Computer Science articles list

Emerging technological tools and services to building world class paper less library information &management system [lims]

Library automation is just not a book inventory where hold, issue and receiving of books by using technological tools and services. Our applied research was found that most of the library administrative functionalities such as ‘Acquisition and Accessioning’, ‘auto Indexing & Classification’ and auto Cataloging (Books & Non books materials)’, inventory with real-time OPAC facilities and many more library science concepts are still missing constructs in Universities/College libraries across the country. In this modern era the concept of eLibrary is more popular because availability and accessibility of digitized content sharing through IT/ICT infrastructure is huge. During our research we found that cognizance of Library automation was completely ignored and focused on only talking and establishment of eLibrary. As we all know that “Physical Library” is not a substitute for “eLibrary”. In fact eLibrary is part of a Physical Library to share authenticated digitized content through IT/ICT infrastructure. After a decade of our applied research in the area of Library science, eventually we recorded a lot of findings based on our survey and discussion with senior researchers and Librarians. Our serious and consistent effort makes to succeeds in designing comprehensively effective and efficient operational strategies to build a “world class Library Automation and Paper less Library Management System” for Universities/College libraries. This paper emphasizes about the comprehensive real-time architecture and operational modules and their effectiveness to achieve the user’s satisfaction (flow of functionalities as per the exact need of the Library Management system). This dealt with how emerging technological tools and services are effectively integrated for designing new strategies in the area of library science includes various automation process and security concepts (using Barcode/RFID). Eventually, our dream comes true in building Use of Emerging Technological Tools and Services to building world class Paper less Library Information &Management System [LIMS]. presently deployed and use of this software product in more than 300 satisfied and client locations in INDIA, this product popularly named as “eLib” by AarGees Business Solution, Hubli, India. Though, our research is still on and continuing for further development to build “Global knowledge sharing Centre”.

Dr. Chandrashekhar Uppin

Comparing machine learning classification models on a loan approval prediction dataset

In the last decade, we have observed the usage of artificial intelligence algorithms and machine learning models in industry, education, healthcare, entertainment, and several other areas. In this paper, we focus on using machine learning algorithms in the loan approval process of financial institutions. First, we briefly review some prior research papers that dealt with loan approval predictions using machine learning models. Next, we analyze the loan approval prediction dataset we downloaded from Kaggle, which was used in this paper to compare several machine learning classification models. During this analysis, we observed that credit scores and loan terms are the attributes that probably most affect the result. Next, we divided the dataset into a training set (80%) and a test set (20%). We trained 27 various machine learning models in MATLAB. Three models were optimized with Bayesian optimization to find the best hyperparameters with minimum error. We used 5-fold cross-validation for the validations to prevent overfitting during the training. In the following step, we used the test set on trained models to measure the models' accuracy on unseen data. The result showed that the best accuracy both on validation and test data, more than 98%, was reached with neural networks and ensemble classification models.

Ladislav Végh

Technology and isolation in the information period

Technology and Isolation in the Information Period explores the social, political, and legal implications of the group and use of personal information in computer databases. In the Information Period, our lives are documented in digital case books maintained by hundreds (perhaps thousands) of businesses and government agencies. These case books are composed of bits of our personal information, which when assembled together begin to paint a portrait of our personalities. Technology has changed our working practices and now allows us to be connected 24/7. We have the power to Skype clients around the world and email or Tweet work colleagues at weekends, but is there a danger that having connectivity so readily available hinders our efforts to gain a better work/life balance? We often read articles about the correct way to manage technology and how to achieve a happy balance of relaxing away from work and being ‘Always On’ and ‘Always available’. For instance, many people choose a job that allows them to detach from the workplace on evenings and weekends, yet technology makes it difficult for others to switch off. Now, we are huge believers in the ability to use the internet, email, Facebook, Twitter, texting and to pick up the phone and talk to people, but because of technology more people are becoming distracted and losing focus. They can’t escape from the workplace and feel that the office follows them around via their Smartphone which demands attention 24/7. It wasn’t so long ago that when we took a holiday, we would plan ahead, make sure everything was order, inform clients of our absence and brief our teams so we could disappear off to distant shores and happily sit in the sun for a relaxing fortnight, avoiding drinking the local water, eating strange local delicacies and fending of mosquitoes. But I digress … Having technology at hand means that we still have an element of control at our workplace and the ability to deal with issues if they occur. The downside to this is managing that work/life balance again. On one hand the internet is a lifeline, but it can also become a ball and chain if we don’t take the time to unplug from it. Technology allows us to be in two places at once, but when employees struggle to find the right balance between their work and personal lives there is a chance that stress levels can increase leading to a potential loss of productivity and happiness in general. In a recent survey 70% of workers said that technology brings the stress of work into their personal lives. Many Researchers have recommended drawing a line between work communications and home. This not only benefits your well being, but benefits your employer too, as you will be coming back to work refreshed and recharged.

Sunita Singh

Whatsapp- messenger fever on students

WhatsApp is mobile application which allows exchange of messages, videos, audio’s and images via Smartphone. The increased use of IM on phones has turned to be goldmine for mobile and computer age. This paper focuses on understanding experimental viewpoint about the intensity, usage of whatsapp messenger and its impact on the academic performance of students in institutions. Instead of fast communication and enhancing effective flow of information and idea sharing among students, whatsapp has actually impacted in some pessimistic performance of students. For instance it takes up much of the students study time resulting in procrastination related issues , destroys students’ linguistic skills, leads to lack of concentration during lectures, results in difficulty in balancing online activities (whatsapp) and intellectual preparation and distracts learner from completing their assignments and adhering to their private studies time table. It is very userfriendly and easy to get initiated. Simply enter the telephone number of the device into the app. It then sorts through the contacts (with your permission) on the phone to figure out who else also has the app already installed. Users can then invite more contacts or go ahead and start sending messages to the ones that the app discovered. Brian Acton and Jan Koum (2009) invented Whatsapp messenger for easy and fast communication and distribution of multimedia messaging. Whatsapp is one of the trend and fashion in technology that is commonly used on specific mobile phones and computers. Since the Smartphones became popular, many messaging services were launched but Whatsapp has become widespread among them. The service is available free for one year and later user has to pay very less annual amount. Besides all, this Application is highly fanatic and can create a great impact on regular users, and apart from that it can leave a trace that becomes difficult to control and cure. With whatsapp messenger, communication through mobile phones has become easier, faster and cheaper. It is less expensive as compared to the normal phone messaging. An individual can chat with friends and family overseas through whatsapp without having to incur global SMS charges.

Sunita Singh

The emerging role of artificial intelligence in stem higher education: a critical review

Artificial Intelligence (AI) has emerged as a disruptive force with the potential to transform various industries, and the field of higher education is no exception. This critical review paper aims to examine the emerging role of AI in Science, Technology, Engineering, and Mathematics (STEM) higher education. The article explores the impact of AI on teaching and learning methodologies, curriculum design, student engagement, assessment practices, and institutional strategies. The review also highlights the potential benefits and challenges associated with integrating AI into STEM education and identifies key areas for future research and development. Overall, this article provides insights into how AI can revolutionize STEM higher education and offers recommendations for harnessing its full potential.

Bharath Kumar

Analyzing game strategies of the don’t get angry board game using computer simulations

In the research described in this paper, we used computer simulations to analyze and compare different types of game strategies in the popular board game Don't Get Angry. Following a brief introduction, we summarized a few previous research papers examining similar board games' game strategies. Next, after a review of the Don't Get Angry game's official rules, we outlined four strategies that can be applied to increase the likelihood of winning. We simulated 50,000 games in which all four players made their moves randomly and 50,000 games where each used a different strategy. We tracked how frequently each player finished first, second, third, or last during the simulations. Furthermore, we recorded how many rounds were needed to complete the game for each player, how many times the players’ pawns were kicked out and returned to their houses by other players, and the number of players’ remaining steps during every gameplay. From the analysis of the recorded data, we could conclude that significant differences exist in the chances of winning the game for the examined strategies when all players use different strategies. The results improve the specific domain knowledge for the Don't Get Angry board game. It may help create more vigorous computer opponents and encourage further study to create a tool for evaluating students' strategic thinking while playing.

Ladislav Végh

Emvd: efficient multitype vehicle detection algorithm using deep learning approach in vehicular communication network for radio resource management

Radio resource allocation in VCN is a challenging role in an intelligent transportation system due to traffic congestion. Lot of time is wasted because of traffic congestion. Due to traffic congestion, user has to miss their important work. In this paper, we propose radio resource allocation scheme so that user can utilize their time by taking the advantage of subscription plan. In this scenario, multitype vehicle identification scheme from real time traffic database is proposed, its history will match in transport database and vehicle travelling history database. Proposed method indicates 95% accuracy for multitype vehicle detection. Subscription plans are allocated to the user on the basis of resource allocation, scheduling, levelling and forecasting. This scheme is better for traffic management, vehicle tracking as well as time management.

Vartika agarwal

Route forecasting-based authentication scheme using a* algorithm in vehicular communication network

Researchers have developed several authentication techniques for route predictions based on user requirements. These techniques estimate the shortest path and available resources in vehicular communication networks. In the current research, the existing authentication techniques for vehicular communication are compared and their inadequacies are identified. Then, new authentication technique based on route forecasting are presented for vehicular communication networks, with the service provider anticipating alternate routes for customers if the current routes have more network traffic congestion. By presenting the most efficient route, the suggested model allows users to maximise their time efficiency. Using A* algorithm, VCN agent seeks path with less network traffic congestion. This algorithm determines the shortest path between a source and a destination. Users are provided with several options by the service provider. User accepts the finest option that meets their needs. This method allows the service provider to deliver at least 15 routes within three seconds. This strategy is beneficial when a significant number of vehicles are stuck in traffic and consumers require network resources to utilise their time effectively.

Vartika agarwal

P2pcpm: point to point critical path monitoring based denial of service attack detection for vehicular communication network resource management

Various types of security attacks are normal in vehicular communication networks. The current study uses a support vector machine to implement a Point to Point Critical Path Monitoring (P2PCPM) based Denial of Service (DOS) Attack detection technique for Vehicular Communication Network (VCN) resource management. Greatest quality of P2PCPM is that it eliminates attacked nodes from the network for the smooth process of vehicular communication. This scheme works well in terms of accuracy as well as attack detection rate. The whole simulation is made and tried by utilizing MATLAB Software. Simulation result shows 99% accuracy in case of security attack detection as well as reduced training and testing error upto 2%. Experimental results indicate that this scheme has a great efficiency and works well up to 1000 nodes, which is the limitation of current implementation. In future, simulation test may be done for unlimited nodes using similar or other techniques of attack detection.

Vartika agarwal

Network resource allocation security techniques and challenges for vehicular communication network management

Internet of things describes the network of physical objects such as sensors, receivers, transmitters and other technologies which are used in VCN. In Vehicular communication network two or more vehicles are communicate with each other. VCN use advanced technologies to solve transportation related problems like long traffic delays, road accidents and air pollution. IOT based technologies make vehicular network smart. In this chapter we reviewed about network resource allocation security techniques, challenges and also discuss how we can make vehicular communication network smarter. We reviewed about different models and schemes for V2V communication. These schemes were developed to ensure a fair, efficient and transparent allocation of resource in an intelligent transportation system.

Vartika agarwal

Iot based smart transport management and vehicle-to-vehicle communication system

Vehicle-to-vehicle (V2V) communication is an advance application and thrust area of research. In the current research, the authors highlighted the technologies which are used in V2V communication systems. Advantage of such technology is that it helps to detect live location and tolling. It plays an important role if there are huge amount of traffic. The current research work can obtain more information about Li-Fi, RFID, VANET, and LORAWAN technology. Li-Fi is known as VLC communication system that uses visible light for high data transmission and reception. RFID technology helps the emergency vehicle to reach destination quickly by avoiding any kind of traffic. LORAWAN is a large-scale network technology with a long range and VANET with low power that allows to obtain accurate traffic information on each route and this saves time. The comparison between the different technologies is reviewed in order to obtain the optimized technology as per the applications.

Vartika agarwal

Deep learning techniques to improve radio resource management in vehicular communication network

This paper investigates the deep learning techniques to improve radio resource management (RRM) in vehicular communication network (VCN). In this paper, the deep learning algorithms are highlighted which are used for RRM. Deep learning technique in RRM is basically used to train the model using various algorithms of resource management including network data. Various machine learning tools will be helpful to get best solutions for resource allocation in a large cellular network.

Vartika agarwal

Iot based smart transport management system

Currently, vehicle to vehicle communication is an important application and thrust area of research. In this paper the author highlighted the workings, executions, implementations and the application of the Internet of Things (IoT) in transport management and vehicle to vehicle communication systems. The main advantage of this Industry 4.0 based IoT technology is that it helps us to reduce road traffic and accidents. The limitations of GPS like accuracy, precision, effective analysis, etc. has led to the evolution of Mobile based V2V communication which is more effective, error proof, result oriented and smart. For proper analysis of traffic vehicle to vehicle communication is established. Random Data from vehicles taken by numerous sensors. Any car coming in its variety could effortlessly share the data by either of two cars nearby. With the help of vehicle to vehicle communication we can provide a path of emergency vehicles to reach the destination quickly. Based on the V2V application, Red and Green signals can be marked on the path as per traffic density and the emergency vehicle can take the shortest, fastest and low density route. Similar such examples are elaborated in the current research manuscript that will help the researcher in effectively finding the research gap for further advancement, analysis, innovation and optimization.

Vartika agarwal

Secured scheduling techniques of network resource management in vehicular communication networks

Scheduling is the need of every project. Without scheduling, projects don’t fulfill time constraints, go over spending plan. It is a process utilized by teams to organize and structure their resources so the tasks they need to complete are scheduled based on availability and capability. This process is more beneficial if it is required to allocate and assign task to the resources without allocating their schedules. This paper reviews different types of network scheduling techniques, which are used to schedule a task. These techniques are very effective and help us to preplan the whole scheduling process

Vartika agarwal

Using a resnet50 with a kernel attention mechanism for rice disease diagnosis

The domestication of animals and cultivation of crops have been essential to human development throughout history, with the agricultural sector playing a pivotal role. Insufficient nutrition often leads to plant diseases, such as those affecting rice crops, resulting in yield losses of 20-40% of total production. These losses carry significant global economic consequences. Timely disease diagnosis is critical for implementing effective treatments and mitigating financial losses. However, despite technological advancements, rice disease diagnosis primarily depends on manual methods. In this study, we present a novel Self-Attention Network (SANET) based on the ResNet50 architecture, incorporating a kernel attention mechanism for accurate AI-assisted rice disease classification. We employ attention modules to extract contextual dependencies within images, focusing on essential features for disease identification. Using a publicly available rice disease dataset comprising four classes (three disease types and healthy leaves), we conducted cross-validated classification experiments to evaluate our proposed model. The results reveal that the attention-based mechanism effectively guides the Convolutional Neural Network (CNN) in learning valuable features, resulting in accurate image classification and reduced performance variation compared to state-of-the-art methods. Our SANET model achieved a test set accuracy of 98.71%, surpassing current leading models. These findings highlight the potential for widespread AI adoption in agricultural disease diagnosis and management, ultimately enhancing efficiency and effectiveness within the sector.

Mehdhar S. A. M. Al-Gaashani

Tomato leaf disease classification by exploiting transfer learning and feature concatenation

Tomato is one of the most important vegetables worldwide. It is considered a mainstayof many countries’ economies. However, tomato crops are vulnerable to many diseasesthat lead to reducing or destroying production, and for this reason, early and accuratediagnosis of tomato diseases is very urgent. For this reason, many deep learning modelshave been developed to automate tomato leaf disease classification. Deep learning isfar superior to traditional machine learning with loads of data, but traditional machinelearning may outperform deep learning for limited training data. The authors proposea tomato leaf disease classification method by exploiting transfer learning and featuresconcatenation. The authors extract features using pre-trained kernels (weights) fromMobileNetV2 and NASNetMobile; then, they concatenate and reduce the dimensionalityof these features using kernel principal component analysis. Following that, they feedthese features into a conventional learning algorithm. The experimental results confirmthe effectiveness of concatenated features for boosting the performance of classifiers.The authors have evaluated the three most popular traditional machine learning classifiers,random forest, support vector machine, and multinomial logistic regression; amongthem, multinomial logistic regression achieved the best performance with an averageaccuracy of 97%.

Mehdhar S. A. M. Al-Gaashani

An efficient deep learning approach for colon cancer detection

Colon cancer is the second most common cause of cancer death in women and the third most common cause of cancer death in men. Therefore, early detection of this cancer can lead to lower infection and death rates. In this research, we propose a new lightweight deep learning approach based on a Convolutional Neural Network (CNN) for efficient colon cancer detection. In our method, the input histopathological images are normalized before feeding them into our CNN model, and then colon cancer detection is performed. The efficiency of the proposed system is analyzed with publicly available histopathological images database and compared with the state-of-the-art existing methods for colon cancer detection. The result analysis demonstrates that the proposed deep model for colon cancer detection provides a higher accuracy of 99.50%, which is considered the best accuracy compared with the majority of other deep learning approaches. Because of this high result, the proposed approach is computationally efficient.

Mehdhar S. A. M. Al-Gaashani

An ontology-based approach to reduce the negative impact of code smells in software development projects

The quality of software systems may be seriously impacted by specific types of source code anomalies. For example, poor programming practices result in Code Smells (CSs), which are a specific type of source code anomalies. They lead to architectural problems that consequently impact some significant software quality attributes, such as maintainability, portability, and reuse. To reduce the risk of introducing CSs and alleviate their consequences, the knowledge and skills of developers and architects is essential. On the other hand, ontologies, which are an artificial intelligence technique, have been used as a solution to deal with different software engineering challenges. Hence, the aim of this paper is to describe an ontological approach to representing and analyzing code smells. Since ontologies are a formal language based on description logics, this approach may contribute to formally analyzing the information about code smells, for example, to detect inconsistencies or infer new knowledge with the support of a reasoner. In addition, this proposal may support the training of software developers by providing the most relevant information on code smells. This ontology can also be a means of representing the knowledge on CSs from different sources (documents in natural language, relational databases, HTML documents, etc.). Therefore, it could be a valuable knowledge base to support the struggle of software developers and architects either to avoid CSs or to detect and remove them. The ontology was developed following a sound methodology. The well-known tool Protégé was used to manage the ontology and it was validated by using different techniques. An experiment was conducted to demonstrate the applicability of the ontology and evaluate its impact on speeding up the analysis of CSs.

Mehdhar S. A. M. Al-Gaashani

Classification framework for medical diagnosis of brain tumor with an effective hybrid transfer learning model

Brain tumors (BTs) are deadly diseases that can strike people of every age, all over the world. Every year, thousands of people die of brain tumors. Brain-related diagnoses require caution, and even the smallest error in diagnosis can have negative repercussions. Medical errors in brain tumor diagnosis are common and frequently result in higher patient mortality rates. Magnetic resonance imaging (MRI) is widely used for tumor evaluation and detection. However, MRI generates large amounts of data, making manual segmentation difficult and laborious work, limiting the use of accurate measurements in clinical practice. As a result, automated and dependable segmentation methods are required. Automatic segmentation and early detection of brain tumors are difficult tasks in computer vision due to their high spatial and structural variability. Therefore, early diagnosis or detection and treatment are critical. Various traditional Machine learning (ML) techniques have been used to detect various types of brain tumors. The main issue with these models is that the features were manually extracted. To address the aforementioned insightful issues, this paper presents a hybrid deep transfer learning (GN-AlexNet) model of BT tri-classification (pituitary, meningioma, and glioma). The proposed model combines GoogleNet architecture with the AlexNet model by removing the five layers of GoogleNet and adding ten layers of the AlexNet model, which extracts features and classifies them automatically. On the same CE-MRI dataset, the proposed model was compared to transfer learning techniques (VGG-16, AlexNet, SqeezNet, ResNet, and MobileNet-V2) and ML/DL. The proposed model outperformed the current methods in terms of accuracy and sensitivity (accuracy of 99.51% and sensitivity of 98.90%).

Mehdhar S. A. M. Al-Gaashani

Ict impediments in performing roles and responsibilities by teaching professionals in the higher education institution

Information and communication technology is an instrument in addressing some of the issues of Indian higher education however; there are certain drawbacks to using ICT to enhance teaching and learning. The present research was carried out in The Maharaja Sayajirao University to study the impediment faced by them in the use of ICT in their professional work. Quantitative data was collected from two hundred and ninety faculty members through the purposive and convenient sampling method. The data indicate that faculty members faced technological infrastructure-related impediments such as lack of smart boards, lack of computers, uneven bandwidth of internet, slow internet connection. It is suggested that an adequate atmosphere be developed in the institution that would encourage faculty members to use ICT.

Maniar avani

 < 1 2 3 4 >