Loading...
  • Table of Content
      10 February 2018, Volume 1 Issue 1-2 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    Construction of the Lexical Analyzer by Direct Programming
    YANG Chao, ZHENG Zhi-qun, HE Shu-qian, SHI Chun
    Computer & Telecommunication. 2018, 1 (1-2): 1-4.  
    Abstract     PDF(0KB)
    The construction of the lexical analyzer by direct programming is analyzed and studied in this paper. The lexical analyzer is described by the regular expression, the state diagram and FA. Then an example is used to analyze and explain the structural process of the lexical analyzer. By further analyzing the performance of the lexical analyzer, we find that the lexical analyzer constructed by direct programming is faster than other types of lexical analyzer.
    Related Articles | Metrics
    Research and Application of the Chaotic Masking Communication in IPTV System
    LI Peng, ZHAI Ran, ZONG Rong, DING Hong-wei , GUO Jia
    Computer & Telecommunication. 2018, 1 (1-2): 5-9.  
    Abstract     PDF(0KB)
    Based on the chaotic Logistic map and Chen map, this paper analyzes the encryption of audios and images in the IPTV system, proposes two chaotic encryption process of audio signal, and obtains the two chaotic keys of the initial value and the compression coefficient. Then it uses the two chaotic encryption methods in image signal, and compares the performance of two algorithms in terms of secret key amount, sensitivity, time complexity and so on. Ultimately, a new complex map is synthesized by Logistic map and Chen map, double keys are generated to encrypt the audio and image signals, so as to provide security for the transmission of IPTV programs in the internet.
    Related Articles | Metrics
    The Implementation of Speech Signal Enhancement Based on Spectral Subtraction under Labview Environment
    SU Li, WANG A-chen, LI Yang
    Computer & Telecommunication. 2018, 1 (1-2): 10-12.  
    Abstract     PDF(0KB)
    Spectral subtraction is a very important method in speech signal processing. The aim of this method is to reduce the proportion of noise in speech signals, which is a very important way in speech recognition. Matlab is a kind of common software for speech signal processing. Labview is a powerful data collecting and processing software. This paper describes how to combine Labview and Matlab to complete speech signal acquisition and enhancement based on spectral subtraction under Labview environment.
    Related Articles | Metrics
    Design of the Network Assisted Teaching Platform Based on Flipped Classroom Teaching Mode in Higher Vocational College
    HUA Chuang-li
    Computer & Telecommunication. 2018, 1 (1-2): 13-16.  
    Abstract     PDF(0KB)
    A network assisted teaching platform is researched and designed in this paper. It is based on flipped classroom teaching mode, and suitable for the characteristics of Higher Vocational Education. The platform includes the roles of administrators,teachers and students, and includes resources management, online learning, communication and discussion, online testing, system maintenance, and other modules. The platform is developed based on B/S structure, which is easy to be expanded and maintained,and can provide a powerful guarantee for implementation of the flipped classroom teaching.
    Related Articles | Metrics
    Experiment Design of Random Number Generator Based on Raspberry PI
    ZHANG Ming-hao, ZHANG Yi-ning, LI Guo-jun
    Computer & Telecommunication. 2018, 1 (1-2): 17-19.  
    Abstract     PDF(0KB)
    This experiment uses LM386 amplification circuit to generate a random signal based on raspberry PI, and uses PCF8591 to convert the analog signal to digital signal, and then uses Fibonacci sequence to form the random array. Finally, the random array is verified by Monte Carlo method. Furthermore, it explores on the new experiment methods with new electronic equipment and technologies.
    Related Articles | Metrics
    Design and Implementation of Palm Lab Client Based on Android
    RAO Hao, WU Chu-qin, HUANG Jin-peng, ZHU Mian-zhu
    Computer & Telecommunication. 2018, 1 (1-2): 20-23.  
    Abstract     PDF(0KB)
    The rapid development of AR/VR technology and Android intelligent terminal, has brought new opportunities for the reform of teaching experiment. This paper designs and realizes the palm lab APP based on Android platform and virtual reality technology,allowing college students easily do the virtual experiments, reducing experimental costs and improving learning efficiency.
    Related Articles | Metrics
    The Design and Implementation of Scientific Research Achievement Management System Based on Java EE
    GUI Lin-bin
    Computer & Telecommunication. 2018, 1 (1-2): 24-27.  
    Abstract     PDF(0KB)
    In view of the large number of scientific research subjects and the increasing number of research achievements, the traditional manual management mode is inefficient and difficult to achieve dynamic management of scientific research results.Based on the full investigation and analysis of the actual needs, with the Java EE technology architecture, this paper develops a scientific research achievement management system in accordance with the school’s characteristics, realizing the on-line management of dynamic information, such as teachers' achievements declaration, inquiry, audit, storage, report generation and so on.
    Related Articles | Metrics
    Study on Computer Network Teaching Based on Mind Mapping
    YU Cheng-min, WANG Li-yan
    Computer & Telecommunication. 2018, 1 (1-2): 28-30.  
    Abstract     PDF(0KB)
    Based on mind mapping,a new teaching mode is built, which consists of the following three stages: mind mapping for preview, mind mapping for classroom teaching, mind mapping for review. The main research contents are related to the mind map drawing before class, teaching process design, review after class and the evaluation of learning process. With this mode, students play the main role in the teaching process, achieving better teaching effect.
    Related Articles | Metrics
    Design and Implementation of the Concentration Training System Based on BrainWave
    SUN Yu-kuan, DOU Chang , QU Tong
    Computer & Telecommunication. 2018, 1 (1-2): 31-32.  
    Abstract     PDF(0KB)
    Concentration plays an important role in many aspects of daily life, which is closely linked to everyone. At present,the concentration training is subjective and boring. In this paper, the original brainwave signal and the degree of concentration are extracted,the degree of focus and the speed of the hollow cup motor are combined to design and implement a brainwave-focused game device. It uses distance measuring sensors to determine the game situation, enhancing the interest, and exercising participants' attention and controlling ability.
    Related Articles | Metrics
    The Research Trend of Integrating CDIO Concept and Computer Science in Recent 10 Years (from 2008 to 2017)
    SUN Xin-jie, LIWei
    Computer & Telecommunication. 2018, 1 (1-2): 33-35.  
    Abstract     PDF(0KB)
    The core ideas of CDIO are“learning from doing”and“project teaching”. Based on CDIO’s engineering philosophy,the research on the talents’cultivation and development of computer specialty has attracted more and more attention from educators and researchers. Therefore, according to the visual analysis of CSSCI and keyword index, this paper explores on the research trend and direction of computer science in recent 10 years guided by CDIO philosophy.
    Related Articles | Metrics
    Design and Implementation of Huatuo Documents and Materials Platform
    YIN Yun-xia, LI Zhi , YANG Yan, WANG Yuan-mao
    Computer & Telecommunication. 2018, 1 (1-2): 36-38.  
    Abstract     PDF(0KB)
    This paper sorts out works and testament of Huatuo, collects works of research on Huatuo as well as documents of Huatuo prescription, probes digitalization solutions to Hautuo academic information, designs data model of Huatuo documents and materials. Based on MVC pattern Web application system design framework, combined with SQR SERVER database management system, the management platform for Huatuo documents and materials is established, promoting national culture.
    Related Articles | Metrics
    The Analysis on Opening Computer Laboratory in Universities
    LIANG Li-li, GAO Nan, WANG Xing-wu
    Computer & Telecommunication. 2018, 1 (1-2): 39-40.  
    Abstract     PDF(0KB)
    Based on the concept of cultivating innovative talents in colleges and universities, this paper analyzes the significance of opening computer laboratory and the existing problems in the process of opening up. Combining with the actual situation of our school, the paper also puts forward the scientific management suggestions to solve the existing problems of opening computer laboratory.
    Related Articles | Metrics
    A Fine-grained Load Balanced File Placement Algorithm for Distributed Storage Systems
    LIU Shuo , XIN Gang
    Computer & Telecommunication. 2018, 1 (1-2): 41-43.  
    Abstract     PDF(0KB)
    To gain a balanced distribution of access load, existing distributed storage systems often make file placement decisions based on popularity information. However, on one hand, popularity information is not known at the moment when the file is initially stored in the system. Therefore, placement optimization algorithms which depend on global popularity information are not practical. On the other hand, popularity information changes over time. File storage locations are required to make frequent adjustment,resulting in high data migration cost. In this paper, a new kind of distributed file placement algorithm is proposed, which does not depend on popularity information. It makes use of the correlation between the file's popularity and its creation time. Through a fine-grained similarity of different storage nodes in data amount created in each time interval, the algorithm achieves ideal load balance.Moreover, the algorithm is very practical and causes little migration cost, since it only depends on file creation time information,which is known and static. Experimental results show that the algorithm achieves a more balanced distribution of access load compared to the random placement algorithm adopted in HDFS.
    Related Articles | Metrics
    Image Encryption Algorithm Based on theWavelet and FRFT
    XU Yan, NIU Xiu-ling, SHI Fan
    Computer & Telecommunication. 2018, 1 (1-2): 44-46.  
    Abstract     PDF(0KB)
    In order to improve the security of the image, and to enhance the effect of encryption, an image encryption algorithm based on discrete wavelet and fractional Fourier transform(FRFT)is proposed. Firstly, the discrete wavelet transform is used to make the image signal sparse, then the discrete fractional Fourier transform is used to deal with the image of sparse processing, and the final image is obtained. The MATLAB simulation results show that compared with the single wavelet transform, the algorithm has better encryption and decryption effect, and can hide the information of the image better.
    Related Articles | Metrics
    Research on the Hadoop Platform Safety Reinforcement Based on the Kerberos Authentication Mechanism
    LU Yu-fan, WANG Xun
    Computer & Telecommunication. 2018, 1 (1-2): 47-49.  
    Abstract     PDF(0KB)
    The first version of the Apache Hadoop has caused a security problem in the architecture of data distribution, which leads to the potential hazard in applications. Based on the analysis of security problems, a managing and monitoring model is established,which is a solution of strengthening the data security. The model is on the basis of Kerberos authentication mechanism.Through the project, the security of data center can be reinforced significantly.
    Related Articles | Metrics
    Research on Network Monitoring and Prevention Technologies in Network Computer Room
    WANG Shuang-qing
    Computer & Telecommunication. 2018, 1 (1-2): 50-52.  
    Abstract     PDF(0KB)
    With the deepening of the Internet + education, the public computer room relies more and more on the network. The network security events occur from time to time, such as obtaining other people's privacy through network monitoring, invading computers to steal examination papers, etc. In this paper, the concept, tools and methods of network monitoring are analyzed. According to the monitoring principle and monitoring method, the detection and prevention measures of network monitoring are put forward.
    Related Articles | Metrics
    Design and Deployment of Enterprise Network Security Scheme
    YE Zheng-qiang , LI Jia
    Computer & Telecommunication. 2018, 1 (1-2): 53-54.  
    Abstract     PDF(0KB)
    With the expansion of the enterprise scale and the expansion of its branches, the enterprise network architecture becomes more complex and faces various security threats. This paper firstly introduces the basic situation of enterprise network environment.Based on the requirement of enterprise information system, the network security protection technologies are introduced,and then the design and deployment of network security protection program is put forward, expecting to provide some reference for related work.
    Related Articles | Metrics
    Research on the Informatization Management Strategy of Tobacco Commercial Enterprises
    CUI Kai
    Computer & Telecommunication. 2018, 1 (1-2): 55-57.  
    Abstract     PDF(0KB)
    With the development and popularization of information technology, a wave of technological revolution has set off.At present, various industries and fields have begun to apply information management, and tobacco commercial enterprises are no exception. At present, China's tobacco commercial enterprises have encountered some problems in the implementation process of informatization management. From two aspects of asset informatization management and human resources informatization management,this paper analyzes the existing problems, and puts forward the corresponding strategies
    Related Articles | Metrics
    The Exploration and Practice of Intelligent Medical Treatment to Promote the Reengineering of Outpatient Service Process
    CHEN Jian-qing, MAZhen-yi
    Computer & Telecommunication. 2018, 1 (1-2): 58-60.  
    Abstract     PDF(0KB)
    This paper explores on the patient-centric process reengineering, smoothing the process before diagnosis, during diagnosis and after diagnosis. It integrates the online and offline functions; carries out mobile treatment, self-medicine and consultation settlement; strengthens internal management; improves the service efficiency; and promotes the“Internet + health service”, to improve the patient experience.
    Related Articles | Metrics
    Analysis on the Production of 3D Animation Based on Game Engine Technology
    ZHANG Sai
    Computer & Telecommunication. 2018, 1 (1-2): 61-63.  
    Abstract     PDF(0KB)
    Gaming engine technology, with its suite of functional advantages such as real-time rendering and real-time editing, is used in 3D animation to dramatically reduce rendering cycles, increase production efficiency, and facilitate the production of highquality 3D animation. This paper discusses on the connotation of game engine, analyzes the main functions of game engine, and explores on the three-dimensional animation production based on game engine technology. The purpose of this article is to provide some ideas on how to promote the smooth production of 3D animation.
    Related Articles | Metrics
    Design and Application of Automatic Data Acquisition System for Soil and Water Conservation Monitoring Station Based on Big Data
    PAN Zheng-yong
    Computer & Telecommunication. 2018, 1 (1-2): 64-66.  
    Abstract     PDF(0KB)
    With the rapid development of information technology and network technology, automatic acquisition equipment can be applied to data collection, storage and management in the prevention and control of soil and water conservation, so as to improve the accuracy and completeness of soil and water conservation and the efficiency of the whole process. This paper designs a set of automatic station data acquisition system based on monitoring of soil data. The system can realize remote automatic monitoring of soil and water conservation data collection, classification, collection, storage, which will be applied to the monitoring station. By running the test for several months, the system is in good condition, which can accurately and completely monitor the automatic data acquisition and data processing.
    Related Articles | Metrics
    The Application of Penetration Test in Level Evaluation
    WUWen-gang, ZHANG Xin
    Computer & Telecommunication. 2018, 1 (1-2): 67-69.  
    Abstract     PDF(0KB)
    In the evaluation of information security level, the vulnerability of the target system can be found through the penetration technique and the security problems found in the grade evaluation are verified by the penetration technology. The methods and tools of penetration test are introduced. The application of the penetration test tool in the evaluation of security level of the information system is described in detail. The analysis indicates that the penetration test can further evaluate the system deeply, which can help to increase the completeness and accuracy of the level evaluation conclusion.
    Related Articles | Metrics
    The Cultivation of Students' Innovative Ability in the Teaching of Computer Basic Course in Higher Vocational Education
    PAN Xin
    Computer & Telecommunication. 2018, 1 (1-2): 70-72.  
    Abstract     PDF(0KB)
    In the era of rapid development of network information technology, the computer has penetrated into every walk of life, basic computer teaching has become a compulsory course in higher vocational colleges. Since the cultivation of innovation ability is the core of talent cultivation in higher education, how to combination both of them is the focus of the current vocational computer teaching. Therefore, it is nessary to promote the cultivation of students' innovative ability through a variety of methods. Based on the analysis of innovation ability, this article summarizes the status quo, and puts forward the reform measures.
    Related Articles | Metrics
    New Model of Library Service Based on Community Cooperation:FOLIO
    HU Xiao-li, XUWei
    Computer & Telecommunication. 2018, 1 (1-2): 73-76.  
    Abstract     PDF(0KB)
    The popularization of open source software has brought a new breakthrough to the library system automation. The proposal of FOLIO project not only combines the concept of open source but also promotes the multi-cooperation to form a truly effective community. This article introduces the project from the background, purpose, organizational structure and operation mechanism of FOLIO project. And it proposes that we should focus on the cooperation in the process of open access to the real needs of users to promote the development of library services.
    Related Articles | Metrics
    The Security Risks and Preventive Measures of the Informatization Construction of Three - level Hospital
    YUAN Bo
    Computer & Telecommunication. 2018, 1 (1-2): 77-78.  
    Abstract     PDF(0KB)
    In the informatization construction of three - level hospital, besides the improvement of the function and efficiency of the informatization system, we should pay more attention to the safety problems, ensuring the safety of the hospital informatization construction. Based on the author's own practical experience, this article firstly briefly analyzes the necessity of risk prevention, and then analyzes the existing security risks in informatization construction in three - level hospital. Finally, it puts forward the corresponding measures and suggestions, hoping to provide reference for the relevant work.
    Related Articles | Metrics
    Development in the Research on Steganalysis
    HUANG Ling-zhen
    Computer & Telecommunication. 2018, 1 (1-2): 79-81.  
    Abstract     PDF(0KB)
    This paper provides a review on steganalysis technology. Firstly the application of steganalysis and important algorithms are introduced, the advantages and disadvantages of traditional algorithms are also discussed. Finally some recently proposed methods are introduced, followed by a summary of open issues.
    Related Articles | Metrics
  News More  


  Links More  


Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd