Computer Sciences and Engineering
3,026 Followers
Most cited papers in Computer Sciences and Engineering
Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless... more
TCP/IP has become an undeniable leader in the areas of Information Technology. It is a well-established fact that data transfer between devices occur by the rules defined by the TCP/IP protocol. Each layer of TCP/IP model generally has... more
Data and computer protection is endured largely by countersigns which are the principle part of the authorization and authentication cognitive process. The most common information processing system authentication process is to apply... more
Over many centuries, tools of increasing sophistication have been developed to serve the human race Digital computers are, in many respects, just another tool. They can perform the same sort of numerical and symbolic manipulations that an... more
As technology advances, it makes life easy and straightforward by solving many of the real-life problems which are faced by people in their daily life. Various types of technologies are used to improve the life of humans. Hence, this... more
The novel human coronavirus is highly contagious and can lead to significant morbidity and mortality. This has triggered major and cascading economic and societal consequences that have contributed considerably to global impact and... more
In recent times, several studies focused on the global warming that may affect the hydrological cycle due to intensification of temporal and spatial variations in precipitation. Such climatic change is likely to impact significantly upon... more
This study investigated the capacity of a deep neural network to distinguish tea sources based on their aromas. The data set of aromas from tea sources, which contained sensor responses measured with a gas–sensing system using a mass–... more
Developing informal settlements has become an important issue for improving urban structures in developing countries. An Informal Settlements Development Fund (ISDF) was presented to Egypt for supporting urban, economic, social and... more
Information services are very important to attract tourists to come to a certain country or location which can be provided through e-Tourism application. This application is for people who will find out more about the location they will... more
The average of customer ratings on a product, which we call a reputation, is one of the key factors in online purchasing decisions. There is, however, no guarantee of the trustworthiness of a reputation since it can be manipulated rather... more
Stereo vision is a challenging problem and it is a wide research topic in computer vision. It has got a lot of attraction because it is a cost efficient way in place of using costly sensors. Stereo vision has found a great importance in... more
This paper focuses on improving student performance prediction, based on their performance characteristics. Due to various distractions, students may divert from their actual track. This might even lead to a course drop out. Predicting... more
The topic of business failure is important because it can be used as a basis for policy making by stakeholders in a company or government. The results of business failure predictions can be used as company managers to take preventive... more
Diabetes is a chronic disease with the potential to cause a worldwide health care crisis. According to International Diabetes Federation 382 million people are living with diabetes across the whole world. By 2035, this will be doubled as... more
IoT is the network which connects and communicates with billions of devices through the internet and due to the massive use of IoT devices, the shared data between the devices or over the network is not confidential because of increasing... more
Recently it is found that people are becoming more cautious to their diet throughout the universe. Unhealthy diet can cause many problems like sugar, obesity, gain in weight and many other chronic health related issues. Essential part of... more
Cloud storage is used generally to store data and realize the data sharing with others. A cloud storage system stores large number of data in its storage server. Data that are stored to the cloud have to be secured in order to avoid the... more
The production of milkfish in South Sulawesi is considerably high and the processing of milkfish surimi has been done to produce fish jelly products. Generally, surimi must be kept in freezing condition. Therefore we need technology... more
Data privacy and security are incredibly important in the healthcare industry. Federated learning is a new way of training a machine learning algorithm using distributed data which is not hosted in a centralized server. Numerous... more
Almost all technical people know about images and image encryption, but some of them are not aware of the security and performance of the encryption systems. All image encryption systems are capable of encrypting the images, but some are... more
For personal, mobiles and sensor communications wireless sensor networking is an emerging concept in recent years. Normally wireless sensor network (WSN) is combined and integrated data relations for modern communication in... more
Photographs are taken as valid evidences in various scenarios of our day to day life. Because of the developments in the field of Image Processing, altering images according to ones need is not a difficult task. Techniques of Image... more
In this paper, performance of a high gain quasi Y-source impedance network converter is analysed. This converter has a high voltage gain while using a small duty ratio. Compared to other impedance source converters, Y-source converter... more
In an era of globalization, economies over the world have become increasingly international and competitive. According to Alahuhta et al (2005), the last three decade has seen a massive revolution in technology use at both individual and... more
A Traffic signal control is a challenging problem and to minimize the travel time of vehicles by coordinating their movements at the road intersections. In recent years traffic signal control systems have on over simplified information... more
Malicious codes have become one of the major threats to computer systems. The malicious software which is also referred to as malware is designed by the attackers and can change their code as they propagate. The existing defense against... more
Machine condition checking innovation has around for a long time, designed for advancing machine execution and limiting unplanned personal time. Since the appearance of the IoT, nonetheless, there has been development around machine... more
Now a day’s Security in cloud computing is one of the broad areas for researchers. Cloud computing is a term that involve to deliver the services over the Internet. So, it requires the security upgrade in data transmission approach. One... more
In this project we are comparing different architectures and adding the features that increases the efficiency of our architecture. Few of them are including multiplexers in the message digester, using different adder architectures in the... more
Fake Prescriptions have emerged lately becoming hazardous for people’s lives; bringing their lives at stake. Drugs like Schedule-H cannot be bought without a doctor's consent and thus cases of such drugs being bought with the help of fake... more
Game theory is a mathematical model which deals with interactions between various entities by analyzing the strategies and choices. In today’s world, Game Theory is being extensively used in fields like computer science, economics,... more
In this research, we have been able to simulate some finite difference schemes to predict weather trends of Abuja Station, Nigeria. By analyzing the results from these schemes, it has shown that the best scheme in the finite difference... more
The images have to be described by certain features. The shape is an important visual feature in understanding an image, that remains stable in spite of changes in an object's illumination, color, and texture. So shape features have been... more
While capturing underwater image there are lot of imposed due to low light, light variation, poor visibility. Photography is about light, but since water has an a lot more prominent density than air — around 800 times more noteworthy not... more
We review existing machine condition monitoring techniques and industrial automation for plant-wide condition monitoring of rotating electrical machines. Cost and complexity of a condition monitoring system increase with the number of... more
In Bioinformatics field Protein Structure Classification is the hugest undertaking. The realized proteins have been requested subject to their level, feature, work, amino destructive and family and superfamily. Protein structure... more
Vehicular Ad Hoc Networks (VANETs) are gaining much attention from both industry and academia communities as an emerging technology. VANET is composed of self-regulating nodes where the vibrant node mobility changes the network topology... more
The network providers are now being challenged with their inability to accurate estimate and characterize traffic in a particular area, due to the increasing number of mobile communication services being rendered by the network providers... more
Data Mining is the process of finding certain patterns and knowledge from big data. In general, the data mining process can be grouped into two categories, namely descriptive data mining and data mining prediction. There are several Math... more
Rainfall prediction is useful for all people for decision making in all fields, such as out door gamming, farming, traveling, and factory and for other activities. We studied various methods for rainfall prediction such as machine... more
Today Indian economy depends upon agriculture. More than 70% of the people in India have taken it as a main occupation, day by day for a particular crop; the formers are not getting proper yield as well as profit due to environmental... more
Artificial Intelligence (AI) helps computers to learn from experience, adjust to new stimuli, and perform tasks of a human nature. It works by combining large amounts of data with fast, iterative processing and smart algorithms, allowing... more
The Internet of things (IoT) refers to a type of network to connect anything with the Internet based on stipulated protocols through information sensing equipment’s to conduct information exchange and communications in order to achieve... more
Earlier, Lung cancer is the primary cause of cancer deaths worldwide among both men and women, with more than 1 million deaths annually. Lung Cancer have been widest difficulty faced by humans over recent couple of decades. When a person... more
Opinions are personal judgment on entity. This is not only true for individuals but also true for organizations. Opinion mining is a type of natural language processing for tracking the mood of the public about a particular product. The... more
Data mining process extracts useful information from a large amount of data. The most interesting part of data mining is discovering the unseen patterns without unpacking sensitive knowledge. Privacy Preserving Data Mining abbreviated as... more
In the era where world runs online the storing and publishing of data online has also increased to a great extent. In this era a large amount of information is collected and published to a network which is publically available. With the... more
Globally, skin diseases are among the most common health problems in all humans irrespective of age. Prevention and early detection of these diseases can improve the chance of surviving. This model illustrates the identification of skin... more