Computer Science Research Papers/Topics

Delay bounded multi-source multicast in software-defined networking

Abstract: Software-Defined Networking (SDN) is the next generation network architecture with exciting application prospects. The control function in SDN is decoupled from the data forwarding plane, hence it provides a new centralized architecture with flexible network resource management. Although SDN is attracting much attention from both industry and research, its advantage over the traditional networks has not been fully utilized. Multicast is designed to deliver content to multiple desti...

Security of quantum-key-distribution protocol by using the post-selection technique

Abstract: The post-selection technique was proposed by Christandl, König, and Renner [Phys. Rev. Lett. 102, 020504 (2009)] to simplify the security of quantum-key-distribution schemes. This work applies this technique to derive the security bounds for the six-state Scarani-Acin-Rigbordy-Gisin 2004 quantum key distribution protocol. This protocol can extract secure keys from a source emitting multi-photons due to its robustness from photon number splitting attacks, making it a good candidate...

Intelligent load balancing techniques in software defined networks : a survey

Abstract: In the current technology driven era, the use of devices that connect to the internet has increased significantly. Consequently, there has been a significant increase in internet traffic. Some of the challenges that arise from the increased traffic include, but are not limited to, multiple clients on a single server (which can result in denial of service (DoS)), difficulty in network scalability, and poor service availability. One of the solutions proposed in literature, to mitigat...

Different Data Mining Algorithms: a Performance Analysis

Abstract: Data mining (also called knowledge discovery in databases) represents the process of extracting interesting and previously unknown knowledge (patterns) from data. By applying artificial intelligence together with analytical methods data can be extracted. An association rule expresses the dependence of a set of attribute-value pairs, called items, upon another set of items (item set). . The association rule mining algorithms can be classified into two main groups: the level-wise alg...

Blockchain Technology into Online Voting Systems

In an era marked by technological advancements and a growing demand for secure and transparent electoral processes, the integration of blockchain technology into online voting systems has emerged as a promising solution. This research paper presents a comprehensive exploration of the design, implementation, and implications of an online voting system built upon blockchain technology. Through an in-depth analysis of existing electronic voting challenges and the potential of blockchain, this pa...

Development and Operations (DevOps)

ABSTRACT DevOps is the collection of cultural practices, philosophies, mechanisms, and technology that assists in increasing the ability of an organization to distribute services and applications at a faster pace. Unlike the traditional software development and infrastructure management processes (also known as the Waterfall Model), DevOps is inspired from the Agile Project Management, meaning that the entire project is broken down into several phases, aiming for continuous improvement at eve...

Virtual Experiments in Metaverse

In this research paper we are introducing how virtual experiments work in metaverse one of the topic is as above : Smart Factory Using Virtual Reality and Online Multi-User: Towards a Metaverse for Experimental Frameworks                                                                                   Virtual reality (VR) has been brought closer to the general public over the past decade as it has become increasingly available for desktop and mobile p...

Adaptive E-learning System

Adaptive learning for individual learners has recently become popular in education. This study examines Adaptive E-learning system. Meanwhile, the purpose of this study is to examine if Adaptive E-learning system caters for the needs of students to personalize learning contents or materials tailored to the individual student. To achieve this, the descriptive research method was used. This study used an Adaptive E-learning System that is Google Classroom platform for learning Microsoft Excel. ...

Implementing Sorting in Database Systems

Most commercial database systems do (or should) exploit many sorting techniques that are publicly known, but not readily available in the research literature. These techniques improve both sort performance on mod- ern computer systems and the ability to adapt gracefully to resource fluctuations in multiuser operations. This survey collects many of these techniques for easy reference by students, researchers, and product de- velopers. It covers in-memory sorting, disk-based external sorting, a...

VP21CSEN0100014_VP21CSEN0100016

This model will change the entire offline examination system as we developing a fully automated system using NLP.

AI Powered Anti-Cyber Bullying System using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine

Abstract “Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed ...

Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm: Data Mining in a Secure Cloud Computing Environment through Restful API

Abstract Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorith...

Digital India with its Nine Pillars, Challenges & Changes

ABSTRACT    Digital Technologies which include Cloud Computing and Mobile Applications have emerged as catalystsforrapideconomicgrowthandcitizenempowermentacrosstheglobe.Digitaltechnologies are being increasingly used by us in everyday lives from retail stores to government offices.Theyhelpustoconnectwitheachotherandalsotoshareinformationonissuesandconcerns faced by us. In some cases they also enable resolution of those issues in near real time. Digital Locker is one of the ambitious aspect...

Social Network Fake Account Identification

Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact and occasionally undesirable repercussions for daily life. The prominent social networking sites have turned into a target platform for the spammers to disperse a huge amount of irrelevant and deleterious information. Twitter, for example, has become one of the most extravagantly used platforms of all times and therefore allo...

Apply Learning Models to recognize the case of Tuberculosis Using X-Ray Images

Tuberculosis is a type of chronic diseases, thus needs long term treatment. Each year, over 2 lakh people in India are affected by TB and on average around 20,000 people are infected every month in each state. According to WHO, primary statistics collated from 84 countries, approximately less than 1.4 million persons received tuberculosis (TB) treatment in 2020 than in 2019, (i.e. 21% decline from 2019). An early detection can significantly shorten the treatment period. In this study, we’ve...


31 - 45 Of 92 Results