Lahore Garrison University Research Journal of Computer Science and Information Technology最新文献

筛选
英文 中文
IoT Based Architecture for Basketball Supervision 基于物联网的篮球监管架构
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-12-31 DOI: 10.54692/lgurjcsit.2019.030490
Mubashir Ali
{"title":"IoT Based Architecture for Basketball Supervision","authors":"Mubashir Ali","doi":"10.54692/lgurjcsit.2019.030490","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030490","url":null,"abstract":"Basketball is one of the most played games in the world with a huge amount of fan following and has a great number of basketballers. Sometimes players get severe lower body wounds such as ankle sprains, shortage of breath, head, teeth, hand, and fingers. Female players have a higher risk of knee injuries than male players. These are health issues that players face while playing basketball. Sports organizations spend millions to train fresh basketball players or for the development of the previous basketball players. The internet of things (IoT) made everyday things readable, controllable and recognizable through the internet and the wireless sensor networks. It is simply the network of interconnected devices that are embedded with sensors, software, and connectivity modules.Nowadays, with this growing technology it is possible to protect the life of players in the game as well as in training sessions, if we detect the problems early in players and appropriate actions will be taken to reduce adverse health effects which can be very dangerous. In this paper, we will propose an architecturefor basketball based on the internet of things (IoT). The main goal behind this approach is to introduce a healthcare system based upon sensors, actuators, devices and telecommunication technologies to communicating real-time stats.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122608129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parallel Data Transmission using New Line Encoding Method 采用新线编码方法的并行数据传输
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-12-31 DOI: 10.54692/lgurjcsit.2019.030491
Waqas Ahmad, Awais Salman Qazi
{"title":"Parallel Data Transmission using New Line Encoding Method","authors":"Waqas Ahmad, Awais Salman Qazi","doi":"10.54692/lgurjcsit.2019.030491","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030491","url":null,"abstract":"In our research paper, we have introduced a unique and new line code method/technique that will have the capability to send two different codes in parallel or concurrently using a single line code, and this will be achieved without any major loss in the shape of the signal. In our proposed new line code, the structure of our code is based on two already well-known line codes that have been used many times in the data communication field, both of them have been combined together. We can say that our new line coding method is a hybrid encoding scheme. This line code combines the properties of already existing line code techniques. At the receiver end, we have implemented a very easy and basic separation  technique that shall help us to separate the real user codes from the added line code, and this will happen without any disturbance or major loss/distortion. There will be no effect on the signal of input data.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125623351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flower Detection in Digital Image Processing using Global Image Enhancement Method 基于全局图像增强方法的数字图像处理中的花朵检测
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-09-30 DOI: 10.54692/lgurjcsit.2019.030382
Arfa hassan, Sarmad Zaheer Ahmad, Qurat ul Ain
{"title":"Flower Detection in Digital Image Processing using Global Image Enhancement Method","authors":"Arfa hassan, Sarmad Zaheer Ahmad, Qurat ul Ain","doi":"10.54692/lgurjcsit.2019.030382","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030382","url":null,"abstract":"Flowers are plays an important role on the planet as they contain the reproduction part of plants. The only flower parts of plants have ability to produce different kinds of fruit, vegetable, and seeds for humans. Flower seeds also are used to produce oil. Honey bees collect nectar from flowers to produce honey. In this paper a new approach is proposed for flower detection. The proposed algorithm is use Global image enhancement and thresholdging technique for flower detection in digital images.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"99 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116908586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer Viruses, Attacks, and Security Methods 计算机病毒、攻击和安全方法
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-09-30 DOI: 10.54692/lgurjcsit.2019.030380
Muhammad Zulkifl Hasan, M Zunnurain Hussain, Zaka Ullah
{"title":"Computer Viruses, Attacks, and Security Methods","authors":"Muhammad Zulkifl Hasan, M Zunnurain Hussain, Zaka Ullah","doi":"10.54692/lgurjcsit.2019.030380","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030380","url":null,"abstract":"with the fast growth of the Internet, computer threats and viruses have become a very serious issue for us, which attract public attention. Therefore, the distribution of computer viruses and worms were discussed in this study. This paper focuses on the effects of computer viruses. The main area of this paperis a brief discussion on computer viruses and security or detection methods. This study is very useful and helpful for computer users to use the different methods, possible steps to protect their system and information from any kind of possible attacks on their system.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126862673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Expert System Technique for Sentiment Analysis of Opinions 观点情感分析的专家系统技术
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-09-30 DOI: 10.54692/lgurjcsit.2019.030383
Sabreena Nawaz, Rabia Khan, Kashaf Ad Dooja
{"title":"An Expert System Technique for Sentiment Analysis of Opinions","authors":"Sabreena Nawaz, Rabia Khan, Kashaf Ad Dooja","doi":"10.54692/lgurjcsit.2019.030383","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030383","url":null,"abstract":"To help the users and the product owners it is quite necessary to extract aspects from the online reviews, their sentiment polarities, and associations between them. There is a great deal of work done in the field of sentiment analysis. Lexical and learning-based systems can be combined to separate the assessments from online opinions and reviews. In learning-based techniques, the Gaussian mixture model can be used for getting probabilistic results for polarities against aspects and naïve baize classifiers for the problem of spam comments which produced better and competitive results against previous techniques.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128686364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things: Architectural Components, Protocols and Its Implementation for Ubiquitous Environment 物联网:面向泛在环境的架构组件、协议及其实现
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-09-30 DOI: 10.54692/lgurjcsit.2019.030384
Waqar Azeem, Aftab Ahmad Malik
{"title":"Internet of Things: Architectural Components, Protocols and Its Implementation for Ubiquitous Environment","authors":"Waqar Azeem, Aftab Ahmad Malik","doi":"10.54692/lgurjcsit.2019.030384","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030384","url":null,"abstract":"Ubiquitous data processing of the sensing nodes has revolutionized the development of electronic industries manufacturing. The concept of the Internet of Things (IoT) is the connectivity of distributed sensing and processing nodes from anywhere rather than fixed computing. For the Implementation of Ubiquitous smart environment, anything and everything can be converted to smart IO Things, and where things have sensing and processing abilities for automation and analysis of environmental processes. Sensors, actuators, embedded processing systems, networking gateways, and IoT Cloud Services are the building blocks of IoT implementation. This paper presents a brief discussion on the connectivity of building blocks with various enabling technologies for the implementation of the Internet of Things. Moreover, many of data link standards and the internet of things data communication protocols will be in the discussion.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134424120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MANet vs VANet- The Applications & Challenges MANet vs VANet-应用与挑战
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-09-30 DOI: 10.54692/lgurjcsit.2019.030381
Mehreen Qamar, Fouzia, Sowaiba Khan, Aqsa, Aneela Mehmood, Raeena
{"title":"MANet vs VANet- The Applications & Challenges","authors":"Mehreen Qamar, Fouzia, Sowaiba Khan, Aqsa, Aneela Mehmood, Raeena","doi":"10.54692/lgurjcsit.2019.030381","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030381","url":null,"abstract":"Vehicular Ad hoc Networks (VANet) and Mobile Ad hoc Networks (MANet) have evolved into one of the very capable fields of research work in wireless networking. VANet is termed as a stimulating form of MANet owing to its highly erratic dynamic topology, frequently occurring disconnections and lifethreateningissues. This paper is a comparative review of MANet, VANet and their applications along with challenges.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130560696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ANALYSIS OF BORDER GATEWAY PROTOCOL, ITS TYPES AND MEASURES TO AVOID RISK 分析了边境网关协议的类型及其规避风险的措施
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-09-30 DOI: 10.54692/lgurjcsit.2019.030379
Prof Dr Aftab Malik, Dr. Haroon Ur-Rashid Rashid, Waqar Azeem
{"title":"ANALYSIS OF BORDER GATEWAY PROTOCOL, ITS TYPES AND MEASURES TO AVOID RISK","authors":"Prof Dr Aftab Malik, Dr. Haroon Ur-Rashid Rashid, Waqar Azeem","doi":"10.54692/lgurjcsit.2019.030379","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030379","url":null,"abstract":"This is the age of digital communication. The process involves sending messages from one end of the network to other end using the internet, extranets and the Internet of Things (IOT) Technologies. Initially, the internet is a small community. But today internet becomes a global community as thousands of different administrative entities own and operate the internet. The process of transferring data across the network is known as routing. The process of routing is performed by using routers. Routers use certain protocols to achieve this task. The Broader Gateway Protocol (BGP) is an interdomain routing protocol that is used to connect two different autonomous systems. The autonomous system is collection of network that runs under a single administrative entity. This paper includes analysis and important techniques of border gateway protocol, types of BGP, its attributes, security threats and measures to avoid risks.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130847035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flying Ad Hoc network (FANET) Communication between UAV's 无人机间的飞行自组网(FANET)通信
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-06-28 DOI: 10.54692/lgurjcsit.2019.030277
Saman Abdi
{"title":"Flying Ad Hoc network (FANET) Communication between UAV's","authors":"Saman Abdi","doi":"10.54692/lgurjcsit.2019.030277","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030277","url":null,"abstract":"In FANET network communication is one of the major concern, and also communication between multi-UAV frameworks. The communication is established between UAV's and base terminal through satellite or any other structure. This kind of communication create issue between UAV's, the long distance between UAV's can create blackouts in communication, because of these issues the ad hoc network can be used among the UAV's, this kind of communication network is called FANET. In this paper I will discuss the implementation of the network and how the network structure can provide reliable communication ad transfer of data between the unnamed aerial vehicles UAV's and the base terminals.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114507209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of SPAN for Identified Network Traffic via Machine Learning 使用SPAN通过机器学习识别网络流量
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-06-28 DOI: 10.54692/lgurjcsit.2019.030276
Akifa Abbas, Danish Ali, Sidra Noureen, Rehmatullah
{"title":"Use of SPAN for Identified Network Traffic via Machine Learning","authors":"Akifa Abbas, Danish Ali, Sidra Noureen, Rehmatullah","doi":"10.54692/lgurjcsit.2019.030276","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030276","url":null,"abstract":"Few years back the number of wireless devices and their use in our daily life has been increased a lot. All devices cell phones, laptops, tablets, camera, TVs, home appliances have become a part of network now. As the network devices are growing and getting connected to each other the security risks are getting higher. All the companies and organizations are now establishing and implanting the public and private wireless networks. Organization have to pay heavy cost to implement and integrate all devices together on a network. As wireless networks are more vulnerable to threats and in security's a huge network all the devices should be identified whenever they enter or leave a network traffic pool the experimental work in this paper will elaborate the methods to identify the network traffic identification under encryption. This paper emphases on identification of devices based on layer 2 functionality by MAC (Media Access Code). Later on, the identification was improved using labeled or tagged traffic methods by use of SPAN (Switch port analyzer technique) technology or protocol with assistance ofVirtual Local Area Network. Many Supervised learning methods were examined during experiment and were referenced on data collected by real time traffic. The network traffic of multiple deceives gradually passes through network so incremental learning method is implemented as classification for streaming data.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132501292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信