Computer Science Research Papers/Topics

FPGA-based image change detection framework

Abstract: This research presents a new approach in modeling and implementing a framework for linear image change detection using Field Programmable Gate Arrays (FPGA) based implementations. Detecting changes between digital images of the same location or region of interest have attracted huge interest in research due to its wide range of applications such as medical diagnosis, astronomy and forensics. In recent years, the steady increase in the use of hardware implementation in image pr...

A framework for improving accuracy of multimodal biometrics security based on bayesian network

Abstract: This thesis addresses the problem of biometrics security and accuracy through the fusion of fingerprint and face images. The Biometrics community in recent years came up with different approaches to improve the accuracy and security of systems. Multimodal authentication has attracted a lot of attention because of its advantage over single biometrics matchers. Even though efforts were made to improve these systems, they are, however, still vulnerable to security threats such as spoo...

Unmanned aerial vehicle swarm synchronization protocol

Abstract: Unmanned Aerial Vehicle (UAV) swarms are not common due to lack of readily available coordinated protocols and applications for synchronizing UAV swarms in outdoor environments. To solve the problem, this study design, implement, and evaluate a leaderfollower Unmanned Aerial Vehicle Swarm Synchronization Protocol (UAVSSP). Unlike other studies that deal with UAV swarm synchronization, this study introduces the concept of pair correlation and back propagation communication scheme am...

A conceptual model for designing and implementation Ofsecure and trustableremote electronic voting systems within the developing world

Abstract: The use of electronic voting systems (EVS’s) is seen as an alternative to traditional manual voting because it aims at increasing efficiency, lowering cost of running election, reducing counting mistakes and improving the accuracy of the results. This has led to electronic voting systems being adopted in most countries to replace traditional paper-based voting systems. Currently, Botswana uses a traditional paper-based voting system. This method of voting comes with several chall...

Comparative analysis of usability between text and virtual reality based expert systems for cattle diseases diagnosis

Abstract: The use of cattle disease diagnosis expert systems has the ability to improve the cattle production as they would help in disease control. Particularly if the system is usable, that is, if it is efficient, effective, satisfying and requires less effort to use. Cattle disease diagnosis expert systems have been adopted in recent years in the cattle production industry particularly in Asian countries like China. However, the usability of these systems still remains a challenge. There...

Geese inspired unmanned aerial vehicle swarm energy aware and harmonisation scheme

Abstract: Over the past years the use of unmanned aerial vehicle (UAVs) swarms has increased drastically. Multiple cooperative unmanned aerial vehicles have introduced numerous possibilities of performing several tasks, saving time, money and impediments. However, even though they are making life easier unequal responsibility propagation amongst unmanned aerial vehicles in a swarm is the biggest detriment that has resulted in inconsistent battery consumption. Missions have failed as a re...

Unmanned aerial vehicle object recognition in bad weather using dark channel prior and convolutional neural networks

Abstract: Object recognition using Unmanned Aerial Vehicles (UAVs) is increasingly becoming more useful. Tremendous success has been achieved on UAV object recognition in clear weather conditions where adequate illumination makes it easier for UAVs to recognize objects in the scene. Unfortunately, for outdoor applications, there is no escape from bad weather moments such as haze, fog, dust, smoke and smog. These weather nuisances occur due to suspended particles in the atmosphere, ultimately...

BA-LEACHC: biphase authentication based LEACH-C protocol for wireless sensor networks

Abstract: The intention in Wireless Sensor Networks (WSNs) is to group sensed raw facts from geographical area under monitoring. Yet, sensor nodes sometimes report tempered (falsified) information resulting from malicious nodes. Hence, various studies recommend pre-identification of malicious node as essential for reliable and healthy networks. Different techniques have been proposed to deal with bogus sensor nodes in WSNs, ranging from authentication to trust based approaches. In this ...

Feature Selection Methods: a Survey for Effective Data Classification

Abstract: Data is growing every day. This daily growing data is called Big Data. The capturing and accessing and preserving of these data is different and difficult. If capturing and preserving of data became very difficult, then classifying data according to the need is also a difficult process. These modern days datasets are high dimensional that is with hundreds of features and keeps on increasing in future. But these hundreds of data are not required for an effective data classification....

A Novel Approach for Analysis and Prediction of Students Academic Performance Using Machine Learning Algorithms

Abstract: Educational data mining has become an efective tool for exploring the hidden relationships in educational data and predicting students’ academic performance. The prediction of student academic performance has drawn considerable attention in education. However, although the learning outcomes are believed to improve learning and teaching, prognosticating the attainment of student outcomes remains underexplored. To achieve qualitative education standard, several attempts have been m...

Epvmp: Enhanced Probabilistic Based Vehicular Multi-Hop Strategies Protocol For Crisis In Vanets Broadcasting

Abstract: Vehicle-to-Vehicle (V2V) transmission is utilized for most security-related programs targeting Vehicular Ad-hoc Networks (VANETs) to disseminate safety-related knowledge to nearby cars. However, the traditional broadcasting networks have broadcast winds, contributing to intolerable pauses in transmission and loss of packets. This paper proposes an important transmission scheme for distributing protection signals throughout the sensitive region called the Enhanced Probabilistic-b...

A context-aware lemmatization model for setswana language using machine learning

Abstract: Lemmatization is an important task which is concerned with making computers understand the relationship that exists amongst words written in natural language. It is a prior condition needed for the development of natural language processing (NLP) systems such as machine translation and information retrieval. In particular, Lemmatization is intended to reduce the variability in word forms by collapsing related words to a standard lemma. There is a limited research on lemmatization o...

Multi-source reliable multicast routing with QoS constraints of NFV in edge computing

Abstract: Edge Computing (EC) allows processing to take place near the user, hence ensuring scalability and low latency. Network Function Virtualization (NFV) provides the significant convenience of network layout and reduces the service operation cost in EC and data center. Nowadays, the interests of the NFV layout focus on one-to-one communication, which is costly when applied to multicast or group services directly. Furthermore, many artificial intelligence applications and services of cl...

Algorithm for compressing/decompressing Sudoku grids

Abstract: We describe a way to transfer efficiently Sudoku grids through the Internet. This is done by using linearization together with compression and decompression that use the information structure present in all sudoku grids. The compression and the corresponding decompression are based on the fact that in each Sudoku grid there are information dependencies and so some of the information is redundant.

Delay bounded multi-source multicast in software-defined networking

Abstract: Software-Defined Networking (SDN) is the next generation network architecture with exciting application prospects. The control function in SDN is decoupled from the data forwarding plane, hence it provides a new centralized architecture with flexible network resource management. Although SDN is attracting much attention from both industry and research, its advantage over the traditional networks has not been fully utilized. Multicast is designed to deliver content to multiple desti...


16 - 30 Of 91 Results