Modern education technology center

Jinan, China

Modern education technology center

Jinan, China

Time filter

Source Type

Tingting T.,Modern Education Technology Center
Proceedings - 9th International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2017 | Year: 2017

In the age of big data, 'Internet plus traffic' pattern, which is deeply integrated new generation information technology with transportation, has become the effective method to improve urban traffic. Combined the problems existed in technology integration with innovative application of traffic big data, this paper puts forward transformation strategy of traffic planning technology from aspects of theory and technology, personnel training and so on. © 2017 IEEE.


Tingting T.,Modern Education Technology Center
Proceedings - 9th International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2017 | Year: 2017

Public transit system development of Changsha and Chengdu were studied as an research, the economic development level, city development level, land utilization level and the like of Changsha and Chengdu were analyzed by using the big date technology, the passenger volume were analyzed by using the public transit IC card, the date of public transit station were retrieved by ARCGIS in High moral map, and the coverage rate of public transit station were analyzed systematically, the public transit network density was calculated by building district automatically recognition technology. The research results indicate that the experience of public transit system in Chengdu provided an efficient inspiration to Changsha, which means it is necessary for Changsha to accelerating develop the public transit system, and improving the lake. And the developing suggestions were proposed at the end. © 2017 IEEE.


Zhang Z.,Modern Education Technology Center
Applied Mechanics and Materials | Year: 2013

The application of OTP user authentication technology to the FTP proxy server on the firewall can further improve the security of user login. On the basis of the OTP, a more secure and reliable improved method of OTP authentication appears, which will add the client's MAC address and port number to the uncertainty factors so as to make it difficult for the attacker to masquerade as a normal user login and consequently make process more secure. © (2013) Trans Tech Publications, Switzerland.


Ma Q.F.,Modern education technology center | Liu G.L.,University of Jinan
Applied Mechanics and Materials | Year: 2013

This paper studied the Service-oriented software architecture. Recently service-oriented architecture is a research hot because it is open and flexible. But all people only concern its application in a certain field. Almost no one puts forward a general method for various field systems. Also there are no service-oriented developing software and tools. This paper proposes a service-orientation solution to the management information system based on SOA (Service-oriented architecture). Business process can be designed by interactive interface library. Users can complete the design of system by simply dragging the mouse. For various systems it is an efficient method because business process can be designed by interactive interface. © (2013) Trans Tech Publications, Switzerland.


Wu X.-K.,Modern Education Technology Center
ICCET 2010 - 2010 International Conference on Computer Engineering and Technology, Proceedings | Year: 2010

At present, the Internet model of the system is taking place from a traditional client / server (client / server) mode to right-Peer Computing (peer-to-peer, also referred to as P2P) mode to transmit. The core idea of P2P is that all participating nodes in the system (referring to a computer on the Internet) is completely equal status, there is no distinction client and server, it can be said that each node is both a client and also server; both to provide services to others, but also to enjoy the service from others. This article will topology information into unstructured P2P networks, unstructured P2P networks and take advantage of the inherent characteristics of the network domain, the choice of classification and super-node, thereby enhancing the efficiency and success rate of queries to reduce the burden on the network. © 2010 IEEE.


Li Q.,Modern Education Technology Center
Journal of Computational Information Systems | Year: 2012

In the paper, the hybrid model of RBF neural network and particle swarm optimization algorithm is proposed to predict tuberculosis. In the hybrid model of RBF neural network and particle swarm optimization algorithm, the RBF neural network is established by five input nodes, six hidden nodes and one output node, and particle swarm optimization algorithm is applied to choose the centers and the widths of hidden nodes and output weight of RBF neural network. The prediction results of the hybrid model of RBF neural network and particle swarm optimization algorithm, traditional RBF neural network, BP neural network show that the hybrid model of RBF neural network and particle swarm optimization algorithm can obtain the best tuberculosis prediction effects among the three prediction models. © 2011 by Binary Information Press.


Wu X.,Modern Education Technology Center
Proceedings - 2013 10th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2013 | Year: 2013

In recent years, a variety of chaos-based image encryption algorithms have been presented with a permutation-diffusion structure. A novel chaos-based color image encryption scheme using coupled map lattices (CML) is proposed in this paper. The image bidirectional diffusion method is employed with variable CML parameters and iteration numbers, in which ordinary confusion operation is omitted and replaced by decompose-and-recompose bit-level image process. Experiments and security analysis has been performed to justify the high security performance of our proposed image encryption scheme. © 2013 IEEE.


Yu H.,Modern Education Technology Center | Wang G.,Modern Education Technology Center
WIT Transactions on Information and Communication Technologies | Year: 2014

After analyzing of common data exchange mode and technology, a heterogeneous data exchange platform framework based on Web services is designed. Heterogeneous data systems are linked by Web services technique to eliminate the information island. © 2014 WIT Press.


Zhang Z.,Modern Education Technology Center
Proceedings - 2012 IEEE Symposium on Electrical and Electronics Engineering, EEESYM 2012 | Year: 2012

Designed and implemented a dual-factor authentication file encryption system based on smart-phone, analyzed the security of file encryption system and combined dual-factor authentication technology. Via the mutual approval between Bluetooth as well as application-specific communication protocol and the computer, the system used the smart-phone as a hardware encryption key to set up a file cabinet in the computer for storing private files to deal with the security of information storage. The application shown that the system is easy to use, highly expansible and has greatly improved the security of the data storage. © 2012 IEEE.


Wang X.,Jiangsu University | Huang D.,Modern Education Technology Center
ITME 2011 - Proceedings: 2011 IEEE International Symposium on IT in Medicine and Education | Year: 2011

For the information island in the information processing, in this paper, we present Cloud Education, a information architecture based on cloud computing in Open Education. Cloud Education uses four sublayers, physical hardware layer, virtualization layer, middleware layer of education and the application interface layer to allow service instances to be placed anywhere in the sublayers. We described the communication process of the sublayers with a formal language CSP (Communicating Sequential Processes), and discussed the key technologies in this model. At last, we evaluate the merits of the model through simulation experiment, and proved the model is flexibility and expansibility. As a result, we can deploy the Cloud Education to the Open Education. © 2011 IEEE.

Loading Modern education technology center collaborators
Loading Modern education technology center collaborators