Background of the study
Connection to the financial system is very important to different economies in the world. Digital currencies have attracted strong interest in recent years and have the potential to become widely adopted for use in making payment...
ABSTRACT
With the rapid development in Computer Technology, most organization have embraced the use of computer resources in its activities to enable them achieve its set down objectives. Electronic data processing is a wonderful tool which is used extensively in financ...
Background of the study
Traffic congestion is a major problem in many cities, and the fixed-cycle light signal controllers are not resolving the high waiting time in the intersection. We see often a policeman managing the movements instead of the traffi...
ABSTRACT
The restructuring of the electrical power industry has given rise to a high degree of vibrancy and competitive market, which changed many features of the power industry. Energy resources become scarce, the cost of power generation increases, environmental conce...
ABSTRACT
This research developed a hybrid forecasting technique that integrates Cat Swarm Optimization Clustering (CSO-C) and Particle Swarm Optimization (PSO) algorithms with Fuzzy Time Series (FTS) forecasting model. Cat Swarm Optimization Clustering (CSO-C) which is an algorithm for...
Excerpt from the Study
Combinatorial optimization involves the mathematical study of arraignment, ordering, selection or grouping of discrete objects. The complexity of combinatorial problem usually increases as the problem dimension becomes very large. Solving these la...
ABSTRACT
This study presents the development of an improved application specific tunnelling protocol selection scheme (iASTPSS) for site-to-site virtual private network (VPN). The aim is to develop an improved tunnelling protocol selection scheme for site to site VPN that is application...
ABSTRACT
The rate of increase in multimedia data necessitated the need for a large number of storage devices. Nonetheless, the stored multimedia data has a lot of redundant video frames. These redundant frames make video browsing and retrieval difficult as well as time-consuming for the...
ABSTRACT
This study presents the development of an Internet Protocol (IP) traceback scheme for the detection of a denial of service (DoS) attack source base on shark smell optimization algorithm (SSOA). Detection of the source of DoS attack is very important due to the serious damages t...
ABSTRACT
This research presents effect of harmonic generated by variable frequency drives (VFD).In the past, electrical power system equipment and devices were designed to produce nearly sinusoidal voltage and current waveforms. However, nowadays, with much interest and wide spreads of...
STATEMENT OF THE PROBLEM
The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.
The choice of data encryption comes next in...
ABSTRACT
Image steganography is the science of hiding data for securing confidential communication and it is the most popular type of carrier to hold information. Many algorithms have been proposed to hide information into digital images. The least significant bit algorithm (LSB) as one...
Abstract
Dimensionality reduction provides a compact representation of an original high-dimensional data, which means the reduced data is free from any further processing and only the vital information is retained. For this reason, it is an invaluable preprocessing step before the appli...
SUMMARY Recent technological developments have resulted in the emergence of new advanced vehicles such as suborbital vehicles and personal air vehicles. These innovative vehicles have in turn opened up new markets that are characterized by a large and complex solution space that requires designer...
Introduction and Background
Understanding the physics of our surrounding has driven science and technology for a long time and while some part of the earth is well know and understood, its subsurface is mostly unknown. The subsurface is one of today’s most important challenges. Fi...
ABSTRACT
This dissertation has two contributions. The primary contribution is to present a trie based routing table lookup algorithm named CP-Trie. The secondary contribution is to present a high-level synthesis tool named C2RTL that can generate routing table lookup implementation in A...
ABSTRACT
The real-time applications and the IoT promote the need for a newer idle spectrum to support the required high traffic. This pushes toward the emergence of the millimeter-wave (mmWave) and the sub-Terahertz (sub-THz) bands in wireless communication. Albeit these higher frequenc...
ABSTRACT
Due to its potential improvement on network throughput, network coding has attracted considerable research interests. Random Linear Network Coding (RLNC), as a branch of research on network coding, is proposed as a cipher to protect the confidentiality of packets possibly on th...
ABSTRACT
Machine learning is a very useful tool to solve issues in multiple domains such as sentiment analysis, fake news detection, facial recognition, and cyberbullying. In this work, we have leveraged its ability to understand the nuances of natural language to detect cyberbullying....
Abstract
Fully autonomous aerial systems (FAAS) combine edge and cloud hardware with UAVs and considerable software support to create self-governing systems. FAAS complete complicated missions with no human piloting by sensing and responding to their environment in real-time. FAAS requi...
Abstract
The trend towards personalized ubiquitous computing has led to the advent of a new generation of wireless technologies, namely wireless body area networks (WBANs), which connect the wearable devices into the Internet-of-Things. This thesis considers the problems of relay...
ABSTRACT.
In our everyday lives, we interact with agents like personal computers, search engines, cars, etc., and reveal many of our personal choices, biases, and preferences. Improving agents by analyzing their interactions with humans is an active area of research. However, the algori...
Abstract
In the modern world, service oriented applications are becoming more and more popular from year to year. To remain competitive, these Web services must provide the high level of quality. From another perspective, the end user is interested in getting the service, which fits the...
ABSTRACT
The Lomb-Scargle discrete Fourier transform (LSDFT) is a fairly popular technique for analyzing time series within the astronomy community. However, this algorithm is largely unknown in many other disciplines, despite many potential applications. In particular, the atmospheric...
Abstract
Automobiles are integral in today’s society as they are used for transportation, commerce, and public services. The ubiquity of automotive transportation creates a demand for active safety technologies for the consumer. Recently, the widespread use and improved sensing an...
BACKGROUND OF THE STUDY
Wireless Ad hoc Networks are networks in which wireless nodes cooperate to establish network connectivity and perform routing functions in the absence of infrastructure using selforganization. Similarly, Mobile wireless Ad hoc Networks (MANETs) are networks in wh...
ABSTRACT
Distribution of Water has been a major source of concern all over the world. Despite the fact that water is a scarce commodity, a lot of human activities in terms of poor management such as opening taps when not needed and careless attitudes towards broken pipes contribute to p...
ABSTRACT Modified class of single-step numerical schemes were proposed to improve the order of accuracy by imposing intra-step points in the formulation process of the proposed algorithms. The behaviour of modified numerical algorithm is of great concern when varieties of countable off-grid point...
Statement of the Problem
The obnoxious state of the Nigerian manufacturing sector has created a dire need for accurate bankruptcy prediction models about the overall outlook of companies. This is precipitated on the overbearing consequences of corporate bankruptcy on key stakeholders. P...
Introduction
The transportation community has experienced the beginnings of a cultural shift toward embedding transportation system management and operation into our culture, work ethic Manufacturers, distributors, and third-party logistics companies all have specific b...
Background of the study
Cryptography has a long and intricate history that intertwines with the development of number theory. From the ancient ciphers of Julius Caesar to the complex algorithms used in modern-day encryption, the evolution of cryptograph...
CHAPTER ONE
INTRODUCTION
STATEMENT OF PROBLEM
A scheduling situation in a transport company develops when buses are expected to dispatch effectively. Scheduling needs the dispatch and general information about route...
CHAPTER ONE
INTRODUCTION
STATEMENT OF PROBLEM
A scheduling situation in a transport company develops when buses are expected to dispatch effectively. Scheduling needs the dispatch and general information about route...
CHAPTER ONE
INTRODUCTION
1.1 Background of the Study
The rapid proliferation of social media platforms over the past decade has fun...
Background of the study
Artificial intelligence (AI) has become an integral part of many industries, revolutionizing traditional practices and offering innovative solutions to complex problems. In the context of education, AI technologies are inc...
Abstract: THE IMPACT OF PRESCRIPTIVE ANALYTICS ON BUSINESS OUTCOMES
This study investigates the impact of prescriptive analytics on enhancing decision-making processes and achieving favorable business outcomes within organizations. The objectives...
ABSTRACT: Developing vocational education programs for careers in quantum computing is essential to prepare the next generation of professionals for the emerging quantum technology sector. This study aimed to design effective vocational education programs tailored to quantum computing, asses...