Vol 3, No 1

Full Issue

  • Open Access

    Original Research Articles

    Article ID: 2503

    A Research on Text Analysis of Telecommunication Network Fraud Information

    by Jiazhen Sheng, Weiwei Wang, Kuiyi Liu

    Journal of Networking and Telecommunications, Vol.3, No.1, 2021; 211 Views, 33 PDF Downloads

    With the advancement of Internet technology, the telecommunication network text information has featured novelty and diversification. The ever-changing text information involving cyber fraud poses new challenges to maintaining social order and protecting users' legitimate rights and interests. This paper first interprets the necessity of an analysis on the telecommunication network text information involving cyber fraud. Then, it analyzes the characteristics of this kind of information from its definition, dissemination mode and audience. Finally, it illustrates the application of text analysis on telecommunication network text information involving cyber fraud and the problems to be further studied from the aspects of Chinese word segmentation, sensitive word frequency, dictionary construction, etc., and explains some precaution measures.

  • Open Access

    Original Research Articles

    Article ID: 1943

    Design Optimization and Application Analysis of Embedded C Program

    by Yi Jiang

    Journal of Networking and Telecommunications, Vol.3, No.1, 2021; 81 Views, 10 PDF Downloads

    From MCU (Micro Control Unit) to ARM (Advanced RISC Machine), from smart phone to industrial Internet of Things, and to embedded development technology, applications have changed rapidly in the past 10 years, and embedded system has been widely used. Due to the characteristics of C programming language and its flexibility in language level, more and more programmers have chosen the embedded application development. Therefore, by analyzing the characteristics of the embedded system and C programming language, this paper discusses the application and optimization of embedded system as well as C programming language, aiming to help developers to improve the efficiency of program development and execution.

  • Open Access

    Original Research Articles

    Article ID: 2497

    Simple Analysis of Pipeline Performance and Cycle Optimization in Computer Architecture

    by Shaoshao Xu

    Journal of Networking and Telecommunications, Vol.3, No.1, 2021; 131 Views, 67 PDF Downloads

    This paper first summarizes the performance analysis of pipeline and some problems related to the performance of pipeline, and then introduces the how to loop optimization in detail. Pipelining technology is a very important technology in the field of computer. Using pipelining technology, multiple executing device in the computer work in parallel. The idea of parallelism comes from the traditional production assembly-line model of factory. As early as in the 1960s, some high-end machines have begun to use pipeline technology. Up to now, the pipeline technology has been very mature. The IBM7030 was the first computer to adopt pipeline technology. Pipelined processor can meet the higher requirements of computer operation and improve the performance of CPU. Pipelined processor has become an important and indispensable part of computer architecture.

  • Open Access

    Original Research Articles

    Article ID: 2103

    Python-Based Little Dinosaur Game Design

    by Laihao Huang

    Journal of Networking and Telecommunications, Vol.3, No.1, 2021; 174 Views, 84 PDF Downloads

    Python is a cross-platform and interpreted high-level programming language which is open source and free. It has a rich and powerful library that can easily connect various modules made in other languages, so Python is often called the "glue" language. [ 1]The Python language has developed rapidly in recent years and has a wide range of applications. A large number of Python applications can be found in such fields as Web programming, graphics processing, hacker programming, big data processing, web crawlers, scientific computing, and game programming and so on. The invention and research of the Python language are mainly for facilitating learning and application. Therefore, the Python language is open source, with characteristics of simple syntax and developer-friendly writing and understanding. This article aims to master the advantages of Python language in the field of game development through the design and analysis of the little dinosaur game.

  • Open Access

    Original Research Articles

    Article ID: 2617

    Analysis of Hot Spots and Trends of Cultural Security Research Based on Citespace

    by Xuchen Sun, Shuo Jing, Jinkai Sun

    Journal of Networking and Telecommunications, Vol.3, No.1, 2021; 87 Views, 18 PDF Downloads

    With the development of The Times, the connotation of national security is increasingly enriched, and the influence of non-traditional security factors on national security is increasing day by day, eventually forming the overall concept of national security. As an important part of non-traditional national security, cultural security can be further analyzed based on the review of its research process and the excavation of research hotspots by using Citespace software. From the perspective of research process, although the overall trend of cultural security research in China is increasing, it has stagnated in recent years, and is faced with the problems of insufficient number of core authors and low degree of journal diversification. In terms of research hotspots, China's cultural security research has shortcomings such as scattered research hotspots and single research fields, and it is necessary to further deal with the relationship between resisting cultural invasion and enhancing national cultural soft power.

  • Open Access

    Original Research Articles

    Article ID: 2619

    Application Research of Computer Technology in Office Automation

    by Xiuli Lu, Zhou Yang, Yan Wang, Yongli Liu

    Journal of Networking and Telecommunications, Vol.3, No.1, 2021; 219 Views, 17 PDF Downloads

    With the rapid development of global economic integration, people all over the world can communicate with their friends and colleagues through computers, which not only brings convenience to people's lives, but also brings great convenience to their work. Industries, enterprises have to face increasingly complex tasks, their work ability and comprehensive quality requirements are also increasing. The traditional management concept and management mode can not adapt to the needs of enterprise office automation. The enterprise should keep pace with the Times, flexible use of computer technology, further improve the efficiency of office automation.

  • Open Access

    Original Research Articles

    Article ID: 3295

    Design of Human-Computer Interaction Control System Based on Steady-state Visual Evoked Encephalography (SSVEP)

    by Leipo Liu

    Journal of Networking and Telecommunications, Vol.3, No.1, 2021; 68 Views, 8 PDF Downloads

    With the continuous development of science and technology, the research of EEG has gradually made great achievements. During this time, a technique called mechanized brain interface was also being used. This technology is based on the computer technology, using the EEG signals generated by the neural activities of the human brain to link with the external devices, so as to form a brain as the signal source, through the signal transmission to the external devices to control the external devices of an emerging technology. The visual system collects information from the outside world, and the EEG signals transmit these signals to the brain. Finally, the brain analyzes and makes judgments so as to give instructions to the mechanical parts, and finally the mechanical parts realize the effect. The experiment found that the system can accurately collect the visual information and the generated EEG signals can be timely display conversion, and finally these signals will be converted into digital signals sent to the calculation of the processing system. In this paper, human-computer interaction control as the entry point, through the analysis and design of the EEG signals of the human brain, and finally designed the ability system that can enable people with physical disabilities to obtain autonomous activities.