American Journal of Computer Science and Technology

Special Issue

Advances in Computer Science and Future Technology

  • Submission Deadline: Dec. 31, 2023
  • Status: Submission Closed
  • Lead Guest Editor: Tuyatsetseg Badarch
About This Special Issue
Computer Science and Future Technology has been growing rapidly over recent years, there has been a steadily increasing demand for future bright world.
However, the study faces various challenges such as effective solutions for data science, big data, artificial intelligence, robotics and, advanced computer science methods compared to classical approaches.
This special issue aims at providing positive, constructive answers to advances in computer science and technology questions, through the experimental and theoretical research in computer science and future technology, modeling, simulation, software solutions, applicable to current and future technology.
The papers will be peer reviewed and selected on their quality and relevance to the theme of this special issue.

Keywords:

  1. Data science
  2. Artificial intelligence
  3. Robotics
  4. Cognitive skills for robots
  5. Reliability and safety challenges
  6. for intelligent systems
  7. Computer assisted education
  8. AI/ML applied to cybersecurity
  9. Bioinformatics
  10. Advanced image processing
  11. Vision computing technology
  12. Distributed computing technology
  13. Non-volatile memory (NVM) products,
  14. interfaces and applications
  15. Digital twins, including cognitive twins
  16. AI and critical systems
  17. Practical delivery drones
  18. Additive manufacturing
  19. Legal related implications to reflect security and privacy
  20. Machine learning
  21. Deep learning
  22. Quantum computing
  23. Big data
  24. Cyber security
Lead Guest Editor
  • Tuyatsetseg Badarch

    School of Information Technology and Design, Mongolian National University, Ulaanbaatar, Mongolia

Guest Editors
  • Heng Zhou

    Department of Computer and Information Science and Engineering, University of Florida, Gainesville, United States

  • Kamalapuram Khaja Baseer ORCiD

    Department of Data Science, Mohan Babu University, Tirupati, India

  • Ganesha Ganesha

    Samsung R & D Institute India - Bangalore, Bangalore, India

  • Rajni Maurya ORCiD

    Department of Electrical Engineering, Madhav Institute of Technology and Science, Gwalior, India

  • Sudha R

    Department of Computer Applications, PSG College of Arts and Science, Coimbatore, India

  • Anamika Rana ORCiD

    Department of Computer Applications, Maharaja Surajmal Institute, University of Guru Gobind Singh Indraprastha, New Delhi, India

  • Sachin Bhat ORCiD

    Department of Electronics and Communication Engineering, Shri Madhwa Vadiraja Institute of Technology and Management, Udupi, India

  • Abhishek Sharma ORCiD

    Department of Electronics & Communication, Oriental Institute of Science and Technology, Bhopal, India

  • Parameswaran Ramesh

    Department of Electronics Engineering, Madras Institute of Technology, Anna University, Chennai, India

Published Articles
  • The Application of Multimedia Technology in Business English Teaching in Higher Vocational Schools

    Liu Zhijun , Badarch Tuyatsetseg

    Issue: Volume 6, Issue 2, June 2023
    Pages: 57-66
    Received: Apr. 06, 2023
    Accepted: May 05, 2023
    Published: May 24, 2023
    DOI: 10.11648/j.ajcst.20230602.12
    Downloads:
    Views:
    Abstract: This paper presents development the multimedia courseware suitable for the teaching of business English in higher vocational colleges. The multimedia courseware helps to enhance the combination of information technology, science, art, and modern methods in classroom teaching. The paper analyzes the design of multimedia technology to achieve interac... Show More
  • Research on Contemporary Software Development Life Cycle Models

    Liu Yuge , Tuyatsetseg Badarch

    Issue: Volume 6, Issue 1, March 2023
    Pages: 1-9
    Received: Jan. 12, 2023
    Accepted: Feb. 20, 2023
    Published: Mar. 04, 2023
    DOI: 10.11648/j.ajcst.20230601.11
    Downloads:
    Views:
    Abstract: The rapid development of computer software and modern technology is perfectly integrated and has a huge contribution to the development of society. The paper covers the research of software life cycles of contemporary software systems, especially, we focus on their development stages, and models for their life cycles. We studied there are powerful ... Show More
  • Research on Designs of Modern Payment Systems in China

    Liu Shao Xiong , Tuyatsetseg Badarch

    Issue: Volume 6, Issue 1, March 2023
    Pages: 10-19
    Received: Jan. 12, 2023
    Accepted: Feb. 20, 2023
    Published: Mar. 04, 2023
    DOI: 10.11648/j.ajcst.20230601.12
    Downloads:
    Views:
    Abstract: In this paper, we focus on the design of the modern payment system in China, especially the third-party payment systems. The reason for the flourishing the third-party payment systems including Alipay, WeChat is the demand of government and enterprise units for electronic transaction payment that has had a profound impact on the financial industry,... Show More
  • Research on Principles and Problems of Computer Software Database Design

    Zhang Daoping , Tuyatsetseg Badarch

    Issue: Volume 6, Issue 1, March 2023
    Pages: 20-24
    Received: Jan. 12, 2023
    Accepted: Feb. 20, 2023
    Published: Mar. 04, 2023
    DOI: 10.11648/j.ajcst.20230601.13
    Downloads:
    Views:
    Abstract: Database design is an unforgettable part of this evolution, it is the core of systems and is the foundation for creating a safe and reliable program. The design quality is directly correlated to the user’s experience with the system. It has a huge effect on the smoothness, stability, and security of the system’s operation. Problems also arise when ... Show More
  • Research and Implementation of Word Detection System Based on Improved DFA in China

    Feng Kai , Tuyatsetseg Badarch

    Issue: Volume 6, Issue 1, March 2023
    Pages: 25-32
    Received: Jan. 12, 2023
    Accepted: Feb. 20, 2023
    Published: Mar. 04, 2023
    DOI: 10.11648/j.ajcst.20230601.14
    Downloads:
    Views:
    Abstract: Since the second half of the last century, the intensive usage of digital texts and textual databases produced the need for efficient search methods and data structures. Even though there are many traditional pattern matching algorithms such as regular matching, AC algorithm, and WM algorithm, in this paper, we use on a word detection method based ... Show More
  • Research on Characteristics and Technologies of Cloud Computing

    Liu Gang , Tuyatsetseg Badarch

    Issue: Volume 6, Issue 1, March 2023
    Pages: 33-41
    Received: Jan. 12, 2023
    Accepted: Feb. 20, 2023
    Published: Mar. 04, 2023
    DOI: 10.11648/j.ajcst.20230601.15
    Downloads:
    Views:
    Abstract: Cloud computing technology has promoted the innovation of software development concepts, which also represents one of the advanced development trends of software development technology. Software engineers have advanced the traditional software development system to the next level. Cloud computing technology gives users access to files, software, an... Show More
  • Research on Information Security and Privacy Technology Based on Blockchain

    Zhong Ke , Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 49-55
    Received: Mar. 28, 2022
    Accepted: Apr. 15, 2022
    Published: May 24, 2022
    DOI: 10.11648/j.ajcst.20220502.14
    Downloads:
    Views:
    Abstract: Blockchain provides IoT security and privacy in all industries including manufacturing, finance, healthcare, supply chain, e-governance, education, banking, and trading through decentralization, persistency, anonymity, and auditability characteristics. This paper presents the blockchain technology assimilating with other data security technologies ... Show More
  • Exploration of Revit Software Aided Architectural Design Education Based on Computer BIM Technology

    Liu Hu Qiang , Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 56-62
    Received: Mar. 28, 2022
    Accepted: Apr. 15, 2022
    Published: May 24, 2022
    DOI: 10.11648/j.ajcst.20220502.15
    Downloads:
    Views:
    Abstract: The development of BIM technology is an amazing trend for the construction industry. The production capacity upgrade with a new technology has inevitably become one of the most important topics of the construction industry. Therefore, the further promotion and application of new computer technologies such as BIM technology have affected the Chinese... Show More
  • On the Application of Virtual Simulation in Teaching of Engineering Surveying and Mapping

    Peng Jian Min , Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 115-121
    Received: Mar. 28, 2022
    Accepted: Apr. 15, 2022
    Published: May 24, 2022
    DOI: 10.11648/j.ajcst.20220502.23
    Downloads:
    Views:
    Abstract: Virtual systems aim to provide a virtual environment and intelligent interaction for building measurements. In the face of complex scene tasks, measurement process simulation and analysis can be completed in advance, so as to assist the actual construction. For the requirements in the virtual simulation teaching of surveying and mapping, the virtua... Show More
  • Research on Civil Engineering Software for Engineering Computation

    Tian Chao , Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 63-71
    Received: Mar. 28, 2022
    Accepted: Apr. 15, 2022
    Published: May 24, 2022
    DOI: 10.11648/j.ajcst.20220502.16
    Downloads:
    Views:
    Abstract: Learning how to compute and simulate civil engineering processes is the necessary task for civil engineers, instructors, and learners. In general, with the continuous improvement of computer technology, the computing software promotes the reform of engineering industry. In general, the software can handle complex models with ease and accuracy. Ther... Show More
  • Research on Applications of Artificial Intelligence in Education

    Zheng Rui , Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 72-79
    Received: Mar. 28, 2022
    Accepted: Apr. 15, 2022
    Published: May 24, 2022
    DOI: 10.11648/j.ajcst.20220502.17
    Downloads:
    Views:
    Abstract: With the rapid development of Information Technology (IT) in China, the IT sector is well recognized as a wealth of opportunities for businesses and societies in the country. At the same time, China education system is also aware of the auxiliary value of IT. In this article, we have studied how artificial intelligence is used in education. This pa... Show More
  • Analysis of the Application of Multimedia Technology in Modern Landscape Architecture

    Hu Shuaibo , Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 80-87
    Received: Apr. 05, 2022
    Accepted: May 06, 2022
    Published: May 24, 2022
    DOI: 10.11648/j.ajcst.20220502.18
    Downloads:
    Views:
    Abstract: When contemporary landscape designers have innovated the traditional landscape concept, multimedia technology is used as a principle tool to advance landscape architecture, which also represents one of the development trends of landscape architecture. In general, the modern landscape development, it’s the precise measurement of the 3D landscape ind... Show More
  • Exploring Artificial Intelligence for Network Security: A Case Study of Malware Defence

    Li Peng , Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 108-114
    Received: Apr. 05, 2022
    Accepted: May 11, 2022
    Published: May 24, 2022
    DOI: 10.11648/j.ajcst.20220502.22
    Downloads:
    Views:
    Abstract: AI has many applications in network security. Network security is one of the most challenging situations. The paper carries out AI based network security analysis and prevention ways of the deep learning models in the network security. We focus on some specific AI applications including voice supervision of public network, malicious code monitoring... Show More
  • Research on the Robot’s Intelligent Inspection, Its Target Detection Method

    Lu Jianhong , Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 88-95
    Received: Apr. 05, 2022
    Accepted: May 06, 2022
    Published: May 24, 2022
    DOI: 10.11648/j.ajcst.20220502.19
    Downloads:
    Views:
    Abstract: Intelligent inspection robot has the characteristics of programmable, and can be applied to various inspection environments. In general, studies show the present trend is to replace humans with an inspection robot thereby reducing the risks and improving the inspection efficiency. The intelligent inspection robot is based on intelligent technology ... Show More
  • Research on the Practice of "Web Design and Production" Course in Higher Vocational Colleges

    Zhang Hongmei , Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 96-100
    Received: Apr. 08, 2022
    Accepted: May 06, 2022
    Published: May 24, 2022
    DOI: 10.11648/j.ajcst.20220502.20
    Downloads:
    Views:
    Abstract: The basic educational process of higher vocational college education is to teach young people with development of their morality, intelligence, physique, critical thinking and labor, with certain theoretical and practical knowledge. The research focuses on the study from traditional teaching to independent practical learning. The main change possib... Show More
  • Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security

    Wei Junxu , Tuyatsetseg Badarch

    Issue: Volume 5, Issue 2, June 2022
    Pages: 101-107
    Received: Apr. 08, 2022
    Accepted: May 06, 2022
    Published: May 24, 2022
    DOI: 10.11648/j.ajcst.20220502.21
    Downloads:
    Views:
    Abstract: AI has a variety of educational applications such as smart campuses, personalized learning platforms, teachers and students in assessment, and facial recognition systems. In this paper, we focus on the common threats in cyber space of education. An AI system inherits security threats of traditional computer system, therefore, cybersecurity protecti... Show More