Computer Science Research Papers/Topics

Assessment of an Access Control System Using Principal Component Analysis and Discrete Cosine Transform

ABSTRACT In this paper, faces were employed as the only control means of right of entrance and usage of information on the super–highway. Principal Component Analysis (PCA) and Discrete Cosine Transform (DCT) algorithms were employed as our basis of comparison. An assessment of both algorithms was considered, it was discovered that PCA proved to be a better algorithm for access control and recognition system because of its very high average percentage of rightly classified faces (90.43%) a...

Sleep syndromes onset detection based on automatic sleep staging algorithm

Sleep specialists often conduct manual sleep stage scoring by visually inspecting the patient’s neurophysiological signals collected at sleep labs. This is, generally, a difficult, tedious and time-consuming task. The limitations of manual sleep stage scoring have escalated the demand for developing Automatic Sleep Stage Classification (ASSC) systems. Sleep stage classification refers to identifying the various stages of sleep and is a critical step in an effort to assist physicians in t...

An Enhanced Clustering Analysis Based On Glowworm Swarm Optimization

Abstract Data clustering has always been an important aspect of data mining. Extracting clusters from data could be very difficult especially when the features are large and the classes not clearly partitioned, hence the need for high-quality clustering techniques. The major shortcoming of various clustering techniques is that the number of clusters must be stated before the clustering starts. A recent successful work in clustering is the Clustering analysis based on Glowworm Swarm Optimizati...

Availability Of Information Resources For Research Output: Perception Of Academic Staff Members In Nigerian Federal Universities

Abstract The volume of information resources potentially available in the globe is massive; hence it becomes necessary to examine available information resources for academics research activity in the academia. This study, therefore, examined the perception of academics on availability of information resources for research productivity in federal universities in Nigeria. Descriptive survey research design was adopted. The Multistage sampling technique was used to select 1,057 academic staff ...

Diagnosis Of Gasoline-Fuelled Engine Exhaust Fume Related Faults Using Electronic Nose

ABSTRACT Fault diagnosis, isolation and restoration from failure are crucial for maintenance and reliability of equipment.

A Prototype of a Fingerprint Based Ignition Systems in Vehicles

Abstract Biometric systems have overtime served as robust security mechanisms in various domains. Fingerprints are the oldest and most widely used form of biometric identification. A critical step in exploring its advantages is to adopt it for use as a form of security in already existing systems, such as vehicles. This research work focuses on the use of fingerprints for vehicle ignition, as opposed to the conventional method of using keys. The prototype system could be divided into the foll...

QUANTITATIVE EVALUATION OF PRINCIPAL COMPONENT ANALYSIS AND FISHER DISCRIMINANT ANALYSIS TECHNIQUES IN FACE IMAGES

ABSTRACT Face recognition is an attractive field in enhancing both the security and the image retrieval activities in the multimedia world.

INTELLIGENT FIRE DETECTION SYSTEM USING MOBILE WIRELESS NETWORK

ABSTRACT To protect lives and valuables against colossal loss due to fire outbreak In any society, provision of proper safety measures is sine qua non.

DEVELOPMENT OF MOBILE INTELLIGENT POULTRY FEED DISPENSING SYSTEM

ABSTRACT Feeding poultry farming in most developed countries, like Nigeria, is still manually carried out as high level of human involvement is required.

DEVELOPMENT OF MOSFET-BASED RADIO FREQUENCY AMPLIFIER FOR IMPROVED SIGNAL RECEPTION

ABSTRACT It is highly desirable that the information routed from a source reaches the audience or destination with little or no interference or distortion.

Assembly Language Programming Using MC68000

ABSTRACT To communicate effectively between two people there must be some set of rules, conventions, symbols and grammars agreed upon. This set is know as language.

A Prototype of a Robust and Secured Access Control System Using Principal Component Analysis

ABSTRACT The need for a robust and secured access control system, using a suitable algorithm is highly inevitable to forestall daily online, hackers that are responsible in defrauding people of invaluable information and transaction worth billions of dollars in the process.

Computational Methods in Historical Research

The Humanities primarily deal with the human condition and its various manifestations and dimensions. Now, the human experience is rich, diverse and complex. It involves the whole human experience from the distant pre-historic past when man used to live in the cave until the present day where he now goes to space and is technologically advanced. The arts and humanities basically analyze the human phenomenon and in the process of doing this, there is a need for the scientific methodology.  �...

Importance of computer and information science

COMPUTER SCIENCE AND TECHNOLOGY Over the years computer has been useful to modern day technology. Computer science and technology is one of the fastest career in modern day, this have improved humans beyond immeasurable doubts. Computer science and technology have developed through mechanical and electrical engineering technology with the basis of mathematical language analysis. For example earliest computers were bassically mechanically oriented but modern day computer have become more elect...

Design of DNA Based Biometric Security System for Examination Conduct

ABSTRACT  Biometrics is a technique of using characteristics and behavioral traits for identification of people this is more effective that common personal identification number(PIN) for an improved security technique. The basic procedure in a biometric system is the collection of biometric data through a sensor elements, the module extracted bares biometric data which is compared to its templates in a database to identify the data subject. In this work, the design of DNA (Deoxyribonucleic a...


46 - 60 Of 82 Results