Home The application of neural network algorithm and embedded system in computer distance teach system
Article Open Access

The application of neural network algorithm and embedded system in computer distance teach system

  • Qin Qiu EMAIL logo
Published/Copyright: January 15, 2022
Become an author with De Gruyter Brill

Abstract

The computer distance teaching system teaches through the network, and there is no entrance threshold. Any student who is willing to study can log in to the network computer distance teaching system for study at any free time. Neural network has a strong self-learning ability and is an important part of artificial intelligence research. Based on this study, a neural network-embedded architecture based on shared memory and bus structure is proposed. By looking for an alternative method of exp function to improve the speed of radial basis function algorithm, and then by analyzing the judgment conditions in the main loop during the algorithm process, these judgment conditions are modified conditionally to reduce the calculation scale, which can double the speed of the algorithm. Finally, this article verifies the function, performance, and interface of the computer distance education system.

AMS Mathematics Subject Classification Number: 68M10

1 Introduction

Distance education is an educational behavior spanning geographical space. Teachers and students may not be in the same classroom, or even in the same region or country. Distance education includes a series of behaviors, such as course study and discussion. With the rapid development of computer technology, the application of computer in teaching is increasingly extensive, and it has become an important symbol of modern education [1]. At present, distance education based on Internet has become a research hotspot. Many countries have built their own education and scientific research networks one after another, enabling people to realize information exchange, resource sharing, scientific and technological cooperation, and distance learning through the Internet on a global scale, thus promoting the rapid development of national scientific research and education [2].

Modern distance education is relative to traditional distance education forms such as correspondence education and radio and television education. The development of online education has become a global trend [3]. To solve the shortage of educational resources and realize the sharing of resources, many governments take the development of online education as an important strategic decision, make special plans and organize their implementation [4,5]. Literature [6,7] studies the process of operating the Internet network to remotely operate the equipment and instruments in the teaching room, so that students can truly complete the teaching in different places. Literature [8] combines physical heat transfer process with virtual technology to vividly reproduce the whole process of heat transfer through virtual teaching. Literature [9] uses browser and server architecture to establish a remote virtual teaching room and uses customized LabVIEW virtual instrument software to simulate the operation of teaching equipment on the server side, thus realizing the virtual remote teaching function. Literature [10,11] established a remote robot teaching room based on Internet, and the operator can remotely control the robot’s arm in real time. Literature [12] developed a set of remote control system, which realized the function of remote control of robot through network.

Distance teaching breaks the limitation of time and space and solves the problem of sharing teaching equipment resources, which not only saves costs but also achieves good results. However, at present, distance education also has some problems, such as imperfect management system, limited application level – it is mostly used for university teaching, and when the network is unstable, the client will disconnect from the server and interrupt teaching. Considering the above problems, this article is dedicated to designing and implementing a distance education platform based on neural network algorithm and embedded system technology.

The research results of this topic will support a variety of classroom modes and provide specific teaching functions and teaching for different teaching processes and contents, which not only saves the teaching management process, reduces the education cost, but also facilitates the choice of students and users, and provides a reference for the service modes of other distance education systems.

2 Radial basis function (RBF) neural network model

Generally, the basic RBF neural network is composed of three layers, and each layer has completely different functions [13,14]:

  1. Input layer: it is composed of some sensing units, which connect the network with the external environment and transmit input signals to the second layer.

  2. Hidden layer: it is the only hidden layer in the network, and its function is to make nonlinear changes from the input space to the hidden layer space. In most cases, the hidden layer space has a higher dimension.

  3. Output layer: its function is to provide response to the activation mode of the input layer.

The structure of regularized RBF network is shown in Figure 1. It is characterized in that the network has N input nodes, P hidden nodes, and i output nodes. The number of hidden nodes in the network is equal to the number of input samples, and the activation function of hidden nodes is often Gaussian RBF. All input samples are set as the center of RBF, and each RBF takes a unified extension constant.

Figure 1 
               RBF neural network structure.
Figure 1

RBF neural network structure.

Let any node of input layer be represented by i, any node of hidden node be represented by j, and any node of output layer be represented by k. The mathematical description of each layer is as follows:

Input vector:

(1) x = ( x 1 , x 2 , , x N ) T .

Activation function of any hidden node:

(2) φ j ( X ) , ( j = 1 , 2 , , P ) .

It is called basis function, and Gaussian function is generally used.

Output weight matrix: W, in which w i , k , ( j = 1 , 2 , , P , k = 1 , 2 , , l ) is the synaptic weight between the jth node of the hidden layer and the kth node of the output layer.

Output vector:

(3) Y = ( y 1 , y 2 , , y l ) .

The neurons in the output layer adopt linear activation function.

When a certain sample X p in the training set is input, the corresponding expected output d p is the teacher signal. To determine the P weights between the hidden layer and the output layer of the network, it is necessary to input the samples in the training set one by one. After the weights of the network are determined, the samples of the training set are completely interpolated, that is, the error of all samples is 0. For the input mode of nontraining set, the output value of the network is equivalent to the interpolation of functions, so the RBF network can be used as number approximation.

The regularized RBF network has the following three characteristics:

  1. Regularized network is a general approximator, which can approximate any multivariate continuous function on a compact set with arbitrary precision only with enough nodes.

  2. It has the best approximation property; that is, if an unknown nonlinear function f is given, a set of weights can always be found, which makes the approximation of regularization network to f better than all its possible choices.

  3. The solution obtained by regularizing the network is the best, and the so-called “best” is reflected in satisfying both the approximation error of the sample and the smoothness of the approximation curve.

3 Application of neural network algorithm and embedded system in computer distance education system

3.1 System operation architecture

The computer distance education system connects many users, including teachers and students, and monitors the operation of each user for management verification [15]. Therefore, the running architecture of the system must mainly solve the following problems.

  1. Computer distance education system is a multiuser and multiprocess concurrent system. Now, how to improve the concurrent management ability and efficiency of the system is the basic problem that the system must solve.

  2. Computer distance education system runs according to a certain education and teaching plan. How to monitor all the systems to ensure the security of the system.

  3. Computer distance education system is facing a steady stream of new courses and various new requirements. How to expand or upgrade new functions based on the existing operating framework is also a problem that must be considered.

To solve the above problems, our computer distance education system puts forward the running idea of “service driven” [16]. In process-driven, all teaching processes set up their own service modules, which are opposite to each other, perform their duties, and do not interfere with each other. A special monitoring process is set in the system to monitor the communication. Once a new service request is found, the service request will be handed over to the service driver for processing, and the monitoring will continue. The operating architecture of the system is shown in Figure 2.

Figure 2 
                  Operating architecture of the system.
Figure 2

Operating architecture of the system.

3.2 Embedded architecture of neural network

In this article, various classical algorithms of neural network are combined into an algorithm library, which is introduced into the application field of embedded system, and the architecture of neural network embedded system is studied and discussed. On this basis, a kind of architecture is selected, the corresponding teaching model is designed, and RBF algorithm is used for function approximation as an example.

The architecture of shared memory consists of three modules [17,18]:

  1. The plug-in processor and its peripheral modules, which are the main modules of system control, set corresponding peripheral modules according to different specific applications to complete specific functions.

  2. Shared memory and different storage spaces are assigned to different algorithms, and the initial values, weights, and sample values of the algorithms are all placed in the shared memory.

  3. Neural network processor module, in which all algorithms are put, and an algorithm library are established. The call of each algorithm is determined by the embedded processor through interrupt control, and the processed results can be output to the embedded processor for use by the main control module.

The system structure diagram is shown in Figure 3.

Figure 3 
                  System structure of shared memory.
Figure 3

System structure of shared memory.

The bus architecture consists of two modules, namely master–slave module, with embedded memory as the master module and neural network processor as the slave module. All data exchange and control are completed through the bus. The peripheral modules of the embedded processor are the same as those in Figure 3. According to different control needs, the corresponding modules are increased or decreased. Different from Figure 3, the embedded processor has its own memory module.

When the system starts to work, the embedded processor transmits the initial values (including random weights) and sample values for the neural network algorithm to the memory and then starts to run the functions of other peripheral modules independently. The neural network processor obtains the corresponding parameters from the memory through the bus and can also directly take the values from the memory through direct memory access [19]. Similarly, the memory obtains parameter values from the neural network processor through the bus to update the weights and thresholds. The choice of algorithm is decided by embedded processor, and interrupt control is realized by the bus. The basic block diagram of the system is shown in Figure 4.

Figure 4 
                  System model of bus structure.
Figure 4

System model of bus structure.

The neural network operation module consists of two parts:

  1. Neural network initialization module, which realizes the setting of some initial data of neural network, such as the number of neurons, the number of layers of neural network, the initial weight of network, and so on.

  2. The weight training program is called as the interrupt subroutine of digital signal process (DSP). When the embedded processor writes the input data (neural network input) into the shared memory through the interface, it triggers the interrupt signal processing program. At the beginning of the program, the data should be read from the shared memory. When the neural network calculation is finished, the results should be written into the shared memory for the embedded processor to read [20].

The basic flow chart is shown in Figure 5.

Figure 5 
                  Basic flow chart of software design.
Figure 5

Basic flow chart of software design.

Because the embedded system emphasizes real time, the whole software system is mainly based on interrupt mode. After the system is powered on, after necessary initialization, the main program enters the waiting state. When the embedded processor triggers interrupt 1, the DSP core accepts the interrupt and runs the corresponding neural network training program. Similarly, interrupt 2 is used to trigger the main program of embedded control. Among them, DSP initialization includes the initialization of the parameters of the chip itself, the number of neurons, the number of neural network layers, and the initial value of the network.

3.3 Intelligent algorithm based on embedded system

Embedded system is a product obtained by combining advanced technologies such as computer technology, communication technology, semiconductor technology, microelectronics technology, voice and image data transmission technology, and even sensors with specific application objects. Therefore, the embedded system has the characteristics of technology intensive, high investment intensity, high dispersion, continuous innovation, and so on. It is a knowledge integration system, and its peripheral devices contain multiple embedded microprocessors, such as keyboard, hard disk, monitor, network card, and sound card, which are controlled by embedded processors [21,22].

In this study, the optimization algorithm is applied to embedded systems, hoping that the performance of the algorithm can be accepted by users. To solve this problem, we need to solve the following problems:

  1. When solving specific problems, the optimization algorithm has considerable accuracy, which can meet the accuracy requirements of users.

  2. The adaptability of the algorithm is strong; that is, the types of problems that can be solved should be as large as possible, and the scale of problems that can be solved should be as large as possible, so as to avoid being helpless as possible.

  3. The time consumed by the operation of the method should be as little as possible. Although the time consumed by the algorithm can’t be compared with the time spent running on a high-performance computer, it can’t exceed the limits acceptable to users.

Some optimization algorithms are implemented on embedded systems, which are not aimed at a specific class of problems, but these algorithms cannot solve all learning problems. It is hoped that these optimization algorithms can solve a small number of learning problems, and this subset is preferably a common problem in engineering [23]. This is a problem that can give full play to the advantages of embedded systems.

Setting of RBF algorithm parameters:

Learning speed: α = 0.7 .

Charge coefficient: β = 0.06 .

Threshold: −1.

Conditions for algorithm convergence:

Mean square error is less than 0.06.

Or

The number of iterations is greater than 30 (default value).

η value: 0.6 (experience value).

Network structure: single hidden layer, the number of hidden layer units is the total number of samples/(sample dimension *4) + 1.

Network output: the number of neurons in the output layer is l.

Setting of support vector machine (SVM) algorithm parameters:

Penalty factor: cos t = 1 .

Cross-validation: 3.

Gamma ( y ) : the reciprocal of the total number of samples; y should be used in the following kernel function:

(4) K ( x i , x j ) = exp ( γ x i x j 2 ) , γ > 0 .

The parameter adjustment of SVM algorithm is simpler than RBF algorithm. When the penalty factor is L, the average performance on each sample set is quite good, so this factor is always L in this article.

4 Result analysis and discussion

4.1 Improve RBF algorithm to improve the speed of operation

Because the accuracy of the new exp function is not as good as the original exp function, the accuracy of the algorithm is high. Moreover, the realization of the new exp function is all realized by macros, which increases the space of the program to a certain extent. This section discusses how to trade the space of algorithm for speed and mainly discusses this problem according to RBF algorithm.

However, there is another way to improve the running speed of the algorithm by losing the prediction accuracy, that is, to select the appropriate iteration number control parameters. There are two main conditions to control the end of RBF algorithm:

One is iteration number control, and the other is training error value control.

If the training error required for the end of training is set to be small, it will be completed by iteration times in most cases; otherwise, it may fall into an infinite loop. Among these two conditions, the latter is difficult to judge and closely related to samples, whereas the first method is much easier to control.

Taking body fat as the training sample set, the number of iterations is 10, 20, and 50, respectively, and Table 1 shows the actual running results.

Table 1

Operational performance of hemorrhoids with different iteration times

Iterations 10 20 50
Time when the program runs (min) 0.93 1.55 2.93
Accuracy of program prediction (%) 92.1 93.6 95.2

It can be seen from Table 1 that the running speed of the algorithm is obviously improved by reducing the control conditions when the program runs, but the performance of the algorithm is not obviously reduced. It is worth noting that the influence of this method on the speed of the algorithm is obvious, but as for the accuracy of prediction, there will be great changes due to different sample sets, which should be decided according to the actual conditions.

This method needs to play an effective role under certain conditions; otherwise, it will inevitably lead to a great reduction in the generalization ability of the algorithm. The main limitations are as follows:

  1. Batch learning algorithm should be used, so that the characteristic curve of error value is smooth and oscillation is less.

  2. Using moderate learning speed, the error value can be quickly reduced to a smaller value, which can reduce oscillation.

  3. The η parameter in the excitation function should be selected to be smaller, and the purpose is to reduce the oscillation in training.

4.2 Performance analysis of RBF neural network

Table 2 shows the color recognition results under different conditions.

Table 2

Color recognition results under different conditions

Each color is recognized 20 times in total. The following table shows the successful recognition times of each color
Method Red Green Blue White Total success rate (%)
Threshold method 17 19 20 19 93.75 Natural light irradiation
Traditional threshold method 14 10 16 7 58.75 No natural light irradiation
RBF neural network method 20 20 19 19 97.5 Natural light irradiation
Artificial neural network method 19 18 16 20 91.25 No natural light irradiation

According to the teaching results, the recognition success rates of the two methods are similar under natural illumination, and the recognition success rate of the threshold method is slightly higher than that of the artificial neural network method. However, when the natural environment changes, the results are obviously different, and the success rate of RBF neural network hardly changes, but the threshold method drops by more than 28 percentage points, which can be said to be obviously different. From the results, it can be concluded that the threshold method is sensitive to environmental changes and the recognition results, whereas the artificial neural network is insensitive to environmental changes. The main reason lies in their different recognition mechanisms.

From Table 2, it can be seen that the threshold method mainly affects the success rate of recognition, which is the boundary between green and white. The intermediate state does not reach the changed threshold, so the recognition result is good, but the boundary value is very sensitive, and false recognition will occur if the environment changes. RBF neural network recognition is based on sample training. When training samples, the influence of environment will be considered. We consider the influence of the environment when training samples. For the input of samples, we input the sample values when the environment changes, so that the recognition success rate will not change greatly when the environment changes, so we can see that the RBF neural network method is more accurate and more practical.

4.3 System test analysis

After any software is written, it needs to be tested. Software testing is a means to verify the correctness, integrity, safety, and quality reliability of the software system. In other words, software testing is a process of comparing the actual output with the expected output and finding errors.

Software interface is the key to users’ first impression of software. Simple and friendly user interface can guide users to find the functions they want to use and guide users to complete corresponding operations by themselves. Beautiful interface can bring beautiful feeling to users. However, the failed interface will make users feel unable to start, unable to find a reasonable operation method, and bring frustration to users, and the software with perfect internal design and strong internal design will be abandoned by users. The users of distance education system are mainly students.

User interface testing includes testing whether the interface is clear and beautiful; whether the interface layout is reasonable; whether the interface font is easy to recognize; whether the interface navigation is clear and understandable, etc. The following four students scored the interface according to their satisfaction after using the APP operation, as shown in Table 3. The test chart is shown in Figure 6.

Table 3

Interface test item description table

Test number Test item Test index
1 Interface style Is the interface clear and beautiful
2 Interface font Is the interface font easy to recognize
3 Interface navigation Is the interface navigation clear and easy to understand
4 Learning interface Is the interface layout reasonable
5 Teaching interface Is the interface layout reasonable
Figure 6 
                  User interface satisfaction test chart.
Figure 6

User interface satisfaction test chart.

Performance test will test the response of the application when it is used on computers with different performances. As shown in Table 4, the test results are shown in Figure 7.

Table 4

Test item description table

Test number Test item Test module Operating procedure
1 Start response System start up Click the application icon on the computer to open the computer display startup screen and enter the application
2 Directory response Directory display After the user logs in successfully, it takes time for the system to read the data display directory
3 Show course responses Course learning The user clicks on the directory entry in the directory interface, and the system enters the course learning interface to display the time required for the course materials
4 Device connection response Course teaching The user clicks the menu tab at the bottom of the application to enter the teaching interface, and clicks the connection icon to query the idle equipment from the server first
5 Teaching response Course teaching The user adjusts the parameter submission for controlling the steering gear of the mechanical arm and observes the response time of the mechanical arm
Figure 7 
                  Test chart of system response time.
Figure 7

Test chart of system response time.

5 Conclusion

This study puts forward a solution of computer distance teaching system based on neural network algorithm and embedded system. This connection mode can improve the transmission speed of network data and the stability of network connection. Optimization algorithm is the core of intelligent algorithm, so the embedded application of intelligent algorithm has similar problems, that is, the embedded application of optimization algorithm. At first, the RBF algorithm is improved when the satisfactory solution is obtained, and the running speed of the program is increased several times. Moreover, the same idea or method can be applied to SVM algorithm, which also verified that the optimization algorithm is the core of intelligent algorithm. From the example of RBF algorithm, it can be seen that the system scheme is feasible. The neural network algorithm is implemented by hardware and incorporated into the architecture of embedded system, which can meet the processing requirements of real-time systems and improve the artificial intelligence level of existing embedded systems.

  1. Conflict of interest: Author states no conflict of interest.

References

[1] Granjo J, Rasteiro MG. Labvirtual – a platform for the teaching of chemical engineering: the use of interactive videos. Comput Appl Eng Educ. 2018;26:1668–76.10.1002/cae.22007Search in Google Scholar

[2] Wang X, Fan C. A computer experiment teaching system based on omap embedded system. Int J Emerg Technol Learn (iJET). 2018;13:188.10.3991/ijet.v13i05.8439Search in Google Scholar

[3] Xu Y. Computer-aided design of personalized recommendation in teaching system. Comput Des Appl. 2019;17:44–56.10.14733/cadaps.2020.S1.44-56Search in Google Scholar

[4] Bogach N, Boitsova E, Chernonog S, Lamtev A, Blake J. Speech processing for language learning: a practical approach to computer-assisted pronunciation teaching. Electronics. 2021;10:235.10.3390/electronics10030235Search in Google Scholar

[5] Donelan H, Smith A, Wong P. Virtualization for computer networking skills development in a distance learning environment. Comput Appl Eng Educ. 2018;26:872–83.10.1002/cae.21928Search in Google Scholar

[6] Mateo Sanguino TDJ, Fernandez DVGIJ, Cortes Ancos E, Espejo Fernandez J. Exploring strengths and weaknesses: a case study after developing a remote network lab. Comput Appl Eng Educ. 2018;26:1422–34.10.1002/cae.21981Search in Google Scholar

[7] Saidi RM, Sharip AA, Rahim N, Zulkifli ZA, Zain S. Evaluating students’ preferences of open and distance learning (odl) tools. Proc Comput Sci. 2021;179:955–61.10.1016/j.procs.2021.01.085Search in Google Scholar

[8] Chen C, Pan Y, Li D, Zhang S, Hong J. A virtual-physical collision detection interface for ar-based interactive teaching of robot. Robot Comput-Integrated Manuf. 2020;64:101948.10.1016/j.rcim.2020.101948Search in Google Scholar

[9] Zampirolli FA, Goya D, Pimentel EP, Kobayashi G. Evaluation process for an introductory programming course using blended learning in engineering education. Comput Appl Eng Educ. 2018;26:2210–22.10.1002/cae.22029Search in Google Scholar

[10] Farag SG. Computer laboratory teaching management system for improving teaching and learning. Int J Online Eng (iJOE). 2018;14:182.10.3991/ijoe.v14i09.8535Search in Google Scholar

[11] Lee J, Deshpande N, Caldwell DG, Mattos LS. Microscale precision control of a computer-assisted transoral laser microsurgery system. IEEE/ASME Trans Mechatron. 2020;25:604–15.10.1109/TMECH.2020.2973381Search in Google Scholar

[12] Wu W, Berestova A, Lobuteva A, Stroiteleva N. An intelligent computer system for assessing student performance. Int J Emerg Technol Learn (iJET). 2021;16:31.10.3991/ijet.v16i02.18739Search in Google Scholar

[13] Tian G, Darcy O. Study on the design of interactive distance multimedia teaching system based on vr technology. Int J Continuing Eng Educ Life-Long Learn. 2021;31:1.10.1504/IJCEELL.2022.121221Search in Google Scholar

[14] Xie Y, Wu Z, Han X, Wang H, Chen Z. Computer-aided system for the detection of multicategory pulmonary tuberculosis in radiographs. J Healthc Eng. 2020;2020:1–12.10.1155/2020/9205082Search in Google Scholar PubMed PubMed Central

[15] Jovanovic N, Zakic A. Network simulation tools and spectral graph theory in teaching computer network. Comput Appl Eng Educ. 2018;26:2084–91.10.1002/cae.21998Search in Google Scholar

[16] Lin L, Lee HM, Lee TY. The applications of processing message security in computer system. ICIC Exp Lett. 2018;12:255–62.Search in Google Scholar

[17] Zhao H, Guo L. Design of intelligent computer aided network teaching system based on web. Comput Des Appl. 2021;19:12–23.10.14733/cadaps.2022.S1.12-23Search in Google Scholar

[18] Li H, Zhao H. Improvement of intelligent computer aided Chinese teaching system. Comput Des Appl. 2020;18:12–24.10.14733/cadaps.2021.S2.12-24Search in Google Scholar

[19] Yokobori K, Miura T. Computer-integrated manufacturing system for membrane structures. MATEC Web Conf. 2019;258:02025.10.1051/matecconf/201925802025Search in Google Scholar

[20] Pei Z, Wang Y. Analysis of computer aided teaching management system for music appreciation course based on network resources. Comput Des Appl. 2021;19:1–11.10.14733/cadaps.2022.S1.1-11Search in Google Scholar

[21] Chou JS, Liu CH. Automated sensing system for real-time recognition of trucks in river dredging areas using computer vision and convolutional deep learning. Sensors. 2021;21:555.10.3390/s21020555Search in Google Scholar PubMed PubMed Central

[22] Zhang J. Computer assisted instruction system under artificial intelligence technology. Int J Emerg Technol Learn (iJET). 2021;16:4.10.3991/ijet.v16i05.20307Search in Google Scholar

[23] Wu H. Multimedia interaction-based computer-aided translation technology in applied English teaching. Mob Inf Syst. 2021;2021:1–10.10.1155/2021/5578476Search in Google Scholar

Received: 2021-08-25
Revised: 2021-10-21
Accepted: 2021-11-21
Published Online: 2022-01-15

© 2022 Qin Qiu, published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Articles in the same Issue

  1. Research Articles
  2. Construction of 3D model of knee joint motion based on MRI image registration
  3. Evaluation of several initialization methods on arithmetic optimization algorithm performance
  4. Application of visual elements in product paper packaging design: An example of the “squirrel” pattern
  5. Deep learning approach to text analysis for human emotion detection from big data
  6. Cognitive prediction of obstacle's movement for reinforcement learning pedestrian interacting model
  7. The application of neural network algorithm and embedded system in computer distance teach system
  8. Machine translation of English speech: Comparison of multiple algorithms
  9. Automatic control of computer application data processing system based on artificial intelligence
  10. A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing
  11. Application of mining algorithm in personalized Internet marketing strategy in massive data environment
  12. On the correction of errors in English grammar by deep learning
  13. Research on intelligent interactive music information based on visualization technology
  14. Extractive summarization of Malayalam documents using latent Dirichlet allocation: An experience
  15. Conception and realization of an IoT-enabled deep CNN decision support system for automated arrhythmia classification
  16. Masking and noise reduction processing of music signals in reverberant music
  17. Cat swarm optimization algorithm based on the information interaction of subgroup and the top-N learning strategy
  18. State feedback based on grey wolf optimizer controller for two-wheeled self-balancing robot
  19. Research on an English translation method based on an improved transformer model
  20. Short-term prediction of parking availability in an open parking lot
  21. PUC: parallel mining of high-utility itemsets with load balancing on spark
  22. Image retrieval based on weighted nearest neighbor tag prediction
  23. A comparative study of different neural networks in predicting gross domestic product
  24. A study of an intelligent algorithm combining semantic environments for the translation of complex English sentences
  25. IoT-enabled edge computing model for smart irrigation system
  26. A study on automatic correction of English grammar errors based on deep learning
  27. A novel fingerprint recognition method based on a Siamese neural network
  28. A hidden Markov optimization model for processing and recognition of English speech feature signals
  29. Crime reporting and police controlling: Mobile and web-based approach for information-sharing in Iraq
  30. Convex optimization for additive noise reduction in quantitative complex object wave retrieval using compressive off-axis digital holographic imaging
  31. CRNet: Context feature and refined network for multi-person pose estimation
  32. Improving the efficiency of intrusion detection in information systems
  33. Research on reform and breakthrough of news, film, and television media based on artificial intelligence
  34. An optimized solution to the course scheduling problem in universities under an improved genetic algorithm
  35. An adaptive RNN algorithm to detect shilling attacks for online products in hybrid recommender system
  36. Computing the inverse of cardinal direction relations between regions
  37. Human-centered artificial intelligence-based ice hockey sports classification system with web 4.0
  38. Construction of an IoT customer operation analysis system based on big data analysis and human-centered artificial intelligence for web 4.0
  39. An improved Jaya optimization algorithm with ring topology and population size reduction
  40. Review Articles
  41. A review on voice pathology: Taxonomy, diagnosis, medical procedures and detection techniques, open challenges, limitations, and recommendations for future directions
  42. An extensive review of state-of-the-art transfer learning techniques used in medical imaging: Open issues and challenges
  43. Special Issue: Explainable Artificial Intelligence and Intelligent Systems in Analysis For Complex Problems and Systems
  44. Tree-based machine learning algorithms in the Internet of Things environment for multivariate flood status prediction
  45. Evaluating OADM network simulation and an overview based metropolitan application
  46. Radiography image analysis using cat swarm optimized deep belief networks
  47. Comparative analysis of blockchain technology to support digital transformation in ports and shipping
  48. IoT network security using autoencoder deep neural network and channel access algorithm
  49. Large-scale timetabling problems with adaptive tabu search
  50. Eurasian oystercatcher optimiser: New meta-heuristic algorithm
  51. Trip generation modeling for a selected sector in Baghdad city using the artificial neural network
  52. Trainable watershed-based model for cornea endothelial cell segmentation
  53. Hessenberg factorization and firework algorithms for optimized data hiding in digital images
  54. The application of an artificial neural network for 2D coordinate transformation
  55. A novel method to find the best path in SDN using firefly algorithm
  56. Systematic review for lung cancer detection and lung nodule classification: Taxonomy, challenges, and recommendation future works
  57. Special Issue on International Conference on Computing Communication & Informatics
  58. Edge detail enhancement algorithm for high-dynamic range images
  59. Suitability evaluation method of urban and rural spatial planning based on artificial intelligence
  60. Writing assistant scoring system for English second language learners based on machine learning
  61. Dynamic evaluation of college English writing ability based on AI technology
  62. Image denoising algorithm of social network based on multifeature fusion
  63. Automatic recognition method of installation errors of metallurgical machinery parts based on neural network
  64. An FCM clustering algorithm based on the identification of accounting statement whitewashing behavior in universities
  65. Emotional information transmission of color in image oil painting
  66. College music teaching and ideological and political education integration mode based on deep learning
  67. Behavior feature extraction method of college students’ social network in sports field based on clustering algorithm
  68. Evaluation model of multimedia-aided teaching effect of physical education course based on random forest algorithm
  69. Venture financing risk assessment and risk control algorithm for small and medium-sized enterprises in the era of big data
  70. Interactive 3D reconstruction method of fuzzy static images in social media
  71. The impact of public health emergency governance based on artificial intelligence
  72. Optimal loading method of multi type railway flatcars based on improved genetic algorithm
  73. Special Issue: Evolution of Smart Cities and Societies using Emerging Technologies
  74. Data mining applications in university information management system development
  75. Implementation of network information security monitoring system based on adaptive deep detection
  76. Face recognition algorithm based on stack denoising and self-encoding LBP
  77. Research on data mining method of network security situation awareness based on cloud computing
  78. Topology optimization of computer communication network based on improved genetic algorithm
  79. Implementation of the Spark technique in a matrix distributed computing algorithm
  80. Construction of a financial default risk prediction model based on the LightGBM algorithm
  81. Application of embedded Linux in the design of Internet of Things gateway
  82. Research on computer static software defect detection system based on big data technology
  83. Study on data mining method of network security situation perception based on cloud computing
  84. Modeling and PID control of quadrotor UAV based on machine learning
  85. Simulation design of automobile automatic clutch based on mechatronics
  86. Research on the application of search algorithm in computer communication network
  87. Special Issue: Artificial Intelligence based Techniques and Applications for Intelligent IoT Systems
  88. Personalized recommendation system based on social tags in the era of Internet of Things
  89. Supervision method of indoor construction engineering quality acceptance based on cloud computing
  90. Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining
  91. Deep learning technology of Internet of Things Blockchain in distribution network faults
  92. Optimization of shared bike paths considering faulty vehicle recovery during dispatch
  93. The application of graphic language in animation visual guidance system under intelligent environment
  94. Iot-based power detection equipment management and control system
  95. Estimation and application of matrix eigenvalues based on deep neural network
  96. Brand image innovation design based on the era of 5G internet of things
  97. Special Issue: Cognitive Cyber-Physical System with Artificial Intelligence for Healthcare 4.0.
  98. Auxiliary diagnosis study of integrated electronic medical record text and CT images
  99. A hybrid particle swarm optimization with multi-objective clustering for dermatologic diseases diagnosis
  100. An efficient recurrent neural network with ensemble classifier-based weighted model for disease prediction
  101. Design of metaheuristic rough set-based feature selection and rule-based medical data classification model on MapReduce framework
Downloaded on 10.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jisys-2022-0004/html
Scroll to top button