Research Papers/Topics in Computer Science

Blockchain Technology into Online Voting Systems

In an era marked by technological advancements and a growing demand for secure and transparent electoral processes, the integration of blockchain technology into online voting systems has emerged as a promising solution. This research paper presents a comprehensive exploration of the design, implementation, and implications of an online voting system built upon blockchain technology. Through an in-depth analysis of existing electronic voting challenges and the potential of blockchain, this pa...

Development and Operations (DevOps)

ABSTRACT DevOps is the collection of cultural practices, philosophies, mechanisms, and technology that assists in increasing the ability of an organization to distribute services and applications at a faster pace. Unlike the traditional software development and infrastructure management processes (also known as the Waterfall Model), DevOps is inspired from the Agile Project Management, meaning that the entire project is broken down into several phases, aiming for continuous improvement at eve...

Virtual Experiments in Metaverse

In this research paper we are introducing how virtual experiments work in metaverse one of the topic is as above : Smart Factory Using Virtual Reality and Online Multi-User: Towards a Metaverse for Experimental Frameworks                                                                                   Virtual reality (VR) has been brought closer to the general public over the past decade as it has become increasingly available for desktop and mobile p...

Adaptive E-learning System

Adaptive learning for individual learners has recently become popular in education. This study examines Adaptive E-learning system. Meanwhile, the purpose of this study is to examine if Adaptive E-learning system caters for the needs of students to personalize learning contents or materials tailored to the individual student. To achieve this, the descriptive research method was used. This study used an Adaptive E-learning System that is Google Classroom platform for learning Microsoft Excel. ...

Implementing Sorting in Database Systems

Most commercial database systems do (or should) exploit many sorting techniques that are publicly known, but not readily available in the research literature. These techniques improve both sort performance on mod- ern computer systems and the ability to adapt gracefully to resource fluctuations in multiuser operations. This survey collects many of these techniques for easy reference by students, researchers, and product de- velopers. It covers in-memory sorting, disk-based external sorting, a...

VP21CSEN0100014_VP21CSEN0100016

This model will change the entire offline examination system as we developing a fully automated system using NLP.

AI Powered Anti-Cyber Bullying System using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine

Abstract “Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed ...

Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm: Data Mining in a Secure Cloud Computing Environment through Restful API

Abstract Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorith...

Digital India with its Nine Pillars, Challenges & Changes

ABSTRACT    Digital Technologies which include Cloud Computing and Mobile Applications have emerged as catalystsforrapideconomicgrowthandcitizenempowermentacrosstheglobe.Digitaltechnologies are being increasingly used by us in everyday lives from retail stores to government offices.Theyhelpustoconnectwitheachotherandalsotoshareinformationonissuesandconcerns faced by us. In some cases they also enable resolution of those issues in near real time. Digital Locker is one of the ambitious aspect...

Social Network Fake Account Identification

Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact and occasionally undesirable repercussions for daily life. The prominent social networking sites have turned into a target platform for the spammers to disperse a huge amount of irrelevant and deleterious information. Twitter, for example, has become one of the most extravagantly used platforms of all times and therefore allo...

Apply Learning Models to recognize the case of Tuberculosis Using X-Ray Images

Tuberculosis is a type of chronic diseases, thus needs long term treatment. Each year, over 2 lakh people in India are affected by TB and on average around 20,000 people are infected every month in each state. According to WHO, primary statistics collated from 84 countries, approximately less than 1.4 million persons received tuberculosis (TB) treatment in 2020 than in 2019, (i.e. 21% decline from 2019). An early detection can significantly shorten the treatment period. In this study, we’ve...

Face Detection By Open CV

Machine learning has been gaining momentum over last decades: self-driving cars, efficient web search, speech and image recognition. The successful results gradually propagate into our daily live. Machine learning is a class of artificial intelligence methods, which allows the computer to operate in a self-learning mode, without being explicitly programmed. It is a very interesting and complex topic, which could drive the future of technology. Face detection is an important step in face recog...

IMU: A Content Replacement Policy for CCN, Based on Immature Content Selection

In‐network caching is the essential part of Content‐Centric Networking (CCN). The main aim of a CCN caching module is data distribution within the network. Each CCN node can cache content according to its placement policy. Therefore, it is fully equipped to meet the requirements of future networks demands. The placement strategy decides to cache the content at the optimized location and minimize content redundancy within the network. When cache capacity is full, the content eviction polic...

Viola-Jones Based Face Detection Algorithm

Detecting faces in images is the first step of any face application such as face recognition, face localization and face expression. The performance of face detection systems directly effect on correct operating of mentioned applications. Because faces are non-rigid and have high variation in scale, color, pose and lighting condition, designing an automatic system to overcome all mentioned problems is difficult. Machine learning has been shown that is one of the most successful tools to build...

A Robust Prediction Model for Candidates Admission

Selection of prospective candidates to a higher institution of learning based on candidate’s choice of course of study is now becoming a herculean task, particularly when the carrying-capacity of two hundred and fifty–six higher institutions in Nigeria cannot admit over one million eligible candidates seeking admission yearly. Several works have been done in the past using Nave Bayes algorithm, Decision trees, K-Means algorithm, Random Forest and other Machine learning algorithms to predi...


1 - 15 Of 58 Results