Computer Science Research Papers/Topics

IMU: A Content Replacement Policy for CCN, Based on Immature Content Selection

In‐network caching is the essential part of Content‐Centric Networking (CCN). The main aim of a CCN caching module is data distribution within the network. Each CCN node can cache content according to its placement policy. Therefore, it is fully equipped to meet the requirements of future networks demands. The placement strategy decides to cache the content at the optimized location and minimize content redundancy within the network. When cache capacity is full, the content eviction polic...

Viola-Jones Based Face Detection Algorithm

Detecting faces in images is the first step of any face application such as face recognition, face localization and face expression. The performance of face detection systems directly effect on correct operating of mentioned applications. Because faces are non-rigid and have high variation in scale, color, pose and lighting condition, designing an automatic system to overcome all mentioned problems is difficult. Machine learning has been shown that is one of the most successful tools to build...

A Robust Prediction Model for Candidates Admission

Selection of prospective candidates to a higher institution of learning based on candidate’s choice of course of study is now becoming a herculean task, particularly when the carrying-capacity of two hundred and fifty–six higher institutions in Nigeria cannot admit over one million eligible candidates seeking admission yearly. Several works have been done in the past using Nave Bayes algorithm, Decision trees, K-Means algorithm, Random Forest and other Machine learning algorithms to predi...

An Improved Gradient Descent Method for Optimization of Supervised Machine Learning Problems

Gradient descent method is commonly used as an optimization algorithm for some machine learning problems such as regression analysis and classification problems. This method is highly applicable for real life of yearly demandprice commodity, agricultural products and Iris flowers. This study proposed the combination of Dai-Yuan (DY) and Saleh and Mustafa (SM) conjugate gradient methods for the optimization of supervised machine learning problems. Experiments were conducted on combined DY and ...

Artificial Intelligence Bionic Technology

Abstract With the ongoing advancement of technology and innovation, bionic technology is also rapidly evolving and becoming more lifelike in their form and function and indeed, changing lives across the world by removing the physical barriers to empower the disabled people. Presently, in most of the developing countries, many amputees are facing challenges to access bionic technologies due to its availability being extremely limited, yet the demand for bionic devices ...

The Application of Data Dimensional Vector Matrix in Machine learning and Data Science

Abstract: Let us suppose we are given a super‐maximal random variable ࢔ .The goal of the present article is to characterize Riemannian vector spaces. We show that ࡳ (࢜) is comparable to ࢃࣈᇲ ࢈, . Every student is aware that ࣊ .૙ > Unfortunately, we cannot assume that ‖ࡴ ≤ ‖࢞. It is well known that 1 ≠ ℵ଴ . Hence it was Bernoulli who first asked whether curves can be described. We wish to extend the results of [33] to connected hulls. In [29], it is shown t...

Optimization of Data Resources with Measurability in Complex Group Theory

Recent developments in pure logic [14] have raised the question of whether Noether’s condition is satisfied. On the other hand, it was Germain who first asked whether Monge manifolds can be constructed. The goal of the present paper is to classify trivially bijective subgroups. On the other hand, in [11], the authors studied local subgroups

On Ellipticity on geometric derivation for Computer vision and Machine Learning

It was von Neumann who first asked whether super‐totally continuous paths can be computed. Here, uniqueness is clearly a concern. The work in [29] did not consider the canonically right‐standard case. In this setting, the ability to study countably super‐separable fields is essential. It was Huygens who first asked whether locally ܿco‐bijective, geometric, partially standard primes can be extended. Hence is it possible to examine ordered matrices?

TCP/IP Protocol-Based Model For Increasing The Efficiency Of Data Transfer In Computer Networks

ABSTRACT This chapter provides solutions for increasing the efficiency of data transfer in modern computer network applications and computing network environments based on the TCP/IP protocol suite. In this work, an imitation model and simulation was used as the basic method in the research. A simulation model was developed for designing and analyzing the computer networks based on TCP/IP protocols suite which fully allows the exact features in realizing the protocols and their impact on inc...

Assessment of an Access Control System Using Principal Component Analysis and Discrete Cosine Transform

ABSTRACT In this paper, faces were employed as the only control means of right of entrance and usage of information on the super–highway. Principal Component Analysis (PCA) and Discrete Cosine Transform (DCT) algorithms were employed as our basis of comparison. An assessment of both algorithms was considered, it was discovered that PCA proved to be a better algorithm for access control and recognition system because of its very high average percentage of rightly classified faces (90.43%) a...

Sleep syndromes onset detection based on automatic sleep staging algorithm

Sleep specialists often conduct manual sleep stage scoring by visually inspecting the patient’s neurophysiological signals collected at sleep labs. This is, generally, a difficult, tedious and time-consuming task. The limitations of manual sleep stage scoring have escalated the demand for developing Automatic Sleep Stage Classification (ASSC) systems. Sleep stage classification refers to identifying the various stages of sleep and is a critical step in an effort to assist physicians in t...

An Enhanced Clustering Analysis Based On Glowworm Swarm Optimization

Abstract Data clustering has always been an important aspect of data mining. Extracting clusters from data could be very difficult especially when the features are large and the classes not clearly partitioned, hence the need for high-quality clustering techniques. The major shortcoming of various clustering techniques is that the number of clusters must be stated before the clustering starts. A recent successful work in clustering is the Clustering analysis based on Glowworm Swarm Optimizati...

Availability Of Information Resources For Research Output: Perception Of Academic Staff Members In Nigerian Federal Universities

Abstract The volume of information resources potentially available in the globe is massive; hence it becomes necessary to examine available information resources for academics research activity in the academia. This study, therefore, examined the perception of academics on availability of information resources for research productivity in federal universities in Nigeria. Descriptive survey research design was adopted. The Multistage sampling technique was used to select 1,057 academic staff ...

Diagnosis Of Gasoline-Fuelled Engine Exhaust Fume Related Faults Using Electronic Nose

ABSTRACT Fault diagnosis, isolation and restoration from failure are crucial for maintenance and reliability of equipment.

A Prototype of a Fingerprint Based Ignition Systems in Vehicles

Abstract Biometric systems have overtime served as robust security mechanisms in various domains. Fingerprints are the oldest and most widely used form of biometric identification. A critical step in exploring its advantages is to adopt it for use as a form of security in already existing systems, such as vehicles. This research work focuses on the use of fingerprints for vehicle ignition, as opposed to the conventional method of using keys. The prototype system could be divided into the foll...


46 - 60 Of 91 Results