{"title":"Subjecting soleprint to fingerprint recognition algorithm treatment","authors":"Obaje Samuel Enemakwu","doi":"10.33545/26633582.2022.v4.i2a.76","DOIUrl":"https://doi.org/10.33545/26633582.2022.v4.i2a.76","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129549244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A critical study of product liability and analysis with special reference to India","authors":"Karmanya Upadhyay","doi":"10.33545/26633582.2022.v4.i2a.77","DOIUrl":"https://doi.org/10.33545/26633582.2022.v4.i2a.77","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124417467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. ., Tanvi Dhingra, Rajat Nagar, P. Tiwari, Deepika Singh
{"title":"Disease detection and consultation using django and machine learning","authors":"D. ., Tanvi Dhingra, Rajat Nagar, P. Tiwari, Deepika Singh","doi":"10.33545/26633582.2022.v4.i1a.67","DOIUrl":"https://doi.org/10.33545/26633582.2022.v4.i1a.67","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126708316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication between machine-to-machine","authors":"Zaid Siddiqui","doi":"10.33545/26633582.2022.v4.i1a.69","DOIUrl":"https://doi.org/10.33545/26633582.2022.v4.i1a.69","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128148560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability checking and performance analysis of stake holder of E-SCM using machine learning and petrinets","authors":"Sayyed Johar, Dr. Samara Mubeen","doi":"10.33545/26633582.2022.v4.i1a.59","DOIUrl":"https://doi.org/10.33545/26633582.2022.v4.i1a.59","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114642100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Breast cancer detection based on thermographic images using machine learning and deep learning algorithms","authors":"Viswanatha Reddy Allugunti","doi":"10.33545/26633582.2022.v4.i1a.68","DOIUrl":"https://doi.org/10.33545/26633582.2022.v4.i1a.68","url":null,"abstract":"According to the latest data, breast carcinoma is the most prevalent kind of cancer in the world, and it is responsible for the deaths of almost 900 thousand people each year. If the disease is detected at the early stage and diagnosed properly, it can improve the chance of positive outcomes, thus reducing the fatality rate. An early diagnosis in fact can help in preventing it to spread and saves the premature victims from obtaining it. When trying to distinguish among benign and malignant tumors, as well as when trying to draw conclusions about mild and advanced breast cancer, researchers who study cancer encounter a number of challenges. The identification of all tumors is accomplished through the application of machine learning, which makes use of algorithms that are able to locate and recognize patterns. All of them, however, revolve around the concept of \"binary grouping,\" as was mentioned earlier (malignant and benign; no-cancer and cancer). In this study, we propose a Computer-aided Diagnosis (CAD) method for the identification and diagnosis of patients into 3 classes (cancer, no cancer, and non-cancerous) under the management of a database. CAD is an abbreviation for computer-aided diagnosis. The Convolutional Neural Network (CNN), the Support Vector Machine (SVM), and Random Forest are all remarkable classifiers (RF). Convolution Networks, Support Vector Machines (SVM), and Random Forest are the three effective classifiers that we look into and analyses for the classification stage (RF). In addition to this, we investigate the impact of the mammography pictures being pre-processed in advance, which allows for a higher success rate in categorization.","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Onoja Emmanuel Oche, Abdullahi Maimuna Ibrahim, Suleiman Muhammad Nasir
{"title":"Ethical issues in computer as an instrument of technology growth","authors":"Onoja Emmanuel Oche, Abdullahi Maimuna Ibrahim, Suleiman Muhammad Nasir","doi":"10.33545/26633582.2022.v4.i1a.58","DOIUrl":"https://doi.org/10.33545/26633582.2022.v4.i1a.58","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123499625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adekunle Ay, A-Min Jo, Adebayo Ao, Joshua Jv, Afonne Ei
{"title":"Development of a mathematical formulation for handover management in heterogeneous network","authors":"Adekunle Ay, A-Min Jo, Adebayo Ao, Joshua Jv, Afonne Ei","doi":"10.33545/26633582.2022.v4.i1a.57","DOIUrl":"https://doi.org/10.33545/26633582.2022.v4.i1a.57","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134180749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data visualization, modelling and analytics","authors":"M. Atif","doi":"10.33545/26633582.2022.v4.i1a.62","DOIUrl":"https://doi.org/10.33545/26633582.2022.v4.i1a.62","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122928404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}