Journal of Networking and Telecommunications
Latest Publications


TOTAL DOCUMENTS

18
(FIVE YEARS 18)

H-INDEX

0
(FIVE YEARS 0)

Published By Piscomed Publishing Pte Ltd

2661-4065

2021 ◽  
Vol 2 (4) ◽  
pp. 70
Author(s):  
Yao Li

<p>The autonomous learning model is one of the dominant learning models in the era of “Internet + education”. It is sought after by teachers and students in universities. The learning style of college students is shifting from passive to active learning. And the traditional teaching model in the course of “Web Design and Production” is easy to cause the problems of poor learning enthusiasm of students and low teaching effect. According to the characteristics of the course, this article explores how autonomous learning can stimulate students’ learning motivation and improve the learning effect of this course. It also designs a corresponding autonomous learning instructional model to mobilize students’ learning enthusiasm, and to improve the instructional efficiency of the course.</p>


2021 ◽  
Vol 2 (4) ◽  
pp. 76
Author(s):  
Ran Cheng

<p>Technological development has brought about a series of changes, including influences on the traditional translation industry which is unable to meet the future needs due to its low efficiency and limited forms. Computer-aided translation software, shortened as CAT software, is therefore developed. Featuring powerful memory and fast computing speed of computers, CAT software allows translators to give full scope to creativity, which enhances traditional translation efficiency. In recent years, both CAT software and cloud translation software have been rapidly developed. The latter is built based on cloud computing technology, and is emerging one after another. This article, taking such CAT software as SDL Trados and such cloud translation platform as Tmxmall as examples, studies similarities and differences between the two different kinds of tools in terms of operation interface, translation project management and corpus management. By analyzing features of the two tools, this article seeks to provide references for translators and software engineers.</p>


2021 ◽  
Vol 2 (4) ◽  
pp. 80
Author(s):  
Qian Zhou

<p>The continuous development of modern society, science and technology has promoted the rapid development of various industries in China and greatly supported social development and people’s lives. Among them, the power system is an important part. Perfecting the power system and building a high-quality power grid system need to be focused on at present. This article mainly analyzes the necessity of applying power communication technology in smart grid and the demand of smart grid for power communication technology. Some specific application suggestions are put forward for reference.</p>


2020 ◽  
Vol 2 (3) ◽  
pp. 62
Author(s):  
Guande Luo

<p>In the telecommunication network, the optical network transmission system is one of the most important components. The system mainly includes two elements, namely transmission media and node equipment. In the specific operation process, the effective use of the system can fundamentally provide practical and effective support for the telecommunication network, and it is safer and more effective applied in the telecommunication support network and various business networks. Moreover, it can carry out long-distance and large-capacity business transmission. Optical network transmission system and technology has a vital direct impact on the safe operation and innovative development of telecommunications networks, so it is very important and necessary to analyze and discuss the application of this technology in telecommunications networks. This article focuses on the analysis and discussion of the application of optical network transmission technology in telecommunication network and the specific implementation strategy, aiming to provide some reference for relevant practitioners.</p>


2020 ◽  
Vol 2 (3) ◽  
pp. 66
Author(s):  
Chen Chen

<p>This article first studies the telecommunication network security according to industry standards, then discusses the current situation of network security protection of domestic telecommunication enterprises. It also sorts out the technical means of telecommunication network security protection, and finally puts forwards the prospect and suggestions of telecommunication network security protection.</p><p> </p>


2020 ◽  
Vol 2 (3) ◽  
pp. 58
Author(s):  
Feng Ling ◽  
Rajamohan Parthasarathy ◽  
Ye Wang ◽  
Sokchoo Ng

<p align="justify">Relevant studies have pointed out that public has paid highly attention on the accuracy of neural network algorithm as it is widely applied in recent years. According to the present practice, it is quite difficult to collect related data when applying neural network algorithm. Besides, problems of trifles and complication exists in data image labeling process, which leads to a bad impact on the recognition accuracy of targets. In this article, analyzes are conducted on the relevant data from the perspective of data image processing with neural network algorithm as the core of this work. Besides, corresponding data augmentation technology is also put forward. Generally speaking, this technology has effectively realized the simulation under different shooting and lighting conditions by flipping, transforming and changing the pixel positions of the related original images, which contributes to the expansion of database types and promotes the robustness of detection work.</p>


2020 ◽  
Vol 2 (3) ◽  
pp. 53
Author(s):  
Xiaofeng Ma ◽  
Norriza Hussin

<p>With the rapid development of computer network, the fully opened network has greatly changed people’s production and daily life and the traditional industries are no longer closed. However, there are also many network security problems. To deal with it, this article explores the computer applications based on management of network information security technology. It analyzes the main factors threatening network information security from the security problems caused by computer applications. Combining with the application practice, specific measures are put forward for reference.</p>


2020 ◽  
Vol 2 (3) ◽  
pp. 46
Author(s):  
Qiurong Chen

<p>On the point of view of Largest Number of Node-Disjoint Path (LNNDP for short) between a node pair in a network, this article states the importance of LNNDP to global survivability of topology at first, then proposes an algorithm to compute maximal number of node-disjoint paths between node pairs. A new topology survivability metric based on LNNDP is put forward to evaluate the global survivability of network topology. It can be used to evaluate the survivability of topology provided. This metric can express accurately global topology survivability.</p>


2020 ◽  
Vol 2 (2) ◽  
pp. 38
Author(s):  
Mengqi Li

<p>With the continuous innovation of science and technology, data and information security technology is widely used in various industries. The application of this technology can obviously enhance the security of network communication. This article discusses the significance and insecurity of network information security, and puts forward some measures for protecting data and information security for the reference.</p>


2020 ◽  
Vol 2 (2) ◽  
pp. 42
Author(s):  
Xingrui Wang

<p>With the rapid development of smart phones and communication technology, the frequency of communication between the public and society through telecommunication equipment is increasing. At the same time, some lawless elements often cheat the public through telecommunication equipment, which brings irreparable economic losses to the society and the masses to a certain extent. In view of the above problems, this article takes the source of telecommunication fraud as the breakthrough point, analyzes the existing telecommunication fraud processing technology and points out its shortcomings, and then proposes a method of telephone fraud analysis based on big data technology. This technology fills the defects of the existing telecommunication interception technology and provides a new idea for effectively avoiding telecommunication fraud in the future.</p>


Sign in / Sign up

Export Citation Format

Share Document