期刊文献+

基于工程认证的数据结构与算法课程教学研究 被引量:12

Research on the Teaching of Data Structure and Algorithm Based on Engineering Certification
下载PDF
导出
摘要 数据结构与算法课程作为计算机与信息类专业的基础课程,传统教学过程中存在重视理论教学,忽视实践教学的问题。为适应工程认证要求,对数据结构与算法课程实践教学环节进行研究与改革。将原有以理论教学为主的教学方式,转换为以理论教学为基础、实践教学为核心的教学体系,从而锻炼和培养学生的工程实践能力。围绕实践教学环节,以兰州交通大学服务大交通行业的特色为切入点,结合数据结构与算法课程特点,构建6~8个科学可行的实践教学案例,填补现阶段数据结构与算法课程实践教学环节无标准化、科学化、系统化教学案例的空白。 The course of Data Structure and Algorithm is a basic course for computer and information majors.There is the problem of focusing on theory teaching and neglecting practice teaching in traditional teaching process.In order to meet the requirements of engineering certification,the practice and teaching part of this course are studied and reformed.The original teaching method,which is based on theory teaching,is converted into a teaching system based on theoretical teaching as a foundation and practice teaching as the core to train and temperi students'engineering practical ability.In practical teaching,we take the characteristics of Lanzhou JiaoTong University's major transportation trade as the breakthrough point combined with the characteristics of data structure and algorithm course to construct 6 to 8 scientific and feasible practice teaching cases which fill the blank of standardized,scientific and systematized teaching cases for the practice teaching part.
作者 张冰涛 王小鹏 王履程 沈瑜 边彩虹 ZHANG Bing-tao;WANG Xiao-peng;WANG Lv-cheng;SHEN Yu;BIAN Cai-hong(School of Electronic and Information Engineering,Lanzhou Jiaotong University;Sales Branch,Lanzhou Thermal Power Corporation,Lanzhou 730070,China)
出处 《软件导刊》 2019年第1期201-204,共4页 Software Guide
基金 国家自然科学基金项目(61461025 61761027) 兰州交通大学教改项目(JGY201841) 兰州交通大学青年基金项目(2016004)
关键词 课程教学 工程教育 实践教学 教学案例 curriculum instruction engineering certification practice teaching teaching cases
  • 相关文献

参考文献14

二级参考文献91

  • 1杨连生.关于人文社会科学与高等工程教育目标的思考[J].西安交通大学学报(社会科学版),1998,18(1):57-59. 被引量:1
  • 2徐警武.世界著名理工大学发展文科的经验[J].理工高教研究,2005,24(1):7-9. 被引量:13
  • 3李玲娟,徐向凯,王汝传.MANET的IDS中移动代理部署算法的研究[J].南京邮电大学学报(自然科学版),2006,26(3):52-57. 被引量:1
  • 4王林,戴冠中.复杂网络的度分布研究[J].西北工业大学学报,2006,24(4):405-409. 被引量:68
  • 5杨子胥.近世代数[M].北京:高等教育出版社,2004.
  • 6Garuba M,Liu Chunmei,Fraites D.Intrusion techniques: Comparative study of network intrusion detection systems[C] //Fifth International Conference on Information Technology: New Generations.Las Vegas,Nevada: IEEE Press,2008: 529-598.
  • 7Denning Dorothy E.An intrusion detection model[J].IEEE Transactions on Software Engineering,1987,13(2): 222-232.
  • 8Bezdek J C.Pattern recognition with fuzzy objective function algorithms[M].New York: Plenum Press,1981.
  • 9Schaeffer Satu Elisa.Graph clustering[J].Computer Science Review,2007,1(1): 27-64.
  • 10Portnuy L,Eskin E,Stolfo S J.Intrusion detection with unlabeled data using clustering[C] //Proceedings of ACM CSS Workshop on Data Mining Applied to Security(DMSA 2001).Philadelphia,PA: ACM Press,2001:5-8.

共引文献61

同被引文献69

引证文献12

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部