{"title":"PDE-based Specular Highlight Elimination","authors":"","doi":"10.30534/ijacst/2024/081312024","DOIUrl":"https://doi.org/10.30534/ijacst/2024/081312024","url":null,"abstract":"Dealing with reflections in images captured through glass would be real headache, as they can obscure the important stuff behind the glass and make the whole image look messy. This is a major problem in many computer vision tasks.Early studies reported that a popular way to tackle the challenge of removing reflections from [1] single images in deep learning. In this article, we take a deep dive into the research on this topic from 2015 to 2021, focusing on how deep learning is being used for [5] single-image reflection removal [4].We searched through a bunch of important online databases and libraries, like IEEE Xplore, Google Scholar, ScienceDirect, SpringerLink, and ACM Digital Library, to find relevant research papers. After carefully going through them, we picked out 25 papers [9] that fit the criteria for our review.We analyzed these papers to answer seven major questions about how deep learning and [3] neural networks are being used for [6] single-image reflection removal. This will hopefully give future researchers a good understanding of what's been done in this area and help them build on that knowledge.The review also highlights the important challenges that data scientists are facing in this area, and also some promising directions for future research. . And importantly, it provides a list of useful datasets that data scientists can use to benchmark their own deep learning techniques against other studies. Whether you're a researcher hungry for the next challenge or just someone who wants to understand how it all works, this review will equip you with the knowledge and inspiration to delve deeper into this fascinating field.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"4 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139445894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA as an Accelerator in Satellite Ground Station for Data Reception and Processing","authors":"","doi":"10.30534/ijacst/2023/011272023","DOIUrl":"https://doi.org/10.30534/ijacst/2023/011272023","url":null,"abstract":"In this paper a data acquisition system which is a combination of hardware and software modules provide solution for high frequency data acquisition and processing for the upcoming satellites. The data acquisition system consists of FPGA based hardware for high frequency satellite data reception, preprocessing along with software modules for few elements of higher level processing thus providing near real time processed output products. The demodulator which receives the Intermediate Frequency data demodulates it, can also archive data in the raw form without any preprocessing done on it. But with the in house developed hardware presented in this paper, it enables us to receive and process the demodulated signal from the demodulator on this hardware and transfer to the system housing the hardware, thereby enabling real time data processing of data and structured data archival on system for further processing in near real time. Thus the FPGA provides the service of data acquisition and processing for all the missions in the ground station before it is archived for permanent and structured data. A new high frequency data acquisition system designed to receive data at 2.88 GHz coming from satellites are encoded, encrypted and compressed which are decoded, decrypted and decompressed in the hardware using the data acquisition system. The FPGA hardware, software and server architecture enable us to receive and process high frequency satellite data, such as those transmitted by Cartosat-2S, Cartosat-3 and the upcoming NISAR.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122557773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Night Vision Thermal sensor based Animal Movement Observation using CNN and YOLO v3","authors":"","doi":"10.30534/ijacst/2023/011262023","DOIUrl":"https://doi.org/10.30534/ijacst/2023/011262023","url":null,"abstract":"Developing an automated system for wildlife detection and recognition using thermal cameras can be challenging nowadays, which have many applications in wildlife conservation and management. This includes many challenges like detecting false positives and negatives and also environmental factors like temperature and humidity. Developed a system for the classification of animals using one of the developed algorithms, the computer-aided CNN algorithm and Python Flask web application that loads a pre-trained convolutional neural network (CNN) model for image classification (cat or dog) and allows the user to upload an image for classification. The wildlife conservationists need a system, which uses a thermal images or videos and detects the animal presence in video. Temperature difference is used to distinguish the animals and can develop the system which uses images to detect the animals in a given video. Using this option, the conservationists will identify the animal using the developed system which is built with yolov3 (You Look Only Once, version 3) algorithm. Finally, if a pet animal is surrounded by a wild animal, or if both pet and wild animals are present in the video, an alarm indication is given in order to protect domestic animals from the wild animals and also safeguard the agriculture fields","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123908823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Container Service Orchestrated with Kubernetes: a State-of-the-Art Technology Review and Application Proposal","authors":"","doi":"10.30534/ijacst/2023/011242023","DOIUrl":"https://doi.org/10.30534/ijacst/2023/011242023","url":null,"abstract":"This paper discusses specific technology related issues with the latest release of the container orchestrator Kubernetes and combining it with certain container runtimes. We provide a technology-focused state-of-the-art review, addressing identified research gaps in this area. Following the depreciation of Dockershim in the latest K8s release 1.26, we’ve tested the migration to another container management tool, that enables using the latest functions or the Containerd runtime (Nerdctl). At the same time this migration also allows running containers in a secure and resource effective way and managing them together with container images. The application we study is orchestrating a container cluster-based cloud NIDS service by using the latest Snort 3 system. We’ve also outlined directions for future research.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing an E-report System for Complaint Management at Catholic University of St. Thomas using Prototyping Method","authors":"","doi":"10.30534/ijacst/2023/011232023","DOIUrl":"https://doi.org/10.30534/ijacst/2023/011232023","url":null,"abstract":"This study aimed to develop an E-report System for Complaint Management at Catholic University of St. Thomas using the Prototyping Method. The system includes a mobile Android app, enabling users to submit and track complaints on-the-go. The system's four phases are requirements gathering, design, implementation, and testing. The system provides a user-friendly interface for submitting and tracking complaints, features a dashboard for administrators, and offers push notifications. The system's four phases are requirements gathering, design, implementation, and testing. The system offers a user-friendly interface for submitting and tracking complaints, a dashboard for administrators, and push notifications. The study used a structured and iterative approach, resulting in a cost-effective solution that meets stakeholder needs. The E-report System is an effective and efficient solution for managing complaints in the education sector.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132169319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Knowledge Management in the Development of Sports Clubs in the Kingdom of Saudi Arabia","authors":"","doi":"10.30534/ijacst/2023/0411212023","DOIUrl":"https://doi.org/10.30534/ijacst/2023/0411212023","url":null,"abstract":"This article aims to identify the role that knowledge management can play in the development of sports clubs in the Kingdom of Saudi Arabia, and as an extension of that, to identify the requirements that help apply knowledge management in sports clubs in the Kingdom and the challenges facing the application of knowledge management in them, and to find out what it can offer Knowledge management to develop these clubs and bring them to a height that touches the aspirations of their fans, especially since sport has become at the present time one of the witnesses of the progress of nations and the progress of peoples, and to achieve this, the quaternary analysis approach was used to identify gaps and stand on strengths and weaknesses, opportunities and expected risks. In addition, in this article, we try to identify the role that knowledge management can play in the development of sports clubs, and the following objectives branch out from it: Knowing knowledge management, its importance, objectives and operations. Determine the challenges facing the application of knowledge management. Determine the requirements for the application of knowledge management. Identify the relationship between knowledge management and sports management. This article is considered the first of its kind - as far as the researcher knows - has come up with many results, where the challenges facing the application of knowledge management in sports clubs have been identified, and the requirements for the application of knowledge management in these clubs have been identified, and in the light of that and through the application of the quaternary analysis approach The strengths, weaknesses, available opportunities and expected risks were identified in the sports clubs in the Kingdom of Saudi Arabia, leading to the role that knowledge management can play to enhance the strengths and overcome the weaknesses and invest in the available opportunities and avoid the expected risks in these clubs, in order to ensure the development of sports clubs. The research recommendations focused on the importance of supporting the Ministry of Sports, sports federations and sports clubs in the Kingdom of the principles and foundations of knowledge management in the sports field in general and in club departments in particular and including it as an administrative department in the organizational structure of clubs and attracting experts in knowledge management with the aim of applying knowledge management in it and then employing it to achieve goals desired. Finally, the research article pointed to the importance of using qualified national cadres from university graduates in knowledge management, in addition to employing technology in its application, all of which will contribute to the development of sports clubs. The research also recommended expanding studies in the field of the role of knowledge management in developing sports clubs in general in the Kingdom. Saudi Arab","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116485016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Medical Records Management in Activating Knowledge Management Applications in Saudi Arabia Hospitals","authors":"","doi":"10.30534/ijacst/2023/0311212023","DOIUrl":"https://doi.org/10.30534/ijacst/2023/0311212023","url":null,"abstract":"There are many justifications that prompted the researcher to choose the subject of the study, namely: The developments witnessed by the health sector worldwide and the Kingdom of Saudi Arabia in particular; the importance and necessity of exchanging knowledge between the various bodies and institutions in the Kingdom of Saudi Arabia to achieve the goals of Vision 2030 programs; the need to build an electronic health system that contributes to the development of scientific research in the health sector in the Kingdom of Saudi Arabia. Therefore, the aim of this article aims to identify the role of medical records management in activating knowledge management applications in private hospitals in the Kingdom of Saudi Arabia. To achieve this general goal, the researcher seeks to achieve the following sub- goals: Identifying the most prominent medical records management practices in private hospitals in the Kingdom of Saudi Arabia; Identifying the requirements for the success of medical records management in activating knowledge management applications in private hospitals in the Kingdom of Saudi Arabia; Exposing the impact of medical records management in private hospitals in the Kingdom of Saudi Arabia; Exposing the obstacles that hinder the management of medical records in private hospitals in the Kingdom of Saudi Arabia from the application of knowledge management; Identify the basic elements of the model that supports the contribution of the medical records management in the field and Supporting as well as activating knowledge management applications in private hospitals in the Kingdom of Saudi Arabia.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"6 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132738482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Verification Process for Assessing Intended Learning Outcomes","authors":"","doi":"10.30534/ijacst/2023/011212023","DOIUrl":"https://doi.org/10.30534/ijacst/2023/011212023","url":null,"abstract":"Continuance and accurate quality assessment of any academic program is the primary indicator of its progress and success. Quality assessment processes are mainly conducted to improve students’ learning outcomes. Successful quality assessment processes should demonstrate clearly how an educational program had achieved its intended learning objectives. To validate the accomplishment of these intended objectives by a course instructor, students’ assessments are usually used to demonstrate that the instructor had covered all relevant contents and material within his lectures. The main drawback of this approach is that it cannot prove that students had really attained the required knowledge and skills for each intended learning objective. In this paper we are proposing a general model and a tool that supports the evaluation of each intended learning objective within a course based on the actual students’ performance on that objective. It measures the accomplishment of an objective not only based on instructor’s opinion but also on the actual students’ assessments results related to that specific objective. For abstraction, the model is consisted of a several layered architecture and a main assessment process. A specialized tool which follows this proposed model has been also developed. It supports a course reviewer to accurately evaluate the accomplishment of each and every indented learning objective within a course. The reviewer’s evaluation will be basically based on the averaged students’ scores and the instructor’s own rating. In addition, this tool will provide the reviewer with the ability to back-track that averaged score to its original assessment objects’ scores","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126819555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concerns from Cloud Security Issues: Challenges and Open Problems","authors":"","doi":"10.30534/ijacst/2023/0211212023","DOIUrl":"https://doi.org/10.30534/ijacst/2023/0211212023","url":null,"abstract":"The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. For example, the owners of data might be worried because the data and associated software are not under their control but rather possessed by the Cloud. In addition, the data owner may not be aware of where the data is geographically located at any particular time. So a question arises as to how secure is the data contained in the Cloud. To help address this question, clients of the Cloud should be given the ability to assess the effectiveness of the Cloud’s security measures. Other concerns include unwarranted and unauthorized stoppage of clients’ services in the Cloud, breach of security measures, and disruption to service availability. In this article, perspectives from Cloud computing practitioners are shown to help address clients concerns and bring about awareness of the measures put in place to ensure the security of the client services running in the Cloud. In addition, we have reviewed a number of the existing Cloud security approaches and techniques to put a systematic survey of the current security issues in the Cloud environment. Furthermore, we discuss challenges and open problems that these mechanisms face to be effective and efficient.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125613751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The role of Smart Technologies in Managing Customer Knowledge: A Survey Study","authors":"","doi":"10.30534/ijacst/2022/011192022","DOIUrl":"https://doi.org/10.30534/ijacst/2022/011192022","url":null,"abstract":"Contemporary organizations in the era of the knowledge economy have taken care of managing customer knowledge to achieve efficiency and effectiveness in the work entrusted to them, and at the same time, recent developments in information technology have pushed organizations to acquire smart technologies, which help them deal with customers intelligently to find smart solutions that achieve the goals of both the client and the organization. In this scientific study, we touched on the role of smart technologies in managing customer knowledge through the main question: What is the role of smart technologies in managing customer knowledge? by using the method of critical review to review a set of studies related to the variables of the study. The results of the study showed that smart technologies contribute to the success of managing customer knowledge and smart technologies enable managing customer knowledge anywhere, anytime, and they also affect the customer experience. The current study found that customer knowledge is the basis for gaining competitive advantage, and through its management helps in gaining customers and building databases in organizations, the study has recommended organizations to use smart technologies in customer knowledge management to meet the wishes and needs of their customers, and that requires the support of the leadership of the organization with all resources, It is also recommended that researchers and specialists in the field of knowledge management and managing customer relationships pay more attention to addressing research areas extensively in smart solutions that contribute to the support of customer knowledge management.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116065282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}