Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 591-594.

• Interdiscipline & Application • Previous Articles     Next Articles

Design and Implementation of Network Subscription System Based on Android Platform

HAO Jun-sheng1,LI Bing-feng1,CHEN Xi2,GAO Wen-juan3   

  1. School of Electrical Engineering and Automation,Henan Polytechnic University,Jiaozuo,Henan 454000,China1
    School of Surveying and Land Information Engineering,Henan Polytechnic University,Jiaozuo,Henan 454000,China2
    School of Sino-Germany Intelligent Production,Shenzhen Institute of Technology,Shenzhen,Guangdong 518116,China3
  • Online:2018-06-20 Published:2018-08-03

Abstract: For solving the problem of congestion,dining difficulty and boring waiting time in college dining peak period,this paper designed and developed a college network ordering system based on Android platform.The system consists of four parts,user management,online ordering,online payment and order sequence.In order to determine whether the number of orders unit time has reached the maximum capacity of the window,this paperd used the K-means algorithm to characterize the customerst’queuing time to extract the similarity between the customer queuing time based on the dishes and establish the maximum capacity of the window standard.It takes the maximum capacity of the window as the maximum allowable value of the user orders in the unit time.The proposed method can alleviate congestion problems by the mode of “user selecting time for free,making meal in advance and taking meal on time”.

Key words: Android, Clustering analysis, K-means, Network ordering, University restaurant

CLC Number: 

  • TP311.52
[1]张宁,刘宏磊,谭薇,等.基于校园一卡通的电子商务平台的设计与实现[J].华中师范大学学报(自然科学版),2017(S1):195-199.
[2]杨斯博.基于安卓平台的手机订餐系统的设计与实现[D].长春:吉林大学,2016.
[3]马勇喆.基于Android平台的高校订餐软件设计与实现[J].信息技术,2016(3):170-174.
[4]张裔智,赵毅,汤小斌.MD5算法研究[J].计算机科学,2008,35(7):295-297.
[5]WANG X,FENG D,LAI X,et al.Collisions for Hash Functions MD4,MD5,HAVAL-128 and RIPEMD[EB/OL].
[2013-10-20].http://eprint.iacr.org/2004/199.pdf.
[6]PIMENTE l V,NICKERSON B G.Communicating and displaying real-time data with WebSocket[J].IEEE Internet Computing,2012,16(4):45-53.
[7]COWARD D.Java WebSocket编程[M].北京:清华大学出版社,2015.
[8]沈海波,洪帆.基于Cookie的跨域单点登录认证机制分析[J].计算机应用与软件,2006,23(12):48-51.
[9]OSKARSSON A,SKERFVING S,et al.Total and inorganic mercury in breast milk and blood in relation to fish consumption and amalgam fillings in lactating women[J].Archives of Environmental Health:An International Journal,1996,51(3):234-241.
[10]JIANG F,KU S.How to display the data from database by Listview on An-droid[C]∥2010 2nd International Workshop on Intelligent Systems and Applications (ISA).IEEE,2010:1-4.
[11]BATYUK L,HERPICH M,CAMTEPE S A,et al.Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications[C]∥2011 6th International Conference on Malicious and Unwanted Software (MALWARE).IEEE,2011:66-72.
[12]任敏丽.排队论在银行服务系统中的若干应用研究[D].哈尔滨:哈尔滨工业大学,2010.
[13]CHEN N,XU Z S,XIA M M.Hierarchical hesitant fuzzy K-means clustering algorithm[J].Applied Mathematics:A Journal of Chinese Universities(Series B),2014,1:1-17.
[14]韩微,翟盘茂.3种聚类分析方法在中国温度区划分中的应用研究[J].气候与环境研究,2015,20(1):112-113.
[15]章基嘉,孙照渤,陈松军.应用K均值聚类法对东亚各自然天气季节500毫巴候平均环流的分型试验[J].气象学报,1984(3):55-63.
[16]贾俊平,何晓群,金勇进.统计学[M].北京:中国人民大学出版社,2012.
[1] YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515.
[2] WANG Yi, LI Zheng-hao, CHEN Xing. Recommendation of Android Application Services via User Scenarios [J]. Computer Science, 2022, 49(6A): 267-271.
[3] XU Shou-kun, NI Chu-han, JI Chen-chen, LI Ning. Image Caption of Safety Helmets Wearing in Construction Scene Based on YOLOv3 [J]. Computer Science, 2020, 47(8): 233-240.
[4] CAO Su-e, YANG Ze-min. Prediction of Wireless Network Traffic Based on Clustering Analysis and Optimized Support Vector Machine [J]. Computer Science, 2020, 47(8): 319-322.
[5] SUN Zhi-qiang, WAN Liang, DING Hong-wei. Android Malware Detection Method Based on Deep Autoencoder Network [J]. Computer Science, 2020, 47(4): 298-304.
[6] ZHONG Ya,GUO Yuan-bo,LIU Chun-hui,LI Tao. User Attributes Profiling Method and Application in Insider Threat Detection [J]. Computer Science, 2020, 47(3): 292-297.
[7] RAO Meng,MIAO Duo-qian,LUO Sheng. Rough Uncertain Image Segmentation Method [J]. Computer Science, 2020, 47(2): 72-75.
[8] JIAO Yang, YANG Chuan-ying, SHI Bao. Relevance Feedback Method Based on SVM in Shoeprint Images Retrieval [J]. Computer Science, 2020, 47(11A): 244-247.
[9] YAO Li-shuang, LIU Dan, PEI Zuo-fei, WANG Yun-feng. Real-time Network Traffic Prediction Model Based on EMD and Clustering [J]. Computer Science, 2020, 47(11A): 316-320.
[10] SUN Zhi-gang, WANG Guo-tao, JIANG Ai-ping, GAO Meng-meng, LIU Jin-gang. Monitoring System of Traffic Safety Based on Information Fusion Technology [J]. Computer Science, 2020, 47(11A): 642-650.
[11] LI Gui-hui,LI Jin-jiang,FAN Hui. Image Denoising Algorithm Based on Adaptive Matching Pursuit [J]. Computer Science, 2020, 47(1): 176-185.
[12] JIANG Hua,WU Yao,WANG Xin,WANG Hui-jiao. Study on Ocean Data Anomaly Detection Algorithm Based on Improved K-means Clustering [J]. Computer Science, 2019, 46(7): 211-216.
[13] WEN Jun-hao,WAN Yuan,ZENG Jun,WANG Xi-bin,LIANG Guan-zhong. Application of Illumination Clustering and SVM in Energy-saving Control Strategy of Street Lamps [J]. Computer Science, 2019, 46(7): 327-332.
[14] LIU Chang-qi, SHAO Kun, HUO Xing, FAN Dong-yang, TAN Jie-qing. K-means Image Segmentation Algorithm Based on Weighted Quality Evaluation Function [J]. Computer Science, 2019, 46(6A): 158-160.
[15] HOU Yuan-yuan, HE Ru-han, LI Min, CHEN Jia. Clothing Image Retrieval Method Combining Convolutional Neural Network Multi-layerFeature Fusion and K-Means Clustering [J]. Computer Science, 2019, 46(6A): 215-221.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!