Computer Science Research Papers/Topics

AI Powered Anti-Cyber Bullying System using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine

Abstract “Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed ...

Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm: Data Mining in a Secure Cloud Computing Environment through Restful API

Abstract Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorith...

Digital India with its Nine Pillars, Challenges & Changes

ABSTRACT    Digital Technologies which include Cloud Computing and Mobile Applications have emerged as catalystsforrapideconomicgrowthandcitizenempowermentacrosstheglobe.Digitaltechnologies are being increasingly used by us in everyday lives from retail stores to government offices.Theyhelpustoconnectwitheachotherandalsotoshareinformationonissuesandconcerns faced by us. In some cases they also enable resolution of those issues in near real time. Digital Locker is one of the ambitious aspect...

Social Network Fake Account Identification

Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact and occasionally undesirable repercussions for daily life. The prominent social networking sites have turned into a target platform for the spammers to disperse a huge amount of irrelevant and deleterious information. Twitter, for example, has become one of the most extravagantly used platforms of all times and therefore allo...

Apply Learning Models to recognize the case of Tuberculosis Using X-Ray Images

Tuberculosis is a type of chronic diseases, thus needs long term treatment. Each year, over 2 lakh people in India are affected by TB and on average around 20,000 people are infected every month in each state. According to WHO, primary statistics collated from 84 countries, approximately less than 1.4 million persons received tuberculosis (TB) treatment in 2020 than in 2019, (i.e. 21% decline from 2019). An early detection can significantly shorten the treatment period. In this study, we’ve...

Face Detection By Open CV

Machine learning has been gaining momentum over last decades: self-driving cars, efficient web search, speech and image recognition. The successful results gradually propagate into our daily live. Machine learning is a class of artificial intelligence methods, which allows the computer to operate in a self-learning mode, without being explicitly programmed. It is a very interesting and complex topic, which could drive the future of technology. Face detection is an important step in face recog...

IMU: A Content Replacement Policy for CCN, Based on Immature Content Selection

In‐network caching is the essential part of Content‐Centric Networking (CCN). The main aim of a CCN caching module is data distribution within the network. Each CCN node can cache content according to its placement policy. Therefore, it is fully equipped to meet the requirements of future networks demands. The placement strategy decides to cache the content at the optimized location and minimize content redundancy within the network. When cache capacity is full, the content eviction polic...

Viola-Jones Based Face Detection Algorithm

Detecting faces in images is the first step of any face application such as face recognition, face localization and face expression. The performance of face detection systems directly effect on correct operating of mentioned applications. Because faces are non-rigid and have high variation in scale, color, pose and lighting condition, designing an automatic system to overcome all mentioned problems is difficult. Machine learning has been shown that is one of the most successful tools to build...

A Robust Prediction Model for Candidates Admission

Selection of prospective candidates to a higher institution of learning based on candidate’s choice of course of study is now becoming a herculean task, particularly when the carrying-capacity of two hundred and fifty–six higher institutions in Nigeria cannot admit over one million eligible candidates seeking admission yearly. Several works have been done in the past using Nave Bayes algorithm, Decision trees, K-Means algorithm, Random Forest and other Machine learning algorithms to predi...

An Improved Gradient Descent Method for Optimization of Supervised Machine Learning Problems

Gradient descent method is commonly used as an optimization algorithm for some machine learning problems such as regression analysis and classification problems. This method is highly applicable for real life of yearly demandprice commodity, agricultural products and Iris flowers. This study proposed the combination of Dai-Yuan (DY) and Saleh and Mustafa (SM) conjugate gradient methods for the optimization of supervised machine learning problems. Experiments were conducted on combined DY and ...

Artificial Intelligence Bionic Technology

Abstract With the ongoing advancement of technology and innovation, bionic technology is also rapidly evolving and becoming more lifelike in their form and function and indeed, changing lives across the world by removing the physical barriers to empower the disabled people. Presently, in most of the developing countries, many amputees are facing challenges to access bionic technologies due to its availability being extremely limited, yet the demand for bionic devices ...

The Application of Data Dimensional Vector Matrix in Machine learning and Data Science

Abstract: Let us suppose we are given a super‐maximal random variable ࢔ .The goal of the present article is to characterize Riemannian vector spaces. We show that ࡳ (࢜) is comparable to ࢃࣈᇲ ࢈, . Every student is aware that ࣊ .૙ > Unfortunately, we cannot assume that ‖ࡴ ≤ ‖࢞. It is well known that 1 ≠ ℵ଴ . Hence it was Bernoulli who first asked whether curves can be described. We wish to extend the results of [33] to connected hulls. In [29], it is shown t...

Optimization of Data Resources with Measurability in Complex Group Theory

Recent developments in pure logic [14] have raised the question of whether Noether’s condition is satisfied. On the other hand, it was Germain who first asked whether Monge manifolds can be constructed. The goal of the present paper is to classify trivially bijective subgroups. On the other hand, in [11], the authors studied local subgroups

On Ellipticity on geometric derivation for Computer vision and Machine Learning

It was von Neumann who first asked whether super‐totally continuous paths can be computed. Here, uniqueness is clearly a concern. The work in [29] did not consider the canonically right‐standard case. In this setting, the ability to study countably super‐separable fields is essential. It was Huygens who first asked whether locally ܿco‐bijective, geometric, partially standard primes can be extended. Hence is it possible to examine ordered matrices?

TCP/IP Protocol-Based Model For Increasing The Efficiency Of Data Transfer In Computer Networks

ABSTRACT This chapter provides solutions for increasing the efficiency of data transfer in modern computer network applications and computing network environments based on the TCP/IP protocol suite. In this work, an imitation model and simulation was used as the basic method in the research. A simulation model was developed for designing and analyzing the computer networks based on TCP/IP protocols suite which fully allows the exact features in realizing the protocols and their impact on inc...


31 - 45 Of 82 Results