Loading...
  • Table of Content
      10 July 2016, Volume 1 Issue 7 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    Application Research and Practice ofWeChat in the Community Intelligence Service
    Wang Haoliang, Wang Lili
    Computer & Telecommunication. 2016, 1 (7): 1-4.  
    Abstract     PDF(0KB)
    Micro era puts forward new challenges to the traditional service mode of property companies. This paper proposes a community service platform based on WeChat, using Spring MVC integration framework, combined with Baidu map positioning and two-dimensional code generation technology to achieve integration of intelligent property services. And the community social networking platform is established. The relations between the neighborhood is closer through users online communication, online registration and topic voting, which improves the overall level of property management, improves the service quality, attracts the surrounding businesses into the application platform, and effectively expands the property value-added services.
    Related Articles | Metrics
    Watermark Algorithm in DWT Domain Based on Fractal Theory and HVS
    Zhang Bo, Wang Yuxin, Li Tianying, Yang Shuguo
    Computer & Telecommunication. 2016, 1 (7): 5-8.  
    Abstract     PDF(0KB)
    In order to protect the copyright of the image, this paper proposes a kind of watermark algorithm in DWT domain based on fractal theory and HVS. Firstly, the original image is transformed via DWT and the wavelet coefficients are divided into isotropic wavelet trees, then the domain subtrees and range subtrees are constructed in isotropic wavelet trees. It will divide domain subtrees into embedded domain subtrees and non-embedded domain subtrees by fractal theory matching, then the watermark is added in the embedded domain subtrees. We only embed part of information of the image and use the HVS module to control the capacity of the embedded watermark, which maximizes the robustness when the watermark is not visible and achieves the blind watermark extraction.
    Related Articles | Metrics
    Research on Image Encryption Algorithm Based on Chaos Theory
    Deng Hui
    Computer & Telecommunication. 2016, 1 (7): 9-11.  
    Abstract     PDF(0KB)
    The chaotic theory is booming, and the application of the chaotic system is also widely used day by day. Because of its unique dynamic characteristics, the chaotic system is very suitable for image encryption. The chaos theory is described. And the technology of image encryption is studied. The image encryption method of chaotic system and the design of image encryption algorithm based on chaos theory are proposed.
    Related Articles | Metrics
    Overview of Anti-jamming Technology in Global Navigation Satellite System
    Lan Shimei
    Computer & Telecommunication. 2016, 1 (7): 12-14.  
    Abstract     PDF(0KB)
    Now the GNSS has been widely used in various fields of the national economy and national defense. In the civil and military action, the dependence on satellite navigation system constantly enhances. The competition in satellite navigation is also increasingly fierce. The satellite communication is vulnerable to jamming, so it is necessary to study some effective and feasible methods of anti-jamming to avoid interference. This paper conducts a series of researches on communication anti-jamming technology and algorithm of GNSS, summaries the current situation and development trend of anti-jamming technology.
    Related Articles | Metrics
    Design of the Cloud Storage Authentication System Based on Fingerprint Identification
    Yao Bingying, Li Chuanqing, Li Chao
    Computer & Telecommunication. 2016, 1 (7): 15-17.  
    Abstract     PDF(0KB)
    For the lower safety problem in the "static password + real-time data" authentication modes of WEB cloud storage system, this paper designs an authentication system based on fingerprint identification technology. It uses the authentication model based on fingerprint identification for user identity authentication, improving the authentication security and reliability, and solving the issues of user account illegal access and tampering. It proposes the hybrid encryption algorithm based on symmetric encryption algorithm and asymmetric encryption algorithm which is used as a identity authentication protocol. This method effectively improves the certification efficiency, and realizes the effective transmission of huge amounts of data. The experimental results show that the scheme obtains very good application in the cloud storage identity authentication system.
    Related Articles | Metrics
    Design and Implementation of Network Security Audit System Based on Protocol Analysis
    Liu Xiaoxiao
    Computer & Telecommunication. 2016, 1 (7): 18-21.  
    Abstract     PDF(0KB)
    With the rapid development of network technology, the application of computer is increasingly expanding, and it also produces a lot of network security issues. There are not a few accidents caused by computer network security problems. Although many computers can escape from the external risk of interference under the protection of firewall and other security measures, they can’t control the emergence of internal security risks. This paper designs a new network security audit system based on protocol analysis, which can provide powerful technical services to network security.
    Related Articles | Metrics
    Research on the Application of Flipped Classroom in Higher Vocational Colleges Teaching ——Taking Flash Animation Design and Production as an Example
    HuangWei
    Computer & Telecommunication. 2016, 1 (7): 22-24.  
    Abstract     PDF(0KB)
    Flipped classroom generates with the development of modern information communication, especially the development of Internet technology, which is a new teaching mode. It changes the traditional teaching mode, changes the role of teachers and students, so that students really participate in the whole process of learning. It effectively improves the efficiency of classroom teaching. This paper studies on the application of flipped classroom teaching mode in flash animation design and production. Results show that flipped classroom teaching mode can be carried out before class, in class and after class. It doesn’t subject to geographical restrictions. It greatly improves the efficiency of classroom teaching and students' learning enthusiasm, and cultivates students' ability of thinking independently.
    Related Articles | Metrics
    Discussion on the Teaching of Compiler Principle for Computer Major in Universities and Colleges
    Jiang Yun
    Computer & Telecommunication. 2016, 1 (7): 25-27.  
    Abstract     PDF(0KB)
    Compiler principle is a classic and core course in computer major. The content of the course is rich and abstract; as a result both the teaching and learning of the course are quite difficult. In this paper, the teaching of compiler principle for computer major in universities and colleges is discussed from three aspects, which are teaching goal, teaching content and teaching methods.
    Related Articles | Metrics
    Construction of Framework for Testing Cloud
    Zhang Ziliang
    Computer & Telecommunication. 2016, 1 (7): 28-29.  
    Abstract     PDF(0KB)
    The popularization and promotion of the cloud computing technology bring the innovation of industry technology, trigger changes in the service model of the industry, effectively improve the efficiency of the overall social services, and also bring a new topic to the traditional test industry. In this paper, from the perspective of testing cloud construction, it discusses on the framework of the testing cloud, the system integration, testing services application development, service performance optimization, security and other aspects.
    Related Articles | Metrics
    Research on the Micro Teaching Resource Database in Mobile Cloud Environment
    Chen Xianlong
    Computer & Telecommunication. 2016, 1 (7): 30-32.  
    Abstract     PDF(0KB)
    Aiming at the problems of the current micro teaching resources, such as numerous resources, management confusion, this paper designs the teaching resource database to solve the problems of micro lesson video management. First of all, the mobile cloud environment and micro lesson are introduced; secondly, the overall design of the teaching resource database is analyzed. Finally, the specific implementation of the micro teaching resource database is given. This paper has a positive effect on the teaching staff.
    Related Articles | Metrics
    Discussion on the Method of Computer Teaching Reform to Improve Students' Innovative Ability
    Tan Shaosheng
    Computer & Telecommunication. 2016, 1 (7): 33-35.  
    Abstract     PDF(0KB)
    In computer teaching, there are the problems that teaching concepts is backward, the teaching methods are rigid, and practical operation is missing. This paper studies on the corresponding solutions for innovative talents cultivation in computer teaching reform, to better train the students in creative thinking and consciousness.
    Related Articles | Metrics
    Research on the Application of VR Technology in Virtual Tour
    Xu Hongyun
    Computer & Telecommunication. 2016, 1 (7): 36-38.  
    Abstract     PDF(0KB)
    The research background combining virtual reality technology with tourism is introduced. Firstly, the concept of virtual reality (VR) tourism technology is analyzed, and the application status of VR technology in tourism in our country is described. Secondly, the development path VR Tourism Technology is researched, satisfying users' different travel experience.
    Related Articles | Metrics
    Research on the Application of Heuristic Teaching in Digital Electronic Experiment
    Liu Yan
    Computer & Telecommunication. 2016, 1 (7): 39-40.  
    Abstract     PDF(0KB)
    Digital electronic is a very practical course. This paper discusses on the application of heuristic teaching method in the digital electronic experiment course. The specific content of heuristic teaching and the application methods in digital electronic experiment by heuristic teaching are introduced. The heuristic teaching has good effect in the application. It can fully mobilize student’sinterest in digital electronics, and enhance the students' self-learning ability and problem-solving skills.
    Related Articles | Metrics
    Synergetic Development of Financial Products of Internet and Its Risk Prevention
    Xi Ziyu
    Computer & Telecommunication. 2016, 1 (7): 41-45.  
    Abstract     PDF(0KB)
    Our country’s Internet finance started lately, the regulation is not perfect enough, synergetic development of financial products of Internet is also unprecedented. In this case, we should find the risks and take precautions. Taking the multi-level supply of the compound product development and sales in comprehensive financial institutions as the background, this paper studies on the collaborative development of Internet banking products, draws lessons from domestic and foreign innovation mode, to provide the beneficial reference to the coordinated development of Internet financial products in our country; at the same time, it pays attention to find the problems and potential risks in the collaborative development process of Internet banking products, and puts forward the solutions and preventive measures.
    Related Articles | Metrics
    An Efficient Algorithm for the Equation of Multiplication of Nine Different Single Numbers
    Chen Yong
    Computer & Telecommunication. 2016, 1 (7): 46-48.  
    Abstract     PDF(0KB)
    Based on the study of the equation of multiplication of nine different single numbers and according to conventionaldesign for NP problem by exhaustive algorithm, the author introduces an optimized algorithm to solve the famous puzzle. It is improved that the algorithm is correct and efficient.
    Related Articles | Metrics
    An Efficient Randomized Algorithm for Generating Test Paper
    ZhouWenjun
    Computer & Telecommunication. 2016, 1 (7): 49-50.  
    Abstract     PDF(0KB)
    For achieving better educational measurement, the construction of item bank system is actively carried out in all colleges and universities. As the core of the system, the algorithm for generating test paper is a hot research topic. This paper analyzes the short comings of the traditional randomized algorithm for generating test paper, and proposes an improved randomized algorithm. The experimental results show that the algorithm can generate the required test paper quickly.
    Related Articles | Metrics
    Solution of the Smart Campus Building in Vocational Colleges
    Chen Bin, Li He
    Computer & Telecommunication. 2016, 1 (7): 51-52.  
    Abstract     PDF(0KB)
    The name of Smart City has been known to people with the rapid development of cloud computing and Internet of Things ( IoT) in recent years. Smart campus, as it is one of the most important parts of the smart city, is often mentioned by people. And the construction of smart campus in universities and colleges is the most important work in the building of smart city. With the case of smart campus building in Guangdong
    Related Articles | Metrics
    Reflections on the Construction of New Campus Network
    Lin Xian
    Computer & Telecommunication. 2016, 1 (7): 53-55.  
    Abstract     PDF(0KB)
    With the development of the times, the role of information technology in our life is more and more obvious. Campus network construction has become an important part of the construction of campus. This paper introduces the function of new university campus network construction, and further analyzes the current problems of university campus network construction. Finally, it expounds the thinking and suggestion on the construction of new university campus network.
    Related Articles | Metrics
    Research on the Data Acquisition Network Model Based on Communication Accounting
    Luo Haibo
    Computer & Telecommunication. 2016, 1 (7): 56-58.  
    Abstract     PDF(0KB)
    There are many kinds of communication accounting methods, so the data acquisition becomes the most important work in the modern communication enterprise. This paper mainly analyzes on the the status quo of the data acquisition and transmission system of communication network accounting, and the data collection network model. Through the elaboration of this paper, we can provide some references for the application of data acquisition network mode of communication accounting.
    Related Articles | Metrics
    Introduction and Research of Energy Saving Technology for Mobile Base Station
    Yu Danjuan
    Computer & Telecommunication. 2016, 1 (7): 59-60.  
    Abstract     PDF(0KB)
    】From the principle of energy-saving technology of mobile communication base station , this paper introduces three different techniques: carrier intelligent shutdown, discontinuous transmission (DTX) and DPS slot intelligent shutdown. Combined with the user experience and communication equipment development trend, it further studies on the mobile communication base station energy saving technology, in order to achieve lower energy consumption, which has very important significance.
    Related Articles | Metrics
    Research on the Application Technology of Computer Communication and Network Development
    Li Yan
    Computer & Telecommunication. 2016, 1 (7): 61-62.  
    Abstract     PDF(0KB)
    The development of computer communication and network technology has laid a solid foundation for the expansion of the scope of data communication, the network data transmission security, and the continuously improvement of information transfer efficiency. Based on this, this paper discusses on the application technology of computer communication and network development, in order to provide reference for the related research work.
    Related Articles | Metrics
    Analytic Study on the Campus Network Security Policies
    Xu Shan, YangWei
    Computer & Telecommunication. 2016, 1 (7): 63-64.  
    Abstract     PDF(0KB)
    With the coming of the information age, Internet has gained continuous application. The project of school- school communication has been constantly promoting in each campus. It plays such a great role in school education. However, some problems have appeared with network access of each campus, which becomes the focus that needs our attention. This article studies on the campus network safety and solves the campus safety problems, making students' campus life more secure.
    Related Articles | Metrics
    Research on Information Security Protection System of Campus Network in Higher Vocational Colleges
    Lai Jinzhi
    Computer & Telecommunication. 2016, 1 (7): 65-67.  
    Abstract     PDF(0KB)
    Vocational college campus network is a complex network. It faces with the increasingly prominent risk of information security while supporting the campus business operation and development. It becomes one of the urgent problems of school management. This paper analyzes the characteristics and information security situation of campus network in higher vocational colleges, proposes to build the information security protection system with "hierarchical protection, regional isolation, highlighted core, defense in depth. It combines with the practice to discuss and analyze, providing necessary reference for campus network information security and protection.
    Related Articles | Metrics
    Research on the Computer Information Security Technology and Its Protection
    Chen Zhangrong
    Computer & Telecommunication. 2016, 1 (7): 68-70.  
    Abstract     PDF(0KB)
    With the rapid development of Internet technology in recent years, the security of computer information has been paid more and more attention. This paper studies the computer security technology and protection. Firstly, it briefly states the basic content of computer information security technology, and then puts forward the existence of security risks according to the actuality in recent years. Finally, it puts forward the computer information security protection measures.
    Related Articles | Metrics
    Research on the Key Technologies of Computer Network Defense Policy Refinement
    Liu Dabao, Zhang Yi, Tang Yong
    Computer & Telecommunication. 2016, 1 (7): 71-73.  
    Abstract     PDF(0KB)
    The rapid development of information technology has injected fresh vitality for the industry field. But the following cyber attacks have become more and more severe, such as Trojans, viruses, etc., which influences the safe operation of network. In severe cases, there will have a large number of important information being stolen or network paralysis. Through the research and practice, it is found that the introduction of corresponding key technologies of defense policy refinement has a great effect on the safe operation of network. This paper studies on the status and the key technologies of computer network defense policy refinement, and proposes relevant recommendations about strengthening technologies for computer network defense policy refinement.
    Related Articles | Metrics
    Research on the Key Technologies of Network Security Situation Assessment
    Wang Jun
    Computer & Telecommunication. 2016, 1 (7): 74-76.  
    Abstract     PDF(0KB)
    In the information age, the study of network security situation has become the focus of computer technology investigator. This paper studies on the principle and structure of network security situation assessment, analyzes the function of each part and the key technologies. The network security situation assessment will be conducive to the investigation of the network security threat factors, ensuring the orderly operation of the entire network.
    Related Articles | Metrics
    The Pipeline Inspection System Based on Internet of Things Technology
    Wan Yixun
    Computer & Telecommunication. 2016, 1 (7): 77-80.  
    Abstract     PDF(0KB)
    This paper systematically introduces the system architecture, technical route and function design of the pipeline inspection system based on internet of things technology. And it introduces the current most advanced internet of things technology, mobile Internet, mobile GIS, intelligent terminal and the first graphic navigation technology used in the system. Finally it makes an objective evaluation on the system application effect.
    Related Articles | Metrics
    Construction and Practice of the Production-sales-stock System in Group Mode
    Liu Honhguang
    Computer & Telecommunication. 2016, 1 (7): 81-83.  
    Abstract     PDF(0KB)
    This paper introduces the design and development mode of the production-sales-stock system, and describes the design and implementation of the system in detail. The system has the advantages of scientific design, advanced concepts, advanced technology, stable function, flexible configuration and friendly interface. The successful development and application of the system provides a feasible way of information construction for the coal enterprises, reflecting the independent technology advantage, cost advantage, operational advantage and post upgrade maintenance advantage. It achieves a unified standard of enterprise data and the unified management, strengthens the production-sales-stock control mode, enhances the business collaboration ability and level of scientific decision-making.
    Related Articles | Metrics
    The Application of Extreme Programming in Software Project Development
    Cai Zonghui
    Computer & Telecommunication. 2016, 1 (7): 84-86.  
    Abstract     PDF(0KB)
    With information technology developing into various industries, the application of extreme programming becomes popular in software project development. Therefore, it is necessary for researchers to think about how to improve the efficiency of software development by extreme programming and make the software more relevant to users’requirements. This article mainly analyzes the concept and principle of extreme programming and it also discusses on the extreme programming process in the software development, hoping to provide some useful experience for the development of software industry.
    Related Articles | Metrics
    Dynamic Backlight Control Method of LED Television Based on Picture Level and Ambient Light
    Sun Bangyu
    Computer & Telecommunication. 2016, 1 (7): 87-89.  
    Abstract     PDF(0KB)
    LED television can not give out light, but only display picture by backlight. Dynamic backlight method can save energy and protect our eyes to some extent. This paper designs a dynamic backlight control method of LED television based on picture level and ambient light, and applies this method to MSD3463 chip-set. From the information of our customers, the result is good.
    Related Articles | Metrics
    Research and Application of the Software Development Method Based on Android platform
    Wang li, Li Ziyan
    Computer & Telecommunication. 2016, 1 (7): 90-91.  
    Abstract     PDF(0KB)
    In the information age, people have higher demand in information accessing. Mobile phone has developed gradually from a single communication tool to be a integrated multi-functional intelligent tool. In recent years, Android has many applications because of its convenience and openness. It has a very good market prospect of development. In this article, the application of software development method based on the Android platform is studied.
    Related Articles | Metrics
    Research on the Drawing Board System Based on MFC
    Li Chao
    Computer & Telecommunication. 2016, 1 (7): 92-94.  
    Abstract     PDF(0KB)
    In view of the complex problems in the current drawing board software, this paper designs a drawing board system for beginners. At first, the function and the interface of the system are analyzed, and the software and hardware environment of the system is described. Then, some modules of the system are analyzed in detail. This article has the positive significance to the software development beginners and the first teaching staff.
    Related Articles | Metrics
    The Application of the Embedded Real-time Software in Computer Software Design
    Xiao Dianhua
    Computer & Telecommunication. 2016, 1 (7): 95-97.  
    Abstract     PDF(0KB)
    In recent years, with the constant development of science and technology in our country, computer application in people's life and work has been so common that it becomes an important tool. In the design of computer software, scientific use of embedded real-time software and handling the failure of computer software make the computer software design simpler. It simplifies the design process, strengthens the system quality effectively. The application of embedded real-time software in computer software design shows great advantages.
    Related Articles | Metrics
    Development and Application of the Remote Data Store Management System Based on VPN
    Wu Chunxiang
    Computer & Telecommunication. 2016, 1 (7): 98-100.  
    Abstract     PDF(0KB)
    This paper develops a remote data storage management system based on VPN, and applies it to the network information system. Users can log in the management system server to remotely configure and manager storage devices which deploy in remote storage network. Server monitors the status of disk-arrays such as running status, online status, etc, and transfers this information to the client operator, and implements the remote , real-time and online functions to manage and monitor the store devices.
    Related Articles | Metrics
    The Application of QR Code Recognition Technology and IOS System in the Process of Professional Title Evaluation
    Wei Tengbiao, Zhu Haixia
    Computer & Telecommunication. 2016, 1 (7): 101-102.  
    Abstract     PDF(0KB)
    With the development and popularization of the network, QR code recognition technology get a wide range of applications, becoming one of the computer automatic identification technologies. And IOS system also gradually penetrated into people's life and work. This paper mainly introduces the present situation and application of QR code recognition technology and IOS system in the process of professional title evaluation.
    Related Articles | Metrics
    Data Auditing Method Based on Self Similar Anomaly Judgment Model
    Wang Zhengrong, Zheng Bangfeng, Wu Qingmao
    Computer & Telecommunication. 2016, 1 (7): 105-107.  
    Abstract     PDF(0KB)
    In the data auditing process, the trend of the normal data is determined according to the data similarity, and the abnormal data is judged, meeting the requirements of the horizontal data audit, and solving the problem of data audit in the communication business.
    Related Articles | Metrics
    Research on the Query Efficiency of SQL Database
    Yao Xi
    Computer & Telecommunication. 2016, 1 (7): 108-109.  
    Abstract     PDF(0KB)
    This paper introduces the type of connections, the operation steps of connections, and the connection syntax in SQL. It analyzes how to improve the query efficiency based on the multi-table connection, and further explains with the examples of the student database.
    Related Articles | Metrics
    Practice of Information Architecture Theory in the Database Platforms of the Scientific Research Literature in English Language: theWebsite Construction of Scientific Research Publishing
    Huang Minghuan
    Computer & Telecommunication. 2016, 1 (7): 110-114.  
    Abstract     PDF(0KB)
    Information architecture is significantly effective for helping the researchers to carry on the scientific research activities. This paper analyzes the practice of information architecture theory in the website of Scientific Research Publishing in its construction of organization system, navigation system, search system and labeling system, which represents the database platforms of the scientific research literature in English language. The paper also summarizes the opportunities and challenges for the information architecture efforts of database platforms of the scientific research literature in English language.
    Related Articles | Metrics
    A Method of Long-short Line Drive Switching for PSTN
    Gao Jifeng
    Computer & Telecommunication. 2016, 1 (7): 115-118.  
    Abstract     PDF(0KB)
    To solve the problem of driving different length of public switched telephone network (PSTN) subscriber line, a method of automatic measurement of subscriber line length and switching circuit is presented. By the construction of subscriber line model, the line model is simplified according to the type of signal. A DC algorithm is used to measure the length of the subscriber line. Circuit and parameter profiles are switched automatically according to different line state of“ring" and "feed". Experiments show that the proposed method can reduce the power consumption of the subscriber line interface circuit (SLIC), extend the subscriber line distance, and enhance the subscriber’s experience.
    Related Articles | Metrics
    Research on Teaching Reform of Computer Application Basis Based on Ability of Developing Software Application
    Zhang Shurong, Li Yulin
    Computer & Telecommunication. 2016, 1 (7): 119-120.  
    Abstract     PDF(0KB)
    This paper studies the method of teaching reform in the course of computer application basis for non computer majors in colleges and universities. Combined with many years of author's teaching experience, this paper explores on the teaching methods from the content of classroom teaching and the students' learning methods. Teachers use the project teaching method and students use the group discussion learning method, which can not only improve the quality of teaching, but also stimulate students interest in learning, and cultivate students application ability and autonomous learning ability.
    Related Articles | Metrics
    How to Realize the Organic Combination of Computer Basic Teaching and Specialty
    Qi Juhui
    Computer & Telecommunication. 2016, 1 (7): 121-123.  
    Abstract     PDF(0KB)
    In today's information era, computer ability is the basic requirement for personnel in economic society. With the raise demands that economy and society requiring for professional people, the combination of computer teaching and specialty has become an important research direction in universities. The article firstly discusses on the necessity and possibility of the combination of computer basic teaching and specialty, and then analyzes the strategy of computer teaching and the organic combination with professional.
    Related Articles | Metrics
    The Application of Authorware Multimedia Courseware in Teaching
    Wang Yuegai
    Computer & Telecommunication. 2016, 1 (7): 124-126.  
    Abstract     PDF(0KB)
    With the development of science and technology and the progress of the times, computer assisted instruction is no longer a technology, but approach to an art. This paper uses Authorware to design the multimedia courseware. It expounds the application of courseware in teaching, the defects in the teaching process and the corresponding measures. It is pointed out that it should pay attention to the reasonable application and give full play to the important role of the multimedia courseware in the process of applying Authorware multimedia courseware in teaching.
    Related Articles | Metrics
    Exploration and Practice of Teaching Reform of VB Course under CDIO Mode
    Huang Quan
    Computer & Telecommunication. 2016, 1 (7): 127-128.  
    Abstract     PDF(0KB)
    The application of CDIO teaching mode in VB course can change the drawbacks of traditional teaching mode, cultivate student’s learning ability, and stimulate the morale of student’s programming creation. In teaching, we design the programming teaching system using projects as the mainline, carry out the case teaching method based on CDIO model, establish the object-oriented VB teaching assessment mode, significantly improving student’s practice ability and self-learning ability.
    Related Articles | Metrics
    Research on Micro Curriculum Model in Computer Teaching
    Qian Lin
    Computer & Telecommunication. 2016, 1 (7): 129-131.  
    Abstract     PDF(0KB)
    Micro course innovates teaching methods, promotes the development in professional field, provides autonomous learning environment for students, guides students to form correct learning methods, promotes the teaching informationization development, and updates the structure of education resources. In order to solve the problems of computer learning difficulty for the students and insufficient knowledge reserve for the teachers, we apply micro course in computer teaching, decompose the teaching task in the whole teaching design, make teaching modules, rebuild the teaching structure, and determine the teaching content and target.
    Related Articles | Metrics
  News More  


  Links More  


Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd