Academia.eduAcademia.edu

Computer Science and Information System

description127 papers
group55 followers
lightbulbAbout this topic
Computer Science and Information Systems is the study of computational systems, algorithms, and data structures, focusing on the design, development, and application of software and hardware solutions. It encompasses the analysis of information processing, data management, and the integration of technology in organizational contexts to enhance decision-making and operational efficiency.
lightbulbAbout this topic
Computer Science and Information Systems is the study of computational systems, algorithms, and data structures, focusing on the design, development, and application of software and hardware solutions. It encompasses the analysis of information processing, data management, and the integration of technology in organizational contexts to enhance decision-making and operational efficiency.
Human-computer interaction depends on facial expression detection, which also finds utility in mental health monitoring to improve digital environment user experiences. Perfect spotting Computer vision has always baffled emotions... more
Wood species identification is a crucial task in various industries, including forestry, woodworking, and conservation. Traditional methods rely on manual expertise, which can be time-consuming and error prone. Hence, an automatic wood... more
One form of data is digital images, because of their widespread of frequent exchange over the Internet it is necessary to preserve the security and privacy of the images transmitted. There are many image encryption techniques that have... more
The rapid expansion of quantum computing presents a substantial obstacle to the available encryption methods, especially those employed in blockchain technology. Because of the impending dangers posed by quantum computing, there is an... more
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify additional digital... more
In this paper, we consider a palm print characteristic which has taken wide attentions in recent studies. We focused on palm print verification problem by designing a deep network called a palm convolutional neural network (PCNN). This... more
The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via... more
The rise of the internet of things (IoT) technology has brought new security challenges, necessitating robust intrusion detection systems (IDS). This research applies swarm intelligence (SI) principles, specifically the pigeon inspired... more
Image encryption is a critical process aimed at securing digital images, safeguarding them from unauthorized access, tampering, or viewing to ensure the confidentiality and integrity of sensitive visual information. In this research, we... more
Dyslexia in children are serious problems that need to be addressed early. Many previous studies have focused on the detection/prediction of dyslexia. However, in the prediction process, there is often an imbalance in the dataset used... more
This paper proposes a modification approach for phased-based EVM in order to reduce the processing time without effect the quality of the magnified video. The proposed approach applies a resizing process on the input video using Lanczos-3... more
and Technology during the spring semester of 2018. The National Institute of Standards and Technology announced in December 2016 that they were taking submissions for quantum-resistant algorithms and that they would be testing and... more
This paper proposes a modification approach for phased-based EVM in order to reduce the processing time without effect the quality of the magnified video. The proposed approach applies a resizing process on the input video using Lanczos-3... more
Access to network traffic records is an integral part of recognizing and addressing network security breaches. Even with the increasing sophistication of network attacks, basic network events such as connections between two IP addresses... more
The current hype of quantum computing has necessitated the need for computer security stakeholders to call for the design of security algorithms that will be quantum efficient when quantum computers finally grace our computing sphere.... more
In the digital era, protecting confidential information from unauthorized access is crucial. Information can be represented through a variety of communicative media, including text, video, audio, and images, with text being the most... more
Multipath environment is a limitation fact in optimized usage of wireless networks. Using smart antenna and beamforming algorithms contributed to that subscribers get a higher-gain signal and better directivity as well as reduce the... more
The successful implementation of deep learning nets opens up possibilities for various applications in viticulture, including disease detection, plant health monitoring, and grapevine variety identification. With the progressive... more
Social networks have become an essential part of our lives today, at least in their virtual dimension, and the image of the web world is almost impossible without the presence of this pervasive phenomenon. These networks are one of the... more
Heart failure (HF) is a global health threat, requiring urgent research in its classification. This study proposes a novel approach for HF classification by integrating advanced supervised learning (ASL) and particle swarm optimization... more
The idea of coverless information hiding has seen a great deal of development since it was initially introduced due to its effectiveness in defeating steganalysis tools. However, the capacity for general coverless information hiding... more
The integrity and security of medical data have become a big challenge for healthcare services applications. Images of hidden text represent steganography forms in which the image is exploited as an object to cover information and data.... more
Selecting the most suitable agile software development method is a challenging task due to the variety of available methods, each with its strengths and weaknesses. To achieve project goals effectively, factors such as project needs, team... more
Lattice-based structures offer considerable possibilities for post-quantum cryptography. Recently, many algorithms have been built on hard lattice problems. The three of the remaining four in the final round of the post-quantum... more
Security System for Data using Steganography and Cryptography (SSDSC) is a set of hardware and software components that will be used to send secured documents through the internet. Some of the software will be loaded into a... more
Talk about the lifestyle that is now growing, it also affects the appearance of mobile phones that are owned by everyone that is more complete mobile accessories and create attractive appearance. Along with the time mobile phone... more
Due to recent advancements in quantum drones, the Internet of Quantum Drones (IoQDs), and Drone-to-Satellite connectivity, several advantages have been anticipated for real-time applications. This work examines quantum computing issues,... more
This study proposed the triple-layer remote phosphor (TRP) structure to enhance the color quality and the emitted luminous flux of white LEDs (WLEDs). The TRP structure consists of three different phosphor layers that are arranged as... more
Many troubles in life require decision-making with convoluted processes because they are caused by uncertainty about the process of relationships that appear in the system. This problem leads to the creation of a model called the Bayesian... more
Nowadays, the white-light-emitting diodes (LEDs) have a vast application on the real-life based on its superior advantages such as energy efficiency, long lifetime, compactness, and environment-friendly and designable features in... more
In this paper, we propose Ca[Mg3SiN4]Ce3+ Phosphor as a new material solution for improving the optical properties in terms of CRI, CQS. D-CCT, LO of the 5600K remote-packaging white LEDs (RP-WLEDs). In the first stage, we built and... more
Objectives: A novel hybrid multi-objective swarm system is proposed in order to find the optimal feature subset that achieves data description with minor redundancy as well as keeps classification performance. Methods/Statistical... more
In the last decade, light-emitting diodes (LEDs), which based on spontaneous light emission in semiconductors can be considered as the main light sources for civil and industrial purposes. In this paper, we presented and investigated the... more
The aim of this work is to show the effectiveness of a new algorithm named as modified grey wolf optimization (MGWO) algorithm to determine the optimum combination parameters values of a linear antenna array which is widely used in the... more
Steganography is the technique of hiding a confidential message in an ordinary message and the extraction of that secret message at its destination. Different carrier file formats can be used in steganography. Among these carrier file... more
We can easily observe that in the current era of communication, Computers, mobile phones, and the Internet are widely used mediums. In such an environment, information security is an important issue. The most common techniques used for... more
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. In this paper, a new coverless steganography is presented to hide the secret... more
Steganography is the technique of hiding a confidential message in an ordinary message and the extraction of that secret message at its destination. Different carrier file formats can be used in steganography. Among these carrier file... more
White light emitting diodes (white-LEDs) are the promising light sources of new lighting technology due to their high efficiency, energy saving, long life and environmentally friendly. In this review, different techniques proposed for the... more
The present work is an attempt to build some new functions of Randomized Complete Block Design in R-software. Different computer programs are developed using Rsoftware. All these functions are run on real data set .The present work is an... more
Emotion recognition using images, videos, or speech as input is considered as a hot topic in the field of research over some years. With the introduction of deep learning techniques, e.g., convolutional neural networks (CNN), applied in... more
The eradication of correlated evidence of the enormous volume of the directory is designated as data mining. Extracting discriminate knowledge associate with the approach is performed by a feature of knowledge. Knowledge rejuvenation is... more
The concept of cloud computing is a model for sharing resources like servers, storage, network, and application. Cloud computing made services are available for customers in open environment. Thus, it is important to provide... more
The present work is an attempt to build some new functions of Randomized Complete Block Design in R-software. Different computer programs are developed using Rsoftware. All these functions are run on real data set .The present work is an... more
The face-recognition system is among the most effective pattern recognition and image analysis techniques. This technique has met great attention from academic and industrial fields because of its extensive use in detecting the identity... more
Innovative tactics are employed by terrorists to conceal weapons and explosives to perpetrate violent attacks, accounting for the deaths of millions of lives every year and contributing to huge economic losses to the global society.... more
Now-a-days, the network has significant roles in transferring data and knowledge quickly and accurately from sender to receiver. However, the data is still not secure enough to transfer quite confidentially. Data protection is considered... more
In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which are Chen system, logistic map and two-dimensional (2D) Arnold cat map. First, a permutation scheme is applied to the image, and then... more
To achieve organizational and business specific goals, IT plays a very important and crucial role. IT Services Management increases the efficiency of the IT Department to provide standardized and effective services to the organization... more
Download research papers for free!