Research at the College of Engineering and Computer Science

Category

Abstract: In smart cities, the fast increase in automobiles has caused congestion, pollution, and disruptions in the transportation of commodities. Each year, there are more fatalities and cases of permanent impairment due to everyday road accidents. To control traffic congestion, provide secure data transmission also detecting accidents the IoT-based Traffic Management System is used. To...
Read More
Abstract: Automated flaw identification has become more important in medical imaging. For patient preparation, unaided prediction of tumor (brain) detection in the magnetic resonance imaging process (MRI) is critical. Traditional ways of recognizing z are intended to make radiologists' jobs easier. The size and variety of molecular structures in brain tumors is one of the...
Read More
Abstract: Bayesian networks are analytical models that may represent probabilistic dependent connections among variables and are useful in machine learning for generating knowledge structure. Due to the vastness of the solution space, learning Bayesian network (BN) structures from data is an NP-hard problem. The score and search technique is one Bayesian Network structure learning strategy....
Read More
Abstract: As internet traffic grows daily, so does the need to protect it. Network security protects data from unauthorized access and ensures their confidentiality and integrity. Steganography is the practice and study of concealing communications by inserting them into seemingly unrelated data streams (cover media). Investigating and adapting machine learning models in digital image steganalysis...
Read More
Abstract: The search for identity is the central theme to numerous literary works, often following the protagonist or another protagonist. This research analyzes the protagonist's growth throughout Swing Time by Zadie Smith, which, like the majority of published psychological works, is motivated by a search for the individual's "authentic self." It's only appropriate that the...
Read More
Abstract: The rapid development of Internet-of-Things (AIoT) systems that assess and respond intelligently to environmental stimuli without human participation has been substantially facilitated by the combined integration of AI and the IoT. However, the volume, velocity, and validity of data and catastrophic transmission latency make it difficult or impossible to process huge volumes of data...
Read More
Abstract: Cloud computing processes vast quantities of data and offers a variety of flexible, secure, on-demand, and cost-effective collaboration options for consumers. Due to the increasing prevalence of hosted services, data security has become an increasingly critical concern. Hadoop, the engine at the heart of cloud computing, causes serious problems for the cloud. Any public,...
Read More
Abstract: In this current century, most industries are moving towards automation, where human intervention is dramatically reduced. This revolution leads to industrial revolution 4.0, which uses the Internet of Things (IoT) and wireless sensor networks (WSN). With its associated applications, this IoT device is used to compute the received WSN data from devices and transfer...
Read More
Abstract: Hate speech recently became a real threat in social media, and almost all social media users are intended to in different ways. Hate speech is not limited to a group or society. It affects many people and can be classified as abusive, offensive, sexism, racism, political affiliation, religious hate, nationality, skin color, disability, gender-based,...
Read More
Abstract: Data generated from social networking sites, blogs, digital magazines, and news websites is the largest human-generated data. Summarization is the process of extracting the crux of a document which when done manually can be tedious and deluging. Automatic text summarization is an approach that encapsulates long documents into a few sentences or words by...
Read More
1 2 3

Recent Comments