Vol. 2 No. 2 (2020)

  • Open Access

    Article

    Article ID: 357

    The Application of RFID Technology in the Work Mode of Library Acquisition and Cataloging

    by Jianfeng Shen

    Insight - Information, Vol.2, No.2, 2020; 450 Views, 12 PDF Downloads

    In the 21st century, with the continuous development of Radio Frequency Identification (RFID), more and more libraries have begun to apply this technology. Due to the many restrictions of the traditional editing model, RFID technology, with its characteristics, has improved work efficiency and service quality of library acquisition and cataloging work. Therefore, the application of RFID technology in library work has great prospects. The application of RFID technology to the intelligent process of libraries has been promoted.  

  • Open Access

    Article

    Article ID: 361

    Research on the Historical Evolution and Hot Spots of Public Policy Making in China

    by Guangchen Wang

    Insight - Information, Vol.2, No.2, 2020; 553 Views, 13 PDF Downloads

    Public policy formulation is the prerequisite and primary issue for public decision-making. This article uses the CiteSpace analysis software to make a detailed analysis of the research literature (1999–2019) on policy formulation in the CNKI database, and to sort out the historical evolution and hotspots of China’s policy formulation research in the past two decades. The analysis found that: policy formulation, educational policy formulation, interest groups, and public participation are the focus of research in the field of policy formulation; the first ten years mainly focused on relevant theories and experiences of Western countries, as well as sustainable development and harmonious society. The next ten years mainly focused on research on public opinion, democracy, think tanks, and satisfaction.

  • Open Access

    Article

    Article ID: 365

    Research on Anti-Counterfeiting Technology Based on Encrypted Two-Dimensional Code

    by Liuyi Lu

    Insight - Information, Vol.2, No.2, 2020; 490 Views, 18 PDF Downloads

    Two-dimensional code is widely used in daily life, and security issues are increasingly prominent. In order to improve the security and use of two-dimensional code information, the anti-counterfeiting technology based on encrypted two-dimensional code is studied. At first, this article discusses the security problems faced by two-dimensional code in the application process, and analyzes digital security technology, and compares the performance of different encryption algorithms. This algorithm not only effectively enhances the security of the system and reduces the chances of key information theft and tampering, but also ensures the generation and recognition speed of two-dimensional codes.

  • Open Access

    Article

    Article ID: 370

    An Example of Using MATLAB for Data Analysis—The Correlation between College Entrance Exam and Students’ Performance at Universities

    by Zhihao Ren

    Insight - Information, Vol.2, No.2, 2020; 288 Views, 10 PDF Downloads

    Many universities all over the world use entrance exams as a tool for filtering and selecting applicants to their courses. While entrance exams provide a standardized testing mechanism, it is not clear whether they are a predictor of the student’s future performance at the university. As an initial investigation, the author found and analyzed a raw dataset of students’ entrance exam scores and their performance in the university during the first three semesters. The author carried out statistical analysis for the entire cohort and also according to gender. The analysis was carried out using Matlab. The analysis carried out shows that for the given dataset, there is no correlation between entrance exam scores and university scores. Also, there is no significant difference in the performance at the entrance exam and university scores, between male and female students.