ABSTRACT In this paper, faces were employed as the only control means of right of entrance and usage of information on the super–highway. Principal Component Analysis (PCA) and Discrete Cosine Transform (DCT) algorithms were employed as our basis of comparison. An assessment of both algorithms was considered, it was discovered that PCA proved to be a better algorithm for access control and recognition system because of its very high average percentage of rightly classified faces (90.43%) a...
Sleep specialists often conduct manual sleep stage scoring by visually inspecting the patient’s neurophysiological signals collected at sleep labs. This is, generally, a difficult, tedious and time-consuming task. The limitations of manual sleep stage scoring have escalated the demand for developing Automatic Sleep Stage Classification (ASSC) systems. Sleep stage classification refers to identifying the various stages of sleep and is a critical step in an effort to assist physicians in t...
Abstract Data clustering has always been an important aspect of data mining. Extracting clusters from data could be very difficult especially when the features are large and the classes not clearly partitioned, hence the need for high-quality clustering techniques. The major shortcoming of various clustering techniques is that the number of clusters must be stated before the clustering starts. A recent successful work in clustering is the Clustering analysis based on Glowworm Swarm Optimizati...
Abstract The volume of information resources potentially available in the globe is massive; hence it becomes necessary to examine available information resources for academics research activity in the academia. This study, therefore, examined the perception of academics on availability of information resources for research productivity in federal universities in Nigeria. Descriptive survey research design was adopted. The Multistage sampling technique was used to select 1,057 academic staff ...
ABSTRACT Fault diagnosis, isolation and restoration from failure are crucial for maintenance and reliability of equipment.
Abstract Biometric systems have overtime served as robust security mechanisms in various domains. Fingerprints are the oldest and most widely used form of biometric identification. A critical step in exploring its advantages is to adopt it for use as a form of security in already existing systems, such as vehicles. This research work focuses on the use of fingerprints for vehicle ignition, as opposed to the conventional method of using keys. The prototype system could be divided into the foll...
ABSTRACT Face recognition is an attractive field in enhancing both the security and the image retrieval activities in the multimedia world.
ABSTRACT To protect lives and valuables against colossal loss due to fire outbreak In any society, provision of proper safety measures is sine qua non.
ABSTRACT Feeding poultry farming in most developed countries, like Nigeria, is still manually carried out as high level of human involvement is required.
ABSTRACT It is highly desirable that the information routed from a source reaches the audience or destination with little or no interference or distortion.
ABSTRACT To communicate effectively between two people there must be some set of rules, conventions, symbols and grammars agreed upon. This set is know as language.
ABSTRACT The need for a robust and secured access control system, using a suitable algorithm is highly inevitable to forestall daily online, hackers that are responsible in defrauding people of invaluable information and transaction worth billions of dollars in the process.
The Humanities primarily deal with the human condition and its various manifestations and dimensions. Now, the human experience is rich, diverse and complex. It involves the whole human experience from the distant pre-historic past when man used to live in the cave until the present day where he now goes to space and is technologically advanced. The arts and humanities basically analyze the human phenomenon and in the process of doing this, there is a need for the scientific methodology. �...
COMPUTER SCIENCE AND TECHNOLOGY Over the years computer has been useful to modern day technology. Computer science and technology is one of the fastest career in modern day, this have improved humans beyond immeasurable doubts. Computer science and technology have developed through mechanical and electrical engineering technology with the basis of mathematical language analysis. For example earliest computers were bassically mechanically oriented but modern day computer have become more elect...
ABSTRACT Biometrics is a technique of using characteristics and behavioral traits for identification of people this is more effective that common personal identification number(PIN) for an improved security technique. The basic procedure in a biometric system is the collection of biometric data through a sensor elements, the module extracted bares biometric data which is compared to its templates in a database to identify the data subject. In this work, the design of DNA (Deoxyribonucleic a...