Academia.eduAcademia.edu

Computer Science Information Technology

description4,295 papers
group1,986 followers
lightbulbAbout this topic
Computer Science Information Technology is the study and application of computing systems, software development, data management, and network infrastructure. It encompasses the design, implementation, and maintenance of technology solutions to process, store, and communicate information effectively, focusing on both theoretical foundations and practical applications in various domains.
lightbulbAbout this topic
Computer Science Information Technology is the study and application of computing systems, software development, data management, and network infrastructure. It encompasses the design, implementation, and maintenance of technology solutions to process, store, and communicate information effectively, focusing on both theoretical foundations and practical applications in various domains.
This research is conducting analysis of digital land images using digital image processing techniques. The main purpose of the research is to classify soil fertility based on two-dimensional RGB colored digital soil images. The research... more
Educational Institutions are facing enormous tasks of marking and grading students at the end of every examination within the shortest possible time. Marking theoretical essay questions which involves thousands of examinees can be biased,... more
Construction industries are a must in developing countries. Constructions take part in almost every corner of the country. In construction projects, reinforced concrete plays big part in any construction. A long bar of steel are cut into... more
Currently, the using of Information Communication Technology (ICT) in the industry is growing fast. Nevertheless, Small Medium Enterprises (SMEs) in Indonesia do not follow these conditions in sense of using the ICT . The influencing... more
This report is based on a project did by Robalge Sankalpana Sewmini Lenora of Plymouth University third-year student. This report presents the development and implementation of a face recognition-based attendance system designed to... more
This paper establishes a fundamental theoretical and practical connection between Dempster-Shafer Theory (DST) and U8 Probability logic demonstrating how these frameworks can be integrated to create a more robust uncertainty reasoning... more
The Thai Water Festival or Songkran marks the start of the traditional Thai New Year. It is characterized by its water-splashing festivities and is one of the most anticipated annual events for tourists and locals alike. This article... more
Based on IEEE 802.11 Distributed Coordination Function (DCF), Persistent Relay Carrier Sense Multiple Access (PRCSMA) was proposed for cooperative transmission with two or more relay nodes. We propose random assigning of the initial... more
This paper introduces an evolutionary approach to enhance the process of finding central nodes in mobile networks. This can provide essential information and important applications in mobile and social networks. This evolutionary approach... more
Technological developments in artificial intelligence, namely in the area of deep learning, have created new avenues for enhancing accessibility for those with visual impairments. In order to improve the capacity of people who are blind... more
This paper discusses theoretical and practical POS tagging issues with the view to improving POS tagging performance for Amharic, which was never above 90%. Knowledge of Amharic morphology, the given annotated data and the tagging... more
Wireless sensor networks consist of various sensor nodes which operate in a memory, energy and bandwidth constrained environment. Target tracking is an important application in wireless sensor networks and in this paper we propose an... more
This research paper examined the inadequacies involved in the manual method of compiling students’ result in secondary schools in Nigeria. To achieve that, preliminary investigations about the current manual record keeping were carried... more
The rapid growth of information over the Internet makes it difficult to find the desired item among the huge amount of items. Web-based recommendation systems provide product recommendations to online consumers based on their purchase... more
Fire is an extremely dangerous circumstance and it is particularly important to screen and give cautioning before anything untoward happens. In many creating nations, houses do not come fitted with fire caution framework as observed in... more
Impersonation in the context of examination, is a situation where a candidate sits in an examination for another candidate pretending to the real candidate. In many institutions in Nigeria, to mitigate this act, students are expected to... more
This qualitative literature review explores the realm of histogram-based image forensics for recaptured image detection, addressing the challenges posed by advancements in display technology and the subsequent need for robust forensic... more
The primary goal of this article is to provide managers and executives the tools and information needed to make informed decisions concerning data warehousing, to understand the processes and technology involved, and to identify... more
The primary goal of this article is to provide managers and executives the tools and information needed to make informed decisions concerning data warehousing, to understand the processes and technology involved, and to identify... more
Due to the time-varying nature of the wireless channel and presence of limited resources for the signal transmission, which faces various detrimental effects such as path-loss, delay spread, Doppler spread, shadowing and interference make... more
VANETs are special kind of Mobile Ad Hoc Networks (MANETs) that are formed between moving vehicles on an as-needed basis. Routing in VANET uses a greedy routing protocol which requires geographical information like location of any... more
This article describes the computer system developed for the detection of minutiae in fingerprints images. The system described can perform automatic and manual extraction of important data from the fingerprints images, storing that... more
A human brain responds at a much faster rate to images and the information it contains. An image is considered as proof of past events that have occurred, but in today's world where editing tools are made available so easily tampering... more
Extensive research into maintaining coverage over time has been spurred by the growing need for wireless sensor networks to monitor certain regions. Coverage gaps brought on either haphazard node placement or failures pose the biggest... more
The Stock Management System (SMS) presented in this study is a full-stack MERN (MongoDB, Express.js, React.js, Node.js) application developed to optimize stock processes and customer engagement through automation and intelligent... more
Finite-state implementations naturally denote concatenations of morphemes and are limited to modeling concatenative morphotactics. The non-concatenative structure, such as reduplication, in the computational morphology of many world... more
Naim Khelifi received the B.Sc. in 2000, and graduated as a computer engineer on computer science in 2005 from Djilali Liabes University, SBA, Algeria. He had his Master's degree in computer science in 2015 from Tahri Mohammed University,... more
Technology is developing so rapidly at this time. Every time various latest and cutting-edge technologies in various fields transmit life. One of them is in the field of object detection. As technology develops, the need for object... more
Identifying moving objects from a video sequence is a fundamental and critical task in many computervision applications. After the images are captured they must be processed and then sent to the server. In this paper we characterize the... more
Running device drivers as unprivileged user-level code, encapsulated into their own process, has often been proposed as a technique for increasing system robustness. However, in the past, systems based on user-level drivers have generally... more
An improved diagnosis of the Aorta's normal and pathological case is obtained by applying image denoising in curvelet domain. Better visual quality is achieved for Better diagnosis. Speckle filtering of medical ultrasound images is a... more
This research investigates the predictive power of pre-release metadata in forecasting IMDb movie ratings. Unlike prior studies that rely on post-release variables such as box office income or audience reviews, our approach focuses... more
Complexity of Arabic writing language makes its handwritten recognition very complex in terms of computer algorithms. The Arabic handwritten recognition has high importance in modern applications. The contour analysis of word image can... more
Currently, there is an increasing interest about the cloud platform by the High Performance Computing (HPC) community, and the Parallel I/O for High Performance Systems is not an exception. In cloud platforms, the user takes into account... more
Over the last few years, it is been experienced wireless sensor networks technologies are grabbing huge attention in almost every aspect of human lives due to its vast coverage in real-life applications. It has emerged as one of the... more
Cloud Security Posture Management (CSPM) has become increasingly vital as organizations move their critical database workloads to the cloud. CSPM provides a proactive approach to identifying, managing, and remediating security risks... more
Air pollution is the “world’s largest environmental health threat”[1], causing 7 million deaths[1] worldwide every year. Its major constituents are PM2.5, PM10 and the harmful green house gases S02, N02, C0 and other effluents from... more
Thinking of today's web search scenario which is mainly keyword based, leads to the need of effective and meaningful search provided by Semantic Web. Existing search engines are vulnerable to provide relevant answers to users query due to... more
Social distancing is one kind of preventative measure to reduce the spread of COVID-19. COVID-19 transmits mainly from one person to another during close contact for a prolonged period. Different types of preventive measures like thermal... more
This paper focuses on research related to the difficulties introduced by academic re-sources management in institutions of Higher Education and specifically in the Fundación Universitaria de Popayán, a private university, where the... more
This paper presents an optimal duty-cycle modulation (ODCM) scheme for analog-to-digital conversion (ADC) systems. The overall ODCM-Based ADC problem is decoupled into optimal DCM and digital filtering sub-problems, while taking into... more
This work proposes a structured approach to baselining a model, identifying attack vectors, and securing the machine learning models after deployment. This method for securing each model post deployment is called the BAD (Build, Attack,... more
Fever is a sign that the body is trying to fight infection. It is usually accompanied by various sicknesses or symptoms that signal another illness or disease. Diagnosing it ahead of time is essential because it has to do with human life... more
Confidentiality of Electronic Health Record (EHR) and privacy are two important security requirements for healthcare systems. Many devices on the EHR network utilize little or no encryption, which makes data in transit vulnerable to... more
Targets on availability are generally included in any Service Level Agreement (SLA). When those targets are not met, the service provider has to compensate the customer. The obligation to compensate may represent a significant risk for... more
the field of Wireless Local Area Networks (LANs) is expanding rapidly as a result of advances in digital communications, portable computers, and semiconductor technology. The early adopters of this technology have primarily been vertical... more
Sentiment analysis is a text mining based on the opinion collection towards the review of online product. Support Vector Machine (SVM) is an algorithm of classification that applicable to review the analysis of product. The hyperplane... more
Crest lines convey the inherent features of the shape. Mathematically Crest lines are described via extremes of the surface principal curvatures along their corresponding lines of curvature. In this study we used an automatic threshold... more
Crest lines convey the inherent features of the shape. Mathematically Crest lines are described via extremes of the surface principal curvatures along their corresponding lines of curvature. In this study we used an automatic threshold... more
Download research papers for free!