International Journal of Engineering in Computer Science最新文献

筛选
英文 中文
The holt-winters multiplicative model of passengers’ traffic forecast of the Nigeria airports 尼日利亚机场冬季客运量预测的乘数模型
International Journal of Engineering in Computer Science Pub Date : 2021-01-01 DOI: 10.33545/26633582.2021.v3.i1a.45
Tamber, A. Jighjigh, Oladejo O. Michael, Ode Ojowu
{"title":"The holt-winters multiplicative model of passengers’ traffic forecast of the Nigeria airports","authors":"Tamber, A. Jighjigh, Oladejo O. Michael, Ode Ojowu","doi":"10.33545/26633582.2021.v3.i1a.45","DOIUrl":"https://doi.org/10.33545/26633582.2021.v3.i1a.45","url":null,"abstract":"This research work was carried out in response to the need as a result of increase in Nigeria population and the demand for air transport facilities, this research was carried out using the data of the Federal Airport Authority of Nigeria (FAAN) is a federal government agency, set up to manage every commercial airport in the country, as well as making sure that, it provides services to both the airlines and the passengers in the airports. FAAN has a total number of 23 airports out of which four are international airports, seven are domestic airports and twelve are other domestic airports with the total number of 75,879,653 passengers between Jan. 2003 and Dec. 2011. The passenge rs’ traffic of FAAN’s data of 2003 to 2011 was collected and forecasted using the NCSS computer package to generate the Holt-Winters multiplicative model with coefficient of determination, R 2 of 91.04 and the models was used to forecast for the years 2012 to 2019 using the model.","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A dynamic alarm for passengers on travel 为旅途中的乘客提供动态报警
International Journal of Engineering in Computer Science Pub Date : 2021-01-01 DOI: 10.33545/26633582.2021.v3.i1a.48
K. Santhasheela, Haritha C, Srividya Ka, P. M
{"title":"A dynamic alarm for passengers on travel","authors":"K. Santhasheela, Haritha C, Srividya Ka, P. M","doi":"10.33545/26633582.2021.v3.i1a.48","DOIUrl":"https://doi.org/10.33545/26633582.2021.v3.i1a.48","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123687384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of real-time operating system (RTOS) on information models 基于信息模型的实时操作系统性能分析
International Journal of Engineering in Computer Science Pub Date : 2021-01-01 DOI: 10.33545/26633582.2021.v3.i1a.39
A. A, A. Y
{"title":"Performance analysis of real-time operating system (RTOS) on information models","authors":"A. A, A. Y","doi":"10.33545/26633582.2021.v3.i1a.39","DOIUrl":"https://doi.org/10.33545/26633582.2021.v3.i1a.39","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134278277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Head first python 头朝前的蟒蛇
International Journal of Engineering in Computer Science Pub Date : 2021-01-01 DOI: 10.33545/26633582.2021.v3.i1a.41
A. A.
{"title":"Head first python","authors":"A. A.","doi":"10.33545/26633582.2021.v3.i1a.41","DOIUrl":"https://doi.org/10.33545/26633582.2021.v3.i1a.41","url":null,"abstract":"Python is a widely used for both learning and real world programming and it is high-level object-oriented programming language created by Guido van Rossum and first released in 1991. Python features a dynamic type system and automatic memory management and supports multiple programming paradigms, including object-oriented, imperative, functional programming","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127299396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Error detection and correction implementation for computer networks using Arduino 基于Arduino的计算机网络错误检测与纠错实现
International Journal of Engineering in Computer Science Pub Date : 2021-01-01 DOI: 10.33545/26633582.2021.v3.i1a.44
Farah Ali Tahseen, S. Alabady, Sukaina Shukur Alhajji
{"title":"Error detection and correction implementation for computer networks using Arduino","authors":"Farah Ali Tahseen, S. Alabady, Sukaina Shukur Alhajji","doi":"10.33545/26633582.2021.v3.i1a.44","DOIUrl":"https://doi.org/10.33545/26633582.2021.v3.i1a.44","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"505 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132429076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of customer behaviour using web usage mining 使用web使用挖掘分析客户行为
International Journal of Engineering in Computer Science Pub Date : 2021-01-01 DOI: 10.33545/26633582.2021.v3.i1a.40
Mamman Ojima John, Onoja Emmanuel Oche, Audu Elizabeth, Usman Ramalan Baba
{"title":"Analysis of customer behaviour using web usage mining","authors":"Mamman Ojima John, Onoja Emmanuel Oche, Audu Elizabeth, Usman Ramalan Baba","doi":"10.33545/26633582.2021.v3.i1a.40","DOIUrl":"https://doi.org/10.33545/26633582.2021.v3.i1a.40","url":null,"abstract":"This paper attempts to figure out the concealed data and establish user Behaviour online by exploiting the online as a source for data collection. With the assistance of this information, user Behaviour can be predicted very easily. Free tool like similar web and page score were used to analyze user pattern on the web site of the particular establishment. These tools attempt to conduct mining on the web in an independent manner. The experimental result emphasizes a clear way to surf through the web and enhance the design of the web. This paper discusses the elaborate results of website in a particular education domain application. The main objective of conducting this study on websites of the different polytechnics in Federal Republic of Nigeria is to discern the pattern of Behavioural expressions and user characteristics so that institutional establishments can enhance their website structure and may transfer additional information in an applicable and timely manner","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122683643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual secret sharing 可视化秘密共享
International Journal of Engineering in Computer Science Pub Date : 2021-01-01 DOI: 10.33545/26633582.2021.v3.i1a.42
K. Santha, ME Sheela, K. Gayathree, P. Vijayarani, J. Suji, R. Sobika
{"title":"Visual secret sharing","authors":"K. Santha, ME Sheela, K. Gayathree, P. Vijayarani, J. Suji, R. Sobika","doi":"10.33545/26633582.2021.v3.i1a.42","DOIUrl":"https://doi.org/10.33545/26633582.2021.v3.i1a.42","url":null,"abstract":"Multiple secret sharing (SS) scheme is a cryptosystem which encrypts a secret into multiple shares so that any qualified combination of shares can reconstruct the secret, while any forbidden combination of shares reveals no information about the secret In the existing process, the system has more complex stages by introducing two stages for making secure VSS. The first stage is message based privacy. The Secret Share content was Reversed and content is encrypted with the help of triple DES algorithm. The second stage is image based privacy. The image based privacy is applied by embedding encrypted message and user key into multi-media object(image) using LSB based water marking Techniques and then the image is encrypted using AES algorithm. The encrypted image is segmented into shares by file merge and split algorithm. The user key and shares are sent to receiver through mail. The valid receiver can be able to reconstruct the shares into image. By using the user key encrypted message will be obtained. Then the message will be decrypted and reversed to get the secret message. Through this approach the new system improve our privacy and protection of secret sharing.","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133520374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design a effective parallel structure clustering approach for adaptive RGB image segmentation 设计一种有效的并行结构聚类方法用于自适应RGB图像分割
International Journal of Engineering in Computer Science Pub Date : 2020-07-01 DOI: 10.33545/26633582.2020.v2.i2a.37
YL Prathapa Reddy
{"title":"Design a effective parallel structure clustering approach for adaptive RGB image segmentation","authors":"YL Prathapa Reddy","doi":"10.33545/26633582.2020.v2.i2a.37","DOIUrl":"https://doi.org/10.33545/26633582.2020.v2.i2a.37","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122725509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly detection model based on SVM & XGBoost to detect network intrusions 基于SVM和XGBoost的网络入侵异常检测模型
International Journal of Engineering in Computer Science Pub Date : 2020-07-01 DOI: 10.33545/26633582.2020.v2.i2a.32
Manish Khule, Neha Sharma
{"title":"Anomaly detection model based on SVM & XGBoost to detect network intrusions","authors":"Manish Khule, Neha Sharma","doi":"10.33545/26633582.2020.v2.i2a.32","DOIUrl":"https://doi.org/10.33545/26633582.2020.v2.i2a.32","url":null,"abstract":"","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"11 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123487382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Medical image denoising: A brief analysis 医学图像去噪:简要分析
International Journal of Engineering in Computer Science Pub Date : 2020-07-01 DOI: 10.33545/26633582.2020.v2.i2a.34
P. Rath
{"title":"Medical image denoising: A brief analysis","authors":"P. Rath","doi":"10.33545/26633582.2020.v2.i2a.34","DOIUrl":"https://doi.org/10.33545/26633582.2020.v2.i2a.34","url":null,"abstract":"An image is nothing but a pictorial representation of an object. Image without any disturbance or noise is generally best suitable for use. But if the image is corrupted with noise then that is of no value. So denoise is a kind of concept which is taken into consideration to remove noise. In this paper, I have reviewed some of the papers in the field of denoising particularly in the field of medical technologies. There are abundant number of papers released in this area. Some are having some advantages and some disadvantages. Ultimate approach of image denoising is that, we need to denoise the image in such a way so that features of images like edges, corners and other valuable features would not be removed. The ultimate aim of researchers is to get the true image from the denoised image with the probability of success as 1.Hence,this paper is not only meant for reviewing the papers based on denosing techniques but also provides a future direction to extend for further research in this area of medical image denosing.","PeriodicalId":147954,"journal":{"name":"International Journal of Engineering in Computer Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信