ABSTRACT Nowadays, water distribution network automation is becoming more and more popular day by day due to its numerous advantages, an internet-based water distribution network system focuses on monitoring and controlling water distribution network instance. Water distribution network face wastage of water due to improper water supply management, non-monitoring in real time, this caused scarcity of water, scarcity of water consider mainly problem in cities. water distribution network auto...
ABSTRACT This research work studies the temperature effects in W-shaped core refractive index optical fiber. The work designs an optimized W-tailored optical fiber (OWTOF) that checks the effect of rising temperatures in W-tailored optical fiber (WTOF) for better communication. Initially, an introduction to the general concept of optical fibers including tailored optical fibers (TOF), temperature effects and models is presented as a background. This is followed by studies on existing litera...
ABSTRACT Noise Reduction in digital image is one of the most important and difficult techniques in image research. The aim of Noise Reduction in digital image is to improve the visual appearance of an image, or to provide a better transform representation for another automated image processing. Many images like medical images, satellite images, aerial images and even real-life photographs suffer from viewing, removing blurring and noise, increasing contrast, etc. Reducing noise from the dig...
ABSTRACT Adequately learning and classifying datasets that are highly unbalanced has become one of the most challenging tasks in Data Mining and Machine Learning disciplines. Most datasets are adversely affected by the class imbalance problem due to the limited occurrence of positive examples. This phenomenon adversely affects the ability of classification algorithms to adequately learn from these data to correctly classify positive examples in new datasets. Data sampling techniques presente...
Managing passwords is a significant problem for most people in the modern world. Passwords are a critical part of information and network security. Passwords serve as primary authentication method to protect user accounts but a poorly chosen password, if compromised, could put the entire network at risk. Many users do not understand why good passwords and password management are important for information systems. “We’re secure! We use passwords!” How many of us have heard this claim? Or...
ABSTRACT The rapid increase in computer, mobile applications and wireless networks has globally changed the features of network security. A series of Internet attack and fraudulent acts on companies and individual network have shown us that open computer networks have no immunity from intrusions. The traditional way of protecting computer networks, such as firewalls and software encryption are insufficient and ineffective. The wireless ad-hoc network is susceptible to physical attack ...
ABSTRACT Biomass energy in the form of woodfuel and charcoal contributes close to 68% of the total energy demand in Kenya. The continued depletion of biomass resources has led to the use of agricultural residue to supplement energy needs for domestic cooking. Biomass stoves used to burn these fuels in Kenya are characterized by high inefficiencies and high emissions that pose environmental and health risks to the users. This research aimed to reduce biomass fuels consumption, reduce fuel indo...
ABSTRACT In this work, an expert system for energy management in community based microgrid was developed. This was necessitated in a bid to address the inadequate power supply predominant in sub-Saharan African countries, while also addressing the problem of energy wastage that comes from individuals supplying their own energy demands. To achieve this, an architecture for a microgrid network was developed by adopting existing standards in the geographical region of interest. An energy manage...
ABSTRACT In this research, Social Network Web Application (SNWA) was developed and tailored for a specific use; community development in the Niger Delta region of Nigeria. In the SNWA development, preliminary context analysis was conducted to capture contextual information on community development challenges in the Niger Delta and the readiness of the target local community to adopt web-based solution to the identified challenges. Subsequently, User-Centered Requirement Engineering, User-Cen...
ABSTRACT Communication Protocols are the key tools for data transmission; most of them were defined for asynchronous data transport. Underpinning the Internet is the Internet Protocol (IP), which, has offered an ideal pathway for general Information Technology convergence with its capability of carrying large variety of signals (audio, control, voice, video, data, etc.). This thesis is on “the Design and Simulation of Audio Over IP (AoIP) frequency modulated broadcast studio system”. Usi...
Abstract Safety is crucial in oil and gas industries, it is normal practice to collect incident reports daily. The volume of such reports is always very huge, as a result, the interpretation poses a great challenge. Consequently, there is an urgent need for techniques that can intelligently assist in transforming such vast amount of data into useful information and knowledge. Data mining is part of the knowledge discovery process that offers ways of extracting non-trivial, previously unknown...
ABSTRACT Transmission Control Protocol (TCP) is the dominant transport protocol in the Internet and supports many of the most popular Internet applications, such as the World Wide Web (WWW), file transfer and e-mail. The recently developed advanced wireless networks, such as GPRS, are known to cause delay spikes in packet transfer which causes unnecessary TCP retransmission timeouts. In order to find solutions to this effect, packet losses across wireless links should be distinguished from c...
ABSTRACT A tool for the simulation of stream processing tasks on two dimensional processor arrays is developed in this work. The tool, a Many-core Energy and Latency Estimator (MELE) has provided abstractions from the many design constraints facing application developers on Many-core platforms. A set of models have been designed to improve the programmer’s ability to iteratively map data flow applications to the target machine. Included in the model set are; an application model, which pre...
ABSTRACT Recommendation systems play a vital role in boosting the organization’s profit, especially for ecommerce platforms such as Amazon. These systems focus on targeting specific products to users and predicting user preferences and interests. However, recommendation systems are plagued with many challenges, such as adapting them to changes in user preferences and taste, and the effectiveness of recommendations made also determines the ability to retain and engage new users, as new user...
ABSTRACT Class imbalance problem is prevalent in many real-world domains and as such has become an area of increasing interest for many researchers. In binary classification problems, imbalance learning refers to learning from a dataset with a high degree of skewness to the negative class. This phenomenon causes traditional classification algorithms to perform woefully when predicting positive classes with new examples. Data resampling is among the most commonly used techniques used to deal ...