Natural & Applied Sciences

Natural & Applied Sciences Research Papers/Topics

Observatory System for Monitoring Road Accidents in Nigeria

ABSTRACT Road Accidents are on the rise due to the high amount of migration from the rural area to the urban areas, Urbanization people are now finding it easier to own cars and use it for their day to day activities. Due to that reason the amount of Road Accident has also risen to all-time highs with estimate of 2000 deaths in four months around the country. Although we record such amounts of Accidents we are not able to learn from them and try to make changes with the same Roads claiming l...

A Real-Time Data Stream Processing Model For A Smart City Application Leveraging Intelligent Internet Of Things (Iot) Concept

ABSTRACT Due to the vast amount of data that is being generated by the sensors through the smart devices in smart cities, streams of data must be processed in real time to gain insight quickly and to make decisions that are in most cases critical and time sensitive. The difficulty is diminished by using big data methods such as Cassandra, Hadoop, Kafka and Spark to perform real-time stream processing in an Internet of Things (IoT) environment, such as traffic monitoring in a smart city envir...

Prediction Of Heart Disease Using Bayesian Network Model

ABSTRACT The Heart Disease according to the survey is the leading cause of death all over the world. The health sector has a lot of data, but unfortunately, these data are not well utilized. This is as a result of lack of effective analysis tools to discover salient trends in data. Data Mining can help to retrieve valuable knowledge from available data. It helps to train model to predict patients’ health which will be faster compared to clinical experimentation. A lot of research has been ...

Qualitative Modelling And Simulation Of Free Running Semiconductor Laser

ABSTRACT The thesis presents the modelling and simulation of free running semiconductor laser. The rate equations which were derived on the basis of the fact that there must be a balance between carriers that undergo transition and the photons generated and annihilated were simulated to examine what laser looks like when ran without positive optical feedback nor any optical injection. The result shows the photons get amplified due to stimulated emission but no oscillation of the output is ob...

A Cloud-Based Java Compiler For Smart Devices

Abstract The Java programming language is widely used in industry and business. Therefore, academic institutions worldwide include Java learning as a basic part of their Computer Science and Engineering curricula. At the same time, smart devices have become popular among university learners. This research tries to take advantage of this fact to promote Java learning. The main problem is that we cannot compile Java programs on smart devices due to the technical limitations of such devices. Th...

Learning System And A Comparative Study On Learning Style Of Students In Africa(Nigeria) And Those In Asia (Japan).

ABSTRACT In different parts of the world especially African and Asian continents, students attend classes and taught in groups using the same method of teaching applied to all students irrespective of whether or not they have the same method of taking and assimilating information (learning style). This contributed negatively towards the development of educations in some countries of those continents. To tackle such problems, an intelligent and adaptive learning system should be the focal poi...

A Predictive Model For Electricity Consumption In University Campuses Using Artificial Neural Networks (A Case Study)

ABSTRACT Energy efficiency is paramount in the quest to achieve sustainable development in the 21st century. Statistics in recent research have shown that in many sectors in any nation’s economy, which include buildings, industries and transportation, energy consumption in buildings accounts for about 77%, a higher percentage than other sectors in Nigeria; the same is true worldwide. Energy consumption forecasting is a critical and necessary input to planning and monitoring energy usage, w...

Malware Classification Into Families Based On File Contents And Characteristics

Abstract The use of malicious software (malware) as an instrument for carrying out different criminal activities both organised and non-organised have become the major threat faced by today’s world of connectivity. Frequency and complexity of such cyberattacks makes it difficult for computer antivirus companies to efficiently handle the high value of the new malwares released using traditional approaches that depends mainly on signature. As a result, machine learning approaches are now the...

Availability Of The Jobtracker Machine In Hadoop/Map-Reduce Implementations

Abstract Due to the growing demand for Cloud Computing services, the need and importance of Distributed Systems cannot be underestimated. However, it is difficult to use the traditional Message Passing Interface (MPI) approach to implement synchronization, coordination,and prevent deadlocks in distributed systems. This difficulty is lessened by the use of Apache’s Hadoop/MapReduce and Zookeeper to provide Fault Tolerance in a Homogeneously Distributed Hardware/Software environment. In this...

A Strong Convergence Theorem For Zeros Of Bounded Maximal Monotone Mappings In Banach Spaces With Applications

ABSTRACT Let E be a uniformly convex and uniformly smooth real Banach space and E ∗ be its dual. Let A : E → 2 E∗ be a bounded maximal monotone map. Assume that A−1 (0) 6= ∅. A new iterative sequence is constructed which converges strongly to an element of A−1 (0). The theorem proved, complements results obtained on strong convergence of the proximal point algorithm for approximating an element of A−1 (0) (assuming existence) and also resolves an important open question. Further...

Modeling And Simulation As A Service

ABSTRACT DEVS Modeling & Simulation separates a model from its simulator. A DEVS model describes the structure and the behavior of a system, while a DEVS simulator generates the trajectories of these descriptions through execution threads. The goal of a DEVS standard is to provide a simple and mostly automated way of executing simulations that involve remote and/or heterogeneous DEVS models. This can be achieved by taking two different approaches, which are simulator-based interoperability ...

Fast and Accurate Feature-based Region Identification

Abstract There have been several improvement in object detection and semantic segmentation results in recent years. Baseline systems that drives these advances are Fast/Faster R-CNN, Fully Convolutional Network and recently Mask R-CNN and its variant that has a weight transfer function. Mask R-CNN is the state-of-art. This research extends the application of the state-of-art in object detection and semantic segmentation in drone based datasets. Existing drone datasets was used to learn seman...

Effects of Land Cover Change on Non-Timber Forest Products And Livelihoods of People in Birim Central Municipality

ABSTRACT   It is known that forest degradation affects NTFPs thus dependants on such forest resources. To ascertain this claim, the study was designed to examine the effect of land cover change on selected non-timber forest products from different land use types in the moist semi-deciduous forest and their likely effects on livelihoods in the northern part of the Birim Central Municipality. Employing the cross-sectional approach, remote sensing/GIS, questionnaires and semi-structured inter...

Sentiment Analysis Based on Social Media Data

Abstract Sentiment analysis has proven to be one of the most challenging tasks in natural language processing (NLP). Many AI systems have been developed which can detect the polarity of a sentence (degree of positivity, neutrality or negativity). But more information such as the emotion of the author can be detected. Our task here is to build an artificial agent – or an AI system – that is capable of detecting polarity in a document as well as the emotion of the author. Generally speakin...

Applying Emerging Data Techniques And Advanced Analytics To Combat Cyber Threat

ABSTRACT Cyber threats are currently on the rise, which has caused individuals, industrial control systems (ICSs), critical infrastructures (CIs), and nations to be subjected to attacks with great losses. Among the cyber threats used for these attacks is the advanced persistent threat (APT) which tends to use highly sophisticated tools to attack targeted organizations or a nation’s critical infrastructure. The capabilities of big data can be leveraged in conducting advanced analytics by ga...


4831 - 4845 Of 8157 Results