Browsing Computer Science by Title
Now showing items 6-25 of 105
-
Annotating Web Search Results
(2014-12-15)With more than millions of pages, the Web has become a greatly enormous information source. This information is in form of documents, images, videos as well as text. With such vast sizes of data, it is a common problem to ...
-
Applying Deep Learning Methods for Short Text Analysis in Disease Control
(2017-12-09)Developing countries have been plagued by recurrent cases of infectious disease outbreaks;coupled with the limitation of traditional disease control strategies, other approaches have been explored for disease control, with ...
-
Applying Emerging Data Techniques and Advanced Analytics to Combat Cyber Threat
(2017-12-09)Cyber threats are currently on the rise, which has caused individuals, industrial control systems (ICSs), critical infrastructures (CIs), and nations to be subjected to attacks with great losses. Among the cyber threats ...
-
Approach to a Simulation Virtual Machine: Object Oriented Implementation of CDEVS and PDEVS
(2009-12-12)In the world today, the size of complex problems and systems has increased, due to the advances in technology and the area of computer design and architecture. Modeling and predicting the behaviour of complex systems ...
-
Automated Code Synthesis for Modeling and Simulation
(2011-11-15)We present Automated Code Synthesis for Modeling and Simulation, a MDA [1] approach to Modeling and Simulation with DEVS [2] formalism. The DEVS-Driven Modeling Language (DDML) [3] has been defined to ease simulation ...
-
Automatic Detection of Injecton Attack in Http Requests
(2019-06-20)Malicious user requests pose a vicious threat to backend devices which execute them; more so, could result in the compromise of other user accounts, exposing them to theft and blackmail. It becomes imperative to sanitize ...
-
-
Bidirectional Search in a String Using Wavelet Matrix and Burrows Wheeler Transform
(AUST, 2020-08-02)Wavelet tree is a data structure which permits the representation of sequences of symbols over an alphabet of size σ. It recursively partitions a string into two halves until homogeneous data is obtained. An increase in ...
-
Cassava Leaf Disease Classification with Deep Learning
(AUST, 2021-08-13)Inspired by the current trend in artificial intelligence and neural network research, and with the increase in accuracy of models with deep neural network architecture (DNN), our work is dedicated to developing and training ...
-
Classification of Breast Cancer Using Logistic Regression
(2019-06-16)Breast cancer is a prevalent disease that affects mostly women, an early diagnosis will expedite the treatment of this ailment. In recent times, Machine Learning (ML) techniques have been employed in biomedical and informatics ...
-
Cloud Computing Adoption in Nigeria Universities: A Conceptualized Model Based on Stakeholder Perceptions
(AUST, 2022-12-09)Cloud computing is a technology that represents a shift from traditional ownership of infrastructure and other resources to a more scalable pattern in which computing resources are leased online to businesses on a pay-as-you-go ...
-
A Cloud-Based C/C++ Compiler for Smart Devices
(2017-11-12)The foundation of many of today’s programming languages is the C/C++ language, due to its success and directives that span across several programming paradigms, conceptual models and runtime environments. Smart devices ...
-
A Cloud-Based Java Compiler for Smart Devices
(2016-06-15)The Java programming language is widely used in industry and business. Therefore, academic institutions worldwide include Java learning as a basic part of their Computer Science and Engineering curricula. At the same time, ...
-
A Cloud-Based Java Compiler for Smart Devices
(2016-06-23)The Java programming language is widely used in industry and business. Therefore, academic institutions worldwide include Java learning as a basic part of their Computer Science and Engineering curricula. At the same time, ...
-
Combining Machine Learning Techniques with Statistical Shape Models in Medical Image Segmentation
(2013-05-07)In this thesis, we implemented Point Distribution Model and basic Active Shape Model algorithm and contributed this to the AUST Computer Vision and Machine Learning code library. We applied the Active Shape Model to ...
-
Comparative Study of Annotation Tools and Techniques
(2019-06-16)A huge amount of data is generated on daily basis. The generated data can be both structured and unstructured data. The sources from which most of the unstructured data are found are the dailies, social networks (posts ...
-
A Data Driven Anomaly based behavior detection method for Advanced Persistent Threats (APT)
(2016-06-16)Advanced Persistent Threats (APTs), represent sophisticated and enduring network intrusion campaigns targeting sensitive information from targeted organizations and operating over a long period. These types of threats are ...
-
Deep Learning for Filter Extractions
(2017-12-09)With the exponential growth of the information technology, nowadays tremendous amounts of data including images, audio, text and videos, up to millions or billions, are collected for training machine learning models. Deep ...
-
Design and Evaluation of an Adaptive Network on Chip for Multicore Architectures
(2009-12-12)Network – On – Chip (NoC) communication architecture have emerged as a solution to problem of lack of scalability, clock delay, lack of support for concurrent communication and power consumption exhibited by the shared bus ...
-
Design and Implementation of a Native Mobile Multimedia Learning Application Framework on Android Platform
(2013-05-23)Internet connectivity is one of the fundamental requirements for a successful mobile learning environment. However, within the context of Africa, availability and access, let alone cost, still pose a great challenge in ...