期刊文献+

应用型本科高校《大数据与云计算》教学改革实践 被引量:2

Practice of Big Data and Cloud Computing Teaching Reform in Application-Oriented Universities
下载PDF
导出
摘要 《大数据与云计算》课程是应用型本科高校教学改革的重要组成部分。在教学过程中,大数据与云计算的理论知识较多、实践操作不足、技术融合性难以把握。为解决这些问题,提出一种改进的教学方法。在确保学生掌握理论知识与实践操作的基础上,有效降低讲授难度,显著提升教学效果。教学实践与反馈结果均证明,该教学方法具有较好的可操作性,有利于学生对课程知识的学习,在教学改革中可以显著提高教学质量。 Big Data and Cloud Computing are important components of teaching reform in application-oriented universities.In the teaching process,big data and cloud computing theory knowledge are many,the practice operation insufficiency,the technical fusion grasps with difficulty.In order to solve these problems,an improved teaching method is proposed.On the basis of ensuring that students master theoretical knowledge and practical operation,teaching difficulty is effectively reduced and teaching effect is significantly improved.Teaching practice and feedback results have shown that the teaching methods have better maneuverability,conducive to students’learning of the course,and it can significantly improve teaching quality in the teaching reform.
作者 王全福 WANG Quan-fu(Nanfang College,Sun Yat-sen University,Guangzhou 510970)
出处 《现代计算机》 2020年第18期114-116,123,共4页 Modern Computer
关键词 应用型本科高校 大数据与云计算 教学改革 教学质量 Application-Oriented Universities Big Data and Cloud Computing Teaching Reform Teaching Quality
  • 相关文献

参考文献2

二级参考文献191

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献3438

同被引文献9

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部