There has been widespread use of Closed-circuit Television (CCTV) surveillance cameras in both public and private settings to increase security. The bitrate for an FHD (Full High Definition) camera operating at thirty frames per second (30 fps) with moderate compression is eight megabits per second (Mbps). Based on the assumption of this bitrate and a twenty-four-hour recording period, the approximate daily data output of a single FHD camera would then amount to approximately eighty-six Gigab...
This research paper proposes a novel approach to detecting skin diseases using machine learning techniques. The proposed system utilizes image processing techniques to extract features from skin lesion images and then applies machine learning algorithms to classify the lesion into different categories. The proposed system can be evaluated using a large dataset of skin lesion images and the machine can learn itself based on the provided data and achieve high accuracy in detecting various skin ...
ABSTRACT The online rental system is a web-based platform designed to facilitate the process of renting various goods and services over the internet. It provides a convenient and efficient way for individuals and businesses to connect, negotiate, and engage in rental transactions. The system offers a user-friendly interface that allows renters to browse through a wide range of available items or services, such as vehicles, equipment, properties, and more. Users can search for specific rentals...
This research focuses on enhancing the optimization process of the classical ground state energy for hydrogen molecules, which is known to be -1.1373 Ha. Various well-known optimization algorithms such as Gradient Descent Optimizer, Adagrad Optimizer, Adam Optimizer, RMSProp Optimizer, and Momentum Optimizer are employed to explore their convergence behavior and their proximity to the precise ground state energy. The analysis extends to examining potential energy curves to gain insights into ...
ABSTRACTA computerized students' records management system(CSRMS) is a computer program designed to capture, store, manage the creation and maintenance of students' records in an organisation. Records management (RM)isthe practiceofcontrolling recordsofan organizationfrom the time they are created to the time of disposal which includes identifying, creating, classifying, using, storing, securing, retrieving, and destroying or permanently preserving records. Record...
ABSTRACTAcomputerizedstudents'recordsmanagementsystem(CSRMS)isacomputerprogramdesigned to capture, store, manage the creation and maintenanceofstudents' recordsinanorganisation. Records management (RM)isthe practiceofcontrolling recordsofan organizationfrom the time they are created to the timeofdisposal which includes indentifying, creating,classifying,using,storing,securing,retrieving,anddestroyingorpermanentlypreservingrecords.Records management system(RMS)isa collectionofelementsinan orga...
Abstract/Overview In this paper, we carry out an in-depth topological data analysis of COVID-19 pandemic using artificial intelligence and machine learning techniques. We show the distribution patterns of the pandemic all over the world, when it was at its peak, with respect to big datasets in Hausdorff spaces. The results show that the world areas, which experience a lot of cold seasons, were affected most.
Abstract/Overview Cricket farming is an upcoming enterprise to Most households in rural communities. Apparently, there is no documented evidence on how farmers access agricultural information on cricket value chain. This study was carried out to assess the use of information communication technologies (ICTs) by farmers to access value chain information. ICTs application in cricket farming means ease to access cricket value chain information and improved interaction between cricket farmers...
Customers play a pivotal role in the success of any business. The ability to attract and retain the right clientele, who consistently engage with a company's products and services, hinges on a thorough understanding of their purchasing behavior. Successful businesses tailor their offerings to meet the unique requirements and preferences of their customers. Utilizing marketing analysis tools, such as the RFM model, facilitates the segmentation of customers based on distinct parameters, enablin...
ABSTRACT: Examination malpractice and student impersonation is a rising concern in tertiary institutions of learning in Nigeria. Majority of the students nowadays involve in the examination malpractices. Examination monitoring is one of the major approach to ensure quality assurance of school products (graduates). A qualitative examination monitoring will have zero tolerance to examination malpractices. The current method of monitoring of examination in the various school which are manual is...
Abstract: Movement restrictions introduced by the coronavirus pandemic have incentivized the rollout of online services globally. Additionally, more employees were telecommuting throughout the pandemic and remote work has become the new normal. This has provided nefarious actors with lucrative opportunities. Hence there has been an increase in online criminal and terrorism activities. The weaponization of the cyberspace is also a concerning trend in the ongoing geopolitical tensions. This is...
Abstract: This study proposes a new electroencephalography (EEG) biometric authentication for humans based on eye blinking signals extracted from brainwaves. The brainwave signal has been investigated for person authentication over the years because of its difficulties in spoofing. Due to advancing low-cost EEG hardware equipment, it has recently been significantly explored. Most studies in brainwave authentication focus on the use of imagination and mental task to authenticate a subjec...
Abstract: The widespread use of mobile phones has contributed significantly to the emergence of Mobile Money Transfer Services (MMTS) in Lesotho. This invention made a great contribution to the financial sector as it bridged the gap between those who qualify for a bank account and those who have to rely on other financial services except for bank, for their financial needs. The main objective of this research study is to enhance the security of MMTS in Lesotho, and solve its security vulnera...
Abstract: A new paradigm shift from eLearning to mLearning will inevitably change the learning process. There is an immense proliferation of mobile technologies however in education these technologies are not fully utilised. Thus the key question that arises is that what are the factors which influence students to adopt mobile technologies in education? The purpose of the study is to extend and apply Technology Acceptance Model (TAM) as the theoretical framework to explain the determinants o...
Abstract: The objective of face recognition is, given an image of a human face identify the class to which the face belongs to. Face classification is one of the useful task and can be used as a base for many real-time applications like authentication, tracking, fraud detection etc. Given a photo of a person, we humans can easily identify who the person is without any effort. But manual systems are biased and involves lot of effort and expensive. Automatic face recognition has been an import...