Tamber, A. Jighjigh, Oladejo O. Michael, Ode Ojowu
{"title":"The holt-winters multiplicative model of passengers’ traffic forecast of the Nigeria airports","authors":"Tamber, A. Jighjigh, Oladejo O. Michael, Ode Ojowu","doi":"10.33545/26633582.2021.v3.i1a.45","DOIUrl":"https://doi.org/10.33545/26633582.2021.v3.i1a.45","url":null,"abstract":"This research work was carried out in response to the need as a result of increase in Nigeria population and the demand for air transport facilities, this research was carried out using the data of the Federal Airport Authority of Nigeria (FAAN) is a federal government agency, set up to manage every commercial airport in the country, as well as making sure that, it provides services to both the airlines and the passengers in the airports. FAAN has a total number of 23 airports out of which four are international airports, seven are domestic airports and twelve are other domestic airports with the total number of 75,879,653 passengers between Jan. 2003 and Dec. 2011. The passenge rs’ traffic of FAAN’s data of 2003 to 2011 was collected and forecasted using the NCSS computer package to generate the Holt-Winters multiplicative model with coefficient of determination, R 2 of 91.04 and the models was used to forecast for the years 2012 to 2019 using the model.","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A dynamic alarm for passengers on travel","authors":"K. Santhasheela, Haritha C, Srividya Ka, P. M","doi":"10.33545/26633582.2021.v3.i1a.48","DOIUrl":"https://doi.org/10.33545/26633582.2021.v3.i1a.48","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123687384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of real-time operating system (RTOS) on information models","authors":"A. A, A. Y","doi":"10.33545/26633582.2021.v3.i1a.39","DOIUrl":"https://doi.org/10.33545/26633582.2021.v3.i1a.39","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134278277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Head first python","authors":"A. A.","doi":"10.33545/26633582.2021.v3.i1a.41","DOIUrl":"https://doi.org/10.33545/26633582.2021.v3.i1a.41","url":null,"abstract":"Python is a widely used for both learning and real world programming and it is high-level object-oriented programming language created by Guido van Rossum and first released in 1991. Python features a dynamic type system and automatic memory management and supports multiple programming paradigms, including object-oriented, imperative, functional programming","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127299396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Farah Ali Tahseen, S. Alabady, Sukaina Shukur Alhajji
{"title":"Error detection and correction implementation for computer networks using Arduino","authors":"Farah Ali Tahseen, S. Alabady, Sukaina Shukur Alhajji","doi":"10.33545/26633582.2021.v3.i1a.44","DOIUrl":"https://doi.org/10.33545/26633582.2021.v3.i1a.44","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"505 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132429076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of customer behaviour using web usage mining","authors":"Mamman Ojima John, Onoja Emmanuel Oche, Audu Elizabeth, Usman Ramalan Baba","doi":"10.33545/26633582.2021.v3.i1a.40","DOIUrl":"https://doi.org/10.33545/26633582.2021.v3.i1a.40","url":null,"abstract":"This paper attempts to figure out the concealed data and establish user Behaviour online by exploiting the online as a source for data collection. With the assistance of this information, user Behaviour can be predicted very easily. Free tool like similar web and page score were used to analyze user pattern on the web site of the particular establishment. These tools attempt to conduct mining on the web in an independent manner. The experimental result emphasizes a clear way to surf through the web and enhance the design of the web. This paper discusses the elaborate results of website in a particular education domain application. The main objective of conducting this study on websites of the different polytechnics in Federal Republic of Nigeria is to discern the pattern of Behavioural expressions and user characteristics so that institutional establishments can enhance their website structure and may transfer additional information in an applicable and timely manner","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122683643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Santha, ME Sheela, K. Gayathree, P. Vijayarani, J. Suji, R. Sobika
{"title":"Visual secret sharing","authors":"K. Santha, ME Sheela, K. Gayathree, P. Vijayarani, J. Suji, R. Sobika","doi":"10.33545/26633582.2021.v3.i1a.42","DOIUrl":"https://doi.org/10.33545/26633582.2021.v3.i1a.42","url":null,"abstract":"Multiple secret sharing (SS) scheme is a cryptosystem which encrypts a secret into multiple shares so that any qualified combination of shares can reconstruct the secret, while any forbidden combination of shares reveals no information about the secret In the existing process, the system has more complex stages by introducing two stages for making secure VSS. The first stage is message based privacy. The Secret Share content was Reversed and content is encrypted with the help of triple DES algorithm. The second stage is image based privacy. The image based privacy is applied by embedding encrypted message and user key into multi-media object(image) using LSB based water marking Techniques and then the image is encrypted using AES algorithm. The encrypted image is segmented into shares by file merge and split algorithm. The user key and shares are sent to receiver through mail. The valid receiver can be able to reconstruct the shares into image. By using the user key encrypted message will be obtained. Then the message will be decrypted and reversed to get the secret message. Through this approach the new system improve our privacy and protection of secret sharing.","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133520374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly detection model based on SVM & XGBoost to detect network intrusions","authors":"Manish Khule, Neha Sharma","doi":"10.33545/26633582.2020.v2.i2a.32","DOIUrl":"https://doi.org/10.33545/26633582.2020.v2.i2a.32","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"11 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123487382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Medical image denoising: A brief analysis","authors":"P. Rath","doi":"10.33545/26633582.2020.v2.i2a.34","DOIUrl":"https://doi.org/10.33545/26633582.2020.v2.i2a.34","url":null,"abstract":"An image is nothing but a pictorial representation of an object. Image without any disturbance or noise is generally best suitable for use. But if the image is corrupted with noise then that is of no value. So denoise is a kind of concept which is taken into consideration to remove noise. In this paper, I have reviewed some of the papers in the field of denoising particularly in the field of medical technologies. There are abundant number of papers released in this area. Some are having some advantages and some disadvantages. Ultimate approach of image denoising is that, we need to denoise the image in such a way so that features of images like edges, corners and other valuable features would not be removed. The ultimate aim of researchers is to get the true image from the denoised image with the probability of success as 1.Hence,this paper is not only meant for reviewing the papers based on denosing techniques but also provides a future direction to extend for further research in this area of medical image denosing.","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}