Loading...
Acta Metallurgica Sinica
Home
IMR Journals
Subscription
Advertisement
Contact us
中文
Search
Citation
Fig/Tab
adv Search
Just Accepted
|
Current Issue
|
Archive
|
Featured Articles
|
Special Collection
|
Most Read
|
Most Downloaded
|
Most Cited
Table of Content
10 February 2018, Volume 1 Issue 1-2
Previous Issue
Next Issue
For Selected:
View Abstracts
Download Citations
EndNote
Reference Manager
ProCite
BibTeX
RefWorks
Toggle Thumbnails
Select
Construction of the Lexical Analyzer by Direct Programming
YANG Chao, ZHENG Zhi-qun, HE Shu-qian, SHI Chun
Computer & Telecommunication. 2018,
1
(1-2): 1-4.
Abstract
PDF
(0KB)
The construction of the lexical analyzer by direct programming is analyzed and studied in this paper. The lexical analyzer is described by the regular expression, the state diagram and FA. Then an example is used to analyze and explain the structural process of the lexical analyzer. By further analyzing the performance of the lexical analyzer, we find that the lexical analyzer constructed by direct programming is faster than other types of lexical analyzer.
Related Articles
|
Metrics
Select
Research and Application of the Chaotic Masking Communication in IPTV System
LI Peng, ZHAI Ran, ZONG Rong, DING Hong-wei , GUO Jia
Computer & Telecommunication. 2018,
1
(1-2): 5-9.
Abstract
PDF
(0KB)
Based on the chaotic Logistic map and Chen map, this paper analyzes the encryption of audios and images in the IPTV system, proposes two chaotic encryption process of audio signal, and obtains the two chaotic keys of the initial value and the compression coefficient. Then it uses the two chaotic encryption methods in image signal, and compares the performance of two algorithms in terms of secret key amount, sensitivity, time complexity and so on. Ultimately, a new complex map is synthesized by Logistic map and Chen map, double keys are generated to encrypt the audio and image signals, so as to provide security for the transmission of IPTV programs in the internet.
Related Articles
|
Metrics
Select
The Implementation of Speech Signal Enhancement Based on Spectral Subtraction under Labview Environment
SU Li, WANG A-chen, LI Yang
Computer & Telecommunication. 2018,
1
(1-2): 10-12.
Abstract
PDF
(0KB)
Spectral subtraction is a very important method in speech signal processing. The aim of this method is to reduce the proportion of noise in speech signals, which is a very important way in speech recognition. Matlab is a kind of common software for speech signal processing. Labview is a powerful data collecting and processing software. This paper describes how to combine Labview and Matlab to complete speech signal acquisition and enhancement based on spectral subtraction under Labview environment.
Related Articles
|
Metrics
Select
Design of the Network Assisted Teaching Platform Based on Flipped Classroom Teaching Mode in Higher Vocational College
HUA Chuang-li
Computer & Telecommunication. 2018,
1
(1-2): 13-16.
Abstract
PDF
(0KB)
A network assisted teaching platform is researched and designed in this paper. It is based on flipped classroom teaching mode, and suitable for the characteristics of Higher Vocational Education. The platform includes the roles of administrators,teachers and students, and includes resources management, online learning, communication and discussion, online testing, system maintenance, and other modules. The platform is developed based on B/S structure, which is easy to be expanded and maintained,and can provide a powerful guarantee for implementation of the flipped classroom teaching.
Related Articles
|
Metrics
Select
Experiment Design of Random Number Generator Based on Raspberry PI
ZHANG Ming-hao, ZHANG Yi-ning, LI Guo-jun
Computer & Telecommunication. 2018,
1
(1-2): 17-19.
Abstract
PDF
(0KB)
This experiment uses LM386 amplification circuit to generate a random signal based on raspberry PI, and uses PCF8591 to convert the analog signal to digital signal, and then uses Fibonacci sequence to form the random array. Finally, the random array is verified by Monte Carlo method. Furthermore, it explores on the new experiment methods with new electronic equipment and technologies.
Related Articles
|
Metrics
Select
Design and Implementation of Palm Lab Client Based on Android
RAO Hao, WU Chu-qin, HUANG Jin-peng, ZHU Mian-zhu
Computer & Telecommunication. 2018,
1
(1-2): 20-23.
Abstract
PDF
(0KB)
The rapid development of AR/VR technology and Android intelligent terminal, has brought new opportunities for the reform of teaching experiment. This paper designs and realizes the palm lab APP based on Android platform and virtual reality technology,allowing college students easily do the virtual experiments, reducing experimental costs and improving learning efficiency.
Related Articles
|
Metrics
Select
The Design and Implementation of Scientific Research Achievement Management System Based on Java EE
GUI Lin-bin
Computer & Telecommunication. 2018,
1
(1-2): 24-27.
Abstract
PDF
(0KB)
In view of the large number of scientific research subjects and the increasing number of research achievements, the traditional manual management mode is inefficient and difficult to achieve dynamic management of scientific research results.Based on the full investigation and analysis of the actual needs, with the Java EE technology architecture, this paper develops a scientific research achievement management system in accordance with the school’s characteristics, realizing the on-line management of dynamic information, such as teachers' achievements declaration, inquiry, audit, storage, report generation and so on.
Related Articles
|
Metrics
Select
Study on Computer Network Teaching Based on Mind Mapping
YU Cheng-min, WANG Li-yan
Computer & Telecommunication. 2018,
1
(1-2): 28-30.
Abstract
PDF
(0KB)
Based on mind mapping,a new teaching mode is built, which consists of the following three stages: mind mapping for preview, mind mapping for classroom teaching, mind mapping for review. The main research contents are related to the mind map drawing before class, teaching process design, review after class and the evaluation of learning process. With this mode, students play the main role in the teaching process, achieving better teaching effect.
Related Articles
|
Metrics
Select
Design and Implementation of the Concentration Training System Based on BrainWave
SUN Yu-kuan, DOU Chang , QU Tong
Computer & Telecommunication. 2018,
1
(1-2): 31-32.
Abstract
PDF
(0KB)
Concentration plays an important role in many aspects of daily life, which is closely linked to everyone. At present,the concentration training is subjective and boring. In this paper, the original brainwave signal and the degree of concentration are extracted,the degree of focus and the speed of the hollow cup motor are combined to design and implement a brainwave-focused game device. It uses distance measuring sensors to determine the game situation, enhancing the interest, and exercising participants' attention and controlling ability.
Related Articles
|
Metrics
Select
The Research Trend of Integrating CDIO Concept and Computer Science in Recent 10 Years (from 2008 to 2017)
SUN Xin-jie, LIWei
Computer & Telecommunication. 2018,
1
(1-2): 33-35.
Abstract
PDF
(0KB)
The core ideas of CDIO are“learning from doing”and“project teaching”. Based on CDIO’s engineering philosophy,the research on the talents’cultivation and development of computer specialty has attracted more and more attention from educators and researchers. Therefore, according to the visual analysis of CSSCI and keyword index, this paper explores on the research trend and direction of computer science in recent 10 years guided by CDIO philosophy.
Related Articles
|
Metrics
Select
Design and Implementation of Huatuo Documents and Materials Platform
YIN Yun-xia, LI Zhi , YANG Yan, WANG Yuan-mao
Computer & Telecommunication. 2018,
1
(1-2): 36-38.
Abstract
PDF
(0KB)
This paper sorts out works and testament of Huatuo, collects works of research on Huatuo as well as documents of Huatuo prescription, probes digitalization solutions to Hautuo academic information, designs data model of Huatuo documents and materials. Based on MVC pattern Web application system design framework, combined with SQR SERVER database management system, the management platform for Huatuo documents and materials is established, promoting national culture.
Related Articles
|
Metrics
Select
The Analysis on Opening Computer Laboratory in Universities
LIANG Li-li, GAO Nan, WANG Xing-wu
Computer & Telecommunication. 2018,
1
(1-2): 39-40.
Abstract
PDF
(0KB)
Based on the concept of cultivating innovative talents in colleges and universities, this paper analyzes the significance of opening computer laboratory and the existing problems in the process of opening up. Combining with the actual situation of our school, the paper also puts forward the scientific management suggestions to solve the existing problems of opening computer laboratory.
Related Articles
|
Metrics
Select
A Fine-grained Load Balanced File Placement Algorithm for Distributed Storage Systems
LIU Shuo , XIN Gang
Computer & Telecommunication. 2018,
1
(1-2): 41-43.
Abstract
PDF
(0KB)
To gain a balanced distribution of access load, existing distributed storage systems often make file placement decisions based on popularity information. However, on one hand, popularity information is not known at the moment when the file is initially stored in the system. Therefore, placement optimization algorithms which depend on global popularity information are not practical. On the other hand, popularity information changes over time. File storage locations are required to make frequent adjustment,resulting in high data migration cost. In this paper, a new kind of distributed file placement algorithm is proposed, which does not depend on popularity information. It makes use of the correlation between the file's popularity and its creation time. Through a fine-grained similarity of different storage nodes in data amount created in each time interval, the algorithm achieves ideal load balance.Moreover, the algorithm is very practical and causes little migration cost, since it only depends on file creation time information,which is known and static. Experimental results show that the algorithm achieves a more balanced distribution of access load compared to the random placement algorithm adopted in HDFS.
Related Articles
|
Metrics
Select
Image Encryption Algorithm Based on theWavelet and FRFT
XU Yan, NIU Xiu-ling, SHI Fan
Computer & Telecommunication. 2018,
1
(1-2): 44-46.
Abstract
PDF
(0KB)
In order to improve the security of the image, and to enhance the effect of encryption, an image encryption algorithm based on discrete wavelet and fractional Fourier transform(FRFT)is proposed. Firstly, the discrete wavelet transform is used to make the image signal sparse, then the discrete fractional Fourier transform is used to deal with the image of sparse processing, and the final image is obtained. The MATLAB simulation results show that compared with the single wavelet transform, the algorithm has better encryption and decryption effect, and can hide the information of the image better.
Related Articles
|
Metrics
Select
Research on the Hadoop Platform Safety Reinforcement Based on the Kerberos Authentication Mechanism
LU Yu-fan, WANG Xun
Computer & Telecommunication. 2018,
1
(1-2): 47-49.
Abstract
PDF
(0KB)
The first version of the Apache Hadoop has caused a security problem in the architecture of data distribution, which leads to the potential hazard in applications. Based on the analysis of security problems, a managing and monitoring model is established,which is a solution of strengthening the data security. The model is on the basis of Kerberos authentication mechanism.Through the project, the security of data center can be reinforced significantly.
Related Articles
|
Metrics
Select
Research on Network Monitoring and Prevention Technologies in Network Computer Room
WANG Shuang-qing
Computer & Telecommunication. 2018,
1
(1-2): 50-52.
Abstract
PDF
(0KB)
With the deepening of the Internet + education, the public computer room relies more and more on the network. The network security events occur from time to time, such as obtaining other people's privacy through network monitoring, invading computers to steal examination papers, etc. In this paper, the concept, tools and methods of network monitoring are analyzed. According to the monitoring principle and monitoring method, the detection and prevention measures of network monitoring are put forward.
Related Articles
|
Metrics
Select
Design and Deployment of Enterprise Network Security Scheme
YE Zheng-qiang , LI Jia
Computer & Telecommunication. 2018,
1
(1-2): 53-54.
Abstract
PDF
(0KB)
With the expansion of the enterprise scale and the expansion of its branches, the enterprise network architecture becomes more complex and faces various security threats. This paper firstly introduces the basic situation of enterprise network environment.Based on the requirement of enterprise information system, the network security protection technologies are introduced,and then the design and deployment of network security protection program is put forward, expecting to provide some reference for related work.
Related Articles
|
Metrics
Select
Research on the Informatization Management Strategy of Tobacco Commercial Enterprises
CUI Kai
Computer & Telecommunication. 2018,
1
(1-2): 55-57.
Abstract
PDF
(0KB)
With the development and popularization of information technology, a wave of technological revolution has set off.At present, various industries and fields have begun to apply information management, and tobacco commercial enterprises are no exception. At present, China's tobacco commercial enterprises have encountered some problems in the implementation process of informatization management. From two aspects of asset informatization management and human resources informatization management,this paper analyzes the existing problems, and puts forward the corresponding strategies
Related Articles
|
Metrics
Select
The Exploration and Practice of Intelligent Medical Treatment to Promote the Reengineering of Outpatient Service Process
CHEN Jian-qing, MAZhen-yi
Computer & Telecommunication. 2018,
1
(1-2): 58-60.
Abstract
PDF
(0KB)
This paper explores on the patient-centric process reengineering, smoothing the process before diagnosis, during diagnosis and after diagnosis. It integrates the online and offline functions; carries out mobile treatment, self-medicine and consultation settlement; strengthens internal management; improves the service efficiency; and promotes the“Internet + health service”, to improve the patient experience.
Related Articles
|
Metrics
Select
Analysis on the Production of 3D Animation Based on Game Engine Technology
ZHANG Sai
Computer & Telecommunication. 2018,
1
(1-2): 61-63.
Abstract
PDF
(0KB)
Gaming engine technology, with its suite of functional advantages such as real-time rendering and real-time editing, is used in 3D animation to dramatically reduce rendering cycles, increase production efficiency, and facilitate the production of highquality 3D animation. This paper discusses on the connotation of game engine, analyzes the main functions of game engine, and explores on the three-dimensional animation production based on game engine technology. The purpose of this article is to provide some ideas on how to promote the smooth production of 3D animation.
Related Articles
|
Metrics
Select
Design and Application of Automatic Data Acquisition System for Soil and Water Conservation Monitoring Station Based on Big Data
PAN Zheng-yong
Computer & Telecommunication. 2018,
1
(1-2): 64-66.
Abstract
PDF
(0KB)
With the rapid development of information technology and network technology, automatic acquisition equipment can be applied to data collection, storage and management in the prevention and control of soil and water conservation, so as to improve the accuracy and completeness of soil and water conservation and the efficiency of the whole process. This paper designs a set of automatic station data acquisition system based on monitoring of soil data. The system can realize remote automatic monitoring of soil and water conservation data collection, classification, collection, storage, which will be applied to the monitoring station. By running the test for several months, the system is in good condition, which can accurately and completely monitor the automatic data acquisition and data processing.
Related Articles
|
Metrics
Select
The Application of Penetration Test in Level Evaluation
WUWen-gang, ZHANG Xin
Computer & Telecommunication. 2018,
1
(1-2): 67-69.
Abstract
PDF
(0KB)
In the evaluation of information security level, the vulnerability of the target system can be found through the penetration technique and the security problems found in the grade evaluation are verified by the penetration technology. The methods and tools of penetration test are introduced. The application of the penetration test tool in the evaluation of security level of the information system is described in detail. The analysis indicates that the penetration test can further evaluate the system deeply, which can help to increase the completeness and accuracy of the level evaluation conclusion.
Related Articles
|
Metrics
Select
The Cultivation of Students' Innovative Ability in the Teaching of Computer Basic Course in Higher Vocational Education
PAN Xin
Computer & Telecommunication. 2018,
1
(1-2): 70-72.
Abstract
PDF
(0KB)
In the era of rapid development of network information technology, the computer has penetrated into every walk of life, basic computer teaching has become a compulsory course in higher vocational colleges. Since the cultivation of innovation ability is the core of talent cultivation in higher education, how to combination both of them is the focus of the current vocational computer teaching. Therefore, it is nessary to promote the cultivation of students' innovative ability through a variety of methods. Based on the analysis of innovation ability, this article summarizes the status quo, and puts forward the reform measures.
Related Articles
|
Metrics
Select
New Model of Library Service Based on Community Cooperation:FOLIO
HU Xiao-li, XUWei
Computer & Telecommunication. 2018,
1
(1-2): 73-76.
Abstract
PDF
(0KB)
The popularization of open source software has brought a new breakthrough to the library system automation. The proposal of FOLIO project not only combines the concept of open source but also promotes the multi-cooperation to form a truly effective community. This article introduces the project from the background, purpose, organizational structure and operation mechanism of FOLIO project. And it proposes that we should focus on the cooperation in the process of open access to the real needs of users to promote the development of library services.
Related Articles
|
Metrics
Select
The Security Risks and Preventive Measures of the Informatization Construction of Three - level Hospital
YUAN Bo
Computer & Telecommunication. 2018,
1
(1-2): 77-78.
Abstract
PDF
(0KB)
In the informatization construction of three - level hospital, besides the improvement of the function and efficiency of the informatization system, we should pay more attention to the safety problems, ensuring the safety of the hospital informatization construction. Based on the author's own practical experience, this article firstly briefly analyzes the necessity of risk prevention, and then analyzes the existing security risks in informatization construction in three - level hospital. Finally, it puts forward the corresponding measures and suggestions, hoping to provide reference for the relevant work.
Related Articles
|
Metrics
Select
Development in the Research on Steganalysis
HUANG Ling-zhen
Computer & Telecommunication. 2018,
1
(1-2): 79-81.
Abstract
PDF
(0KB)
This paper provides a review on steganalysis technology. Firstly the application of steganalysis and important algorithms are introduced, the advantages and disadvantages of traditional algorithms are also discussed. Finally some recently proposed methods are introduced, followed by a summary of open issues.
Related Articles
|
Metrics
News
More
Links
More
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd