Introduction The ability of plants to grow and give healthier growth and sustainable yield of a plant is directly decided by the root system. It is therefore essential to analyze the root part of a plant to diagnose disease infection in its earlier stage and to trace out the possible reasons of low productivity. Normally for diagnosis of root infestation, …
Read More »Alsa Hasan
Cloud Powered Plant Image Warehouse
Introduction Over many decades, the researchers and academicians in the NARES (National Agricultural Research and Education System) in various disciplines have been putting huge efforts in finding solutions to various challenges encountered in the field of agriculture. Common to all approaches, there is certain need to fairly include images of crop species, varieties or insects subjected to their academic or …
Read More »DEPRESSIKA: An Early Risk of Depression Detection through Opinions
Introduction Depressika: An Early risk of Depression Detection through Opinions is based on identifying early risks through sentiments of social media such as twitter posted by the users. Approaching this problem demands powerful techniques such as learning a powerful subset of machine learning algorithms identified as the neural networks. Depressika requires a sentiment classifier that categories or classifies early risks …
Read More »Diverging Mysterious in Green Supply Chain Management
Introduction In the past few years, Green Supply Chain Management (GSCM) has gained increased coverage.1 GSCM’s criteria have expanded because of public interest, cultural, environmental or legislative causes. The GSCM includes traditional management of the supply chain that integrates environmental criteria and concerns in the decision on purchasing organizations and long-term relationships with suppliers. It is about confining waste, within …
Read More »Performance of Machine Learning and other Artificial Intelligence paradigms in Cybersecurity
Introduction Background Cyber security is the collection of policies, techniques, technologies, and processes that work together to protect the confifidentiality, integrity, and availability of computing resources, networks, software programs, and data from attack (Berman, D.S., et al., 2019). The process of instructing computers to learn is called machine learning. Machine learning (ML) algorithms inspired by the central nervous system are …
Read More »Text and Voice Based Emotion Monitoring System
Introduction Emotion plays a significant role in successfully communicating one’s intentions and beliefs. Therefore, emotion recognition has recently become the focus of several studies. Some of its applications include computer games, talking toys and call center satisfaction monitoring. In a call centre environment, emotion analytics is important since ineffective handling of conversations by the agents can often lead to customer …
Read More »Identifying Botnet on IoT by Using Supervised Learning Techniques
Introduction The Internet of Things (IoT) might be thought of as the designation of Ubiquitous Computing. In IoT, the user environment is replete of gadgets working cooperatively.1, 2, 3 These gadgets go from computing elements, for example, RFID tags and biochip on ranch animals to smartphones and machines with implicit sensors. Types of gear like these are known by the …
Read More »QoS Priorities in ERP Implementation – A Study of Manufacturing Industry of Nepal
Introduction In this rapid changing world, economy has amplified the demand for corporations for supplying the merchandise a lot of swiftly and with better quality whereas decreasing prices to get high consumer satisfaction. For transitory relief regarding hike in costs can only be fixed by downsizing, outsourcing, etc. To run in the race of competition, many of the organizations are …
Read More »Bayesian Network Model for a Zimbabwean Cybersecurity System
Introduction Background The monotonic increase in the use of the internet has precipitated the advent of Network Intrusion Detection Systems (NIDS). The NIDS draw a distinction between the legitimate network users from malicious ones, and monitor system usage to identify behaviour breaking the security policy (Bringas, P.B., and Santos, I., 2010, p.229). Bayesian Networks (BNs) are directed acyclic graphs that …
Read More »An Evaluation of Big Data Analytics Projects and the Project Predictive Analytics Approach
Introduction Big Data collects and stores huge volumes of data whose management and analysis are increasingly becoming more challenging. A majority of firms or companies are now investing in Big Data Analytics motivated by the potential benefits and competitive edge of this new technology. Big Data involves the processing and management of large volumes of data obtained from a variety …
Read More »Copy Move Image Forgery Detection with Exact Match Block Based Technique
Introduction In today’s digital world, images are a significant part of digital communication. An image can define a situation better than words. Digital images are used in medical science, forensic investigation, journalism, marketing, agriculture and most extensively in social networking websites such as Instagram, Facebook, and Twitter etc. From the time when photography was invented, organisations and individuals have often …
Read More »Real Time Depth Hole Filling using Kinect Sensor and Depth Extract from Stereo Images
Introduction Kinect sensor is able to generate color and depth images at the equal time at a speed of thirty frames per Second. Depth data are used in 3-D vision and robotic applications. These applications are 3-D television, 3-D communication, object detection, gaming industry and gesture recognition for controlling devices. The attractiveness of the Kinect camera can be qualified to …
Read More »Nanotechnology – Intentionality and Free-Will
Introduction Every theory in the making is quite enchanting.9 Ignore everything that does not fit into the theory becomes an acceptable norm. In the process, either fortunately or unfortunately, educating the young minds invariably gets delayed. The Wright brothers observed the flight of birds to make an aircraft.3 There is no evidence of plenty of data being collected and simulations …
Read More »An Assessment of the Effectiveness of E-Learning in AMA Olongapo Campus
Introduction The advancement of technology today has activated vast changes by the way we get to, expend, talk about, and offer substance. AMA Olongapo Campus is the only IT Academic Institutions that offers E-learning program that integrates with blended learning and face to face method of delivery. Normally, learning is sticking to this same pattern. Whereas numerous need learning at …
Read More »Boolean Models Guide Intentionally Continuous Information and Computation Inside the Brain
Introduction In this paper we present a method to transform every Boolean function into one dimension continuous function denoted implication Boolean function or activation function. The values of the Boolean functions are represented by the maximum value as one (true) and the minimum value as zero (false); between true and false there are all possible degrees of truth. Channels in …
Read More »Architecture Selection in Neural Networks by Statistical and Machine Learning
Introduction In the past decade, artificial neural networks (ANN) have been successfully used in many areas of engineering and science.8, 24, 25 However, there are still some problems with using this well-known method. ANN approach is a data driven method so it is very important to select proper components of the method based on the data in order to reach …
Read More »Suitability of OFDM in 5G Waveform – A Review
Introduction Exploration as well as upgradation to 5G mobile wireless technologies have been the current topic of research in both the academia and industries. Though Code-Division Multiple Access (CDMA) was used extensively in the Third Generation (3G) technologies, it had certain disadvantages like Inter-Symbol-Interferences and High power consumptions. The CDMA was replaced with OFDM as it possessed higher ease of …
Read More »Controlling the Speed of Conveyor Belt using Python – Raspberry Pi 3B+
Introduction In the world of food processing industry, there are still a few areas in which it is quite sufficient to transport manually from one place to another place of the material components, but, for high-unit loads, automated systems have become essential part of it. Conveyors are durable and reliable components used in automated distribution and warehousing, as well as manufacturing and …
Read More »A Review on Cyber Security and the Fifth Generation Cyberattacks
Introduction Due to the increasing trust and usage of the Internet, almost all the industries, government and even financial institutions has transformed their transactions to the cyber infrastructure. This makes the cyber system more vulnerable to cyberattacks. A cyberattack is a malicious attempt made by an individual or organization to breach the information system of another individual or organization. Most …
Read More »Justifying IT Investment: Extension of a Model using a Case Study from Jordan
Introduction The investment in information technology results in a wide transformation toward automating the business processes in different fields in organizations. Organizations in the 21st century adopt diverse applications and technologies to transform manual processes to automated processes to reduce their costs and increase their revenues.1 Information technology is the course of action that collects, stores, processes, and transmits data. …
Read More »An Edge Computing Tutorial
Edge Computing The Internet of Things is a network or an interconnection of devices, sensors, or actuators that share information through a unified protocol. The devices use ubiquitous sensing, data analysis, information representation and the same framework to achieve this. A standard IoT network consists mainly of radio frequency identification devices (RFID) and Wireless Sensor Networks (WSN). This type of …
Read More »Towards financial valuation in data-driven companies
Introduction Nowadays, data-driven companies are widespread in all business contexts.19, 17, 4 How-ever, the real implications of being a data-driven company are huge and not all the companies can easily transform into one.5 A data-driven approach is one in which companies organize and analyze their data carefully in order to improve their customer service and predict future product demands. One …
Read More »Performance analysis of Remote Sensing Application using area wise prediction
Introduction The expression “remote sensing satellites” is also called as the “aerial photography” regard as the depiction. The main research focused on the evolution of remote sensing satellites in four decades i.e., 1960-2010. Detecting the portraits of the huge plane from expanded partitions utilized airborne picture making and they utilized to grab the pictures.1 Remote sensing systems came into the …
Read More »Implementation of Digital Notice Board using Raspberry Pi and IOT
Introduction Notice board is an essential information gathering system in our life. In our day-to-day life, we can see notice boards in various places like educational institutions, railway stations, shopping malls, Bus stations, offices etc. So we can say that Notice boards are the places to leave public information such as advertise events, announce events or provide attention to the …
Read More »Health Monitoring System using Raspberry Pi and IOT
Introduction The Internet of Things is a rising topic of social, economic and technical significance. Internet of Thing using sensors, Processors and Microcontrollers with accessories used for communication through the internet and becoming the constitutive part of the Internet, it is built with a suitable protocol which helps the interacting and communicating with each other and with the users respectively. …
Read More »Rethinking Cluster-based Routing in Wireless Sensor Networks
Wireless sensor networks (WSNs) can be employed in many application areas for various civilian and military scenarios. The main reason is that a WSN does not require a pre-defined network infrastructure and can be deployed on an ad-hoc basis. A sensor node in a WSN1 senses the sensing field and gathers important data such as temperature and detection of enemy …
Read More »Web@30: A Vote for Digital Ethics
Pearls are enduring and last under pressure, so is the web. But in its Pearl-jubilee, not all are shining in the web as pearls do. Is the World Wide Web the web we would love to have in every respect? Tim Berners-Lee, whose initial proposal at CERN, Geneva in March 1989 opened the way to a technological revolution which influenced …
Read More »Hostel Management System Based on Finger Print Authentication
Introduction Fingerprint identification is one of the most well-known and common biometric authentication systems.6 The system is specially proposed for hostel management and monitoring. Security in the organization is one of the most persistent issues that organization must address. Nowadays security is a prime concern in each individual’s life. Currently student’s attendance becomes more vital element for every organization. Entering …
Read More »Developed Web-Based System for Performance Evaluation Based on Balanced Scorecard Model: Case Study in Ethiopian Organizations
Introduction Performance measurement has great impact in organization management procedure. The need to impressive performance tools to produce evaluation reports for business performance grounded on commercial as well as non-commercial measures increased in recent years.1 The balanced score card (BSC) system proposed by Robert Kaplan and David Norton in 1992 as” an execution estimation system that additional vital non-money related …
Read More »Use of Mathematical Morphology in Vehicle Plate Detection
Introduction In recent years, research in developing an efficient vehicle number plate detection system has attracted a lot of attention. Every country has a unique number plate. Every number plate has a unique number which helps to distinguish one vehicle from another especially when the vehicles are of the same color, make and model. A vehicle number plate detection system …
Read More »Revisiting the “An Improved Remote User Authentication Scheme with Key Agreement”
Introduction There have been many cryptographic scientists working within the field of remote user authentication using smart card system design.1-22 A user authentication system using smart card contains two roles: the user and the server; and three protocols: registration, login and authentication, and password change. In the design principle, the user’s identity cannot be revealed to a third party to ensure …
Read More »