Computer Science Research Papers/Topics

HYBRIDIZED CONVOLUTIONAL LONG SHORT-TERM MEMORY AND SUPPORT VECTOR MACHINES MODEL FOR VIOLENCE DETECTION IN SURVEILLANCE FOOTAGE

There has been widespread use of Closed-circuit Television (CCTV) surveillance cameras in both public and private settings to increase security. The bitrate for an FHD (Full High Definition) camera operating at thirty frames per second (30 fps) with moderate compression is eight megabits per second (Mbps). Based on the assumption of this bitrate and a twenty-four-hour recording period, the approximate daily data output of a single FHD camera would then amount to approximately eighty-six Gigab...

Conceptual Framework for Multi-Factor Authentication for Mobile Money Systems in Lesotho

Abstract: The widespread use of mobile phones has contributed significantly to the emergence of Mobile Money Transfer Services (MMTS) in Lesotho. This invention made a great contribution to the financial sector as it bridged the gap between those who qualify for a bank account and those who have to rely on other financial services except for bank, for their financial needs. The main objective of this research study is to enhance the security of MMTS in Lesotho, and solve its security vulnera...

Ethical Hacking and Network Security to Prevent Network Cyber Attacks

Abstract: Over the past thirty years, “Network Cyber Attacks” has been an increasing problem in the cyber world affecting organizations and individuals – everyone in one way or the other has been exploited. Ethical hacking and network security can be used to prevent network cyber-attacks in organizations irrespective of their size. Research has proven that cyber-attacks comes as a result of network attacks that are done unauthorized without the system administrators or users of th...

Study on Employee Information Security: Human Issue: Gaborone University College of Law and Professional Studies (GUC)

Abstract: The purpose of the study was to establish the level Information Security among End User in order to address the Human issue and its impacts on Information Security (IS) in organizations. Human errors likely to result into excessive security breaches than technical vulnerabilities (Hinson, 2003). Notable human errors include, deleting wrong file by mistake, entering wrong value, pull out the wrong plug by mistake and configuration mistakes can leave the network ports open, firew...

Credit Scoring Using Data Mining Classification Application on Sudanese Banks

Abstract  The main aim of this thesis is to develop suitable and high performance Credit Scoring Models (CSMs) to assess credit risk of personal loans for the Sudanese commercial banks using data mining techniques. Two Sudanese credit datasets were constructed. These datasets were provided by Agricultural Bank of Sudan and Al Salam Commercial Bank. In addition to these two datasets, a German credit dataset was also employed in this research as a benchmarking dataset. Three data mining classi...

Mobile Recruitment System in the Nigerian Civil Service Commission (A Case Study of Ogun State Civil Service Commission)

ABSTRACT  Traditional recruitment procedures are replaced so as to overcome most of its attendant challenges such as time-consuming and tiresome nature of recruiting a larger number of applicants into Civil Service from different parts of Nigeria considering multifaceted nature of the nation. This research obliterate favouritism, nepotism and other corrupt means that were the usual practice in short listing prospective candidate for job, electronic recruitment system are enhanced with the av...

Design of an Accident-Avoidance System

Overview In the urban life transportation is very common. A lot of mishappenings occur on the road every day .Therefore the need of security and monitoring is developed .To resolve such problems, a system is developed using GPS and GSM technologies and an application is introduced in the research work. The ability to accurately detect a vehicle location and its status is the main goal of automobile trajectory monitoring systems.& also The high demand of automobiles has also increased the tra...

Developing An Access Control System for Students’ Identification in Higher Institutions of Learning Using Biometric Technique

ABSTRACT Biometric technology is a technique that is capable of uniquely identifying a person through his/her characteristics features. The use of this approach is gaining ground in recent times, particularly in higher institution of learning where impersonation is currently at alarming rate. The technology offers a reliable solution for solving recognition problem through features such as: fingerprint, faces, iris, palm print etc. The main objective of this study is to implement a system tha...

Global System for Mobile Communication (Gsm) Subscription Fraud Detection System Using Artificial Neural Network Technique

ABSTRACT This project is concerned with GSM subscription fraud detection system using artificial neural network technique. Fraud is a multi-billion problem around the globe with huge loss of revenue. Fraud can affect the credibility and performance of telecommunication companies. The most difficult problem that faces the industry is the fact that fraud is dynamic, which means that whenever fraudsters feel that they will be detected, they device other ways to circumvent security measures. In s...

Framework of a Clinical Decision Support System for Diagnosis of Type 1 Diabetes

ABSTRACT Diabetes is one of the most prevalent chronic mellitus which occurs when blood glucose (sugar) increases more than normal. Diabetes management has been playing an important role on preventing or delaying occurrence of the life threatening diabetes complications. By providing a roaming operation environment, internet healthcare technologies can bring efficiencies and convenience to both diabetics and relative medics on diabetes management. The remote monitoring of patients is consider...

Project Report for Design of a Website for Abacus Tours Uganda

ABSTRACT The speed at which tourism industry growing in Uganda, East Africa and Africa as a whole has created need to extensively advertise to the rest of the world through internet based advertising. This project therefore was to develop a web solution for Abacus tours Uganda. Our study has established that unlike all other forms of advertising (Electronic and print media and word of mouth), the internet based advertising commands a wider coverage is more appealing to the user and is less ex...

Software Bugs: Detection, Analysis and Fixing

ABSTRACT This research work is concerned with the detection, analysis and fixing of software bugs. The objective of this work was to identify software development process with a focus of identifying cost effective methods of developing and managing software systems by introducing a post-deployment debugging approach which helps track software’s stability and at same time serve as a software bug-data repository. To achieve this objective, a web-based application –BugTracker was developed t...

Development of an Improved Web-Based System for Human Resource Management Unit of Somali University

ABSTRACT Human Resource (HR) unit is a vital department in any institution of higher learning. The unit manages the staff welfare, recruits new staff and keep track of their records until retirement. The unit is also responsible for adequate dissemination of information through official memo and online communication to the entire stake holders of the institutions and beyond. The main objective of this study was to introduce a substantial improvement to the existing website that was been used ...

Tailoring Software Process Improvement Models for Software Enterprises in Sudan

ABSTRACT The majority of software development organizations all over the world are small enterprises. Successful implementation of SPI methodologies in small software enterprises (SEs) is generally not possible because such organizations are not capable of investing the cost of implementing these programs and limited resources. Software Process Improvement (SPI) activities have been reported to result in remarkable improvements in the quality of software, reduced time to market and increased ...

Fuzzy Cognitive Map-Based Conflict Control Model

ABSTRACT The research work is concerned with Fuzzy Cognitive Maps-based Conflict control Model. The objective of the work was to develop Conflict control model using Fuzzy Cognitive Map (FCM) and Non-liner Hebbian Learning (NHL) that will allows the users (or policy makers) to optimize the environmental factors which are major causative factors of the Tiv-Fulani in other to achieve peace. To achieve the objective, basic factors understood to be influential in Tiv-Fulani conflict were used to ...


1 - 15 Of 254 Results