Skip to main content
Log in

Management of university and artificial intelligence statistics for 5G edge computing

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

With the continuous development of science and technology, artificial intelligence technology, deep learning technology, and signal transmission technology have all been rapidly developed. The products of artificial intelligence can be used in all kinds of people’s lives and studies, making people’s lives and learning is more convenient. Some universities should also change their own teaching management methods, improve the quality of teaching, catch up with the trend of artificial intelligence development, improve the competitiveness of schools, and cultivate more talents for the society. Edge computing technology is a component of cloud computing. It can calculate data stored in cloud computing and has good storage capabilities. Users can calculate and store large quantities of data through edge computing technology. At present, the role of edge computing technology is becoming more and more important. In this research, we first gave a brief introduction to 5G technology, explained the role and status of 5G technology, and then conducted an in-depth analysis from the perspective of edge computing, and compared edge technology with other technologies. Deepen the understanding of edge computing technology. We also discussed the management of many universities in combination with 5G technology. The system we designed has three-tier architecture, including three functional modules, and each functional module is divided into multiple sub-modules. Finally, we made plans and suggestions for the development of artificial intelligence technology in university.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Dadvar, M., Trieschnigg, D., Ordelman, R., de Jong, F. (2013). Improving cyberbullying detection with user context. In: European Conference on Information Retrieval, (pp. 693–696). Berlin, Heidelberg: Springer.

  2. Dadvar, M., Jong, F. D., Ordelman, R., Trieschnigg, D. (2012). Improved cyberbullying detection using gender information. In: Proceedings of the Twelfth Dutch-Belgian Information Retrieval Workshop (DIR 2012). University of Ghent.

  3. Raisi, E., Huang, B. (2017). Cyberbullying detection with weakly supervised machine learning. In: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, pp. 409–416. ACM.

  4. Balakrishnan, V., Khan, S., & Arabnia, H. R. (2020). Improving cyberbullying detection using Twitter users’ psychological features and machine learning. Computer's & Security, 90: 101710.

    Article  Google Scholar 

  5. Kumar, A., Sachdeva, N. (2020). Cyberbullying checker: Online bully content detection using hybrid supervised learning. In: International Conference on Intelligent Computing and Smart Communication 2019, (pp. 371–382). Singapore: Springer.

  6. Dadvar, M., & Eckert, K. (2018). Cyberbullying detection in social networks using deep learning based models; a reproducibility study. arXiv:1812.08046.

  7. Agrawal, S., Awekar, A. (2018). Deep learning for detecting cyberbullying across multiple social media platforms. In: European Conference on Information Retrieval, (pp. 141–153). Cham: Springer.

  8. Cheng, L., Guo, R., Silva, Y., Hall, D., Liu, H. (2019). Hierarchical attention networks for cyberbullying detection on the instagram social network. In: Proceedings of the 2019 SIAM International Conference on Data Mining, (pp. 235–243). Society for Industrial and Applied Mathematics.

  9. Al-Hashedi, M., Soon, L. K., Goh, H. N. (2019). Cyberbullying detection using deep learning and word embeddings: an empirical study. In: Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems, pp. 17–21.

  10. Founta, A. M., Chatzakou, D., Kourtellis, N., Blackburn, J., Vakali, A., Leontiadis, I. (2019). A unified deep learning architecture for abuse detection. In: Proceedings of the 10th ACM Conference on Web Science, pp. 105–114.

  11. Mahlangu, T., Tu, C. (2019). Deep learning cyberbullying detection using stacked embbedings approach. In: 2019 6th International Conference on Soft Computing & Machine Intelligence (ISCMI), pp. 45–49. IEEE.

  12. Singh, V. K., Ghosh, S., Jose, C. (2019). Toward multimodal cyberbullying detection. In: Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 2090–2099.

  13. Yang, F., Peng, X., Ghosh, G., Shilon, R., Ma, H., Moore, E., Predovic, G. (2019). Exploring deep multimodal fusion of text and photo for hate speech classification. In: Proceedings of the Third Workshop on Abusive Language Online, pp. 11–18.

  14. Kansara, K. B., & Shekokar, N. M. (2015). A framework for cyberbullying detection in social network. Int J Current Eng Technol, 5(1), 494–498.

    Google Scholar 

  15. He, Z. (2015). Exploiting the topology property of social network for rumor detection. In: 2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp. 41–46. IEEE.

  16. Kumar, A., Sangwan, S. R., & Nayyar, A. (2019). Rumour veracity detection on twitter using p swarm optimized shallow classifiers. Multimed. Tools Appl., 78(17), 24083–24101.

    Article  Google Scholar 

  17. Kumar, A., Sangwan, S. R. (2018). Rumour detection using machine learning techniques on social media. In: International Conference on Innovative Computing and Communication. Lecture Notes in Networks and Systems. Springer.

  18. Yang, F., Liu, Y., Yu, X., Yang, M. (2012). Automatic detection of rumor on Sina Weibo. In: Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics, p. 13. ACM.

  19. Zhang, Q., Zhang, S., Dong, J., Xiong, J., & Cheng, X. (2015). Automatic detection of rumor on social network. In J. Li, H. Ji, D. Zhao, & Y. Feng (Eds.), Natural Language Processing and Chinese Computing. NLPCC 2015 (Vol. 9362, pp. 113–122). Cham: Springer.

    Chapter  Google Scholar 

  20. Jin, Z., Cao, J., Jiang, Y. G., Zhang, Y. (2014). News credibility evaluation on microblog with a hierarchical propagation model. In: 2014 IEEE International Conference on Data Mining, pp. 230–239. IEEE.

  21. Wang, S., Terano, T. (2015). Detecting rumor patterns in streaming social media. In: 2015 IEEE International Conference on Big Data (Big Data), pp. 2709–2715. IEEE.

  22. Sahana, V. P., Pias, A. R., Shastri, R., Mandloi, S. (2015). Automatic detection of rumoured tweets and finding its origin. In: 2015 International Conference on Computing and Network Communications (CoCoNet), pp. 607–612. IEEE.

  23. Zhao, Z., Resnick, P., Mei, Q. (2015). Enquiring minds: Early detection of rumors in social media from enquiry posts. In: Proceedings of the 24th International Conference on World Wide Web, pp. 1395–1405. International World Wide Web Conferences Steering Committee. https://doi.org/10.1007/978-3-319-67217-5_8.

Download references

Acknowledgements

This research has been supported by the Ministry of Education Human Society project of China (No. 20YJC760030), the key projects of Teaching Research and Teaching Reform of Nanjing Institute of Technology (No. JG2019009), the First Class Curriculum Construction project of Nanjing Institute of Technology (No. YZKC2019067), the Higher Education Research project of Nanjing Institute of Technology(No.2019YB26), Cultural and Artistic Creativity Design Institute (No. CACD202003).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianjun Hou.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hou, J., Xu, L. Management of university and artificial intelligence statistics for 5G edge computing. Wireless Netw (2021). https://doi.org/10.1007/s11276-021-02689-w

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11276-021-02689-w

Keywords

Navigation