided into multiple parts, guiding the network to extract finer-grained local clues. In addition, considering the short‐ comings of a single branch in extracting multi-granularity clues, a multi-branch fine-grained network is designed to further extract richer clues. Experimental results on mainstream datasets verify the effectiveness of the network proposed in this article
  • YUAN Yi-xia
    Computer & Telecommunication. 2024, 1(3): 52. https://doi.org/10.15966/j.cnki.dnydx.2024.03.009
    Abstract ( )   Knowledge map   Save
    In response to the current situation of multiple computer major courses with strong correlation being mutually indepen‐ dent and lacking comprehensive application in teaching, this article proposes an iterative teaching model of multi-course fusion proj‐ ect. The teaching of multiple courses revolves around the same large project, breaks down the large project into a series of iterative teaching tasks from easy to difficult, adopts an online and offline hybrid teaching method, and introduces the popular TAPD research and development platform in the industry as teaching assistance. Take the integration teaching of JAVA Program Design and Data‐ base Principles and Applications for example, this article introduces the teaching design and specific implementation process of this model in detail. 
  • YOU Dan-dan LUO Shao-ye
    Computer & Telecommunication. 2024, 1(3): 64. https://doi.org/10.15966/j.cnki.dnydx.2024.03.006
    Abstract ( )   Knowledge map   Save
    With the popularization of the internet and social media, the impact of network public opinion on the social level cannot be underestimated, and sentiment analysis in network public opinion is of utmost importance. This paper collects, organizes, and summarizes relevant literature on sentiment analysis in network public opinion research in China, adopting bibliometric methods to analyze the quantity of literature, co-occurrence of high-frequency keywords, and evolution of theme keywords. Following the pro‐ cess of sentiment analysis in network public opinion research, this study analyzes the main research content, ideas, and methods in data collection, data processing, sentiment recognition(classification/tendency),sentiment evolution. Finally, this study points out fu‐ ture research directions, and gives the working directions of next steps.