High-Performance Computing and Automatic Face RecognitionView this Special Issue
Design and Implementation of Internet of Things Technology in College Students’ Innovation and Entrepreneurship Integration System
In order to improve the operation efficiency of the innovation and entrepreneurship integration system of college students, this document proposes to formulate and implement the innovation and entrepreneurship integration system of college students based on “Internet technology.” The web front end is implemented by Django technology, the back end is developed by Apache server pycharm, the database is written in Python, and the database is MySQL. The system meets the expected objectives of implementing, monitoring, and managing innovation and entrepreneurship projects. How the system realizes the functions of repeated comparison projects, easy tracking projects, and fast search, and how managers can make progress at any time. By creating different account function permissions, the system realizes the login, declaration, management, and other functions required by the users of the innovation and entrepreneurship project management system. It is very suitable for college students to improve the project application, information review, and application process. At the same time, it is helpful to supervise and select teachers and greatly improve management efficiency. The test results show that the minimum values of 30, 80, and 150 simulated users in the system performance test are 4, 5, and 7, respectively. The maximum users of the system performance test model are 30, 80, 150, 64, 284, and 398. The system performance tests are taken under the conditions of 30, 80, and 150 user bandwidth, with the results of 113/min, 104/min, and 90/min. The system basically meets the daily work management standards and fully achieves the expected system design goals. The development and use of this system are related to the development of college students’ innovation and entrepreneurship project management and have a clear reference for the development of innovation and entrepreneurship project management systems similar to manage workflow in the future.
The main challenges faced by innovation and entrepreneurship at this stage are students’ innovation ability, interest in entrepreneurship training, innovation ability, motivation of professional teachers’ entrepreneurship education, innovation ability, the resistance of entrepreneurship implementation mechanism, and innovation ability. Entrepreneurial projects and school activities lack innovation and entrepreneurship . Therefore, how to further improve the implementation system of college students’ innovation and entrepreneurship courses is a key problem faced by college students’ innovation and entrepreneurship teachers . Establish a coordinated, orderly, and well-structured implementation system of innovation and entrepreneurship courses for college and unversity students at at different levels of the national and provincial. Relying on the provincial college students’ innovation and entrepreneurship courses, school-level college students’ innovation and entrepreneurship training programs, and school-level college students’ innovation and entrepreneurship training programs, leads the national college students’ innovation and entrepreneurship courses “Increased innovation and entrepreneurship courses.” In recent years, the research on building an innovation and entrepreneurship platform for college students has become a hot research topic for college students. It focuses on the Internet and the features that add value to it. Several papers summarize the challenges faced by innovation and entrepreneurship in the Internet era and provide effective strategies for helping college students improve their innovation and entrepreneurship skills in the Internet era. Figure 1 shows the overall framework of the current college student innovation and entrepreneurship project management system .
2. Literature Review
Aiming at this research problem, Cao et al. have developed a relatively perfect system by adopting a complete set of information architectures and infrastructures . Yuan establish and manage the underlying hardware resource pool and provide the service resources required by the upper application through the open stack platform. It is free software and open source code project to build infrastructure as a service . Yong studied the statistics of entrepreneurship data and the electronization of project materials and preliminarily completed the transformation from traditional paper projects to electronic project applications. . Gao et al. entrepreneurship project management system mainly refers to the editing and publishing of innovation projects through computers, and the approval of various innovation projects through computers . Damayanti et al. believe that inthe third generation of college students’ innovation and entrepreneurship project management system, in the era of knowledge economy in the 21st century, how to master and maximize the use of knowledge has become the key content of innovation project management. This generation of system has powerful data processing functions, can fully integrate the files in the file system and the data in the data warehouse, and provides rich innovative project mining functions and knowledge sharing methods, gradually integrating the principles and practices of knowledge management into the daily work of each innovative project management . Licite et al. believe that after more than 30 years of development, with the increasing popularity of the Internet and web technology. They pay more and more attention to the actual needs of the school and the automation of business processes, which effectively solves the island phenomenon of various information platforms within the school . Liu et al. believe that the new generation can effectively cooperate with the school’s information management and help the school better carry out intensive management . Ianenko et al. believe that while strengthening data refinement management through application systems, there are data islands between application systems that can not realize data connection, affecting business efficiency . Yan et al. refined and classified some important data, set corresponding permissions according to the use scope of different teachers and students, and different business data by standardizing the Internet behavior of end-users, by using identity authentication and other methods . Barau believes that the future trend of cloud computing also increases the difficulty of network data attack methods and risk identification. Only by constantly improving the school network construction, repairing the defects of the equipment itself, and strengthening the information evaluation, can we reduce the data security risk of the information system . Based on the current research, this paper introduces some key technologies used in the system, such as B/S architecture, pycharm integrated development environment, Django (Python Web Framework) technology, MySQL database, and Internet of Things authentication algorithm, which compares and analyzes these technologies, finds out the relevant technologies suitable for the system, and makes full preparations for the development of the system. Demand analysis is an important step of platform construction. Through the specific analysis of business scenarios, the business requirements of the platform can be obtained. System requirement analysis is also called software requirement analysis. The web front end is implemented by Django technology, the back end is developed by Apache server pycharm, the database is written in Python, and the database is MySQL. The development and use of this system are related to the development of college students’ innovation and entrepreneurship project management and have a clear reference for the development of innovation and entrepreneurship project management systems similar to management workflow in the future.
3.1. Relevant Technical Support
3.1.1. B/S Architecture
B/S architecture, namely browser and server architecture mode, is a mode proposed after the widespread use of the web global wide area network. This mode can directly use the browser to connect and transmit data with the server. At first, many web games of this mode, which is more convenient than C/S structure. Users no longer need to download the client, and user data is also stored in the browser and server . Browser is widely used in the operating system. Users can greatly improve the speed by docking data between browser and server, but there are also some problems, such as the consumption of memory will increase with time, and the optimization problem is difficult to be well solved. B/S structure is composed of three-layer structure, and it is shown in Figure 2.
The first layer is the presentation layer, which mainly shows the interactive information between users and servers at the user level. The second layer is the business logic layer, which mainly applies the business logic functions to the software functions used by users. The third layer is the data access layer, which takes data from the database after responding to the user’s request .
The obvious disadvantages of B/S architecture are that it is weak on cross-browser. The function is weakened, there are functions that cannot be realized, and the performance is relatively low. The comparison between B/S architecture and C/S architecture is shown in Table 1.
3.1.2. Pycharm Integrated Development Environment
Pycharm is a development environment that integrates multiple functions. Therefore, it can improve the efficiency of Python development . It includes a complete set of Python language development tools such as code debugging, jump, project management, intelligent operation, and automatic completion of instructions . Moreover, it also provides some advanced functions, such as using Django for web development.
3.1.3. Django (Python Web Framework) Technology
Django adopts MTV architecture mode (i.e., model M, view v, and template T), which is an open source code of web application architecture written in Python . It is a better web framework in Python, integrates many modules, and makes the connection between modules more stable.
Django has the following characteristics: Perfect documents: after long-term development, improvement, and consolidation, it can provide users with relatively perfect online documents, and this sort of online documents can be provided to developers to find solutions at any time, so it can improve development efficiency. Integrated ORM component: the model layer of Django has its own database ORM component, which is used to operate different classes. Type database provides a unified way . URL mapping technology: Django’s mapping uses URL regular management expressions because the URL character encoding is composed of strings, which has great convenience and flexibility for developers. Background management system: this management system is simple and easy to operate. Users can realize background operation and web management control through a few lines of simple code and instructions . Error message prompt: if there are errors or exceptions in the process of development, debugging, and use, Django can prepare to locate the places with errors and problems and display the error information, so as to facilitate developers to modify and improve accurately and efficiently.
3.1.4. MySQL Database
MySQL database is a relational database. Its highlight is open source and many people use it. It is a small and medium-sized database, but it is enough for this topic. This topic does not need a particularly large database. Alibaba Taobao used this database before 2012, so this database is sufficient for this topic. Its disadvantage is that there is no way to store and process some super large data, which does not exist in this subject . MySQL database provides interfaces (APIs) for many high-level programming languages and Python used in this topic. It supports multithreaded data processing and multiCPU. Although the database is open source, it has very good security and reliability and provides a variety of data types, including common data types . It has a good memory management mechanism, which can effectively prevent memory leakage and will prompt in time when memory overflow occurs. It supports all database query statements and can be used on all platforms.
3.1.5. Internet of Things Authentication Algorithm
For some nodes of wireless sensor networks, the algorithm complexity of SHA-256 and other algorithms is still high, which is not suitable for terminal nodes with low processing capacity. At the same time, the old algorithms still have good performance in security. Therefore, the method adopted in this paper is still based on SHA-1 with relatively fast speed, which is also the prerequisite of sinusoidal projection authentication scheme . The random number (160 bits, i.e., composed of 40 hexadecimal numbers) is issued to the node by the platform. After the node receives it, the independent variable value of sinusoidal projection is calculated with the node key, which is the identity authentication element. The specific calculation method is as follows:
Random number (expressed as 40 hexadecimal numbers):
Each and represent a hexadecimal number.
The key transformation value after hash transformation is as follows:
Among them, and also represent a hexadecimal number. A and B are the displacement identification of the key, which circularly displaces the key by a bits and b bits.
Then, in the sine projection independent variable,where means that the number of digits on both sides of the equal sign is consistent and any carry generated is omitted. The complete independent variable (composed of 40 hexadecimal numbers) is shown in the following equation:
3.2. System Functional Requirements
The functional requirements analysis of the system is to clarify the needs of target customers and build the implementation architecture after in-depth understanding and analysis. Combined with relevant technical methods, establish an abstract model for the target, refine the realization of various functions, establish a logical model, design the system according to the architecture, and complete the realization of the system . The functional structure of the system is shown in Figure 3.
Generally, it can be divided into four basic modules as shown in Figure 3.
System manager is the authority and responsibility of system administrator and project administrator. It mainly assigns its own permissions to other users, creates accounts for instructors and students, and adds project administrators, judges, teachers, and approvers . Message notification management is mainly used to remind users of the link of the project, the items that need your approval or review, or the latest notifications. Online declaration management is the process of project declaration. Its process can be divided into project information registration, project declaration, project audit, project redeclaration, project modification, etc. Project management has two parts: one is to further improve or resubmit and modify the projects under application, the other is how to conduct an interim inspection and closing of the projects under application, and the contribution of everyone in the team .
4. Results and Analysis
4.1. Database Design
Meeting the needs of users is the basic requirement of system database design. According to the actual operation environment of the system, build an efficient storage database mode. The core of system architecture and design is the design of database, and relevant programs, which are created through database application system. At the same time, data maintenance must follow the one-to-one design principle. In order to avoid repeated naming, we must abide by the unique naming principle and the two-way use principle to obtain data information.
4.1.1. Entity Diagram
We can clearly get the interaction relationship between them and display it through the entity contact diagram (E-R diagram), so as to determine the corresponding relationship between their entities.
According to the information entity, there can be user basic information entity, project basic information entity, project member basic information entity, project application form information entity, interim inspection information entity, acceptance information entity, and project review information entity. Therefore, they should be distinguished when making database tables, and their entity attributes are also different. Entity information is shown in Figures 4–6.
4.1.2. Database Table Structure Design
The design of database table structure can reflect the logical relationship among entity attributes. The quality of the design directly affects the experience of using the system. The basic structure of the system is shown in Tables 2–5.
4.2. System Test
4.2.1. Overall System Test
The overall test of the system is the test method with the largest granularity among all tests. It is the last step of the online system. It is mainly to check whether the output results meet the expected objectives. This test method is more intuitive, so it is tested manually, as shown in Table 6.
4.2.2. Test of Some Functional Modules
Understand the characteristics and operation mode of the system, determine the key points of the functional module test, and then test each functional module of the system one by one to see whether the test results meet the expected objectives, and then determine the system error problem. The following is the test method of user login function module, which is tested by the PyUnit test framework. Other function modules can be tested according to the test method of login module. Table 7 takes the login function module as an example to analyze the function test. Through the test of some special characters, MySQL security test, and illegal verification test, the security of system operation can be determined only after the test of all function modules.
4.2.3. Safety Test
The system security test is about whether the system can intercept illegal access and malicious attacks. The system is configured with many functional permissions, and the functions that each permission can make are also different. All permissions are also encrypted by the MD5 encryption algorithm, as shown in Table 8.
4.2.4. Compatibility Test
For multiple versions of different browsers, such as IE7.0 to IE10, the stable operation state of each interface of the system and the normal use of functional modules are shown in Table 9.
4.2.5. Performance Test
The innovation and entrepreneurship training project management system simulates 3080150 users, respectively, by using the Load Runner test tool. By running the system, users can read data, check the response time of each functional module, record the appropriate time, judge whether the system performance meets the expected requirements, and calculate the system response speed. The system performance test results are shown in Figures 7–9. As shown in Figures 7–9, the performance of the system is relatively stable.
Through the test of the whole system and each functional module, it can be seen from the test result form that the system basically meets the standard of daily work management and fully meets the expected goal of system design.
This paper introduces the design and implementation of the Internet of Things technology in the college students’ innovation and entrepreneurship integrated system and introduces some key technologies used in the B/S architecture, pycharm integrated development environment, Django (Python Web Framework), and other systems. MySQL database, Internet of Things verification algorithm, compare and analyze these technologies, find relevant technologies for the system, and provide sufficient preparation for system development. This paper discusses the business requirements, system construction principles, construction scope, purpose, and construction scheme of the college students’ innovation and entrepreneurship project management system. Demand analysis is an important step in building a platform. Through special analysis of business options, the business requirements of the platform can be obtained. System requirements analysis is also known as software requirements analysis. Database development: through the inspection of the entire system and each functional module, it can be seen from the test result table that the system basically meets the daily work management standards and fully meets the expected system design goals. Later improvement combined with school innovation and entrepreneurship, on the one hand, students can understand the impact of previous business projects, which is of great benefit to students participating in the project. On the other hand, if teachers think that the projects proposed by students are practical, they can propose to implement the projects on the basis of innovation and entrepreneurship of college students.
The labeled dataset used to support the findings of this study is available from the corresponding author upon request.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
This study was supported by the Scientific Research Project of Colleges and Universities in Inner Mongolia Autonomous Region (No. NJSZZX2112) and the Major Innovation and Entrepreneurship Project of Baotou Teachers’ College (No. BSCY2020-02).
J. Cao, J. S. Zhong, W. J. Hu, L. M. Li, and Y. S. Liu, “Enhancing the clinical competence of postgraduate students in periodontology: design and implementation of multidisciplinary grand rounds,” Zhonghua kou qiang yi xue za zhi = Zhonghua kouqiang yixue zazhi = Chinese journal of stomatology, vol. 55, no. 6, pp. 408–411, 2020.View at: Publisher Site | Google Scholar
S. D. Damayanti, I. Enriko, and M. I. Nashiruddin, “Design and implementation of mount agung eruption monitoring system based on internet of things (iot) technology,” Test Engineering and Management, vol. 83, pp. 8166–8176, 2020.View at: Google Scholar
M. Ianenko, M. Ianenko, T. Kirillova, S. Amakhina, and N. Nikitina, “Digital transformation strategies of trade enterprises: key areas, development and implementation algorithms,” IOP Conference Series: Materials Science and Engineering, vol. 940, no. 1, Article ID 012051, 2020.View at: Publisher Site | Google Scholar
S. Barau, “Radio frequency energy measurement and budgeting towards design, optimization, and development of rf harvesting system,” The Journal of Engineering Entrepreneurship, vol. 3, no. 1, pp. 1–5, 2020.View at: Google Scholar
E. Kurniawan, S. Sumaryo, F. Budiman, A. Happy, and B. S. Aprillia, “Design and implementation of the quality of mineral water test equipment using fuzzy logic method based on internet of things,” IOP Conference Series: Materials Science and Engineering, vol. 1098, no. 4, Article ID 042068, 2021.View at: Publisher Site | Google Scholar
J. Murugesan and A. Murugaiyan, “Design and implementation of a smart garbage monitoring system (gms) using internet of things (iot),” Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, vol. 14, no. 8, pp. 1089–1091, 2020.View at: Google Scholar
A. Abdulkareem, T. E. Somefun, O. K. Chinedum, F. Agbetuyi, and T. E. Somefun, “Design and implementation of speech recognition system integrated with internet of things,” International Journal of Electrical and Computer Engineering, vol. 11, no. 2, pp. 1796–1803, 2021.View at: Publisher Site | Google Scholar
A. Musyafa, I. Abadi, R. D. Noriyati, R. Mukromin, and M. K. Asy'Ari, “Design and implementation monitoring system based internet of things (iot) on battery charging - photovoltaic power plant using flc,” International Journal of Mechanical & Mechatronics Engineering, vol. 20, no. 4, pp. 22–30, 2020.View at: Google Scholar
Q. Xie, B. Huang, G. Cao, X. Tao, and S. Zhao, Design and Implementation of Web-Based Project Management System for College Students' Innovation and Entrepreneurship, no. 4, 2018.