-
The Application of Multimedia Technology in Business English Teaching in Higher Vocational Schools
Authors:
Liu Zhijun
,
Badarch Tuyatsetseg
Issue: Volume 6, Issue 2, June 2023
Pages: 57-66
Received: Apr. 06, 2023;
Accepted: May 05, 2023;
Published: May 24, 2023;
Abstract: This paper presents development the multimedia courseware suitable for the teaching of business English in higher vocational colleges. The multimedia courseware helps to enhance the combination of information technology, science, art, and modern methods in classroom teaching. The paper analyzes the design of multimedia technology to achieve interactive teaching based on the principles of multimedia courseware and teaching characteristics of business English. The whole design process of courseware is centered on how to make, organize and display the interface on the courseware. All teaching links need to be completed in each interface jump. The research results show the interactivity of multimedia courseware that can improve students’ ability to improve self-study skills and interaction between the students and instructors. The research focuses on the overall structure, interactive design, and presentation mode of each part of the courseware in detail. Finally, the courseware is comprehensively evaluated by teaching applications and questionnaire surveys. As for the courseware itself, it mainly focuses on the basics of business English, with a few multimedia courses on visualization, listening, and training. Through the research on the use and effect of the multimedia courseware of business English in the classroom, the experimental data is obtained, and results are analyzed to test the effect of the multimedia courseware in the interactive teaching of business English in higher vocational colleges.
Abstract: This paper presents development the multimedia courseware suitable for the teaching of business English in higher vocational colleges. The multimedia courseware helps to enhance the combination of information technology, science, art, and modern methods in classroom teaching. The paper analyzes the design of multimedia technology to achieve interac...
Show More
-
Research on Contemporary Software Development Life Cycle Models
Authors:
Liu Yuge
,
Tuyatsetseg Badarch
Issue: Volume 6, Issue 1, March 2023
Pages: 1-9
Received: Jan. 12, 2023;
Accepted: Feb. 20, 2023;
Published: Mar. 04, 2023;
Abstract: The rapid development of computer software and modern technology is perfectly integrated and has a huge contribution to the development of society. The paper covers the research of software life cycles of contemporary software systems, especially, we focus on their development stages, and models for their life cycles. We studied there are powerful and principal software systems such as system software, application software, and support software. Software is mainly divided into seven categories such as system software, application software, engineering/scientific software, embedded software, product line software, web applications, and artificial intelligence software depending on their usage. In addition, we analyzed the models including workflow, data flow, and action flow models. The software process model is expressed as a simplified abstract representation and a framework of the software development process including the various activities that make up the software process, software artifacts, and the actors involved in the development. The paper focuses on the life cycle of software that can be divided into six parts: planning, analysis of requirements, design and coding, testing, and operation and maintenance. In addition, we describe the relationship between the various parts of the software development process which is an iterative process with some feedback. We show development methods and tools to improve the efficiency and capability of software development. This paper presents potential software development life cycles described by the cycles from product development to end-of-life with phases such as problem definition, requirement analysis, system design, coding, debugging and testing, acceptance and operation, maintenance and upgrade to disposal. When planning long life cycles, we emphasize performing a detailed requirement analysis of the various functions that must be implemented in the software development stages. As a result of studies, we want to emphasize component assembly-based software engineering methods that have emerged in recent years, and these models have been widely used. Our study emphasizes the waterfall model which has been playing an important role as one of the earliest software life cycle models. The model describes some basic process activities of software life. At our study point, one thing became clear the software architecture has become obsolete and should be discarded to meet the system design requirements of a new software architecture to replace it. This paper presents that the selection of the software lifecycle model plays a crucial role in the software.
Abstract: The rapid development of computer software and modern technology is perfectly integrated and has a huge contribution to the development of society. The paper covers the research of software life cycles of contemporary software systems, especially, we focus on their development stages, and models for their life cycles. We studied there are powerful ...
Show More
-
Research on Designs of Modern Payment Systems in China
Authors:
Liu Shao Xiong
,
Tuyatsetseg Badarch
Issue: Volume 6, Issue 1, March 2023
Pages: 10-19
Received: Jan. 12, 2023;
Accepted: Feb. 20, 2023;
Published: Mar. 04, 2023;
Abstract: In this paper, we focus on the design of the modern payment system in China, especially the third-party payment systems. The reason for the flourishing the third-party payment systems including Alipay, WeChat is the demand of government and enterprise units for electronic transaction payment that has had a profound impact on the financial industry, then the traditional banking business model cannot meet the needs of online payment. We conduct research on the main third-party payment systems and solutions in the Chinese market, focusing on the payment system design and principle architecture. We analyze the key issues of the operation of the payment systems, and we also illustrate some possible suggestions in relation to the improvement of China's payment system. Because of the modern financial system characteristics in China, enterprise and institutions need to invest a lot of funds and implement advanced technologies to solve the increasing transaction volumes, lack of manpower, and funds. In terms of subsystem design, we present the access and internal subsystems that provide all types of services based on a full system. We also want to share the case of emphasizing the Alipay system architecture, the study still needs to be focused in detail. Our paper presents the accounting and financial processing design of Alipay. It involves two subsystems, internal and external. The external subsystem is a unilateral account to meet online performance requirements; the internal subsystem uses double-entry subsystems to meet financial needs. In order to compete with other payment service companies like WeChat, our study proves that Alipay payment application program implementation and service accounts on the platform are able to provide direct in-app payment service to users. In this paper, we highlight the feature due to the third-party online payment connection with the internet system with the bank and the service they offer is dependable and safe. The third-party online payment has a completely safe method, which transmits the encryption data from the internet bank system across the safety of the certificates, making sure the account transactions from the customer are safe and the digital signature. In this paper, the architecture design of Jingdong payment platform is emphasized as another powerful design of the payment system in China. The paper concludes that third-party modern systems help with contemporary solutions of financial smart collections, business transactions, networking, digitization, and multi-point distribution.
Abstract: In this paper, we focus on the design of the modern payment system in China, especially the third-party payment systems. The reason for the flourishing the third-party payment systems including Alipay, WeChat is the demand of government and enterprise units for electronic transaction payment that has had a profound impact on the financial industry,...
Show More
-
Research on Principles and Problems of Computer Software Database Design
Authors:
Zhang Daoping
,
Tuyatsetseg Badarch
Issue: Volume 6, Issue 1, March 2023
Pages: 20-24
Received: Jan. 12, 2023;
Accepted: Feb. 20, 2023;
Published: Mar. 04, 2023;
Abstract: Database design is an unforgettable part of this evolution, it is the core of systems and is the foundation for creating a safe and reliable program. The design quality is directly correlated to the user’s experience with the system. It has a huge effect on the smoothness, stability, and security of the system’s operation. Problems also arise when the database is neglected. If the design lacks quality due to the developer’s disregard for following design principles these problems arise, thus developers need to comprehensively analyze, test, and summarize their design. This paper aims at software design concepts and their importance from a researcher’s point of view. We will discuss how someone could improve the transmission efficiency of data resources and the importance of updating the software database. Our study shows there is a difference between databases of different applications. For instance, the database of a supermarket chain must be fundamentally different from that of an information technology company. An insurance industry database is definitely different from a manufacturing enterprise database. From the micro perspective, although the same industry database is being used, there are differentiated designs and services. For example, a supermarket chain, international chain, and domestic supermarket chain databases are completely different. Another thing we want to highlight is about the caution that is advised in any industry, the systems design and development industry has to be extra careful. If a single aspect of a program database is organized wrong, the whole system could crash. It causes huge losses for the enterprises as the company is dependent on it. In addition, accuracy is crucial for maintaining the integrity of data. For example, if inaccurate data can lead to false conclusions and wasted time and resources, the users must enter data correctly and consistently to ensure accuracy. Data should also be verified regularly to identify any errors that may have been introduced. The study shows we lack vitality in the design phase of software systems. Regarding the literature, we evaluated that future work needed to be used as an architecture with improved hardware capability, and evaluate the architecture’s adaptability in more scenarios. The obtained results from our study encourage and show the potential for applying a software architecture for data-intensive real-time applications in the future. The paper concludes even though the usage of real-time based database technologies increased in recent years, there is a lack of standardization and modularized architectures.
Abstract: Database design is an unforgettable part of this evolution, it is the core of systems and is the foundation for creating a safe and reliable program. The design quality is directly correlated to the user’s experience with the system. It has a huge effect on the smoothness, stability, and security of the system’s operation. Problems also arise when ...
Show More
-
Research and Implementation of Word Detection System Based on Improved DFA in China
Authors:
Feng Kai
,
Tuyatsetseg Badarch
Issue: Volume 6, Issue 1, March 2023
Pages: 25-32
Received: Jan. 12, 2023;
Accepted: Feb. 20, 2023;
Published: Mar. 04, 2023;
Abstract: Since the second half of the last century, the intensive usage of digital texts and textual databases produced the need for efficient search methods and data structures. Even though there are many traditional pattern matching algorithms such as regular matching, AC algorithm, and WM algorithm, in this paper, we use on a word detection method based on an improved DFA algorithm. We focus on the implementation of content matching technology using an improved DFA algorithm. We used the approach that can retrieve the emoticon icon, half corner character, repeated word based on ConcurrentSkipListMap to construct the tree of the word filtering system. We introduce the architecture of the system that mainly depends on the middleware, database, and data processing parts. The algorithm performs functions including filtering the word to match multiple pattern strings, to share a common prefix of a string that can reduce repeated lookups and save memory space. We use the pre-trained word vector model to achieve good results for the expansion and improvement of the sensitive lexicon. The system realizes the functions of word matching, including initializing, changing, matching, and highlighting of the word database, various processes that are tested and analyzed. We did a simulation to capture relevant word data and import it into MySQL database for storage. The method for message sensitive word recognition effectively improves the speed and accuracy of the algorithm recognition, the efficiency of word matching. We emphasize the DFA algorithm is the best approach compared to AC algorithm and other algorithms. Through function test, system test, and performance test, some valuable results are obtained. As a result of the tests, valuable results are founded from functional tests, system tests, performance tests. The system realizes the characteristics of large thesaurus and high matching efficiency of long text. It can meet the requirement of network real-time transmission, so it can be applied in the network. This paper proposes an improved multi-mode matching algorithm for word detection based on DFA. The algorithm maximizes the speed of problem detection and response efficiency and purifies the network space by optimizing the algorithm for the characters of the text content, the number of basic words and the detection efficiency. As a result of our research, we have shown the data from different sources of the system can be reused to reduce repeated construction costs.
Abstract: Since the second half of the last century, the intensive usage of digital texts and textual databases produced the need for efficient search methods and data structures. Even though there are many traditional pattern matching algorithms such as regular matching, AC algorithm, and WM algorithm, in this paper, we use on a word detection method based ...
Show More
-
Research on Characteristics and Technologies of Cloud Computing
Authors:
Liu Gang
,
Tuyatsetseg Badarch
Issue: Volume 6, Issue 1, March 2023
Pages: 33-41
Received: Jan. 12, 2023;
Accepted: Feb. 20, 2023;
Published: Mar. 04, 2023;
Abstract: Cloud computing technology has promoted the innovation of software development concepts, which also represents one of the advanced development trends of software development technology. Software engineers have advanced the traditional software development system to the next level. Cloud computing technology gives users access to files, software, and servers. Cloud computing providers store and process data in a location that’s separate from users. With the increase in internet users, more and more challenges arise in software development. Software development no longer faces a single demand for design. Software needs to be able to support the personalized content of a large number of users. In recent years, traditional software development is not meeting the requirements of users. This is where cloud computing can offer a solution at a low cost. Cloud computing technology combines with network access to build a corresponding data resource library, which has a very low management cost. It can enable massive data to be released quickly so that any user without professional knowledge can use cloud computing to process data more conveniently and quickly. At the same time, cloud computing technology also needs to be able to meet security challenges. In large-scale cluster deployment and access strategies, network security, data security, and other issues in software development technology also bring many new challenges. Studying advanced software development technologies in the cloud computing era from the perspective of software maintainers has brought new changes, new features, new capabilities, and new models in this field. We emphasize that the private clouds can be well adapted to the company's unique data requirements, using the company's existing hardware resources to build the cloud, which greatly reduces the company's overhead. One common feature is the possibility to use technology from everywhere. It is proven that cloud computing services enable users to access application services from any location using a variety of endpoints, often without control or knowledge of the exact division of these resource pools. However, it is possible to know in which administrative region or data center these resource pools are located. Through the research on advanced software development technology of cloud computing, this paper analyzes how cloud computing solves the problems of large-scale software architecture and cluster stability. The paper gives the corresponding strategy and scheme and expounds on the practical prospect of cloud computing technology in future software development and design.
Abstract: Cloud computing technology has promoted the innovation of software development concepts, which also represents one of the advanced development trends of software development technology. Software engineers have advanced the traditional software development system to the next level. Cloud computing technology gives users access to files, software, an...
Show More
-
Research on Information Security and Privacy Technology Based on Blockchain
Authors:
Zhong Ke
,
Tuyatsetseg Badarch
Issue: Volume 5, Issue 2, June 2022
Pages: 49-55
Received: Mar. 28, 2022;
Accepted: Apr. 15, 2022;
Published: May 24, 2022;
Abstract: Blockchain provides IoT security and privacy in all industries including manufacturing, finance, healthcare, supply chain, e-governance, education, banking, and trading through decentralization, persistency, anonymity, and auditability characteristics. This paper presents the blockchain technology assimilating with other data security technologies to design a blockchain based data sharing system. Based on the design the network architecture of data sharing system, we test and analyze various processes in data sharing. To test the function and security of the system, we have built a test environment with data sharing system consisting of three blockchain nodes, four data participant nodes (three data users, one data provider), and a data-sharing system composed of CA. We developed Base App as an application provided by the data user, including addition, deletion, check modification of data in the application code for data sharing. We simulated an experiment related scenario, and then we wrote a program to generate the vehicle information data and import it into MySQL for storage. The paper has found some valuable results of functional test, system test, safety test, and performance test of the data sharing system. This system realizes the possibility of a system that can connect multiple participants and their corresponding data.
Abstract: Blockchain provides IoT security and privacy in all industries including manufacturing, finance, healthcare, supply chain, e-governance, education, banking, and trading through decentralization, persistency, anonymity, and auditability characteristics. This paper presents the blockchain technology assimilating with other data security technologies ...
Show More
-
Exploration of Revit Software Aided Architectural Design Education Based on Computer BIM Technology
Authors:
Liu Hu Qiang
,
Tuyatsetseg Badarch
Issue: Volume 5, Issue 2, June 2022
Pages: 56-62
Received: Mar. 28, 2022;
Accepted: Apr. 15, 2022;
Published: May 24, 2022;
Abstract: The development of BIM technology is an amazing trend for the construction industry. The production capacity upgrade with a new technology has inevitably become one of the most important topics of the construction industry. Therefore, the further promotion and application of new computer technologies such as BIM technology have affected the Chinese construction industry to an unavoidable critical juncture. In this paper, we show the Revit software-based experiments, their results based on the college education level. At such a moment, the architectural design major of higher vocational colleges has undergone tremendous changes. The school’s teaching goals are not consistent with the new development of the architectural design industry. In the paper, we present the current studies of the BIM based architectural education. We compared the types of applications such as CAD, SketchUp, Revit we use in education field. In this paper, we show that BIM experiment is the advanced technology, and everyone can work together to contribute to efficient transformation of the construction industry with computer BIM technology. We get BIM skill certificate as a result of the Revit software-based experiments and projects in the teaching. The paper presents the results of experiments, tests, performance, and BIM effects on trainings. In applying BIM in an education, a visualization tool is used to enrich the body of knowledge of BIM education.
Abstract: The development of BIM technology is an amazing trend for the construction industry. The production capacity upgrade with a new technology has inevitably become one of the most important topics of the construction industry. Therefore, the further promotion and application of new computer technologies such as BIM technology have affected the Chinese...
Show More
-
On the Application of Virtual Simulation in Teaching of Engineering Surveying and Mapping
Authors:
Peng Jian Min
,
Tuyatsetseg Badarch
Issue: Volume 5, Issue 2, June 2022
Pages: 115-121
Received: Mar. 28, 2022;
Accepted: Apr. 15, 2022;
Published: May 24, 2022;
Abstract: Virtual systems aim to provide a virtual environment and intelligent interaction for building measurements. In the face of complex scene tasks, measurement process simulation and analysis can be completed in advance, so as to assist the actual construction. For the requirements in the virtual simulation teaching of surveying and mapping, the virtual measurement area and its corresponding surveying and mapping response methods are required. The paper presents 3-dimensional visual measurement area that makes the mapping and surveying works. In our experiment, we use the teacher platform that is a contemporary educational application based on cloud computing technology. It is a 3D digital curriculum possibility that integrates an interactive reading experience, multimedia learning materials, and learning aids. Based on the simulator process, we show an application of virtual simulation is a complex micro individual with prominent intelligent interaction characteristics in construction simulation scenarios, which has great research significance in both theory and practice. Taking this simulator prototype as an example, the paper comprehensively applies virtual simulation to carry out research on building key technologies. The paper presents the virtual simulation in teaching can improve students learning enthusiasm and learning efficiency in many ways such as teaching and learning.
Abstract: Virtual systems aim to provide a virtual environment and intelligent interaction for building measurements. In the face of complex scene tasks, measurement process simulation and analysis can be completed in advance, so as to assist the actual construction. For the requirements in the virtual simulation teaching of surveying and mapping, the virtua...
Show More
-
Research on Civil Engineering Software for Engineering Computation
Authors:
Tian Chao
,
Tuyatsetseg Badarch
Issue: Volume 5, Issue 2, June 2022
Pages: 63-71
Received: Mar. 28, 2022;
Accepted: Apr. 15, 2022;
Published: May 24, 2022;
Abstract: Learning how to compute and simulate civil engineering processes is the necessary task for civil engineers, instructors, and learners. In general, with the continuous improvement of computer technology, the computing software promotes the reform of engineering industry. In general, the software can handle complex models with ease and accuracy. Therefore compared to traditional manual calculations, computerized software can avoid errors in data acquisition and calculation. Therefore, many problems in civil engineering have been improved. China is also strongly supporting and promoting the modern computing software usages into education, which further encourages BIM-based computing. In this research we propose to analyze civil engineering computing software implementation based on the experiment of BIM Glodon software. We use the Glodon GCL 2013 for empirical experiment for the engineering drawings and related quantities of components of civil engineering computing. This article presents the BIM Glodon Software makes advanced specific operations for civil engineering computing such as construction drawing, steel metering, and computing. The article reviews the related studies that are considered as valuable resources to software research and development, shows many scholars have also conducted in-depth research in computing development. According to our research result, we recommend that the development companies need to focus on upgrading their software to be more consumer friendly, cost effective.
Abstract: Learning how to compute and simulate civil engineering processes is the necessary task for civil engineers, instructors, and learners. In general, with the continuous improvement of computer technology, the computing software promotes the reform of engineering industry. In general, the software can handle complex models with ease and accuracy. Ther...
Show More
-
Research on Applications of Artificial Intelligence in Education
Authors:
Zheng Rui
,
Tuyatsetseg Badarch
Issue: Volume 5, Issue 2, June 2022
Pages: 72-79
Received: Mar. 28, 2022;
Accepted: Apr. 15, 2022;
Published: May 24, 2022;
Abstract: With the rapid development of Information Technology (IT) in China, the IT sector is well recognized as a wealth of opportunities for businesses and societies in the country. At the same time, China education system is also aware of the auxiliary value of IT. In this article, we have studied how artificial intelligence is used in education. This paper presents the possibility of the development of artificial intelligence technology has been reflected in many methodologies in education. Based on the study, we focus on the the importance of artificial intelligence usages in education. The study also looked at what types of artificial intelligence technologies are widely used in education sector. Within this area, the research presents the importance of artificial intelligence, technologies, and how teachers and students use them in their teaching and learning process. The paper result shows students can get out of the passive learning state by using artificial intelligence technology, and gradually transform from solving exercises to solving problems. In general, we design an information-based teaching model to display knowledge more intuitively in front of students, which not only enriches the overall teaching but also reduces the difficulty of students' learning. This article analyzes many aspects about the application of artificial intelligence in college teaching and learning. In this way, we aim to show that artificial intelligence is an essential tool in education. We show the research results about the use of artificial intelligence in the way we teach and learn, which we currently use, provides a great opportunity for further independent learning.
Abstract: With the rapid development of Information Technology (IT) in China, the IT sector is well recognized as a wealth of opportunities for businesses and societies in the country. At the same time, China education system is also aware of the auxiliary value of IT. In this article, we have studied how artificial intelligence is used in education. This pa...
Show More
-
Analysis of the Application of Multimedia Technology in Modern Landscape Architecture
Authors:
Hu Shuaibo
,
Tuyatsetseg Badarch
Issue: Volume 5, Issue 2, June 2022
Pages: 80-87
Received: Apr. 05, 2022;
Accepted: May 06, 2022;
Published: May 24, 2022;
Abstract: When contemporary landscape designers have innovated the traditional landscape concept, multimedia technology is used as a principle tool to advance landscape architecture, which also represents one of the development trends of landscape architecture. In general, the modern landscape development, it’s the precise measurement of the 3D landscape index can make up for the defects of the 2D landscape index. The main purpose of this article is to study multimedia technology as a professional research tool and aesthetics into contemporary natural landscape. Studying the relationship between the contemporary natural landscape and multimedia technology from the perspective of "multimedia teaching" brings the new changes, contents, and forms of the field. In this paper, we analyze the designs and applications of multimedia technology in landscape, which are mainly reflected as having negative effects on the application of multimedia technology, exampled by light pollution, noise pollution, "container man effect'' and the infringement of privacy due to the interactive nature of multimedia. The paper presents how multimedia can be used as a media to shape a more humanized landscape space environment with the characteristics of the information age. The paper gives the corresponding solution strategy, scheme and expounds on the practical prospect of multimedia technology in the future of landscape design.
Abstract: When contemporary landscape designers have innovated the traditional landscape concept, multimedia technology is used as a principle tool to advance landscape architecture, which also represents one of the development trends of landscape architecture. In general, the modern landscape development, it’s the precise measurement of the 3D landscape ind...
Show More
-
Exploring Artificial Intelligence for Network Security: A Case Study of Malware Defence
Authors:
Li Peng
,
Tuyatsetseg Badarch
Issue: Volume 5, Issue 2, June 2022
Pages: 108-114
Received: Apr. 05, 2022;
Accepted: May 11, 2022;
Published: May 24, 2022;
Abstract: AI has many applications in network security. Network security is one of the most challenging situations. The paper carries out AI based network security analysis and prevention ways of the deep learning models in the network security. We focus on some specific AI applications including voice supervision of public network, malicious code monitoring, smartphone intrusion monitoring, HTTP security monitoring, mobile phone malicious APK code monitoring are bringing the solutions for network security. We studied there are powerful methods such as mobile phone malicious APR code monitoring employed Artificial Neural Network (ANN) model which detects and mitigates predictable and unpredictable DDoS attacks (TCP, UDP, and ICMP protocols). HTTP is running over TCP, then the web server can face many TCP-related attacks, therefore, we have an experiment of HTTP security monitoring, mobile phone malicious APK code monitoring. This paper presents a potential security threats from malicious uses of AI, and proposes ways to better prevent, and mitigate these threats. When planning HTTP service protection, we present it is important to keep in mind that the attack surface is much broader than just the HTTP protocol. We suggest promising areas for further research that could expand the AI based solutions for development of cloud computing-related technologies, and the combination of cloud computing and deep learning technology in the security area.
Abstract: AI has many applications in network security. Network security is one of the most challenging situations. The paper carries out AI based network security analysis and prevention ways of the deep learning models in the network security. We focus on some specific AI applications including voice supervision of public network, malicious code monitoring...
Show More
-
Research on the Robot’s Intelligent Inspection, Its Target Detection Method
Authors:
Lu Jianhong
,
Tuyatsetseg Badarch
Issue: Volume 5, Issue 2, June 2022
Pages: 88-95
Received: Apr. 05, 2022;
Accepted: May 06, 2022;
Published: May 24, 2022;
Abstract: Intelligent inspection robot has the characteristics of programmable, and can be applied to various inspection environments. In general, studies show the present trend is to replace humans with an inspection robot thereby reducing the risks and improving the inspection efficiency. The intelligent inspection robot is based on intelligent technology and has programmability. In this paper, based on the research of intelligent inspection robot technology, we analyze inspection techniques, their algorithms, functions, characteristics and other important parameters. The research mainly focuses on two things: the target detection, methods and improved Adaboost algorithm to improve the accuracy of target detection; the Camshift algorithm which is improved to complete tracking design, timely data acquisition, timely problem discovery and timely solution. The target detection and target tracking are studied and their algorithms are analyzed. We present that a tracking algorithm based on improved Camshift deals with the problems which exist in traditional Camshift algorithm. In addition, we present Meanshift algorithm improves the Camshift algorithm for the whole-process tracking, automation and intelligence level, and efficient tracking. Next, combined with relevant technologies and techniques, the algorithm is improved to complete the target detection design and tracking design, and to solve the problems of inaccurate target detection and untimely detection.
Abstract: Intelligent inspection robot has the characteristics of programmable, and can be applied to various inspection environments. In general, studies show the present trend is to replace humans with an inspection robot thereby reducing the risks and improving the inspection efficiency. The intelligent inspection robot is based on intelligent technology ...
Show More
-
Research on the Practice of "Web Design and Production" Course in Higher Vocational Colleges
Authors:
Zhang Hongmei
,
Tuyatsetseg Badarch
Issue: Volume 5, Issue 2, June 2022
Pages: 96-100
Received: Apr. 08, 2022;
Accepted: May 06, 2022;
Published: May 24, 2022;
Abstract: The basic educational process of higher vocational college education is to teach young people with development of their morality, intelligence, physique, critical thinking and labor, with certain theoretical and practical knowledge. The research focuses on the study from traditional teaching to independent practical learning. The main change possibility is about teacher and student’s cooperation which guides methodology and a project-based learning opportunity. The paper presents teaching and learning possibility based on an application of web page design and production course. We, beginning with the studies existed in web design and production course, introduce the application-based course, and develop the application the web design and production course teaching method. Through application-based project courses, students are able learn basic operations related computer software and then practice designing and producing digital products. The paper can show the practical teaching method in the course of web design and production has been effective in promoting learners, their interest in learning and improving their professional core qualities.
Abstract: The basic educational process of higher vocational college education is to teach young people with development of their morality, intelligence, physique, critical thinking and labor, with certain theoretical and practical knowledge. The research focuses on the study from traditional teaching to independent practical learning. The main change possib...
Show More
-
Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security
Authors:
Wei Junxu
,
Tuyatsetseg Badarch
Issue: Volume 5, Issue 2, June 2022
Pages: 101-107
Received: Apr. 08, 2022;
Accepted: May 06, 2022;
Published: May 24, 2022;
Abstract: AI has a variety of educational applications such as smart campuses, personalized learning platforms, teachers and students in assessment, and facial recognition systems. In this paper, we focus on the common threats in cyber space of education. An AI system inherits security threats of traditional computer system, therefore, cybersecurity protection mainly helps computer’s software and hardware, data store and transfer, as well as human activity. Therefore, we focus on the application of artificial intelligence technology to improve security protection and management capabilities in cyberspace security can further reduce the incidence of network failures and network attack accidents, and improve network system operation efficiency. We focus on the role of artificial intelligence and its applications through machine-learning systems. The general ways with the advancements of IT colleges and universities have adopted smart campus systems and they have become the mainstream. This paper introduces the design and implementation experience of a smart campus network, information security protection system, and points out that the implementation effects on providing teachers and students with a fast, safe, and reliable network. This environment makes teaching easier and students' learning more efficient. To this end, the article studies the role of artificial intelligence in cyber security, and hopes that this research can provide a scientific and reasonable reference for future related research.
Abstract: AI has a variety of educational applications such as smart campuses, personalized learning platforms, teachers and students in assessment, and facial recognition systems. In this paper, we focus on the common threats in cyber space of education. An AI system inherits security threats of traditional computer system, therefore, cybersecurity protecti...
Show More