Computer Science Research Papers/Topics

A Computerized Students' Records Management System: A Case Study of Faculty of Science and Technology Kampala International University Western Campus

ABSTRACTA computerized students' records management system(CSRMS) is a computer program designed to capture, store, manage the creation and maintenance of students' records in an organisation. Records management (RM)isthe practiceofcontrolling recordsofan organizationfrom the time they are created to the time of disposal which includes identifying, creating, classifying, using, storing, securing, retrieving, and destroying or permanently preserving records. Record...

A COMPUTERIZED STUDENTS' RECORDS MANAGEMENT SYSTEM A CASE STUDY OF FACULTY OF SCIENCE AND TECHNOLOGY KAMPALA INTERNATIONAL UNIVERSITY WESTERN CAMPUS

ABSTRACTAcomputerizedstudents'recordsmanagementsystem(CSRMS)isacomputerprogramdesigned to capture, store, manage the creation and maintenanceofstudents' recordsinanorganisation. Records management (RM)isthe practiceofcontrolling recordsofan organizationfrom the time they are created to the timeofdisposal which includes indentifying, creating,classifying,using,storing,securing,retrieving,anddestroyingorpermanentlypreservingrecords.Records management system(RMS)isa collectionofelementsinan orga...

Topological Data Analysis of COVID-19 Using Artificial Intelligence and Machine Learning Techniques in Big Datasets of Hausdorff Spaces

Abstract/Overview In this paper, we carry out an in-depth topological data analysis of COVID-19 pandemic using artificial intelligence and machine learning techniques. We show the distribution patterns of the pandemic all over the world, when it was at its peak, with respect to big datasets in Hausdorff spaces. The results show that the world areas, which experience a lot of cold seasons, were affected most.

Use of Information Communication Technologies by Cricket Farmers

Abstract/Overview Cricket farming is an upcoming enterprise to Most households in rural communities. Apparently, there is no documented evidence on how farmers access agricultural information on cricket value chain. This study was carried out to assess the use of information communication technologies (ICTs) by farmers to access value chain information. ICTs application in cricket farming means ease to access cricket value chain information and improved interaction between cricket farmers...

Application of RFM Model on Customer Segmentation in Digital Marketing

Customers play a pivotal role in the success of any business. The ability to attract and retain the right clientele, who consistently engage with a company's products and services, hinges on a thorough understanding of their purchasing behavior. Successful businesses tailor their offerings to meet the unique requirements and preferences of their customers. Utilizing marketing analysis tools, such as the RFM model, facilitates the segmentation of customers based on distinct parameters, enablin...

Biometric-Based Examination Monitoring System Using Facial Recognition: Case Study of Yaba College of Technology

ABSTRACT: Examination malpractice and student impersonation is a rising concern in tertiary institutions of learning in Nigeria. Majority of the students nowadays involve in the examination malpractices. Examination monitoring is one of the major approach to ensure quality assurance of school products (graduates). A qualitative examination monitoring will have zero tolerance to examination malpractices. The current method of monitoring of examination in the various school which are manual is...

Investigating the cybersecurity threat landscape for Botswana

Abstract: Movement restrictions introduced by the coronavirus pandemic have incentivized the rollout of online services globally. Additionally, more employees were telecommuting throughout the pandemic and remote work has become the new normal. This has provided nefarious actors with lucrative opportunities. Hence there has been an increase in online criminal and terrorism activities. The weaponization of the cyberspace is also a concerning trend in the ongoing geopolitical tensions. This is...

EEG human biometric authentication using eye blink artefacts

Abstract: This study proposes a new electroencephalography (EEG) biometric authentication for humans based on eye blinking signals extracted from brainwaves. The brainwave signal has been investigated for person authentication over the years because of its difficulties in spoofing. Due to advancing low-cost EEG hardware equipment, it has recently been significantly explored. Most studies in brainwave authentication focus on the use of imagination and mental task to authenticate a subjec...

Conceptual Framework for Multi-Factor Authentication for Mobile Money Systems in Lesotho

Abstract: The widespread use of mobile phones has contributed significantly to the emergence of Mobile Money Transfer Services (MMTS) in Lesotho. This invention made a great contribution to the financial sector as it bridged the gap between those who qualify for a bank account and those who have to rely on other financial services except for bank, for their financial needs. The main objective of this research study is to enhance the security of MMTS in Lesotho, and solve its security vulnera...

Extending the technology acceptance model to predict mobile learning adoption among tertiary education students in Botswana

Abstract: A new paradigm shift from eLearning to mLearning will inevitably change the learning process. There is an immense proliferation of mobile technologies however in education these technologies are not fully utilised. Thus the key question that arises is that what are the factors which influence students to adopt mobile technologies in education? The purpose of the study is to extend and apply Technology Acceptance Model (TAM) as the theoretical framework to explain the determinants o...

Enhanced deep learning with featured transfer learning in Identifying disguised faces

Abstract: The objective of face recognition is, given an image of a human face identify the class to which the face belongs to. Face classification is one of the useful task and can be used as a base for many real-time applications like authentication, tracking, fraud detection etc. Given a photo of a person, we humans can easily identify who the person is without any effort. But manual systems are biased and involves lot of effort and expensive. Automatic face recognition has been an import...

A conceptual framework for mining and analysis of social media data

Abstract: Data has turned to be an essential aspect of every individual, group, industry, financial system, business enterprise, commercial enterprise and society. In this era, where social networks yields inconceivable volumes of data for different purposes on daily bases, an improved approach to analysis of data is required to extract information that best matches user interest. One of the ways of achieving this is through data mining. Data mining could help any consumer or producer of inf...

Assessing factors that influence the success of agriculture mobile information systems: a validation with the DeLone and McLean model

Abstract: The purpose of this study is to assess the factors that influence the success of agriculture mobile information systems in Botswana. Agriculture mobile information systems have been widely adopted in the commercial and subsistence agricultural sector however little research has explored the success of agricultural mobile information systems. Firstly, the factors that influence the success of agricultural mobile information system were identified and adopted from the DeLone and McLe...

Designing a Hybrid Genetic Algorithm Trained Feedforward Neural Network for Mental Health Disorder Detection

This research delves into the innovative application of feed-forward neural networks (FNNs) specifically the multi-layer perceptron (MLP). MLP is a flexible algorithm due to its ability to adapt to different realworld problems amongst other features, and this makes it a preferred machine learning algorithm in the early detection of mental health disorders. MLP’s number of layers and the number of neurons per layer changes to accommodate these abilities. MLP was chosen for this work becau...

A secured data management scheme for smart societies in industrial internet of things environment

Abstract: Smart societies have an increasing demand for quality-oriented services and infrastructure in an industrial Internet of Things (IIoT) paradigm. Smart urbanization faces numerous challenges. Among them, secured energy demand-side management (DSM) is of particular concern. The IIoT renders the industrial systems to malware, cyberattacks, and other security risks. The IIoT with the amalgamation of big data analytics can provide ef cient solutions to such challenges. This paper propose...


1 - 15 Of 1650 Results