Computer Science Research Papers/Topics

A Novel Approach for Analysis and Prediction of Students Academic Performance Using Machine Learning Algorithms

Abstract: Educational data mining has become an efective tool for exploring the hidden relationships in educational data and predicting students’ academic performance. The prediction of student academic performance has drawn considerable attention in education. However, although the learning outcomes are believed to improve learning and teaching, prognosticating the attainment of student outcomes remains underexplored. To achieve qualitative education standard, several attempts have been m...

Epvmp: Enhanced Probabilistic Based Vehicular Multi-Hop Strategies Protocol For Crisis In Vanets Broadcasting

Abstract: Vehicle-to-Vehicle (V2V) transmission is utilized for most security-related programs targeting Vehicular Ad-hoc Networks (VANETs) to disseminate safety-related knowledge to nearby cars. However, the traditional broadcasting networks have broadcast winds, contributing to intolerable pauses in transmission and loss of packets. This paper proposes an important transmission scheme for distributing protection signals throughout the sensitive region called the Enhanced Probabilistic-b...

A context-aware lemmatization model for setswana language using machine learning

Abstract: Lemmatization is an important task which is concerned with making computers understand the relationship that exists amongst words written in natural language. It is a prior condition needed for the development of natural language processing (NLP) systems such as machine translation and information retrieval. In particular, Lemmatization is intended to reduce the variability in word forms by collapsing related words to a standard lemma. There is a limited research on lemmatization o...

Multi-source reliable multicast routing with QoS constraints of NFV in edge computing

Abstract: Edge Computing (EC) allows processing to take place near the user, hence ensuring scalability and low latency. Network Function Virtualization (NFV) provides the significant convenience of network layout and reduces the service operation cost in EC and data center. Nowadays, the interests of the NFV layout focus on one-to-one communication, which is costly when applied to multicast or group services directly. Furthermore, many artificial intelligence applications and services of cl...

Algorithm for compressing/decompressing Sudoku grids

Abstract: We describe a way to transfer efficiently Sudoku grids through the Internet. This is done by using linearization together with compression and decompression that use the information structure present in all sudoku grids. The compression and the corresponding decompression are based on the fact that in each Sudoku grid there are information dependencies and so some of the information is redundant.

Delay bounded multi-source multicast in software-defined networking

Abstract: Software-Defined Networking (SDN) is the next generation network architecture with exciting application prospects. The control function in SDN is decoupled from the data forwarding plane, hence it provides a new centralized architecture with flexible network resource management. Although SDN is attracting much attention from both industry and research, its advantage over the traditional networks has not been fully utilized. Multicast is designed to deliver content to multiple desti...

Security of quantum-key-distribution protocol by using the post-selection technique

Abstract: The post-selection technique was proposed by Christandl, König, and Renner [Phys. Rev. Lett. 102, 020504 (2009)] to simplify the security of quantum-key-distribution schemes. This work applies this technique to derive the security bounds for the six-state Scarani-Acin-Rigbordy-Gisin 2004 quantum key distribution protocol. This protocol can extract secure keys from a source emitting multi-photons due to its robustness from photon number splitting attacks, making it a good candidate...

Intelligent load balancing techniques in software defined networks : a survey

Abstract: In the current technology driven era, the use of devices that connect to the internet has increased significantly. Consequently, there has been a significant increase in internet traffic. Some of the challenges that arise from the increased traffic include, but are not limited to, multiple clients on a single server (which can result in denial of service (DoS)), difficulty in network scalability, and poor service availability. One of the solutions proposed in literature, to mitigat...

Different Data Mining Algorithms: a Performance Analysis

Abstract: Data mining (also called knowledge discovery in databases) represents the process of extracting interesting and previously unknown knowledge (patterns) from data. By applying artificial intelligence together with analytical methods data can be extracted. An association rule expresses the dependence of a set of attribute-value pairs, called items, upon another set of items (item set). . The association rule mining algorithms can be classified into two main groups: the level-wise alg...

Blockchain Technology into Online Voting Systems

In an era marked by technological advancements and a growing demand for secure and transparent electoral processes, the integration of blockchain technology into online voting systems has emerged as a promising solution. This research paper presents a comprehensive exploration of the design, implementation, and implications of an online voting system built upon blockchain technology. Through an in-depth analysis of existing electronic voting challenges and the potential of blockchain, this pa...

Development and Operations (DevOps)

ABSTRACT DevOps is the collection of cultural practices, philosophies, mechanisms, and technology that assists in increasing the ability of an organization to distribute services and applications at a faster pace. Unlike the traditional software development and infrastructure management processes (also known as the Waterfall Model), DevOps is inspired from the Agile Project Management, meaning that the entire project is broken down into several phases, aiming for continuous improvement at eve...

Virtual Experiments in Metaverse

In this research paper we are introducing how virtual experiments work in metaverse one of the topic is as above : Smart Factory Using Virtual Reality and Online Multi-User: Towards a Metaverse for Experimental Frameworks                                                                                   Virtual reality (VR) has been brought closer to the general public over the past decade as it has become increasingly available for desktop and mobile p...

Adaptive E-learning System

Adaptive learning for individual learners has recently become popular in education. This study examines Adaptive E-learning system. Meanwhile, the purpose of this study is to examine if Adaptive E-learning system caters for the needs of students to personalize learning contents or materials tailored to the individual student. To achieve this, the descriptive research method was used. This study used an Adaptive E-learning System that is Google Classroom platform for learning Microsoft Excel. ...

Implementing Sorting in Database Systems

Most commercial database systems do (or should) exploit many sorting techniques that are publicly known, but not readily available in the research literature. These techniques improve both sort performance on mod- ern computer systems and the ability to adapt gracefully to resource fluctuations in multiuser operations. This survey collects many of these techniques for easy reference by students, researchers, and product de- velopers. It covers in-memory sorting, disk-based external sorting, a...

VP21CSEN0100014_VP21CSEN0100016

This model will change the entire offline examination system as we developing a fully automated system using NLP.


16 - 30 Of 82 Results