Computer Science: Recent submissions

Now showing items 61-80 of 105

  • On Big Data Management in Internet of Things 

    Ojewale, Mubarak Adetunji (2016-06-16)
    The Internet of Things (IoT) has generated a large amount of research interest across a wide variety of technical areas. These include the physical devices themselves, communications among them, and relationships between ...

  • Quality of service and NFC Communications Security of applications dedicated to dependent people 

    Afolabi-Bello, Oluwayemisi (2016-05-15)
    The application of Near Field Communication (NFC) technology in every part of the world today has tremendously improved efficiency and effectiveness regarding security. The use of this technology in the healthcare system ...

  • An adaptive predictive financial fraud detection approach using deep learning methods on a Big Data platform 

    Isa, Ismail Modibbo (2016-05-16)
    Fraud, waste, and abuse in many financial systems are estimated to result in significant losses annually. Predictive analytics offer government and private financial institutions the opportunity to identify, prevent or ...

  • A mobile based image analysis system for Cervical Cancer Detection 

    Saka, Abiola Monsour (2016-05-15)
    Cervical cancer is the third major killer disease in developed and developing countries. Whereas screening and other preventive measures reduce the mortality rate in developed countries, mortality rates still remain very ...

  • A Hybridized Recommendation System on Movie Data Using Content-Based and Collaborative Filtering 

    Otegbade, Omowunmi (2016-05-15)
    In recent times, the rate of growth in information available on the internet has resulted in large amounts of data and an increase in online users. The Recommendation System has been employed to empower users to make ...

  • A Data Driven Anomaly based behavior detection method for Advanced Persistent Threats (APT) 

    Ezefosie, Nkirue (2016-06-16)
    Advanced Persistent Threats (APTs), represent sophisticated and enduring network intrusion campaigns targeting sensitive information from targeted organizations and operating over a long period. These types of threats are ...

  • Implementation of New Fault Tolerance Solution in Wireless Sensor Networks in a Multi-Channel Context 

    Ohida, Sefiya (2016-08-16)
    Wireless sensor network is application specific, which is deployed in an interested area like about hundred or thousands of sensor nodes. All the sensor nodes communicate via a wireless medium and works cooperatively to ...

  • Wireless Sensor Networks for Environmental Monitoring Applications 

    Odo, Christian Maduabuchi (2016-08-16)
    After many years of rigorous research and development in wireless sensor network (WSN) technology with numerous responses to innovative applications, WSNs still have some interesting unanswered questions. In this thesis ...

  • Formal and Operational Study of P-Devs 

    Eli-Ake, Grace Eyitayo Kehinde (2011-12-15)
    Discrete Event System Specification (DEVS) is a sound formal modeling and simulation (M&S) structure based on generic dynamic system concepts. PDEVS (Parallel Discrete Event System Specification) is a well-known formalism ...

  • Strategies to Implement Parallel Discrete Event System Specification Algorithms 

    Adekunle, Onaopepo Husamat (AUST, 2014-12-15)
    Discrete Event System Specification (DEVS) formalism is a Modeling and Simulation (M&S) framework that provides a means of specifying systems. It separates a model from its simulator. The former describes the structure and ...

  • Genetic Algorithms for timetable Generation 

    Walusungu, Gonamulonga Gondwe (AUST, 2014-12-15)
    Timetabling presents an NP-hard combinatorial optimization problem which requires an efficient search algorithm. This research aims at designing a genetic algorithm for timetabling real-world school resources to fulfil a ...

  • Detecting Denial of Service attack in Wireless Sensor Networks 

    Adebayo, Fisayomi (2014-12-15)
    Wireless sensor networks, thanks to recent technological advances, has become prevalent and offer a variety of applications ranging from environmental monitoring to support and automate chores fields. However, this very ...

  • Adaptive Learning Framework 

    Mubarak, Sani Ibrahim (2016-06-15)
    Many Institutions offer on-line courses to people from all around the world. Learning Management Systems provides a convenient learning environment for on-line courses. Each learner has individual needs and characteristics ...

  • A Cloud-Based Java Compiler for Smart Devices 

    Mohammed, Tanko Yahaya (2016-06-15)
    The Java programming language is widely used in industry and business. Therefore, academic institutions worldwide include Java learning as a basic part of their Computer Science and Engineering curricula. At the same time, ...

  • Group Mutual Exclusion in Opportunistic Network 

    Asulba, Barikisu Ahmed (2016-06-15)
    The Opportunistic network is an interesting development in the Mobile Ad hoc Network (MANET) environment. It has no end-to-end connectivity among nodes. Unlike MANETs, the nodes in Opportunistic network are independent on ...

  • Generic Animation Tool for Traffic Simulation 

    Olayiwola, Joy Ugonna (2016-06-15)
    Traffic simulation has become one of the most used approaches for traffic analysis in support of the design and evaluation of traffic systems. Although traffic flow models have been applied for almost a century to describe, ...

  • Technological Considerations for Devs-Based System Control 

    Ifebude, Barnabas Chukwudike (2016-06-15)
    System control has grown from manual control where humans sense the environment, analyse the result and determine control actions to semi-automated control. In semi-automated control sensing is done by sensing devices and ...

  • Annotating Web Search Results 

    Manthalu, Sam (2014-12-15)
    With more than millions of pages, the Web has become a greatly enormous information source. This information is in form of documents, images, videos as well as text. With such vast sizes of data, it is a common problem to ...

  • A Smart Media-Based Recommendation System 

    Ogbonna, Amanze Darlington (2014-12-15)
    Smart media devices such as: smartphones and tablets are getting more powerful, smarter, cheaper and hence more popular. Recommendation systems become very common in e-business and e-Commerce, for example: Amazon, Google, ...

  • Modeling and Simulation as a Service 

    Ngargoto, Mainroal (2014-12-15)
    DEVS Modeling & Simulation separates a model from its simulator. A DEVS model describes the structure and the behavior of a system, while a DEVS simulator generates the trajectories of these descriptions through execution ...