Research Papers/Topics in Computer Science

An Enhanced Clustering Analysis Based On Glowworm Swarm Optimization

Abstract Data clustering has always been an important aspect of data mining. Extracting clusters from data could be very difficult especially when the features are large and the classes not clearly partitioned, hence the need for high-quality clustering techniques. The major shortcoming of various clustering techniques is that the number of clusters must be stated before the clustering starts. A recent successful work in clustering is the Clustering analysis based on Glowworm Swarm O...

Availability Of Information Resources For Research Output: Perception Of Academic Staff Members In Nigerian Federal Universities

Abstract The volume of information resources potentially available in the globe is massive; hence it becomes necessary to examine available information resources for academics research activity in the academia. This study, therefore, examined the perception of academics on availability of information resources for research productivity in federal universities in Nigeria. Descriptive survey research design was adopted. The Multistage sampling technique was used to select 1,057 academic ...

Diagnosis Of Gasoline-Fuelled Engine Exhaust Fume Related Faults Using Electronic Nose

ABSTRACTFault diagnosis, isolation and restoration from failure are crucial for maintenance and reliability of equipment.

A Prototype of a Fingerprint Based Ignition Systems in Vehicles

Abstract Biometric systems have overtime served as robust security mechanisms in various domains. Fingerprints are the oldest and most widely used form of biometric identification. A critical step in exploring its advantages is to adopt it for use as a form of security in already existing systems, such as vehicles. This research work focuses on the use of fingerprints for vehicle ignition, as opposed to the conventional method of using keys. The prototype system could be divided into t...

QUANTITATIVE EVALUATION OF PRINCIPAL COMPONENT ANALYSIS AND FISHER DISCRIMINANT ANALYSIS TECHNIQUES IN FACE IMAGES

ABSTRACTFace recognition is an attractive field in enhancing both the security and the image retrieval activities in the multimedia world.

INTELLIGENT FIRE DETECTION SYSTEM USING MOBILE WIRELESS NETWORK

ABSTRACTTo protect lives and valuables against colossal loss due to fire outbreak In any society, provision of proper safety measures is sine qua non.

DEVELOPMENT OF MOBILE INTELLIGENT POULTRY FEED DISPENSING SYSTEM

ABSTRACTFeeding poultry farming in most developed countries, like Nigeria, is still manually carried out as high level of human involvement is required.

DEVELOPMENT OF MOSFET-BASED RADIO FREQUENCY AMPLIFIER FOR IMPROVED SIGNAL RECEPTION

ABSTRACTIt is highly desirable that the information routed from a source reaches the audience or destination with little or no interference or distortion.

Assembly Language Programming Using MC68000

ABSTRACTTo communicate effectively between two people there must be some set of rules, conventions, symbols and grammars agreed upon. This set is know as language.

A Prototype of a Robust and Secured Access Control System Using Principal Component Analysis

ABSTRACTThe need for a robust and secured access control system, using a suitable algorithm is highly inevitable to forestall daily online, hackers that are responsible in defrauding people of invaluable information and transaction worth billions of dollars in the process.

Computational Methods in Historical Research

The Humanities primarily deal with the human condition and its various manifestations and dimensions. Now, the human experience is rich, diverse and complex. It involves the whole human experience from the distant pre-historic past when man used to live in the cave until the present day where he now goes to space and is technologically advanced. The arts and humanities basically analyze the human phenomenon and in the process of doing this, there is a need for the scientific methodo...

Importance of computer and information science

COMPUTER SCIENCE AND TECHNOLOGYOver the years computer has been useful to modern day technology. Computer science and technology is one of the fastest career in modern day, this have improved humans beyond immeasurable doubts.Computer science and technology have developed through mechanical and electrical engineering technology with the basis of mathematical language analysis. For example earliest computers were bassically mechanically oriented but modern day computer have become more electri...

Design of DNA Based Biometric Security System for Examination Conduct

ABSTRACT Biometrics is a technique of using characteristics and behavioral traits for identification of people this is more effective that common personal identification number(PIN) for an improved security technique. The basic procedure in a biometric system is the collection of biometric data through a sensor elements, the module extracted bares biometric data which is compared to its templates in a database to identify the data subject. In this work, the design of DNA (Deoxyribonuclei...

THE RELEVANCE OF THE COMPUTER MACHINE

Computer is a machine that is invented and developed by mimicking the functionality of the human brains. Several human abilities are utilized in writing the programs that run this excellent device. As a result the computer could be applied to solve virtually all problems of man (except spiritual problems).My question is: "Would it not be very beneficial to be educated on how to use this problem solving device?"

PERFORMANCE OF DATAMINING TECHNIQUES IN THE PREDICTION OF CHRONIC KIDNEY DISEASE

Data mining being an experimental science is very important especially in the health sector where we have large volumes of data. Since data mining is an experimental science, getting accurate predictions could be tasking. Getting maximum accuracy of each classifier is necessary, it is therefore important that the appropriate feature selection method is selected. Feature selection is highly relevant in predictive analysis and should not be overlooked. It helps reduce the execution time ...


1 - 15 Of 35 Results