The internet today has become an unrivalled source of information where people converse on content based websites such as Quora, Reddit, StackOverflow and Twitter asking doubts and sharing knowledge with the world. A major arising problem... more
Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model and C implementation. We conclude that Java/JML combines... more
As there is rapid development in computer technology; the interaction between human and computer is become a topic of research, where we can use mobile devices for data mining applications as mobile devices are user friendly and... more
Journaling is a relatively new feature of modern file systems that is not yet exploited by most digital forensic tools. A file system journal caches data to be written to the file system to ensure that it is not lost in the event of a... more
We argue that the evident utility of scenario-based modeling can be greatly enhanced when enriched with a mathematically precise notion of conditionality and partiality, such as that found in Triggered Message Sequence Charts (TMSCs).... more
Stock market prediction is an important topic in ?nancial engineering especially since new techniques and approaches on this matter are gaining value constantly. In this project, we investigate the impact of sentiment expressed through... more
In different fields of the humanities annotations of multimodal resources are a necessary component of the research workflow. Examples include linguistics, psychology, anthropology, etc. However, creation of those annotations is a very... more
This paper introduces a modeling level-oriented approach for BIM studies according to the abstraction of generated information structures. Models for different abstraction levels are necessary to define patterns, describe rules, store... more
In the context of the 4 industrial revolution, the knowledge and management of the precise topological and geographical location of industrial equipment is a growing necessity. However, a holistic concept for topology and location... more
In recent years, we have seen dramatic progress in the field of Hand Gesture Recognition, yet these applications have some drawback. Keeping in view the trend of making application more interactive and simple, easy to use as well as cost... more
In clinical conclusion, the expectation of an illness plays a significant role in breaking down the medical pictures. An undesirable sudden cell development in any piece of the organ is known as a tumor. Tumor might be benign or... more
Public key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key... more
Pipelines are regarded as the lifelines of the national economy of most oil producing countries. This is because these pipelines which cover thousands of kilometers are used to transport large volumes of refined and unrefined petroleum... more
Evaluating AI is a challenging task, as it requires an operative definition of intelligence and the metrics to quantify it, including amongst other factors economic drivers, depending on specific domains. From the viewpoint of AI basic... more
Cardiovascular disease (CVD) is a leading cause of death and a major contributor to disability. Early detection of cardiovascular disease using ANFIS has the potential to reduce costs and simplify treatment. This study aims to develop a... more
In collaborative environments, coordination is an essential matter to the specification of activities, which are described as sets of interdependent tasks. An extensible framework encompassing coordination mechanisms to specify tasks... more
The coordination of interdependencies among activities in collaborative environments is a very important and difficult task. In this paper we present a set of coordination mechanisms for the specification and control of interaction among... more
This paper presents the development of a web application, which aims to provide a platform for white paper authors to upload and have their documents reviewed by industry experts and scholars. The web app will utilize Ethereum block chain... more
An absolute prerequisite for the management of large investigating methods to build high-level monitoring computer networks is the ability to measure their systems that are built on top of existing monitoring performance. Unless we... more
In recent days, data resources such as documents, PDFs, texts, power points, applications, softwares, graphics, images, audios, songs, animations, videos, etc. are shared in many websites for improving knowledge of the people. Website... more
In this paper, we describe EMMA (E-Mail Management Assistant), an e-mail system that addresses the process of e-mail management, from initially sorting messages into virtual folders, to prioritizing, reading, replying (automatically or... more
The description of MD2 is based on material prepared by John Linn and Ron Rivest. Their permission to incorporate that material is greatly appreciated.
A distributed system is one in which components located at networked computers communicate and coordinate their actions only by passing messages. Now days Distributed system face different type of problems. One of those problems is load... more
Pendidikan inklusif adalah suatu sistem pendidikan yang menyertakan semua anak secara bersama-sama dalam suatu proses pembelajaran dengan layanan pendidikan yang layak dan sesuai dengan kebutuhan individu siswa tanpa membedakan anak dari... more
One of the elements that have popularized and facilitated the use of geographical information on a variety of computational applications has been the use of Web maps; this has opened new research challenges on different subjects, from... more
We confirm the work reported in this research proposal has been under my supervision and guidance. It has been submitted with my approval.
SQL injection attack is one of the most serious security vulnerabilities in many Databases Managements systems. Most of these vulnerabilities are caused by lack of input validation and SQL parameters used particularity at this time of... more
Centralized systems management approaches have been recently investigated in the academia and implemented in the industry aiming to facilitate the deployment of disk images to groups of machines. The old approach of installing and... more
System" capable of using system models to ensure command safety while monitoring system performance, and develop and test a "Cognitive Firewall" and "Cognitive Supervisor." This system is tested in theory and practice for three threat... more
This paper presents an application titled "Rapid Response Fall Detection System" RRFD. This application aims to detect when a cyclist has suffer an accident, and alerts the emergency contacts about the accident. “RRFD” uses the... more
This paper describes the main components of MiPad (Multimodal Interactive PAD) and especially its distributed speech processing aspects. MiPad is a wireless mobile PDA prototype that enables users to accomplish many common tasks using a... more
The image is encrypted and decrypted using modular operations such as addition and multiplication. The operations like rotation and ex-or implemented to increase the complexity of the encryption algorithms. All these implemented and... more
The future of India will be formed in the lecture hall. Whereas India has made great steps in refining the education system but much still remains to be complete. If you see the current situation then you will find that there is a torrent... more
With the improvement in IT industry, more and more application of computer software is introduced in teaching and learning. In this paper, we discuss the development process of such software. Diabetic Retinopathy is a common complication... more
An analysis of some long text if authors are unknown or if it was written by one author is still an interesting problem and it could be done using methods of data analysis and data mining, and using structural analysis. In the paper, it... more
In the paper, there are analyzed and compared results of usable methods for discrepancies detection based on character n-gram profiles (the set of character n-gram normalized frequencies of a text) for English and Arabic documents.... more
Texts (books, novels, papers, short messages) are sequences of sentences, words or symbols. Each author has an unique writing style. It can be characterized by some collection of attributes obtained from texts. The text verification is... more
A new virtual memory management algorithm WSCLOCK has been synthesized from the local working set (WS) algorithm, the global CLOCK algorithm, and a new load control mechanism for auxiliary memory access. The new algorithm combines the... more
The history of computing is expressed through AutoCAD as an accretion of ideas and inventions, each of which was a breakthrough in its time. Learning to use AutoCAD, or any CAD system, is augmented by an understanding of the historical... more
This study investigates the conversational strategies employed in cyber blackmail cases from a forensic linguistics perspective. By analyzing authentic data from criminal investigations, the research identifies patterns in the language... more
Developing a Framework for Linking Design Intelligence from Multiple Professions in the AEC Industry
The research presented in this paper addresses the issue of bridging conceptual differences between the theories and practice of various disciplines in the AEC industry. The authors propose an application logic that works as a framework... more
Diabetic Retinopathy (DR) is a related malady with diabetes and primary driver of sightlessness in diabetic patients. Epidemiological overview categorizes DR among four significant reasons for sight impedance. DR is a microvascular... more
In order to solve issues with trust-based influencer marketing campaigns on Online Social Networks (OSNs), this article presents the INFLUTRUST architecture. By using a Fusion Learning Method, the framework gives the influencers the... more
A novel approach that seamlessly integrates human action recognition and object detection in hybrid deep learning architectures for the enhancement of accuracy in shoplifting prevention and detection remains largely unexplored to date.... more
Diabetes is a chronic condition that could lead to a global health care disaster. 382 million people worldwide have diabetes, according to the International Diabetes Federation. This will double to 592 million by 2035. Diabetes is a... more
CampusERP is an implementation of an ERP System, which will be used primarily in educational institutes such as Engineering Colleges. There will be both Web and Flutter Application for Centralized Management of Educational Institutes.... more