scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

The Impact of the Development of 5G Technologies on the Ideological and Political Education of College Students.

  • Academic Journal
  • Qiang, Lixian1 (AUTHOR)
  • Mathematical Problems in Engineering. 5/24/2022, p1-9. 9p.
  • Article
  • Poor teaching effectiveness is currently a major concern in China's colleges and universities. The Fifth Generation (5G) Internet era has ushered in significant changes in lifestyle, culture, and work, and its convenience and efficacy have supported civilization's rapid progress. It has brought with it a host of difficulties, as well as new changes and benefits for university students' ideological and political education (IPE). However, the openness and dispersion of the Internet have certain negative consequences, particularly in terms of IPE in institutions, where the consequences are severe. We propose a 5G-based IPE in this paper. In the opening, we collect the dataset to initialize the proposed flow. The collected dataset can be preprocessed using normalization. After the input education details have been preprocessed, the education detail is grouped by utilizing the Hierarchical K-means (HK) technique. The aspects can then be extracted using the variational autoencoder (VAE). After it has been reviewed for viability, the data can be stored in a database for future research. Then, using the Boosted TCP (BTCP) protocol, the workable data can be sent to the identity of the student and also the BTCP used to convert data effectively. The presentation of this protocol improved using Enhanced fruit fly optimization (EFFO). Performances such as throughput, good-put, transmission rate, and execution time are discussed, and the results are compared to those of other studies. [ABSTRACT FROM AUTHOR]
Full Text

AN0157048406;[1hiy]24may.22;2022May26.03:17;v2.2.500

The Impact of the Development of 5G Technologies on the Ideological and Political Education of College Students 

1. Introduction

Poor teaching effectiveness is currently a major concern in China's colleges and universities. The Fifth Generation (5G) Internet era has ushered in significant changes in lifestyle, culture, and work, and its convenience and efficacy have supported civilization's rapid progress. It has brought with it a host of difficulties, as well as new changes and benefits for university students' ideological and political education (IPE). However, the openness and dispersion of the Internet have certain negative consequences, particularly in terms of IPE in institutions, where the consequences are severe. We propose a 5G-based IPE in this paper. In the opening, we collect the dataset to initialize the proposed flow. The collected dataset can be preprocessed using normalization. After the input education details have been preprocessed, the education detail is grouped by utilizing the Hierarchical K-means (HK) technique. The aspects can then be extracted using the variational autoencoder (VAE). After it has been reviewed for viability, the data can be stored in a database for future research. Then, using the Boosted TCP (BTCP) protocol, the workable data can be sent to the identity of the student and also the BTCP used to convert data effectively. The presentation of this protocol improved using Enhanced fruit fly optimization (EFFO). Performances such as throughput, good-put, transmission rate, and execution time are discussed, and the results are compared to those of other studies.

The Internet has increasingly invaded many elements of politics and social life nowadays, thanks to an express growth of IT, digitalized technologies, and Android conveying technologies. It has grown into a vital field that is intimately linked to the country's destiny in the age of digital technology. The Net, for instance, has infiltrated each class, each dormitory, as well as every college student's everyday study, and college students have emerged as its most aggressive group in terms of incorporating new technology into their regular living. Through modern media, university graduates gain a significant quantity of knowledge and information, which has an impact on their strategy of living, studying, and reasoning. Students' IPE opens up new possibilities while also posing significant problems [[1]]. One of the characteristics of modern civilization is that it is rich in information, and the rate at which information is transmitted and renewed is increasing. In these circumstances, the priority is to ask ideological and political education to change traditional to simply explain and introduce basic theory inculcating model, efficient use of network advantage, various theories and messages quickly passed on to ideological and political education of the educated, and faster and better to implant educated spirit of independent learning, so that they can improve their ideologies [[2]]. Teachers can create course-specific multimedia curricula and submit them to digital lectures on the net. Graduates can study at every time by browsing online; if they do not understand something, they can leave a message on a BBS in SMS or audio that is not in live time. To more quickly identify the effects of teaching and learning, digital examinations are also conceivable in digital learning, with professors being able to escape pertinent exercises online and students being able to practice and keep track of their progress. It also can control user roles and permissions. Colleges and universities are increasingly adopting this type of integrated "network online course" [[3]]. The range, timeliness, interaction, and breadth of the computer network (CN) can enhance traditional education and provide IPE in colleges and universities a new lease on life. The use of a CN in conjunction with traditional teaching methods can help to enhance the relevance and authenticity of IPE. So this paper approaches 5G-based IPE for analyzing the performance parameters that are compared with existing methods. Now in this article, the collected dataset can be preprocessed using normalization. After the input education details have been preprocessed, the educational information is grouped using the Hierarchical K-means technique. The features can then be extracted using the variational autoencoder (VAE). After it has been reviewed for viability, the data can be stored in a database for future research. Then, using the Boosted TCP protocol (BTCP), the workable data can be sent to the identity of the student. This protocol is used to convert data effectively. The presentation of this protocol improved using Enhanced fruit fly optimization (EFFO). Performances such as throughput, good-put, transmission rate, and execution time are examined, and the results are compared to those of other studies. The result can be examined in the MATLAB Simulation software tool.

The data can be retained in a database for future research after it has been verified for feasibility. This study takes a 5G-based IPE technique to analyzing performance characteristics and comparing them to existing methodologies. The educational information is grouped using the Hierarchical K-means algorithm once the input education details have been preprocessed. Throughput, good-put, transmission rate, and execution time are all investigated, and the results are compared to those of other investigations. The MATLAB Simulation software programme can be used to analyse the results. The further part of this article is structured as shown. Section 2 offers the literary works associated with this paper and the problem statement. Section 3 explains the presented model. Section 4 provides the performance analysis of the suggested method. And, finally, Section 5 contains the overall idea of the paper.

2. Related Works

Based on the reform of the studying field curriculum system IPE courses in colleges and universities, Xiaoyang et.al. [[4]] propose using association rules between data mining and artificial intelligence technology to mine the engagement between the software higher studies of the computer department, and ideas and methods for optimizing the course setting. It proposes four techniques of "systematic design as described in the outline, collaborative team-building coordination, ecological network growth, and dual development of quality standards," as well as improvements and optimization tactics. Countermeasures that will help you be more effective.

Wang et.al. [[5]], examine artificial intelligence (AI) based teaching intelligent machines, summarize their functions and characteristics, and conclude that a mobile AI terminal-based ideological and political teaching system for university students could be used as an educational leader, assistant, or even a teaching object to guide students' studying.

Yi et.al. [[6]], provide an overview and reflection on current IPE in China, discuss the practical importance of cultivating students' cultural self-confidence through curriculum design, examine the relationship between college English curriculum design IPE, and propose a path planning to improve the relationship.

Related to psychological performance measures, Zhong et.al. [[7]] propose AI-IPL for university graduates. The AI-IPL approach is used to support college students' mental and physical development, as well as their ideological and political development. The AI-IPL approach causes disagreements among certain students, determining the IPL of a person's ultimate proclivity for creative strategy and psychology education technique.

Wang et.al. [[8]], concentrate on both political and ideological educational workers in enhancing information understanding, viewpoint, understanding fully big data analytical techniques, making preparations for the digital revolution, fondling in the political and ideological education of law, and enhancing the efficiency of Political and ideological teaching at the advertise educational status, among other things.

Shiying et.al. [[9]], mutually cooperate, fuse, and penetrate through the Ideological and Political Theory Lesson Classroom Theory Teaching, Research Teaching, Experiment Teaching, Practical Teaching, Network Teaching, and so on. Teachers and students participate in the Ideological and Political Theory Course's Omni-Directional Teaching Activities, which strengthen theory education, research education, practice education, and network education. Jsp is becoming more widely used in all types of Jsp applications as a good dynamic web page development language. For the most common Jsp programs, the combination of Jsp Javabean has become the De Facto standard.

Zheng et.al. in [[10]]state that, students' knowledge of national security and national crisis grows as a result of the effective integration of IPE into the syllabus, and they understand that if they fall behind, they will be defeated. They should take risks and study hard so that they can be enthusiastic about their professional knowledge and abilities. Furthermore, while mastering their skills and knowledge, they get a comprehensive awareness of information security industry rules and specifications moral duty, enhancing students' ability to address real-world information security challenges.

Zhang et.al [[11]], utilize a software architectural model based on the typical Android environment, which mixes two architectures. Java program has been chosen as a technique for constructing net educational structures for later efforts and service updates as a result of comparative research on networking technology today. To enable education between teachers and students, the underlying network education technology utilizes an APP. This technology can encompass the latest learning style in which students and faculty are the key players, in addition to utilizing computers' advantages in net information transport. By simulating the genuine school and educational process and applying a range of useful education management strategies, it may handle some challenges in teacher and student education as well as educate teachers and students.

Zheng [[12]] designs a Tai Chi political and ideological interactive classroom system using advanced analytics and graphing neural nets. To initiate, a Spatio-temporal chart CNN is used to logic about the connection between Tai Chi action subgroups and to boost the lesser features of subsets and their cross expressions, which are used to improve the semantic augmentation of current input images. Furthermore, to ensure the Tai Chi scene analysis network's efficacy, an efficient dual feature extraction basic module is introduced to establish the backbone network, reducing the number of parameters and the overall network's computational complexity.

Hong et.al. [[13]], present a strategy for detecting unusual access patterns in IP-MOOCs in institutions. The model for detecting net activities is built using DL to distinguish between normal and abnormal network behavior to detect anomalous access network behavior.

Zhou et.al. [[14]], provide a syllabus IPE platform that integrates various data and details in a connected world. This study employs the MVC framework, which makes it simple to construct numerous controllers in a web app built using the MVC design pattern. The front desk IPE teacher section is where the login mechanism is located. The teacher can also check the test status of a specific student as well as the overall IQ of all students who have been tested. There are 3 sorts of user logins in this system: administrator, student, and instructor, each of which can be accessed using the user passcode. Teachers can participate in these activities by questioning students' exam situations, paying attention to students' many bits of intelligence, and instructing students according to their abilities.

The rise of information technology and innovations has aided in the implementation of the flipped classroom practically and efficiently. It reverses the conventional teaching information exchange in class and information deepening after class from time and location and flipping information transfer and internalization from two levels of teaching structure and teaching method. This research by Su and Fan [[15]], introduces a new recurrent neural network method for music feature categorization that includes a channel attention mechanism.

In Men [[16]], with the arrival of the digital age and the continuous growth of the tech field, the previous approach of IPE at colleges has become outdated, making it necessary and urgent to employ the web to educate. However, the enhancement of instructional procedures in colleges is currently beset by a slew of challenges and inconsistencies. The unpredictability and formalization of net data are all issues that must be addressed. As a result, relevant departments at universities must fundamentally overhaul ideological and political education to legitimize the latest style of relationship among students and instructors.

Yang [[17]], employs a data flow intrusion detection system to track virtual learning visits, detect malicious nodes and abnormal entries in real-time, and respond to changes occurring in network visitation patterns. First, normal and atypical visitation modes are used to build a knowledge library. Second, the similarity between normal and abnormal modes is measured using the variance among the information point and information group. Finally, to reflect network modifications in the virtual quality education, the data collection is reclustered. The proposed method is put to the test using a real dataset.

Hornsey et.al in [[18]], consider some limitations, the unique analyses presented here offer new insight into who in the public is most likely to be vaccination skeptical. Profile 1 depicts a small group of educated, left-wing individuals who are adamantly opposed to vaccinations. Profile 2 depicts a broad coalition of people from various walks of life, connected by youth, political fanaticism, and a lack of educational attainment.

3. Proposed Work

The framework for assessing educational systems and providing ideological instruction to college students is offered. Here is where you may start the 5G network. In the first step, we collect the dataset to initialize the proposed flow. The collected dataset can be preprocessed using normalization. After the input education details have been preprocessed, the education data are grouped by utilizing the Hierarchical K-means technique. The aspects can then be removed using the variational autoencoder (VAE). After it has been reviewed for viability, the data can be stored in a database for future research. Then, using the Boosted TCP protocol (BTCP), the workable data can be sent to the identity of the student also BTCP is used to convert data effectively. The presentation of this protocol improved using Enhanced fruit fly optimization (EFFO). The performances such as throughput, good-put, transmission rate, and execution time are analyzed and then the result is compared with existing methods. The proposed structure flow is represented in Figure 1.

Graph: Figure 1 Proposed structure flow.

3.1. 5G Network Setup

While 5G networks and verification testing are now underway, the introduction of commercial 5G network services will necessitate the supply of monitoring solutions at 5G networks I&M to ensure IPE performance. As a result, we must establish an efficient 5g network for data goodness transmission.

3.2. Dataset Collection

This article selects 55 quantifiable formative evaluation forms for counselors' use, with each form containing mostly two criteria. The majority of it is made up of management attitude and capability. Handle individual learners fairly; cultivate a positive relationship with the students; speak respectfully and model behavior; and be truthful and self-disciplined. Students act unfairly and selfishly at work; students act unfairly and selfishly at work.

3.3. Data Preprocessing Using Normalization

The information is unstructured and may contain identical packages or incomplete data. It has been thoroughly cleaned and processed to remove identical and repeating instances, as well as invalid information. Because the educational system's databases are so large, sample reduction techniques must be used. Extracting aspects approaches are required to reduce unnecessary characteristics due to the vast number of features in this dataset. During the preprocessing stage, the data may be normalized. The s -score, which is defined by the equation, is generated in the first stage of the following normalization procedure:

(1)E=<msub>Sm</msub>−αV,

where α is defined as mean data.

τ is standard.

Furthermore, equation (1) is given as follows:

(2)E=<msub>Sm</msub>−<msub>S¯</mover>m</msub>SD.

The sample standard deviation is denoted by SD.

A randomly assigned sample is made up of,

(3)<msub>Eh</msub>=<msub>σ0</msub>+<msub>σ1</msub>S<msub>mh</msub>+<msub>μ<msub>0h</msub></msub>,

where <msub>μ<msub>0h</msub></msub> is error-based v2 .

Following that, the errors must be independent of each other, as the following equation:

(4)<msub>tv</msub>=<msqrt>U</msqrt>t<msqrt>t2+u−1</msqrt>,

where the random variable is denoted by tv .

The standard deviation is then used to normalize the changes in the variable.

The following formula is used to calculate the moment scaling deviation:

(5)<msub>MSD</msub>=δmsτms,

where moment scaling is denoted as " ms ".

(6)δms=Ex<msub>Rv</msub>−γms.

In the above-given equation, Rv and Ex are representations of randomized variables and expected outcomes, respectively.

<mtd rowspan="2">(7)τms=<msqrt>Ex<msub>Rv</msub>−γms</msqrt>2COV=ms<msub>Rv</msub>¯</mover>.

The variant of the coefficient is represented by COV.

The process of feature scaling is terminated by setting all variables to 0 or 1. The unison-based normalizing process is what it is called. The normalized equation would therefore be written as follows:

(8)<msubsup>Rv′;</msubsup>=t−<msub>tmin</msub><msub>tmax</msub>−<msub>tmin</msub>.

The range and consistency of the data may remain constant after the input has been normalized. The goal of this phase is to reduce or eliminate data delay. Following that, the normalized data can be utilized as an input to the next processes.

3.4. Clustering Using the Hierarchical K-Means (HK) Technique

Because college students' interactional activity is variable, it is important to build tighter groups of students with similar interactional characteristics, and Hierarchical K-means clustering provides the best fit for the given dataset and is superior to any other grouping approach. Clustering divides m samples into j groups, with each input attribute belonging to one of the clusters and not the others. When the teacher has completed grading the students, he could build up and complete the grouping using the data he has gathered.

For K-means clustering, go through the following steps.

First, set the beginning condition by defining the number of clusters and selecting the cluster centers at random. The distance between the qualities is measured using Euclidean distance.

<mtd rowspan="2">(9)zc,d=<msqrt><msub>c1</msub>−<msub>d1</msub>2+<msub>c2</msub>−<msub>d2</msub>2⋯+<msub>cm</msub>−<msub>dm</msub>2</msqrt>zc,d=<msqrt><mstyle displaystyle="true"><munderover>∑h=1m</munderover><msub>ch</msub>−<msub>dh</msub>2</mstyle>,</msqrt>

where c and d are two Euclidian locations and z is the distance between them. Second, allocate each data point to the cluster center closest to it to create a new division. Third, update the centers for clusters that have gained or lost data points. Finally, repeat steps 2 and 3 until you reach a distance convergence threshold.

3.5. Feature Extraction Using Variational Autoencoder (VAE)

To see which data separation technique on 5G network connection data may improve clustering. Feature extraction is a method for extracting new features from an original dataset is as we want to lessen the measure of resources needed for processing without sacrificing crucial qualities, this method is effective. Removing aspects can also aid in the reduction of unnecessary characteristics in a study. Feature extraction transforms basic features into more significant features in a surprising way. To reduce the high dimensionality of the feature vector, feature extraction is a procedure for constructing new features that rely on the original input feature set. The transformation is carried out using algebraic transformations and some optimization criteria. In addition, while dealing with high-dimensional challenges, feature extraction can manage critical information. By preserving the original relative distance between features and covering the original data potential structure, these dimensionality reduction strategies strive to avoid losing a considerable amount of information during the feature transformation process.

3.6. Boosted TCP (BTCP) Protocol

The direction of social and intellectual workers in the educational techniques employed is the framework as an education model. It is an important part of IPE's ideas, theories, and technical orientations, as well as radical social and intellectual conceptions. Experts in IPE theories created a structure to improve cognition, action, and expression. Thinking based on an understanding, IPE frameworks make up the education governance framework. H1 and H2 reflect the administrative structure and experimental units, respectively. The following equation depicts the similarity between the databases of college students in the IPE:

(10)Similarity=Sy=2k<msub>H1</msub>+<msub>H2</msub>k<msub>H1</msub>+k<msub>H2</msub>.

Here, the number k signifies the module's number, and the similarity within university student records denotes similarity among the two databases. The following equation depicts the distribution of data as follows:

(11)DD=Sy∗F+G∗k∗k<msub>H1</msub>+k<msub>H2</msub>.

Here, F represents the role of human interest, and G represents the sense of confusing tasks in an education sector, IPE as a way of feeding nations that need liberty, rather than the base of IPE. As shown in (12), the expertise IPE structure is an academic structure that relates to describing the illogical growth of the knowledge economy, which has lost its fundamental place in life learning.

(12)Sy=<msub>βf</msub><msub>k1</msub><msub>S1</msub>+<msub>S2</msub><msub>kt−1</msub>+<msub>S1</msub><msub>kt−1</msub>+<msub>S1</msub>.

To further clarify its application effect, the approach is used in the teaching of political and ideological subjects in a freshman class at universities. The students' attitudes about political and ideological courses, their level of satisfaction with classroom teaching, and their acceptability of political and ideological courses, as well as their learning circumstances are all examined using the questionnaires utilized in this study. The acceptance of political and ideological courses may be higher, which can be used to evaluate the use of the MATLAB Simulation tool for IPE.

3.7. Enhanced Fruit Fly Optimization (EFFO)

Within a radius of one, the basic FFO develops food sources around its swarm site. This radius is set in stone and cannot be modified throughout the iteration process. The main disadvantage of the EFFO is more iterations are required by the algorithm to obtain an ideal solution. The fruit fly swarm site is frequently far from optimal in early iterations; the search radius may be too limited, and a significant increase in iterations is required to identify a favorable spot. The swarm area is close to an optimal or near-ideal solution in the last generations. The fine-tuning of solution space necessitates a very limited scope. This search radius is excessively broad. Fixed values of search radius can help improve the FFO's performance and reduce its flaws. It can also be expressed in the following:

(13)ρ=<msub>ρmax</msub>.explog<msub>ρmin</msub><msub>ρmax</msub>.I<msub>Imax</msub>,

where ρ = each iteration's search radius. <msub>ρmax</msub> = maximum radius. <msub>ρmin</msub> = minimum radius. I = iteration number and Imax = maximum iteration number.

To improve the intensive search, we do not modify all of the swarm location's decision variations while creating a new solution. Instead, we pick one decision variation at random from a uniform distribution. Let a€1,2,...m be a number picked at a random index. As follows, a new solution Yi=yi,1,yi,2,...,yi,m is formed.

(14)<msub>Yi,j</msub>=<mtable class="cases"><msub>σj</msub>±ρ.ranifj=a<msub>σj</msub>otherwise,j=1,2,...,m.

A suitable initial swarm location could speed up convergence to good solutions. To choose a decent swarm location, we generate a population of PS solutions at random and the best one is chosen as the first fruit fly swarm location.

The above-given mathematic technique depicts the entire computing approach for the presented IFFO algorithm.

Algorithm 1: Enhanced Fruit Fly Optimization (EFFO)

//Initialization

Parameters setting a, <msub>ρmax</msub> , <msub>ρmin</msub> , and <msub>Imax</msub>

for i = 1, 2, ....,b//produce food source Y1, Y2,... Ya

<msub>Yi,j</msub>=<msub>Lj</msub>+<msub>Uj</msub>−<msub>Lj</msub>×ran,j=1,2,...m

• end

∇←arg<msub>mini=1,2,...b</msub>f<msub>Yi</msub> //representation of swarm location

• I = 0

Y∗=∇

• Again

ρ=<msub>ρmax</msub>.explog<msub>ρmin</msub>/<msub>ρmax</msub>.I/<msub>Imax</msub> //foraging phase of opheresis

For i = 1,2, ....b

a = random number between [1, m]

// produce food source Yi = (yi,1, yi,2,..., yi,m)

<msub>Yi,j</msub>=<mtable class="cases"><msub>σj</msub>±ρ.ranifj=a<msub>σj</msub>otherwise j = 1,2, ..., m

If Yi,j > Uj then Yij = Uj

If Yi,j < Lj then Yij = Lj

end for//vision forging phase

<msub>Ybest</msub>=arg<msub>mini=1,2,...b</msub>f<msub>Yi</msub>

If f (Ybest) < f( ∇ ) then ∇ = Ybest

If f( ∇ ) < f (Y ∗ ) then Y ∗ ) = ∇

I←I+1

till I = Imax

4. Performance Analysis

We have employed a MATLAB simulator in this study to examine and contrast the behavior of the proposed protocol with the existing protocols.

4.1. Throughput

It is the total number of packets sent via the network from sender nodes to reception nodes at any given time. It is usually expressed as packets per second or bits per second. To achieve better results, the throughput must be comparable. The study of (15) is used to calculate the value of throughput.

(15)T=RpRf−Ri,

where Rp = received packets. Rf = last or end packet. Ri = starting packet.

Figure 2 depicts a comparison of throughput in kilobits per second for the present and proposed methods. When compared to other existing protocols, our proposed technique has a higher throughput, as seen in the graph. This paper proves efficient throughput than the existing methods for each node to get higher data transmission.

Graph: Figure 2 Comparison of throughput (kbps) in the present and proposed methods.

4.2. Good-Put

The rate at which meaningful data traverses a network is referred to as good-put. Good-put and throughput will be as near as they can theoretically be assuming an uncongested channel between endpoints. Figure 3 depicts a comparison of good-put in kilobits per second for the present and proposed methods. When compared to other existing protocols, our proposed technique has a higher good-put, as seen in the graph. This paper proves more efficient good-put than the existing methods for each node.

Graph: Figure 3 Comparison of good-put (kbps) in existing and proposed methods.

4.3. Transmission Rate

The transmission rate is the number of bits per second that can be transferred. It also determines the length of time that a sign remains on the wire. Figure 4 depicts a comparison of transmission rates for existing and proposed methods. As shown in the graph, our proposed approach has a greater transmission rate than other existing protocols. This paper proves a higher transmission rate than the existing methods for each node to get higher data transmission.

Graph: Figure 4 Comparison of the transmission rate (Mbps) in existing and proposed methods.

A comparison of transmission rates for existing and planned technologies is shown in Figure 4. Figure 4 represents the comparison of transmission rate for existing and proposed methods to determine the high transmission rate.

4.4. Execution Time

It is the amount of time it takes for a 5G node to compute the functions required for data transmission. The proposed approach and the existing method are compared in terms of executing time in seconds in Figure 5. When compared to existing protocols, the graph clearly shows that our suggested technique takes the shortest time to transmit data. This paper proves reduced execution time than the existing methods for each node.

Graph: Figure 5 Comparison of Execution time (s) in existing and proposed methods.

A comparison of execution time for existing and planned technologies is shown in Figure 4. The proposed approach and the existing method are compared in terms of executing time in seconds in Figure 5.

5. Conclusions

The creation of IPE is the topic of this study and evaluates the system's performance and functionality. At the same time, the Boosted TCP's performance for IPE is assessed. On both the teacher and student terminals, the built system's political and ideological courses, courseware management, online discussion, and classroom evaluation management capabilities can be used on a regular basis. Furthermore, the system's application effect in practical teaching is relatively good. The suggested system's Boosted TCP can successfully improve students' attitudes toward IPE, increase satisfaction and acceptance of classroom teaching, and develop ideological and political information mastery. This paper contributes to the intelligent development of IPE and contains numerous experimental application values and significance, such as throughput, good-put, and transmission rate were proven to be faster than other existing methods, and the execution time was reduced when compared to other methods using the enhanced fruit fly optimization technique. The quality of data transmission can be attained in the future if we focus on cost and energy consumption. The fastest data transfer can be achieved by increasing the good-put and minimizing the execution time.

Data Availability

The experimental data used to support the findings of this study are available from the author upon request.

Conflicts of Interest

The author declares that there are no conflicts of interest.

REFERENCES

1 Yu H. Application analysis of new Internet multimedia technology in optimizing the ideological and political education system of college students. Wireless Communications and Mobile Computing. 2021; 2021, 12, 5557343, 10.1155/2021/5557343

2 Wang X. Analysis of ideological and political education theories under the network environmentProceedings of the 2018 4th International Conference on Education & Training, Management and Humanities Science (ETMHS 2018). June, 2018. Zhengzhou, China

3 Xu L., Tsai S.-B. The transformation of college students' ideological and political education and learning analysis of education system by streaming media technology. Mathematical Problems in Engineering. 2021; 2021, 11, 3285830, 10.1155/2021/3285830

4 Xiaoyang H., Junzhi Z., Jingyuan F., Xiuxia Z. Effectiveness of ideological and political education reform in universities based on data mining artificial intelligence technology. Journal of Intelligent and Fuzzy Systems. 2021; 40(2): 3743-3754, 10.3233/jifs-189408

5 Wang Y. Analysis on the construction of ideological and political education system for college students based on mobile artificial intelligence terminal. Soft Computing. 2020; 24(11): 8365-8375, 10.1007/s00500-020-04932-6

6 Yi Y., Dan W. The realization of ideological and political education in college English based on cultural confidence. Creative Education. 2020; 11(11): 2193-2198, 10.4236/ce.2020.1111158

7 Zhong J. Exploring and researching ideological and political education of college students' psychological quality for the development of artificial intelligence. Mobile Information Systems. 2021; 2021, 12, 2453385

8 Wang S., Zhang T. Research on innovation path of school ideological and political work based on large data. Cluster Computing. 2019; 22(S2): 3375-3383, 10.1007/s10586-018-2184-1, 2-s2.0-85074130764

9 Shiying Z. Development and implementation of college students' ideological and political practice course network teaching platform based on Jsp technologyProceedings of the 2019 3rd International Conference on Advancement of the Theory and Practices in Education (ICATPE 2019). November, 2019. Helsinki, Finland

Zheng P., Wang X., Li J. Exploration and practice of curriculum ideological and Political Construction Reform --Take "information security" course as an example. ASP Transactions on Computers. 2021; 1(1): 1-5, 10.52810/tc.2021.100020

Zhang X., Gao X., Yi H., Li Z. Design of an intelligent virtual classroom platform for ideological and political education based on the mobile terminal APP mode of the Internet of things. Mathematical Problems in Engineering. 2021; 2021, 12, 9914790, 10.1155/2021/9914790

Zheng L. Analysis of Tai Chi ideological and political course in university-based on big data and graph neural networks. Scientific Programming. 2021; 2021, 9, 9914908

Hong N., Wang X., Wang Z. Abnormal access behavior detection of ideological and political MOOCs in colleges and universities. Mobile Information Systems. 2021; 2021, 14, 9977736, 10.1155/2021/9977736

Zhou J., Wei Z., Jia F., Li W. Course ideological and political teaching platform based on the fusion of multiple data and information in an intelligent environment. Journal of Sensors. 2021; 2021, 10, 1558360, 10.1155/2021/1558360

Su F., Fan Z. Flipped classroom design of college ideological and political courses based on long short-term memory networks. Scientific Programming. 2021; 2021, 8, 6971906, 10.1155/2021/6971906

Men C. The implementation of ideological and political education in colleges and universities from the perspective of computer Internet. Journal of Physics: Conference Series. 2021; 1744(3); IOP Publishing, 032049, 10.1088/1742-6596/1744/3/032049

Yang Y. On detecting abnormal access for online ideological and political education. International Journal of Distributed Systems and Technologies. 2021; 12(2): 35-45, 10.4018/ijdst.2021040104

Hornsey M. J., Edwards M., Lobera J., Díaz-Catalán C., Barlow F. K. Resolving the small-pockets problem helps clarify the r ole of education and political ideology in shaping vaccine skepticism. British Journal of Psychology. 2021; 112

By Lixian Qiang

Reported by Author

Additional Information
611310 Colleges, Universities, and Professional Schools
517210 Wireless Telecommunications Carriers (except Satellite)
Copyright of Mathematical Problems in Engineering is the property of Hindawi Limited and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
1Suzhou Industrial Park Institute of Service Outsourcing, Suzhou, China
5342
1024-123X
10.1155/2022/8768097
157048406

banner_970x250 (970x250)

sponsored