Computer Science Research Papers/Topics

Electronic Commerce In Namibia: Its Growth, Present Status And Potential

Abstract Wide varieties of trading methods are rapidly being replaced by the use of computers and communications networks the world over. This new concept of trading is known as Electronic Commerce (e-commerce). Great potentials exist for saving costs and improving services by utilizing this technology. Examples of phenomenal successes and staggering cost savings are just too many. Profits in millions of dollars are mentioned with ease, as a result of applying e-commerce. It is apparent that...

An Evaluation Of Browser-Based Clients For Asterisk

ABSTRACT Asterisk is a Private Branch Exchange (PBX) software used to connect telephony applications such as Voice over Internet Protocol (VoIP). In the Department of Computer Science at the University of Namibia (DCS-UNAM), Asterisk is currently set up to provide basic VoIP services to staff and students. However, this system currently has limited accessibility because it can only be accessed with VoIP clients such as hard and soft phones. Alternatively, Browser-based VoIP clients (BBVCs) c...

Computational Intelligent Systems: Evolving Dynamic Bayesian Networks

Dynamic Bayesian Networks (DBNs) are temporal probabilistic models for reasoning over time. They often formulate the core reasoning component of intelligent systems in the field of machine learning. Recent studies have focused on the development of some DBNs such as Hidden Markov Models (HMMs) and their variants, which are explicitly represented by highly skilled users and have gained popularity in speech recognition. These varieties of HMMs represented as DBNs have contributed to the baselin...

Goal Models Vs Five Forces Models: A Comparative Study of Strategic Analyses

The performance of an enterprise is determined by its strategic objectives, and the strategic plan it adopts through some form of strategic analysis in order to meet these objectives. However, strategic analysis is currently only supported through unsystematic and informal processes such as SWOT analysis and the Five Forces Model. This thesis proposes conceptual goal modeling as a systematic approach to strategic analysis and shows through a comparative study how this analysis can be conducte...

Performance Analysis of Des And Rsa Suitability For Different System Applications

ABSTRACT  This work is based on performance Analysis of DES and RSA suitability for different system applications. The rationale behind the work was to find out how suitable DES (Data Encryption Standard) and RSA (Rivest, Shamir and Adleman) are for different application systems under different systems requirements. In order to achieve these objectives, an application that implements DES and RSA was developed using an object-oriented analysis and design (OOAD) approach and was implemented in...

Improving Intelligent Transportations Systems Through Analytical Investigation of Macroscopic Traffic Flow Model in Vehicular Ad Hoc Networks(VANETS)

Abstract In recent times, wireless communication has witnessed unprecedented growth due mainly to advances in instrumentation and computer science. Substantial research efforts have been devoted to exploring the application of Intelligent Transportation Systems (ITS) within the context of vehicular ad hoc networks (VANETs) to ensure safety and for an efficient and integrated transport network. Vehicle-to-vehicle (V2V) communication in VANETs poses many challenges. In sparse as well as in den...

Investigating Laptop Battery Lifespan As Affected By Charging Practices

ABSTRACT This study investigated laptop battery lifespan as affected by users charging practices. Laptop battery lifespan is the average length of life a laptop battery has or the duration if its effectiveness. Battery charging practices means the frequency by which a user plugs the machine in the electric source. The main purpose of the study was to investigate the two different laptop charging practices on how they affect the lifespan. The two laptop charging practices that concerned this ...

Opinion Mining/Sentiment Analysis

Abstract There has been tremendous growth in the amount of user generated content on the Internet. This is due to rise in social networks and the embrace of web 2.0 or technologies. The Internet is no longer a place for consumption of information only, but a melting point of users interacting on various interests. This project concentrates on a specific type of content – opinionated content. Several review sites exist where users can comment on their experience about a movie, product or se...

Study Of Scalable Deep Neural Network For Wildlife Animal Recognition And Identification

ABSTRACT Recently, deep learning techniques have been used significantly for large scale image classification targeting wildlife prediction. This research adopted a deep convolutional neural network (CNN) and proposed a deep scalable CNN. Our research essentially modifies the network layers (scalability) dynamically in a multitasking system and enables real-time operations with minimum performance loss. It suggests a straightforward technique to access the performance gains of the network wh...

Genetic Algorithms For Timetable Generation

Abstract Timetabling presents an NP-hard combinatorial optimization problem which requires an efficient search algorithm. This research aims at designing a genetic algorithm for timetabling real-world school resources to fulfil a given set of constraints and preferences. It further aims at proposing a parallel algorithm that is envisaged to speed up convergence to an optimal solution, given its existence. The timetable problem is modeled as a constraint satisfaction problem (CSP) and a theor...

An Eclipse-Based Graphical Modeling Tool For Discrete Event Simulation

Abstract We propose DEVS-Driven Modeling Language (DDML), a graphical notation for DEVS [1] modeling and an Eclipse-based graphical editor, Eclipse-DDML. DDML attempts to bridge the gap between expert modelers and domain experts making it easy to model systems, and capture the static, dynamic, and functional aspects of a system. At the same time, it unifies CDEVS and P-DEVS models. DDML integrates excellent modeling concepts from powerful formalisms and glues them in one unique consistent fr...

Classification Of Breast Cancer Using Logistic Regression

ABSTRACT Breast cancer is a prevalent disease that affects mostly women, an early diagnosis will expedite the treatment of this ailment. In recent times, Machine Learning (ML) techniques have been employed in biomedical and informatics to help fight breast cancer. This research work proposed an ML model for the classification of breast cancer. To achieve this we employed logistic regression (LR) and also compared our model’s performance with other extant ML models namely, Support Vector Ma...

Formal Analysis Of DDML

ABSTRACT We propose a framework for formal analysis of DEVS Driven Modeling Language (DDML) models in order to assess and evaluate the properties of DDML models. This framework semantically maps the hierarchical levels of DDML: Input Output system (IOS), Input Output Relation Observation (IORO) and Coupled Network (CN) levels to corresponding formal methods: Labeled Transition System (LTS), Linear Temporal Logic (LTL) and Computation Tree Logic (CTL), and Communicating Sequential Processes (C...

Automatic Detection Of Injecton Attack In HTTP Requests

ABSTRACT Malicious user requests pose a vicious threat to backend devices which execute them; more so, could result in the compromise of other user accounts, exposing them to theft and blackmail. It becomes imperative to sanitize such requests before they are treated by the servers as access to a single malicious request is enough to cause a disaster. A number of authors suggest that sanitizing models built on support vector machines guarantee optimum classification of malicious from non-mal...

Formal Verification Of A Network On Chip

Abstract Current advancement in VLSI technology allows more circuit to be integrated on a single chip forming a System on Chip (SoC). The state of art in on-chip intermodule connection of using a shared bus with a common arbiter poses scalability problems and become a performance bottleneck as the number of modules increase. Network on Chip (NoC) has been proposed as a viable solution to this problem. The possibility of occurrence of deadlocks and livelocks in a NoC requires that their desig...


121 - 135 Of 252 Results