American Journal of Computer Science and Technology

Volume 5, Issue 2, June 2022

  • Classification of Pneumonia Using Deep Convolutional Neural Network

    Alhussein Mohammed Ahmed, Gais Alhadi Babikir, Salma Mohammed Osman

    Issue: Volume 5, Issue 2, June 2022
    Pages: 26-33
    Received: Mar. 13, 2022
    Accepted: Apr. 06, 2022
    Published: Apr. 14, 2022
    Downloads:
    Views:
    Abstract: Pneumonia is considered a serious and fatal disease worldwide. In fact, pneumonia can be an individual's life-endangering if not treated promptly by drugs. Therefore, the early detection of pneumonia enhances the chances of recovery, which helps reduce mortality. It is worth noting that X-rays are one of the most important diagnostic tools for diag... Show More
  • Investigation on the Effectiveness of E-Leadership Styles and Skills in E-Business

    Nuha Abdul Fattah, Hock Chuan Lim

    Issue: Volume 5, Issue 2, June 2022
    Pages: 34-40
    Received: Mar. 15, 2022
    Accepted: Apr. 08, 2022
    Published: Apr. 26, 2022
    Downloads:
    Views:
    Abstract: Information and communications technology such as the Internet and e-commerce and lately the severity of global pandemic crisis, have changed the way organizations work. Workplaces evolved to include both virtual online and physical interactive spaces, for example, many enterprises have moved into the realms of online and remote workspaces where th... Show More
  • Enhanced Security of Advanced Encryption Standard (ES-AES) Algorithm

    Nahom Gebeyehu Zinabu, Samuel Asferaw

    Issue: Volume 5, Issue 2, June 2022
    Pages: 41-48
    Received: Feb. 09, 2022
    Accepted: Mar. 16, 2022
    Published: May 10, 2022
    Downloads:
    Views:
    Abstract: Encryption is a method of coding information or any other form of confidential, private and sensitive information or data to prevent from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption. Now a day, it is essential to secure data that is at rest in our computer or is transmitted via web against attacks. Several... Show More
  • Research on Information Security and Privacy Technology Based on Blockchain

    Zhong Ke, Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 49-55
    Received: Mar. 28, 2022
    Accepted: Apr. 15, 2022
    Published: May 24, 2022
    Downloads:
    Views:
    This article belongs to the Special Issue Advances in Computer Science and Future Technology
    Abstract: Blockchain provides IoT security and privacy in all industries including manufacturing, finance, healthcare, supply chain, e-governance, education, banking, and trading through decentralization, persistency, anonymity, and auditability characteristics. This paper presents the blockchain technology assimilating with other data security technologies ... Show More
  • Exploration of Revit Software Aided Architectural Design Education Based on Computer BIM Technology

    Liu Hu Qiang, Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 56-62
    Received: Mar. 28, 2022
    Accepted: Apr. 15, 2022
    Published: May 24, 2022
    Downloads:
    Views:
    This article belongs to the Special Issue Advances in Computer Science and Future Technology
    Abstract: The development of BIM technology is an amazing trend for the construction industry. The production capacity upgrade with a new technology has inevitably become one of the most important topics of the construction industry. Therefore, the further promotion and application of new computer technologies such as BIM technology have affected the Chinese... Show More
  • Research on Civil Engineering Software for Engineering Computation

    Tian Chao, Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 63-71
    Received: Mar. 28, 2022
    Accepted: Apr. 15, 2022
    Published: May 24, 2022
    Downloads:
    Views:
    This article belongs to the Special Issue Advances in Computer Science and Future Technology
    Abstract: Learning how to compute and simulate civil engineering processes is the necessary task for civil engineers, instructors, and learners. In general, with the continuous improvement of computer technology, the computing software promotes the reform of engineering industry. In general, the software can handle complex models with ease and accuracy. Ther... Show More
  • Research on Applications of Artificial Intelligence in Education

    Zheng Rui, Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 72-79
    Received: Mar. 28, 2022
    Accepted: Apr. 15, 2022
    Published: May 24, 2022
    Downloads:
    Views:
    This article belongs to the Special Issue Advances in Computer Science and Future Technology
    Abstract: With the rapid development of Information Technology (IT) in China, the IT sector is well recognized as a wealth of opportunities for businesses and societies in the country. At the same time, China education system is also aware of the auxiliary value of IT. In this article, we have studied how artificial intelligence is used in education. This pa... Show More
  • Analysis of the Application of Multimedia Technology in Modern Landscape Architecture

    Hu Shuaibo, Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 80-87
    Received: Apr. 05, 2022
    Accepted: May 06, 2022
    Published: May 24, 2022
    Downloads:
    Views:
    This article belongs to the Special Issue Advances in Computer Science and Future Technology
    Abstract: When contemporary landscape designers have innovated the traditional landscape concept, multimedia technology is used as a principle tool to advance landscape architecture, which also represents one of the development trends of landscape architecture. In general, the modern landscape development, it’s the precise measurement of the 3D landscape ind... Show More
  • Research on the Robot’s Intelligent Inspection, Its Target Detection Method

    Lu Jianhong, Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 88-95
    Received: Apr. 05, 2022
    Accepted: May 06, 2022
    Published: May 24, 2022
    Downloads:
    Views:
    This article belongs to the Special Issue Advances in Computer Science and Future Technology
    Abstract: Intelligent inspection robot has the characteristics of programmable, and can be applied to various inspection environments. In general, studies show the present trend is to replace humans with an inspection robot thereby reducing the risks and improving the inspection efficiency. The intelligent inspection robot is based on intelligent technology ... Show More
  • Research on the Practice of "Web Design and Production" Course in Higher Vocational Colleges

    Zhang Hongmei, Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 96-100
    Received: Apr. 08, 2022
    Accepted: May 06, 2022
    Published: May 24, 2022
    Downloads:
    Views:
    This article belongs to the Special Issue Advances in Computer Science and Future Technology
    Abstract: The basic educational process of higher vocational college education is to teach young people with development of their morality, intelligence, physique, critical thinking and labor, with certain theoretical and practical knowledge. The research focuses on the study from traditional teaching to independent practical learning. The main change possib... Show More
  • Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security

    Wei Junxu, Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 101-107
    Received: Apr. 08, 2022
    Accepted: May 06, 2022
    Published: May 24, 2022
    Downloads:
    Views:
    This article belongs to the Special Issue Advances in Computer Science and Future Technology
    Abstract: AI has a variety of educational applications such as smart campuses, personalized learning platforms, teachers and students in assessment, and facial recognition systems. In this paper, we focus on the common threats in cyber space of education. An AI system inherits security threats of traditional computer system, therefore, cybersecurity protecti... Show More
  • Exploring Artificial Intelligence for Network Security: A Case Study of Malware Defence

    Li Peng, Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 108-114
    Received: Apr. 05, 2022
    Accepted: May 11, 2022
    Published: May 24, 2022
    Downloads:
    Views:
    This article belongs to the Special Issue Advances in Computer Science and Future Technology
    Abstract: AI has many applications in network security. Network security is one of the most challenging situations. The paper carries out AI based network security analysis and prevention ways of the deep learning models in the network security. We focus on some specific AI applications including voice supervision of public network, malicious code monitoring... Show More
  • On the Application of Virtual Simulation in Teaching of Engineering Surveying and Mapping

    Peng Jian Min, Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 115-121
    Received: Mar. 28, 2022
    Accepted: Apr. 15, 2022
    Published: May 24, 2022
    Downloads:
    Views:
    This article belongs to the Special Issue Advances in Computer Science and Future Technology
    Abstract: Virtual systems aim to provide a virtual environment and intelligent interaction for building measurements. In the face of complex scene tasks, measurement process simulation and analysis can be completed in advance, so as to assist the actual construction. For the requirements in the virtual simulation teaching of surveying and mapping, the virtua... Show More
  • Farsighted Collusion in Stable Marriage Problem, with No Self-Harmful Plays: Efficient Algorithm for Determining the Unique Man-Optimal Matching

    Mircea-Adrian Digulescu

    Issue: Volume 5, Issue 2, June 2022
    Pages: 122-133
    Received: Apr. 10, 2022
    Accepted: Apr. 26, 2022
    Published: May 24, 2022
    Downloads:
    Views:
    Abstract: The Stable Marriage Problem, as proposed by Gale and Shapley, considers producing a bipartite matching between two equally sized sets of boys (proposers) and respectively girls (acceptors), each member having a total preference order over the other set, such that the outcome is stable. This paper considers the Game directly induced by this problem ... Show More
  • Design and Implementation of Journal Recommendation Model Based on L-BERT

    Peng Liu, Yuzhi Xiao, Youpeng Qin, Lin Zhou

    Issue: Volume 5, Issue 2, June 2022
    Pages: 134-145
    Received: Jun. 05, 2022
    Accepted:
    Published: Jun. 09, 2022
    Downloads:
    Views:
    Abstract: The output cycle and quantity of academic achievements of researchers can promote academic exchanges and integration to a certain extent. Therefore, it is particularly important to design a journal recommendation model for scientific researchers that is fast and relatively suitable for producing scientific research results. Based on this, focusing ... Show More