Background of the study
Throughout history, people have exchanged products and services via a number of techniques and channels. Many of these methods and materials, such as metal coins or paper money, are typically physical.
Without a questio...
Background of the study
Connection to the financial system is very important to different economies in the world. Digital currencies have attracted strong interest in recent years and have the potential to become widely adopted for use in making payment...
BACKGROUND OF THE STUDY
Employee disengagement is one very serious unnerving issue that results in anxiety for the employee. Oftentimes the situation is unforeseen and doesn’t necessarily lie in the hands of the employer, other times it is even ve...
Background Of The Study
In every society, there must exist some problems. These problems could be in the areas of politics, commerce, education, agriculture, communication, housing, transportation, health etc. In order to solve these problems as they mi...
BACKGROUND OF STUDY
The global financial system is no doubt embracing the current transition from physical currency to almost virtual currencies through the medium of technology. This wave has ushered in the birth of crypto currencies. In the light of t...
INTRODUCTION
Face recognition system is an application for identifying someone from image or videos. Face recognition is classified into three stages ie)Face detection,Feature Extraction ,Face Recognition. Face detection method is a difficult task in image analysis. Fac...
BACKGROUND OF THE STUDY
Electricity is a component that cannot be overlooked in any contemporary economy. It is essential for the expansion of a nation's economy and its overall development that the nation have access to an affordable and dependable...
BACKGROUND OF THE STUDY
The capacity to convey one's thoughts through a set of signs (text), gestures, and noises is referred to as language. It is a distinguishing property of humans, who are the only organisms with such a system. Speech is the oldest and most exte...
ABSTRACT
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency...
Abstract
Data mining has a great deal of attention in the information industry in recent year due to the wide availability of high amount of data and the useful information and knowledge. This project is based on the Application of Data mining technique...
ABSTRACT
With the rapid development in Computer Technology, most organization have embraced the use of computer resources in its activities to enable them achieve its set down objectives. Electronic data processing is a wonderful tool which is used extensively in financ...
Background of the study
Traffic congestion is a major problem in many cities, and the fixed-cycle light signal controllers are not resolving the high waiting time in the intersection. We see often a policeman managing the movements instead of the traffi...
ABSTRACT
The restructuring of the electrical power industry has given rise to a high degree of vibrancy and competitive market, which changed many features of the power industry. Energy resources become scarce, the cost of power generation increases, environmental conce...
ABSTRACT
This study presents an Application of Bat Algorithm-Based Method (BA) forMultiObjective Optimal Network Reconfiguration andDistributed Generation placement in Radial Distribution Network. The BA approach presented in this work enables the reconfiguration of the network as well...
ABSTRACT
For reliable and efficient operation of power system, voltage level and reactive power flow along transmission lines has to be adequately regulated. To control reactive power flow over transmission lines and compensate for varying voltage drops, tap changing transformers are re...
ABSTRACT
This research work presents the Application of Cuckoo Search Algorithm for the simultaneous placement of distributed generation units and shunt capacitor banks in radial distribution networks. The approaches used in most literatures for determining the optimal allocation of DG...
ABSTRACT
This project designs and implements an algorithm which creates a semester course timetable by assigning time-slots and exam halls to a given set of courses to be run that semesterunder given constraints. The constraints include avoiding clashes of time-slots an...
ABSTRACT
Scheduling lectures and practical timetables for a large array of courses is a very complex problem which often has to be solved manually by the center staff even though results are not always fully optimal...
Abstract
This study examines how line losses can be minimized using particle swarm optimization. Three research objective were formulated to give direction towards this work, this study describes theoretical and practical issues concerning line losses minimization in el...
ABSTRACT
The control of voltage level has been identified as one of the most important operational
needs for efficient and reliable operation of power system equipment. Due to the fact
that both the utility and customer equipment are designed to ope...
ABSTRACT
In this dissertation a Clonal Selection Algorithm (CSA) based system that detected multiple instances of circles, quadrilaterals and triangles in an image scene was developed. CSA models how B-cell antibodies of the immune system protect the body from invading...
ABSTRACT
This research presents the development of a Discrete Firefly Algorithm (DFA) based feature selection scheme for improved face recognition. Discrete Cosine Transform (DCT) and Haar wavelet based Discrete Wavelet Transform (DWT) were used for feature extraction, and Nearest Neigh...
ABSTRACT
This research developed a hybrid forecasting technique that integrates Cat Swarm Optimization Clustering (CSO-C) and Particle Swarm Optimization (PSO) algorithms with Fuzzy Time Series (FTS) forecasting model. Cat Swarm Optimization Clustering (CSO-C) which is an algorithm for...
ABSTRACT
Orthogonal Frequency Division Multiplexing (OFDM) is a multi-carrier frequency multiplexing scheme used in broadband wireless communication systems and has advantages such as high spectral efficiency, simple channel equalization and flexibility.One of its major challenges is th...
ABSTRACT
This research is aimed at the development of a modified fruit fly optimization algorithm (mFFOA) for the determination of optimized weighting matrices (Q which is a positive definite matrix that penalizes the states and R which is also a positive definite matrix that penalizes...
ABSTRACT
This research presents the development of a modified token-based congestion control scheme with adaptive forwarding mechanism (mTBCC) algorithm for addressing congestion problems in opportunistic networks (OppNets). The algorithm addresses the limitations associated with the st...
ABSTRACT
This research work presents the development of a privacy aided trust routing model using social similarity in an Opportunistic Network (OppNet). OppNet is a delay tolerant network where link is highly unpredictable. It is an ideal solution in situations where the deployment of...
Excerpt from the Study
This study focused on the development of novel digital image watermarking technique in DOST domain in conjunction with DWT and SVD based on the principle of photon polarization using optimal scaling factor. The developed algorithm is applied on co...
Excerpt from the Study
Combinatorial optimization involves the mathematical study of arraignment, ordering, selection or grouping of discrete objects. The complexity of combinatorial problem usually increases as the problem dimension becomes very large. Solving these la...
ABSTRACT
This research work presents a scheme that identifies line outage and generator outage using contigency analysis and effectively splits the network into a set of predefined islands, with a load shedding strategy to minimise the adverse effect of each outage and to ensure system...
ABSTRACT
High signaling load due to location management (LM) scheme in Long Term Evolution (LTE) Networks is a major quality of service issue due to the significant amount of resources consumed by this scheme. This scheme needs to be managed efficiently to guarantee seamless connection...
ABSTRACT
This research presents the development of a Frangi filter and first-order derivative of Gaussian (FF-FDOG) based power line detection (PLD) algorithm as an improvement to the standard PLD algorithm. Vision-based PLD is important in obstacle avoidance in low-altitude flight and...
ABSTRACT
This study presents the development of an improved application specific tunnelling protocol selection scheme (iASTPSS) for site-to-site virtual private network (VPN). The aim is to develop an improved tunnelling protocol selection scheme for site to site VPN that is application...
ABSTRACT
This research work is aimed at the development of an optimal extracted feature classification scheme in a voice recognition system using dynamic cuckoo search algorithm. This minimized error mismatch in the recognition process and increased accuracy of recognition. Standard voi...
ABSTRACT
The rate of increase in multimedia data necessitated the need for a large number of storage devices. Nonetheless, the stored multimedia data has a lot of redundant video frames. These redundant frames make video browsing and retrieval difficult as well as time-consuming for the...
ABSTRACT
Electricity demand forecasting is a central and integral process for planning periodical operations and facility expansion in the electricity sector. Demand pattern is very complex due to the highly unpredictable behavior of consumers load consumption. Therefore, finding an app...
ABSTRACT
This study presents the development of an Internet Protocol (IP) traceback scheme for the detection of a denial of service (DoS) attack source base on shark smell optimization algorithm (SSOA). Detection of the source of DoS attack is very important due to the serious damages t...
ABSTRACT
This dissertation presents the development of an optimized routing scheme for a capacitated vehicle model using Firefly Algorithm (FFA). The conventional model is a formal description involving mathematical equations formulated to simplify a more complex structure of logistic p...
ABSTRACT
This research work presents development of Firefly algorithm (FA) and application of voltage stability index (VSI) for optimal planning of Distribution Generation (DG) in an unbalanced threephase distribution network. The VSI was used to find the DG location while the FA was us...
ABSTRACT
The generation of electric power using different fuel resources to meet load demand and losses while satisfying various constraints on the system involves high running cost (cost of fuel). Therefore, it requires electric utilities to minimize the cost of production of electric...
ABSTRACT
This thesis presents the development of a Three Degree of Freedom (3DoF) based outlet fluid temperature controller for Shell and Tube Heat Exchanger (STHX). Shell and Tube Heat Exchangers are classes of heat exchangers being used in industries for heat transfer between fluids....
ABSTRACT
A model of transitional probability matrix for Mechanistic-Empirical Pavement Design was developed with the aim of tarnishing the traditional method obtained from the judgment of an expert panel. The model was developed using fatigue and rutting as the critical factors in pavem...
ABSTRACT
The major problems of most wireless technologies such as EDGE, HSPA, WiMax, HSPA+, WiFi G, WiFi and LTE are the imbalance of radio resources allocation as well as unfairness and difficulty to achieve unity index. These result in overstressing the networks while leaving some idl...
ABSTRACT
This research presents effect of harmonic generated by variable frequency drives (VFD).In the past, electrical power system equipment and devices were designed to produce nearly sinusoidal voltage and current waveforms. However, nowadays, with much interest and wide spreads of...
ABSTRACT
This research presents the development of an improved Extended Dijkstra Algorithm (mED-SDN) for Software Defined Networks (SDN) using Representational State Transfer (REST). The original Extended Dijkstra Algorithm for SDN (ED-SDN) cannot handle shortcomings associated with the...
STATEMENT OF THE PROBLEM
The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.
The choice of data encryption comes next in...
ABSTRACT
Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to identify the existence of any hidden information. There are many different carriers for steganography. Of which, most popular ones are di...
ABSTRACT
Image steganography is the science of hiding data for securing confidential communication and it is the most popular type of carrier to hold information. Many algorithms have been proposed to hide information into digital images. The least significant bit algorithm (LSB) as one...
ABSTRACT
In this project, we shall implement the hierarchical clustering algorithm and apply it to various data sets such as the weather data set, the student data set, and the patient data set. We shall then reduce these datasets using the following dimensionality reduction approaches:...
ABSTRACT
Transportation is a basic requirement for every nation, regardless of its industrial capacity, it has been a difficult task for individuals to locate their transport route,...