Detecting brain tumors early is crucial for precise diagnosis and the development of effective treatment strategies, given the severity of the condition involving the uncontrolled growth of abnormal cell clusters in the brain.This research introduces an innovative Convolutional Neural Network (CNN) model augmented with an attention mechanism for the classification of brain tumor images, utilizing a comprehensive dataset of 3,000 Magnetic Resonance Imaging (MRI) scans sourced from Kaggle. Rigo...
The frequency and severity of cyber- attacks have surged, causing detrimental impacts on businesses and their operations. To counter the ever-evolving cyber threats, there's a growing need for robust risk assessment systems capable of ef ectively pinpointing and mitigating potential vulnerabilities. This paper introduces an innovative risk assessment technique rooted in both Machine Learning and graph theory, which of ers a method to evaluate and foresee companies' susceptibility to ...
As Modern-day data increases in terms of dimensions (Instances X attributes), Single Feature Selection Techniques (SFST) often have certain biases and fail to provide optimal performance in machine learning models. To overcome the challenges associated with using SFST on large datasets, an Ensemble Feature Selection Technique (EFST) is proposed that includes multi-filter-based feature ranking selection and a wrapper-based feature subset selection methods for feature extraction on the Cana...
An Introduction to Computer Science and Problem Solving
INTRODUCTION TO PROBLEM SOLVING An algorithm is a sequence of simple steps that can be followed to solve a problem. These steps must be organized in a logical, and clear manner. We design algorithms using three basic methods of control: sequence, selection, and repetition. 1.1 Sequential control. Sequential Control means that the steps of an algorithm are carried out in a sequential manner where each step is executed exactly once. Let’s look at the following problem: We need to obtain the t...
A computer is an electronic device that receives input, stores or processes the input as per user instructions and provides output in desired format. Input-Process-Output Model Computer input is called data and the output obtained after processing it, based on user’s instructions is called information.
What is Computer Science? 6 • Computer Science can be summarized with two simple words: problem solving. • Computer Science is the study of problems, problem-solving, and the solutions that come out of this problem-solving process. • Given a problem, the goal is to develop an algorithm to solve the problem. • An algorithm is a step-by-step list of instructions to solve the problem.
Course Requirements, Grading, & ASSESSMENT: Students will earn a passing grade upon successful completion of the following 1. Weekly lectures 5 points. To earn full points for this learning activity you need to attend weekly classes 2. Weekly readings and summary of the readings 5 points. Submission deadline for this learning activity is every Monday by 06:00am 3. Weekly reflective journal entry 7 points. Submission deadline for this learning activity is every Sunday by 10:000pm 4. Weekly dis...
This is a short article on a call to action for everyone, especially the youth of today, on why they need to adjust, skill, and reskill themselves so as not to be caught off guard by the wave of the obvious and unstoppable revolution that's gradually sweeping across all sectors of the twenty-first century in the name of the fourth industrial revolution (4IR).
Abstract: A whole lot of factors could affect E-commerce as regard to customers’ satisfaction. Such factors include; issues of fraud, authenticity of transaction, trust, ease of navigation through websites, options for the return of goods if customers are not satisfied, time saved, costs, conformity of goods delivered to those illustrated online, quality of the goods. In the light of these backdrops, this study investigated the effect of E-commerce on customers’ satisfaction in Nigeria. ...
Abstract: The deficiencies associated with storage, preservation and presentation of large volumes of the information in paper form made managerial processes very cumbersome. Consequently, alternative methods provided by Information and Communications Technology (ICT) became very imperative. The study investigated the impact of ICT on school administration in Nigeria secondary education. Specifically, the study sought to: (1) determine the impact of ICT on student personnel management in Nig...
The Public Sector Management in Nigeria has numerous challenges in providing effective public services, particularly in the developing economies, as these services are provided through manual working systems, with lower level of transparency and accountability. The main objective of this study is to examine the effect of e-Governance on public sector delivery in SouthEast Nigeria: focusing National Youth Service Corporations (NYSC). The specific objectives are to: (1) ascertain the effect of ...
In this article ootnote{https://debuggercafe.com/reducing-image-distortion-using-spatial-transformer-network/}, we will learn how we can reduce distortion in images using the Spatial Transformer Network (STN) using the PyTorch deep learning library. Figure 1 shows the results of applying STN to the distorted MNIST dataset. After applying STN to the distorted images, we can see that the images spatially more plausible and readable. If you are new to the topic of Spatial Transformer Networks, t...
Abstract Home automation system is a system that controls by smart device using a mobile application. It can control the home appliances such as light, fans, air conditions, and smart security locks etc. Bluetooth or wi-fi technology will be used to control the things remotely. Manypeoplewerethinkingaboutthattechnologyistakingareallyhugepartofourlives. Itdoes!we’relivinginamoderngenerationwheresmartandintelligentsystemsarenecessarytobetherewhereverwearetomakeourliveseasierandmuchbetter, ...
Abstract The advancement in technology has brought a new era in terrorism where Online Social Networks (OSNs) have become a major platform of communication with wide range of usage from message channeling to propaganda and recruitment of new followers in terrorist groups. Meanwhile, during the terrorist attacks people use OSNs for information exchange, mobilizing and uniting and raising money for the victims. This paper critically analyses the specific usage of OSNs in the times of terrorism...