Computer Science Research Papers/Topics

Biometric-Based Examination Monitoring System Using Facial Recognition: Case Study of Yaba College of Technology

ABSTRACT: Examination malpractice and student impersonation is a rising concern in tertiary institutions of learning in Nigeria. Majority of the students nowadays involve in the examination malpractices. Examination monitoring is one of the major approach to ensure quality assurance of school products (graduates). A qualitative examination monitoring will have zero tolerance to examination malpractices. The current method of monitoring of examination in the various school which are manual is...

Investigating the cybersecurity threat landscape for Botswana

Abstract: Movement restrictions introduced by the coronavirus pandemic have incentivized the rollout of online services globally. Additionally, more employees were telecommuting throughout the pandemic and remote work has become the new normal. This has provided nefarious actors with lucrative opportunities. Hence there has been an increase in online criminal and terrorism activities. The weaponization of the cyberspace is also a concerning trend in the ongoing geopolitical tensions. This is...

EEG human biometric authentication using eye blink artefacts

Abstract: This study proposes a new electroencephalography (EEG) biometric authentication for humans based on eye blinking signals extracted from brainwaves. The brainwave signal has been investigated for person authentication over the years because of its difficulties in spoofing. Due to advancing low-cost EEG hardware equipment, it has recently been significantly explored. Most studies in brainwave authentication focus on the use of imagination and mental task to authenticate a subjec...

Extending the technology acceptance model to predict mobile learning adoption among tertiary education students in Botswana

Abstract: A new paradigm shift from eLearning to mLearning will inevitably change the learning process. There is an immense proliferation of mobile technologies however in education these technologies are not fully utilised. Thus the key question that arises is that what are the factors which influence students to adopt mobile technologies in education? The purpose of the study is to extend and apply Technology Acceptance Model (TAM) as the theoretical framework to explain the determinants o...

Enhanced deep learning with featured transfer learning in Identifying disguised faces

Abstract: The objective of face recognition is, given an image of a human face identify the class to which the face belongs to. Face classification is one of the useful task and can be used as a base for many real-time applications like authentication, tracking, fraud detection etc. Given a photo of a person, we humans can easily identify who the person is without any effort. But manual systems are biased and involves lot of effort and expensive. Automatic face recognition has been an import...

A secured data management scheme for smart societies in industrial internet of things environment

Abstract: Smart societies have an increasing demand for quality-oriented services and infrastructure in an industrial Internet of Things (IIoT) paradigm. Smart urbanization faces numerous challenges. Among them, secured energy demand-side management (DSM) is of particular concern. The IIoT renders the industrial systems to malware, cyberattacks, and other security risks. The IIoT with the amalgamation of big data analytics can provide ef cient solutions to such challenges. This paper propose...

A formal analytical modeling and simulation of wireless sensor home network

Abstract: Technological advances for low-cost Wi-Fi applications such as ‘the wireless sensor network (WSN) deployment’ are at an advanced stage of acceptance, especially in smart home environments. The application of this kind of network is referred to as a wireless sensor home network (WSHN). In literature, the evaluation of customers' home wireless network performance level is usually done via real-time experiment or by experience to test the network’s performance, leading to networ...

Blockchain-based distributive auction for relay-assisted secure communications

Abstract: Physical layer security (PLS) is considered as a promising technique to prevent information eavesdropping in wireless systems. In this context, cooperative relaying has emerged as a robust solution for achieving PLS due to multipath diversity and relatively lower transmission power. However, relays or the relay operators in the practical environment are unwilling for service provisioning unless they are incentivized for their cost of services. Thus, it is required to jointly consid...

Data compression algorithms for wireless sensor networks: a review and comparison

Abstract: Energy consumption has risen to be a bottleneck in wireless sensor networks. This is caused by the challenges faced by these networks due to their tiny sensor nodes that have limited memory storage, small battery capacity, limited processing capability, and bandwidth. Data compression has been used to reduce energy consumption and improve network lifetime, as it reduces data size before it can be forwarded from the sensing node to the sink node in the network. In this paper, a surv...

A multi sensor approach to Botswana sign language dataset with view of addressing occlusion

Abstract: Automatic Sign Language Recognition (ASLR) helps with converting hand gestures to spoken language, therefore, enabling communication between those able to hear and those unable to hear. There is abundant research work on ASLR of British Sign Language and American Sign Language. However, Botswana Sign Language has received less attention at least in terms of computational representation leading to automatic sign language recognition which can be attributed to lack of a Botswana ...

A kmer-based parallel algorithm for pattern searching in DNA sequences on shared-memory model

Abstract: The explosive growth of biological sequences over the last decade has consequently led to a lot of research on effective techniques for storing and analysing this big data. Generating Deoxyribonucleic Acid (DNA) sequences has become more reliable, faster, easier and cheaper due to latest sequencing technology leading to big data sequences. This poses a challenge to efficient analysis to such massive sequences. Advanced indexing algorithmic techniques are required to facilitate effi...

FPGA-based image change detection framework

Abstract: This research presents a new approach in modeling and implementing a framework for linear image change detection using Field Programmable Gate Arrays (FPGA) based implementations. Detecting changes between digital images of the same location or region of interest have attracted huge interest in research due to its wide range of applications such as medical diagnosis, astronomy and forensics. In recent years, the steady increase in the use of hardware implementation in image pr...

A framework for improving accuracy of multimodal biometrics security based on bayesian network

Abstract: This thesis addresses the problem of biometrics security and accuracy through the fusion of fingerprint and face images. The Biometrics community in recent years came up with different approaches to improve the accuracy and security of systems. Multimodal authentication has attracted a lot of attention because of its advantage over single biometrics matchers. Even though efforts were made to improve these systems, they are, however, still vulnerable to security threats such as spoo...

Unmanned aerial vehicle swarm synchronization protocol

Abstract: Unmanned Aerial Vehicle (UAV) swarms are not common due to lack of readily available coordinated protocols and applications for synchronizing UAV swarms in outdoor environments. To solve the problem, this study design, implement, and evaluate a leaderfollower Unmanned Aerial Vehicle Swarm Synchronization Protocol (UAVSSP). Unlike other studies that deal with UAV swarm synchronization, this study introduces the concept of pair correlation and back propagation communication scheme am...

A conceptual model for designing and implementation Ofsecure and trustableremote electronic voting systems within the developing world

Abstract: The use of electronic voting systems (EVS’s) is seen as an alternative to traditional manual voting because it aims at increasing efficiency, lowering cost of running election, reducing counting mistakes and improving the accuracy of the results. This has led to electronic voting systems being adopted in most countries to replace traditional paper-based voting systems. Currently, Botswana uses a traditional paper-based voting system. This method of voting comes with several chall...


1 - 15 Of 87 Results