-
Classification of Pneumonia Using Deep Convolutional Neural Network
Alhussein Mohammed Ahmed,
Gais Alhadi Babikir,
Salma Mohammed Osman
Issue:
Volume 5, Issue 2, June 2022
Pages:
26-33
Received:
13 March 2022
Accepted:
6 April 2022
Published:
14 April 2022
Abstract: Pneumonia is considered a serious and fatal disease worldwide. In fact, pneumonia can be an individual's life-endangering if not treated promptly by drugs. Therefore, the early detection of pneumonia enhances the chances of recovery, which helps reduce mortality. It is worth noting that X-rays are one of the most important diagnostic tools for diagnosing pneumonia. In fact, Chest X-ray is widely used in the diagnosis of many lung diseases (such as: Breast Cancer, Pneumonia, Tuberculosis, etc.), due to lower diagnostic costs. Indeed, the diagnoses can be subjective for many reasons for example the appearance of disease which can be unclear in chest X-ray images or can be confused with other diseases. Hence, for enhancing the level of diagnosis to guide clinicians, computer-aided diagnosis systems will be needed. In this paper, we put forward to develop a structure to classify pneumonia from chest X-ray images using a Convolutional Neural Network (CNN) and residual network architecture. Clearly, to determine if a person is infected with pneumonia or not, we used two well-known CNN pre-trained models (ResNet50 and ResNet101), with multi-class Support Vector Machine (SVM) to classify and transfer learning from the pre-trained CNN models to extract and classify features. Thus, the proposed framework takes an X-ray image size of 224 x 224 pixels as an input and gives the final prediction Normal or Pneumonia. The experimental results showed that the classification models proved to be effective, with an accuracy range of 97% to 98.3%. More precisely, the image extraction features using Resnet50 + SVM and Transfer Learning + Resnet50 methods achieve the highest performance of Accuracy of 98.3% and 97.8%, respectively.
Abstract: Pneumonia is considered a serious and fatal disease worldwide. In fact, pneumonia can be an individual's life-endangering if not treated promptly by drugs. Therefore, the early detection of pneumonia enhances the chances of recovery, which helps reduce mortality. It is worth noting that X-rays are one of the most important diagnostic tools for diag...
Show More
-
Investigation on the Effectiveness of E-Leadership Styles and Skills in E-Business
Nuha Abdul Fattah,
Hock Chuan Lim
Issue:
Volume 5, Issue 2, June 2022
Pages:
34-40
Received:
15 March 2022
Accepted:
8 April 2022
Published:
26 April 2022
Abstract: Information and communications technology such as the Internet and e-commerce and lately the severity of global pandemic crisis, have changed the way organizations work. Workplaces evolved to include both virtual online and physical interactive spaces, for example, many enterprises have moved into the realms of online and remote workspaces where the impact of the type of leadership styles on employee performances needs greater study. This has impacted workplace performances and productivity where in some cases, leaders are required to re-think required skills set and the need to acquire new skills. The main characteristic of e-leadership is the way interaction takes place between leaders and the organization. This paper investigates the effectiveness of e-leadership styles and skills in e-businesses and their impacts on employee performance. This study adopts a qualitative approach supported with secondary research based on reviewed documents. The data were collected through open-ended questions created through google form and links were sent to respondents where people can participate in these questions. The analysis indicates that coaching in e-leadership is the most effective style to improve employee performance. The emphasis is placed on a better understanding of leadership style for modern workplace where a proper understanding of leadership approaches impacts work performances.
Abstract: Information and communications technology such as the Internet and e-commerce and lately the severity of global pandemic crisis, have changed the way organizations work. Workplaces evolved to include both virtual online and physical interactive spaces, for example, many enterprises have moved into the realms of online and remote workspaces where th...
Show More
-
Enhanced Security of Advanced Encryption Standard (ES-AES) Algorithm
Nahom Gebeyehu Zinabu,
Samuel Asferaw
Issue:
Volume 5, Issue 2, June 2022
Pages:
41-48
Received:
9 February 2022
Accepted:
16 March 2022
Published:
10 May 2022
Abstract: Encryption is a method of coding information or any other form of confidential, private and sensitive information or data to prevent from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption. Now a day, it is essential to secure data that is at rest in our computer or is transmitted via web against attacks. Several of cryptographic techniques are being used to preserve security and could be classified as: symmetric and asymmetric. A symmetric algorithm named as (AES) is selected for enhancement due to its applicability and widely used algorithm. In AES, among the four stages that are used for encryption and decryption Sub Bytes and Mix Column produce more delay. On the other side, Shift Rows stage contribute to less security level of AES because it uses easy operation that is linear in nature. To overcome these challenges, in the designed symmetrical cryptography algorithm shift row stage of AES is replaced by symmetrical transposition technique to advance security. The simulation result of our Symmetrical Transposition technique has shown better security achievement, with greater than 50% avalanche effect, which means the proposed algorithm makes better confusion and diffusion. Hence, our proposed Enhanced Security of Advanced Encryption Standard (ES-AES) algorithm has better security when compared to original Advance Encryption Standard (AES) algorithm.
Abstract: Encryption is a method of coding information or any other form of confidential, private and sensitive information or data to prevent from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption. Now a day, it is essential to secure data that is at rest in our computer or is transmitted via web against attacks. Several...
Show More
-
Research on Information Security and Privacy Technology Based on Blockchain
Zhong Ke,
Tuyatsetseg Badarch
Issue:
Volume 5, Issue 2, June 2022
Pages:
49-55
Received:
28 March 2022
Accepted:
15 April 2022
Published:
24 May 2022
Abstract: Blockchain provides IoT security and privacy in all industries including manufacturing, finance, healthcare, supply chain, e-governance, education, banking, and trading through decentralization, persistency, anonymity, and auditability characteristics. This paper presents the blockchain technology assimilating with other data security technologies to design a blockchain based data sharing system. Based on the design the network architecture of data sharing system, we test and analyze various processes in data sharing. To test the function and security of the system, we have built a test environment with data sharing system consisting of three blockchain nodes, four data participant nodes (three data users, one data provider), and a data-sharing system composed of CA. We developed Base App as an application provided by the data user, including addition, deletion, check modification of data in the application code for data sharing. We simulated an experiment related scenario, and then we wrote a program to generate the vehicle information data and import it into MySQL for storage. The paper has found some valuable results of functional test, system test, safety test, and performance test of the data sharing system. This system realizes the possibility of a system that can connect multiple participants and their corresponding data.
Abstract: Blockchain provides IoT security and privacy in all industries including manufacturing, finance, healthcare, supply chain, e-governance, education, banking, and trading through decentralization, persistency, anonymity, and auditability characteristics. This paper presents the blockchain technology assimilating with other data security technologies ...
Show More
-
Exploration of Revit Software Aided Architectural Design Education Based on Computer BIM Technology
Liu Hu Qiang,
Tuyatsetseg Badarch
Issue:
Volume 5, Issue 2, June 2022
Pages:
56-62
Received:
28 March 2022
Accepted:
15 April 2022
Published:
24 May 2022
Abstract: The development of BIM technology is an amazing trend for the construction industry. The production capacity upgrade with a new technology has inevitably become one of the most important topics of the construction industry. Therefore, the further promotion and application of new computer technologies such as BIM technology have affected the Chinese construction industry to an unavoidable critical juncture. In this paper, we show the Revit software-based experiments, their results based on the college education level. At such a moment, the architectural design major of higher vocational colleges has undergone tremendous changes. The school’s teaching goals are not consistent with the new development of the architectural design industry. In the paper, we present the current studies of the BIM based architectural education. We compared the types of applications such as CAD, SketchUp, Revit we use in education field. In this paper, we show that BIM experiment is the advanced technology, and everyone can work together to contribute to efficient transformation of the construction industry with computer BIM technology. We get BIM skill certificate as a result of the Revit software-based experiments and projects in the teaching. The paper presents the results of experiments, tests, performance, and BIM effects on trainings. In applying BIM in an education, a visualization tool is used to enrich the body of knowledge of BIM education.
Abstract: The development of BIM technology is an amazing trend for the construction industry. The production capacity upgrade with a new technology has inevitably become one of the most important topics of the construction industry. Therefore, the further promotion and application of new computer technologies such as BIM technology have affected the Chinese...
Show More
-
Research on Civil Engineering Software for Engineering Computation
Tian Chao,
Tuyatsetseg Badarch
Issue:
Volume 5, Issue 2, June 2022
Pages:
63-71
Received:
28 March 2022
Accepted:
15 April 2022
Published:
24 May 2022
Abstract: Learning how to compute and simulate civil engineering processes is the necessary task for civil engineers, instructors, and learners. In general, with the continuous improvement of computer technology, the computing software promotes the reform of engineering industry. In general, the software can handle complex models with ease and accuracy. Therefore compared to traditional manual calculations, computerized software can avoid errors in data acquisition and calculation. Therefore, many problems in civil engineering have been improved. China is also strongly supporting and promoting the modern computing software usages into education, which further encourages BIM-based computing. In this research we propose to analyze civil engineering computing software implementation based on the experiment of BIM Glodon software. We use the Glodon GCL 2013 for empirical experiment for the engineering drawings and related quantities of components of civil engineering computing. This article presents the BIM Glodon Software makes advanced specific operations for civil engineering computing such as construction drawing, steel metering, and computing. The article reviews the related studies that are considered as valuable resources to software research and development, shows many scholars have also conducted in-depth research in computing development. According to our research result, we recommend that the development companies need to focus on upgrading their software to be more consumer friendly, cost effective.
Abstract: Learning how to compute and simulate civil engineering processes is the necessary task for civil engineers, instructors, and learners. In general, with the continuous improvement of computer technology, the computing software promotes the reform of engineering industry. In general, the software can handle complex models with ease and accuracy. Ther...
Show More
-
Research on Applications of Artificial Intelligence in Education
Zheng Rui,
Tuyatsetseg Badarch
Issue:
Volume 5, Issue 2, June 2022
Pages:
72-79
Received:
28 March 2022
Accepted:
15 April 2022
Published:
24 May 2022
Abstract: With the rapid development of Information Technology (IT) in China, the IT sector is well recognized as a wealth of opportunities for businesses and societies in the country. At the same time, China education system is also aware of the auxiliary value of IT. In this article, we have studied how artificial intelligence is used in education. This paper presents the possibility of the development of artificial intelligence technology has been reflected in many methodologies in education. Based on the study, we focus on the the importance of artificial intelligence usages in education. The study also looked at what types of artificial intelligence technologies are widely used in education sector. Within this area, the research presents the importance of artificial intelligence, technologies, and how teachers and students use them in their teaching and learning process. The paper result shows students can get out of the passive learning state by using artificial intelligence technology, and gradually transform from solving exercises to solving problems. In general, we design an information-based teaching model to display knowledge more intuitively in front of students, which not only enriches the overall teaching but also reduces the difficulty of students' learning. This article analyzes many aspects about the application of artificial intelligence in college teaching and learning. In this way, we aim to show that artificial intelligence is an essential tool in education. We show the research results about the use of artificial intelligence in the way we teach and learn, which we currently use, provides a great opportunity for further independent learning.
Abstract: With the rapid development of Information Technology (IT) in China, the IT sector is well recognized as a wealth of opportunities for businesses and societies in the country. At the same time, China education system is also aware of the auxiliary value of IT. In this article, we have studied how artificial intelligence is used in education. This pa...
Show More
-
Analysis of the Application of Multimedia Technology in Modern Landscape Architecture
Hu Shuaibo,
Tuyatsetseg Badarch
Issue:
Volume 5, Issue 2, June 2022
Pages:
80-87
Received:
5 April 2022
Accepted:
6 May 2022
Published:
24 May 2022
Abstract: When contemporary landscape designers have innovated the traditional landscape concept, multimedia technology is used as a principle tool to advance landscape architecture, which also represents one of the development trends of landscape architecture. In general, the modern landscape development, it’s the precise measurement of the 3D landscape index can make up for the defects of the 2D landscape index. The main purpose of this article is to study multimedia technology as a professional research tool and aesthetics into contemporary natural landscape. Studying the relationship between the contemporary natural landscape and multimedia technology from the perspective of "multimedia teaching" brings the new changes, contents, and forms of the field. In this paper, we analyze the designs and applications of multimedia technology in landscape, which are mainly reflected as having negative effects on the application of multimedia technology, exampled by light pollution, noise pollution, "container man effect'' and the infringement of privacy due to the interactive nature of multimedia. The paper presents how multimedia can be used as a media to shape a more humanized landscape space environment with the characteristics of the information age. The paper gives the corresponding solution strategy, scheme and expounds on the practical prospect of multimedia technology in the future of landscape design.
Abstract: When contemporary landscape designers have innovated the traditional landscape concept, multimedia technology is used as a principle tool to advance landscape architecture, which also represents one of the development trends of landscape architecture. In general, the modern landscape development, it’s the precise measurement of the 3D landscape ind...
Show More
-
Research on the Robot’s Intelligent Inspection, Its Target Detection Method
Lu Jianhong,
Tuyatsetseg Badarch
Issue:
Volume 5, Issue 2, June 2022
Pages:
88-95
Received:
5 April 2022
Accepted:
6 May 2022
Published:
24 May 2022
Abstract: Intelligent inspection robot has the characteristics of programmable, and can be applied to various inspection environments. In general, studies show the present trend is to replace humans with an inspection robot thereby reducing the risks and improving the inspection efficiency. The intelligent inspection robot is based on intelligent technology and has programmability. In this paper, based on the research of intelligent inspection robot technology, we analyze inspection techniques, their algorithms, functions, characteristics and other important parameters. The research mainly focuses on two things: the target detection, methods and improved Adaboost algorithm to improve the accuracy of target detection; the Camshift algorithm which is improved to complete tracking design, timely data acquisition, timely problem discovery and timely solution. The target detection and target tracking are studied and their algorithms are analyzed. We present that a tracking algorithm based on improved Camshift deals with the problems which exist in traditional Camshift algorithm. In addition, we present Meanshift algorithm improves the Camshift algorithm for the whole-process tracking, automation and intelligence level, and efficient tracking. Next, combined with relevant technologies and techniques, the algorithm is improved to complete the target detection design and tracking design, and to solve the problems of inaccurate target detection and untimely detection.
Abstract: Intelligent inspection robot has the characteristics of programmable, and can be applied to various inspection environments. In general, studies show the present trend is to replace humans with an inspection robot thereby reducing the risks and improving the inspection efficiency. The intelligent inspection robot is based on intelligent technology ...
Show More
-
Research on the Practice of "Web Design and Production" Course in Higher Vocational Colleges
Zhang Hongmei,
Tuyatsetseg Badarch
Issue:
Volume 5, Issue 2, June 2022
Pages:
96-100
Received:
8 April 2022
Accepted:
6 May 2022
Published:
24 May 2022
Abstract: The basic educational process of higher vocational college education is to teach young people with development of their morality, intelligence, physique, critical thinking and labor, with certain theoretical and practical knowledge. The research focuses on the study from traditional teaching to independent practical learning. The main change possibility is about teacher and student’s cooperation which guides methodology and a project-based learning opportunity. The paper presents teaching and learning possibility based on an application of web page design and production course. We, beginning with the studies existed in web design and production course, introduce the application-based course, and develop the application the web design and production course teaching method. Through application-based project courses, students are able learn basic operations related computer software and then practice designing and producing digital products. The paper can show the practical teaching method in the course of web design and production has been effective in promoting learners, their interest in learning and improving their professional core qualities.
Abstract: The basic educational process of higher vocational college education is to teach young people with development of their morality, intelligence, physique, critical thinking and labor, with certain theoretical and practical knowledge. The research focuses on the study from traditional teaching to independent practical learning. The main change possib...
Show More
-
Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security
Wei Junxu,
Tuyatsetseg Badarch
Issue:
Volume 5, Issue 2, June 2022
Pages:
101-107
Received:
8 April 2022
Accepted:
6 May 2022
Published:
24 May 2022
Abstract: AI has a variety of educational applications such as smart campuses, personalized learning platforms, teachers and students in assessment, and facial recognition systems. In this paper, we focus on the common threats in cyber space of education. An AI system inherits security threats of traditional computer system, therefore, cybersecurity protection mainly helps computer’s software and hardware, data store and transfer, as well as human activity. Therefore, we focus on the application of artificial intelligence technology to improve security protection and management capabilities in cyberspace security can further reduce the incidence of network failures and network attack accidents, and improve network system operation efficiency. We focus on the role of artificial intelligence and its applications through machine-learning systems. The general ways with the advancements of IT colleges and universities have adopted smart campus systems and they have become the mainstream. This paper introduces the design and implementation experience of a smart campus network, information security protection system, and points out that the implementation effects on providing teachers and students with a fast, safe, and reliable network. This environment makes teaching easier and students' learning more efficient. To this end, the article studies the role of artificial intelligence in cyber security, and hopes that this research can provide a scientific and reasonable reference for future related research.
Abstract: AI has a variety of educational applications such as smart campuses, personalized learning platforms, teachers and students in assessment, and facial recognition systems. In this paper, we focus on the common threats in cyber space of education. An AI system inherits security threats of traditional computer system, therefore, cybersecurity protecti...
Show More
-
Exploring Artificial Intelligence for Network Security: A Case Study of Malware Defence
Li Peng,
Tuyatsetseg Badarch
Issue:
Volume 5, Issue 2, June 2022
Pages:
108-114
Received:
5 April 2022
Accepted:
11 May 2022
Published:
24 May 2022
Abstract: AI has many applications in network security. Network security is one of the most challenging situations. The paper carries out AI based network security analysis and prevention ways of the deep learning models in the network security. We focus on some specific AI applications including voice supervision of public network, malicious code monitoring, smartphone intrusion monitoring, HTTP security monitoring, mobile phone malicious APK code monitoring are bringing the solutions for network security. We studied there are powerful methods such as mobile phone malicious APR code monitoring employed Artificial Neural Network (ANN) model which detects and mitigates predictable and unpredictable DDoS attacks (TCP, UDP, and ICMP protocols). HTTP is running over TCP, then the web server can face many TCP-related attacks, therefore, we have an experiment of HTTP security monitoring, mobile phone malicious APK code monitoring. This paper presents a potential security threats from malicious uses of AI, and proposes ways to better prevent, and mitigate these threats. When planning HTTP service protection, we present it is important to keep in mind that the attack surface is much broader than just the HTTP protocol. We suggest promising areas for further research that could expand the AI based solutions for development of cloud computing-related technologies, and the combination of cloud computing and deep learning technology in the security area.
Abstract: AI has many applications in network security. Network security is one of the most challenging situations. The paper carries out AI based network security analysis and prevention ways of the deep learning models in the network security. We focus on some specific AI applications including voice supervision of public network, malicious code monitoring...
Show More
-
On the Application of Virtual Simulation in Teaching of Engineering Surveying and Mapping
Peng Jian Min,
Tuyatsetseg Badarch
Issue:
Volume 5, Issue 2, June 2022
Pages:
115-121
Received:
28 March 2022
Accepted:
15 April 2022
Published:
24 May 2022
Abstract: Virtual systems aim to provide a virtual environment and intelligent interaction for building measurements. In the face of complex scene tasks, measurement process simulation and analysis can be completed in advance, so as to assist the actual construction. For the requirements in the virtual simulation teaching of surveying and mapping, the virtual measurement area and its corresponding surveying and mapping response methods are required. The paper presents 3-dimensional visual measurement area that makes the mapping and surveying works. In our experiment, we use the teacher platform that is a contemporary educational application based on cloud computing technology. It is a 3D digital curriculum possibility that integrates an interactive reading experience, multimedia learning materials, and learning aids. Based on the simulator process, we show an application of virtual simulation is a complex micro individual with prominent intelligent interaction characteristics in construction simulation scenarios, which has great research significance in both theory and practice. Taking this simulator prototype as an example, the paper comprehensively applies virtual simulation to carry out research on building key technologies. The paper presents the virtual simulation in teaching can improve students learning enthusiasm and learning efficiency in many ways such as teaching and learning.
Abstract: Virtual systems aim to provide a virtual environment and intelligent interaction for building measurements. In the face of complex scene tasks, measurement process simulation and analysis can be completed in advance, so as to assist the actual construction. For the requirements in the virtual simulation teaching of surveying and mapping, the virtua...
Show More
-
Farsighted Collusion in Stable Marriage Problem, with No Self-Harmful Plays: Efficient Algorithm for Determining the Unique Man-Optimal Matching
Issue:
Volume 5, Issue 2, June 2022
Pages:
122-133
Received:
10 April 2022
Accepted:
26 April 2022
Published:
24 May 2022
Abstract: The Stable Marriage Problem, as proposed by Gale and Shapley, considers producing a bipartite matching between two equally sized sets of boys (proposers) and respectively girls (acceptors), each member having a total preference order over the other set, such that the outcome is stable. This paper considers the Game directly induced by this problem and analyze the case when proposers collude. A linear time method for determining the unique optimal collusion matching which is farsightedly stable (liner in the number of bits of the input), under the following assumptions: (i) the sole utility in the Game is the rank of the match in own preference list (in particular, proposers are indifferent as to how other proposers fare); (ii) proposers make proposals iff farsightedly such plays would strictly improve their own outcome (thus proposers cooperate by refraining from making proposals which can only harm others, but not strictly help them; also, they cannot make concessions to others which harm themselves). It is proved that this optimal outcome is actually stronger than a Strong Nash Equilibrium - no alternative feasible (realistic, rational) coalition exists which can offer at least one member a strictly better outcome under these assumptions. This paper also shows why some prior results pertaining to collusion of proposers do not always yield a realistic outcome.
Abstract: The Stable Marriage Problem, as proposed by Gale and Shapley, considers producing a bipartite matching between two equally sized sets of boys (proposers) and respectively girls (acceptors), each member having a total preference order over the other set, such that the outcome is stable. This paper considers the Game directly induced by this problem ...
Show More
-
Design and Implementation of Journal Recommendation Model Based on L-BERT
Peng Liu,
Yuzhi Xiao,
Youpeng Qin,
Lin Zhou
Issue:
Volume 5, Issue 2, June 2022
Pages:
134-145
Received:
5 June 2022
Published:
9 June 2022
Abstract: The output cycle and quantity of academic achievements of researchers can promote academic exchanges and integration to a certain extent. Therefore, it is particularly important to design a journal recommendation model for scientific researchers that is fast and relatively suitable for producing scientific research results. Based on this, focusing on the information knowledge of papers and the characteristics of journal topics, combined with deep learning technology, this paper proposes a journal-oriented recommendation model based on L-BERT (LDA-BERT), which realizes the purpose of recommending journals for scholars. Firstly, topic extraction is performed on papers in a specific journal, and the number of topic words is determined by perplexity. Secondly, the vectorized representation of the topic words is carried out by using the BERT model, and the fixed representation value is obtained through the mean value idea. Finally, Euclidean distance is used to determine the similarity between papers and journals. In order to verify the effect of L-BERT model, it is compared with Word2Vec model on the real data set. The results show that the recommended results of L-BERT model are improved by 17%, 10% and 13% respectively in Precision, Recall, and F1-Score, which fully shows that this research has a certain application value, and the research results can help researchers shorten the cycle of looking for journals.
Abstract: The output cycle and quantity of academic achievements of researchers can promote academic exchanges and integration to a certain extent. Therefore, it is particularly important to design a journal recommendation model for scientific researchers that is fast and relatively suitable for producing scientific research results. Based on this, focusing ...
Show More