Abstract: This research presents a new approach in modeling and implementing a framework for linear image change detection using Field Programmable Gate Arrays (FPGA) based implementations. Detecting changes between digital images of the same location or region of interest have attracted huge interest in research due to its wide range of applications such as medical diagnosis, astronomy and forensics. In recent years, the steady increase in the use of hardware implementation in image pr...
Abstract: This thesis addresses the problem of biometrics security and accuracy through the fusion of fingerprint and face images. The Biometrics community in recent years came up with different approaches to improve the accuracy and security of systems. Multimodal authentication has attracted a lot of attention because of its advantage over single biometrics matchers. Even though efforts were made to improve these systems, they are, however, still vulnerable to security threats such as spoo...
Abstract: Unmanned Aerial Vehicle (UAV) swarms are not common due to lack of readily available coordinated protocols and applications for synchronizing UAV swarms in outdoor environments. To solve the problem, this study design, implement, and evaluate a leaderfollower Unmanned Aerial Vehicle Swarm Synchronization Protocol (UAVSSP). Unlike other studies that deal with UAV swarm synchronization, this study introduces the concept of pair correlation and back propagation communication scheme am...
Abstract: The use of electronic voting systems (EVS’s) is seen as an alternative to traditional manual voting because it aims at increasing efficiency, lowering cost of running election, reducing counting mistakes and improving the accuracy of the results. This has led to electronic voting systems being adopted in most countries to replace traditional paper-based voting systems. Currently, Botswana uses a traditional paper-based voting system. This method of voting comes with several chall...
Abstract: The use of cattle disease diagnosis expert systems has the ability to improve the cattle production as they would help in disease control. Particularly if the system is usable, that is, if it is efficient, effective, satisfying and requires less effort to use. Cattle disease diagnosis expert systems have been adopted in recent years in the cattle production industry particularly in Asian countries like China. However, the usability of these systems still remains a challenge. There...
Abstract: Over the past years the use of unmanned aerial vehicle (UAVs) swarms has increased drastically. Multiple cooperative unmanned aerial vehicles have introduced numerous possibilities of performing several tasks, saving time, money and impediments. However, even though they are making life easier unequal responsibility propagation amongst unmanned aerial vehicles in a swarm is the biggest detriment that has resulted in inconsistent battery consumption. Missions have failed as a re...
Abstract: Object recognition using Unmanned Aerial Vehicles (UAVs) is increasingly becoming more useful. Tremendous success has been achieved on UAV object recognition in clear weather conditions where adequate illumination makes it easier for UAVs to recognize objects in the scene. Unfortunately, for outdoor applications, there is no escape from bad weather moments such as haze, fog, dust, smoke and smog. These weather nuisances occur due to suspended particles in the atmosphere, ultimately...
Abstract: The intention in Wireless Sensor Networks (WSNs) is to group sensed raw facts from geographical area under monitoring. Yet, sensor nodes sometimes report tempered (falsified) information resulting from malicious nodes. Hence, various studies recommend pre-identification of malicious node as essential for reliable and healthy networks. Different techniques have been proposed to deal with bogus sensor nodes in WSNs, ranging from authentication to trust based approaches. In this ...
Abstract: Data is growing every day. This daily growing data is called Big Data. The capturing and accessing and preserving of these data is different and difficult. If capturing and preserving of data became very difficult, then classifying data according to the need is also a difficult process. These modern days datasets are high dimensional that is with hundreds of features and keeps on increasing in future. But these hundreds of data are not required for an effective data classification....
Abstract: Educational data mining has become an efective tool for exploring the hidden relationships in educational data and predicting students’ academic performance. The prediction of student academic performance has drawn considerable attention in education. However, although the learning outcomes are believed to improve learning and teaching, prognosticating the attainment of student outcomes remains underexplored. To achieve qualitative education standard, several attempts have been m...
Abstract: Vehicle-to-Vehicle (V2V) transmission is utilized for most security-related programs targeting Vehicular Ad-hoc Networks (VANETs) to disseminate safety-related knowledge to nearby cars. However, the traditional broadcasting networks have broadcast winds, contributing to intolerable pauses in transmission and loss of packets. This paper proposes an important transmission scheme for distributing protection signals throughout the sensitive region called the Enhanced Probabilistic-b...
Abstract: Lemmatization is an important task which is concerned with making computers understand the relationship that exists amongst words written in natural language. It is a prior condition needed for the development of natural language processing (NLP) systems such as machine translation and information retrieval. In particular, Lemmatization is intended to reduce the variability in word forms by collapsing related words to a standard lemma. There is a limited research on lemmatization o...
Abstract: Edge Computing (EC) allows processing to take place near the user, hence ensuring scalability and low latency. Network Function Virtualization (NFV) provides the significant convenience of network layout and reduces the service operation cost in EC and data center. Nowadays, the interests of the NFV layout focus on one-to-one communication, which is costly when applied to multicast or group services directly. Furthermore, many artificial intelligence applications and services of cl...
Abstract: We describe a way to transfer efficiently Sudoku grids through the Internet. This is done by using linearization together with compression and decompression that use the information structure present in all sudoku grids. The compression and the corresponding decompression are based on the fact that in each Sudoku grid there are information dependencies and so some of the information is redundant.
Abstract: Software-Defined Networking (SDN) is the next generation network architecture with exciting application prospects. The control function in SDN is decoupled from the data forwarding plane, hence it provides a new centralized architecture with flexible network resource management. Although SDN is attracting much attention from both industry and research, its advantage over the traditional networks has not been fully utilized. Multicast is designed to deliver content to multiple desti...