i-manager's Journal on Computer Science最新文献

筛选
英文 中文
PERFORMANCE EVALUATION OF CULTURAL ARTIFICIAL BEE COLONY AND CULTURAL ARTIFICIAL FISH SWARM ALGORITHM 人工养殖蜂群及人工养殖鱼群算法的性能评价
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.6.4.15725
Hadir Adebiyi Busayo, Tijani Salawudeen Ahmed, Folashade O. Adebiyi Risikat
{"title":"PERFORMANCE EVALUATION OF CULTURAL ARTIFICIAL BEE\u0000 COLONY AND CULTURAL ARTIFICIAL FISH SWARM ALGORITHM","authors":"Hadir Adebiyi Busayo, Tijani Salawudeen Ahmed, Folashade O. Adebiyi Risikat","doi":"10.26634/jcom.6.4.15725","DOIUrl":"https://doi.org/10.26634/jcom.6.4.15725","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128843969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image steganography approach using spatial and transform domain technique 利用空间和变换域技术的图像隐写方法
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.10.1.18504
S. Radhe, Gupta Deepika, Jaiswal Madhuri, K. Vaishnavi, A. L. Prasanna
{"title":"Image steganography approach using spatial and transform domain technique","authors":"S. Radhe, Gupta Deepika, Jaiswal Madhuri, K. Vaishnavi, A. L. Prasanna","doi":"10.26634/jcom.10.1.18504","DOIUrl":"https://doi.org/10.26634/jcom.10.1.18504","url":null,"abstract":"Cryptography is often used to keep information confidential by making it illegible. However, incomprehensible information may raise suspicions of the adversary and may lead him to sabotage this style of communication. Therefore, steganography has a place in the arena of information security. Steganography refers to the technique of hiding information in digital media to hide the existence of information. Data caching is the art of hiding data for colorful purposes similar as; to maintain private data, secure non-public data and so on. Securely exchange the data over the internet network is veritably important issue. So, to transfer the data securely to the destination, there are numerous approaches like cryptography and steganography. In this design we propose a LSB & DCT grounded steganographic system for hiding the data by applying Least Significant Bit (LSB) algorithm for bedding the data into the images which is enforced through the HTML, CSS, JavaScript.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127474651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AES-based encoding and decoding images using MATLAB 基于aes的图像编码和解码
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.4.18595
Thakur Neelima, Choubey Siddhartha, Choubey Abha
{"title":"AES-based encoding and decoding images using MATLAB","authors":"Thakur Neelima, Choubey Siddhartha, Choubey Abha","doi":"10.26634/jcom.9.4.18595","DOIUrl":"https://doi.org/10.26634/jcom.9.4.18595","url":null,"abstract":"This paper mainly deals with mixed-image secret writing techniques. From the point of view of information security, recording secret images are extremely important. Security is the most complex aspect of networks and network applications. The web and networked applications are growing in the blink of an eye, which increases the importance and, therefore, the value of the information transmitted through the web or alternative media. Encryption can be related to improve image security by scanning pixels. Encryption will protect privacy on its own. It works in a wide variety of fields, such as network communications, medical photography, and military communications. Due to the natural selection of images, such as high duplication of information and the ability of mass dissemination of information, image encryption is different from the text. Text encryption is the conversion of information into an encoded cipher code that cannot be easily decrypted by outsiders.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127480749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALYSING CUSTOMER'S PURCHASING PATTERN BY MARKET BASKET ANALYSIS 通过市场购物篮分析分析客户的购买模式
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.7.1.15582
Khandelwal Ritu, Divyasharma, Kanwar Harsh
{"title":"ANALYSING CUSTOMER'S PURCHASING PATTERN\u0000 BY MARKET BASKET ANALYSIS","authors":"Khandelwal Ritu, Divyasharma, Kanwar Harsh","doi":"10.26634/jcom.7.1.15582","DOIUrl":"https://doi.org/10.26634/jcom.7.1.15582","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130651878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PRECISE DETECTION OF PHISHING URLS USING RECURRENTNEURAL NETWORKS 使用递归神经网络精确检测钓鱼网址
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.1.18154
Neeharika Kamireddy, K. P. RUPHAA SRI, B. Vishruthi, M. Suresh Anand
{"title":"PRECISE DETECTION OF PHISHING URLS USING RECURRENT\u0000NEURAL NETWORKS","authors":"Neeharika Kamireddy, K. P. RUPHAA SRI, B. Vishruthi, M. Suresh Anand","doi":"10.26634/jcom.9.1.18154","DOIUrl":"https://doi.org/10.26634/jcom.9.1.18154","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"15 9-10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123621110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MACHINE LEARNING APPROACH TO SENTIMENT ANALYSIS OF USERS’ MOVIE REVIEWS 用机器学习方法对用户的电影评论进行情感分析
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.7.1.15701
Adetunmbi Adebayo, A. Oluwafemi, Olutomilola Oluwayemisi, Boyinbode Olutayo
{"title":"MACHINE LEARNING APPROACH TO SENTIMENT\u0000 ANALYSIS OF USERS’ MOVIE REVIEWS","authors":"Adetunmbi Adebayo, A. Oluwafemi, Olutomilola Oluwayemisi, Boyinbode Olutayo","doi":"10.26634/jcom.7.1.15701","DOIUrl":"https://doi.org/10.26634/jcom.7.1.15701","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A review on gesture based MSG system using python 基于手势的python MSG系统综述
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.11.1.19391
Mandal Prapti, S. Akansha, Pandey Vibha
{"title":"A review on gesture based MSG system using python","authors":"Mandal Prapti, S. Akansha, Pandey Vibha","doi":"10.26634/jcom.11.1.19391","DOIUrl":"https://doi.org/10.26634/jcom.11.1.19391","url":null,"abstract":"Video tracking and processing have become increasingly important in modern technologies due to their ability to provide data for various research projects and system representation. This paper sheds light on the capabilities for processing images using OpenCV, MediaPipe Library, Python programming language and a Convolutional Neural Network (CNN). To achieve the desired results, a wide range of methods for data processing and manipulation are utilized. OpenCV (Open Source Computer Vision) library is used to process real-time webcam data, allowing the user to write or draw simply by moving their hand and following their fingertip. Also, the CNN model is used to facilitate gesture detection.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124904231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EVOLUTION OF OS ARCHITECTURES: A SURVEY ON PARALLELCOMPUTING BASED OS KERNELS 操作系统架构的演变:基于并行计算的操作系统内核综述
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.8.3.18252
Najam Rohma, Deen Ebrahim
{"title":"EVOLUTION OF OS ARCHITECTURES: A SURVEY ON PARALLEL\u0000COMPUTING BASED OS KERNELS","authors":"Najam Rohma, Deen Ebrahim","doi":"10.26634/jcom.8.3.18252","DOIUrl":"https://doi.org/10.26634/jcom.8.3.18252","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120945070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HYBRID METHOD FOR DATA SHARING AMONG COOPERATIVEUSERS IN MOBILE ENVIRONMENT 移动环境下协作用户间数据共享的混合方法
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.2.17113
Bhomini P. AMUDHA, J. Jayasudha
{"title":"HYBRID METHOD FOR DATA SHARING AMONG COOPERATIVE\u0000USERS IN MOBILE ENVIRONMENT","authors":"Bhomini P. AMUDHA, J. Jayasudha","doi":"10.26634/jcom.9.2.17113","DOIUrl":"https://doi.org/10.26634/jcom.9.2.17113","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115272350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AN ONLINE LECTURER EVALUATION SYSTEM: A CASE STUDY OF FUT MINNA 在线讲师评价系统:以fut minna为例
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/JCOM.7.1.16126
Sufyan Danmallan Sulaiman, David Apata Adeoluwa, A. O. Oluwaseun, Ifeoma Mustapha Segilola, S. A. Olawale
{"title":"AN ONLINE LECTURER EVALUATION SYSTEM:\u0000 A CASE STUDY OF FUT MINNA","authors":"Sufyan Danmallan Sulaiman, David Apata Adeoluwa, A. O. Oluwaseun, Ifeoma Mustapha Segilola, S. A. Olawale","doi":"10.26634/JCOM.7.1.16126","DOIUrl":"https://doi.org/10.26634/JCOM.7.1.16126","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115642699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信