Computer Science
Browse by
This collection contains selected research work by Computer Science Students at the master's level, from 2009-2022.
All rights reserved
Recent Submissions
-
A Performant Predict Analytics Approach to Recommender Systems Using Deep Learning Methods
(AUST, 2022-09-05)Recently, Massive amounts of data have been generated as a result of the frequency at which the amount of information available digitally is advancing. To enable users to effectively utilise the huge amount of information, ...
-
Cloud Computing Adoption in Nigeria Universities: A Conceptualized Model Based on Stakeholder Perceptions
(AUST, 2022-12-09)Cloud computing is a technology that represents a shift from traditional ownership of infrastructure and other resources to a more scalable pattern in which computing resources are leased online to businesses on a pay-as-you-go ...
-
A Lightweight Convolutional Neural Network for Breast Cancer Detection Using Knowledge Distillation Techniques
(AUST, 2023-01-15)The second most heterogeneous cancer ever discovered is Breast Cancer (BC). BC is a disease that develops from malignant tumors when the breast cells begin to grow abnormally. Although it grows in the breast, it can spread ...
-
Neural Collaborative Filtering and Autoencoder Enabled Deep Learning Models for Recommender Systems
(AUST, 2022-11-05)Finding important and useful information is getting harder as much more information is available online. The challenge for content producers is to deliver the appropriate content to the appropriate consumers while making ...
-
Ensemble Learning for Url Phishing Detection
(2021-07)Phishing is a social engineering attack that has been perpetuated for long and is still a prominent attack with an attending high number of victims. The adverse effect of this allows phishers easy access to sensitive ...
-
Ensemble Learning for URL Phishing Detection
(AUST, 2020-07-13)Phishing is a social engineering attack that has been perpetuated for long and is still a prominent attack with an attending high number of victims. The adverse effect of this allows phishers easy access to sensitive ...
-
Bidirectional Search in a String Using Wavelet Matrix and Burrows Wheeler Transform
(AUST, 2020-08-02)Wavelet tree is a data structure which permits the representation of sequences of symbols over an alphabet of size σ. It recursively partitions a string into two halves until homogeneous data is obtained. An increase in ...
-
Integrated Information System for a Food Processing Industry: Case Study of Cashew Nuts Processing
(AUST, 2021-07-09)Information System (IS) is an integrated set of components for collecting, storing, and processing data and for providing information and knowledge. IS is commonly used by organizations, business firms, institutions to ...
-
Text Retrieval Using Wavelet Tree
(AUST, 2021-07-20)The wavelet tree is a flexible data structure that permits representing sequences S[1; n] of symbols over an alphabet of size (n), within compressed space and supporting a wide range of operations on S. It has been used ...
-
Cassava Leaf Disease Classification with Deep Learning
(AUST, 2021-08-13)Inspired by the current trend in artificial intelligence and neural network research, and with the increase in accuracy of models with deep neural network architecture (DNN), our work is dedicated to developing and training ...
-
Ai-Enabled Pneumonia Detection System
(AUST, 2021-05-10)The world is currently facing the global pandemic of the Coronavirus disease (COVID-19) disrupting large part of the world, the number of patients has grown progressively. For dealing with this serious emergency, accurate ...
-
Maleria Prevention Using Social Media and Text Mining
(AUST, 2021-07-18)The battle with malaria especially in the African continent still exists and has been taking the lives of many in the area, so there is a need to keep fighting the battle, monitor progress and challenges. One way is the ...
-
Design and Implementation of Multimedia Content on Smartphone for Learning Automata Theory
(AUST, 2013-06-13)Alternative methods of learning that will provide an avenue for students to construct knowledge independently has become the yearning of all and sundry. Computers are revolutionizing the educational institutions as well ...
-
Malware Classification into Families Based on File Contents and Characteristics
(2017-11-29)The use of malicious software (malware) as an instrument for carrying out different criminal activities both organised and non-organised have become the major threat faced by today’s world of connectivity. Frequency and ...
-
Malaria Prediction using Bayesian and other Machine Learning Techniques
(2019-09-12)Main purpose of data mining is to extract valuable information from available data. With the enormous amount of data stored in files, databases, and repositories, in the healthcare sector, it’s increasingly important, if ...
-
Automatic Detection of Injecton Attack in Http Requests
(2019-06-20)Malicious user requests pose a vicious threat to backend devices which execute them; more so, could result in the compromise of other user accounts, exposing them to theft and blackmail. It becomes imperative to sanitize ...
-
Semantic Sentiment Analysis Based on Probabilistic Graphical Models and Recurrent Neural Networks
(2019-07-23)Sentiment Analysis is the task of classifying documents based on the sentiments expressed in textual form, this can be achieved by using lexical and semantic methods. The purpose of this study is to investigate the use of ...
-
Employing Probabilistic Matching Algorithms for Identity Management in the Telecommunication Industry
(2019-06-23)The telecommunication industry has a lot of data related to households, individuals and devices. Advertisers pay a premium to ensure they advertise to their target audience. To ensure that content is personalized, it is ...
-
Observatory System for Monitoring Electric Power Demand and Delivery
(2017-11-22)Nigeria is a fast-growing country in terms of urbanization. One of the major infrastructure challenge is power supply. However, this challenge is often not as a result of power generation but as a result of power distribution. ...
-
Study of Scalable Deep Neural Network for Wildlife Animal Recognition and Identification
(2019-06-16)Recently, deep learning techniques have been used significantly for large scale image classification targeting wildlife prediction. This research adopted a deep convolutional neural network (CNN) and proposed a deep scalable ...