Introduction The graphs considered here are finite, connected, undirected and simple. The vertex set and edge set of a graph G are denoted by V (G) and E(G) respectively. For various graph theoretic notations and terminology we follow Gross and Yellen3. A dynamic survey of graph labeling is published and updated every year by Gallian2. The concept of Sundaram et …
Read More »Taha Sheikh
A Survey on Recent Advances in Medical Diagnosis and Telemedicine Using Machine Learning Techniques
Introduction Accurate medical diagnosis plays a crucial role in guiding treatment decisions and improving patient outcomes. With the rapid advancements in technology, machine learning has emerged as a powerful tool in the field of medical diagnosis. Machine learning algorithms can analyze vast amounts of patient data, detect patterns, and provide valuable insights to healthcare professionals. These advances have the potential …
Read More »ChatGPT: Capabilities, Limitations, and Ethical Considerations from the Perspective of ChatGPT
Introduction The field of natural language processing (NLP) has witnessed significant advancements in recent years, driven by the development of large-scale language models. Among these models, ChatGPT, based on the GPT-3.5 architecture, has emerged as a state-of-the-art conversational AI system, enabling human-like interaction with machines. This paper aims to provide a comprehensive exploration of ChatGPT, shedding light on its capabilities, …
Read More »Physical Distancing Detection System with Distance Sensor for COVID-19 Prevention
Introduction The COVID-19 pandemic, also known as the coronavirus pandemic, is an ongoing pandemic of coronavirus disease 2019 (COVID-19) caused by the transmission of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). It was first identified in December 2019 in Wuhan, China 1. The outbreak was declared a Public Health Emergency of International Concern in January 2020 and a pandemic in …
Read More »Arduino Uno Based Child Tracking System Using GPS and GSM
Introduction This device is basically an embedded system prototype of the wearable device we plan to introduce. A device or system that has distinct functionalities integrated into it and real-time computation is called an embedded system. It consists of both hardware and software. Embedded systems are crucial for the development of new technologies. Many industries, including the defense industry, the …
Read More »A Comparison between Position-Based and Image-Based Multi-Layer Graphical User Authentication System
Introduction The heart of security system is user authentication. When it comes to computer system security, Human factors are often considered the weakest link. There are three major areas where human computer interaction is important: authentication, security operations, and developing secure systems (Patrick, et al). Here we focus on the authentication problem. The most common computer authentication method is for …
Read More »A Reinforcement Learning Paradigm for Cybersecurity Education and Training
Introduction With the growth of the Internet, cyberattacks are evolving quickly, and the state of cybersecurity is not optimistic. Computers, networks, programs, and data are all protected by a variety of technologies and procedures called “cybersecurity” in order to prevent assaults and unauthorized access, modification, or destruction 1, 21. Firewalls, antivirus software, and intrusion detection systems are all components of …
Read More »Logical Foundations for Reasoning in Cyber – Physical Systems
Introduction Geometric logic aims at being the logic of observations of physical systems and their consequences. “Perpendicular lines intersect at an angle of 90 degrees” is a declarative sentence that describes a physical reality in terms of Geometry. Such a sentence can either be true or false. Most geometric sentences such as this example have a similar quality. They are …
Read More »Challenges of E-Library Services in Tertiary Institutions of Ebonyi State –Nigeria
Introduction E-library is synonymous to both virtual library and digital library which is a library where services or collections of electronic resources are entirely virtual and access through internet service. An E-library does not have a physical space where interested persons can visit to access information or academic resources, instead distribution of resources are done electronically virtually. It is also …
Read More »Automated Hotel Booking and Cancellation Web-Based Application: A Prototype
Introduction The coronavirus pandemic has affected so many people, including travel enthusiasts who booked their trips long before an enhanced community quarantine (ECQ) was imposed in the Philippines 1. Apart from flight cancellations and suspended operations of travel-related services, hotel chains have also been shut down. Many guests postpone and cancel their bookings due to the outbreak. In the meantime, …
Read More »A Comprehensive Survey of IoT-Based Cloud Computing Cyber Security
Introduction A large community of IoT-enabled devices and applications makes up a web of factors (IoT)-based cloud structure. Servers, garage, underpinning infrastructure, actual-time processing, and operations are all blanketed within the infrastructure. IoT-primarily based cloud architecture also includes the requirements and services required for safeguarding, managing, and connecting various IoT packages and devices. The traditional IoT architecture is shown in …
Read More »OpenCL Altera SDK v.14.0 vs. v. 13.1 Benchmarks Study
Introduction OpenCL stands for Open Computing Language, which is an open framework for parallel programming executed across heterogeneous platforms: CPUs, GPUs and DSPs [1]. OpenCL programming model consists of two programs; first, host program, which is usually written in C/C++, and it is responsible for loading the OpenCL programs, memory management, data transfer and errors checking [2]. Second program is …
Read More »Evaluating the Factors that Affect Service Quality Management on Arabic Public Sector
Introduction The efficiency of services is the cornerstone of any public organization. Too many servers would increase the efficiency of the service provided, but it increases the cost. The longer duration customers spend waiting for service increases distress and anxiety, which will affect the customers’ evaluation of the service delivered 1. Queuing is not only a part of our daily …
Read More »Deployment of ROBOT for HVAC duct and Disaster Management
Introduction The SBM (Swachh Bharat Mission) Robot is a robot centred device manually operated internet with a head. The arm used in our robot has a low-cost arm with a good quality acrylic sheet. The word used for a mechanical device is the number of independent parameters that describe its structure called DOF (Degrees of Freedom). Once a robot arm …
Read More »Virtual Machine Migration in Cloud Computing
Introduction Virtual Machine gives users the ability to run multiple operating systems on a single physical device. However, there will come a time when the computer machine’s memory will be full, causing the computer machine to slow down. To address this issue, we can use VM migration, which allows users to transfer operating system instances from one physical computer machine …
Read More »Role of Librarian in Electronic Libraries
Introduction The information and knowledge from library which is in the form of electronic and digital sources are called e-library. Those libraries in which the information and knowledge are comprised in the form of electronic devices or digital equipments are called electronic libraries. The following terms are used for above respective themes electronic library. Electronic Libraries Paperless Libraries Virtual Libraries …
Read More »ICT in Agriculture: Creating SMART Farmers
Introduction Timely and reliable information related to agriculture acts as a magic for agriculture and farmers. There are many telecom devices and services for supporting our farmers today. Computers, mobile phones, television are a few of them. Rapid growth in the field of information and technology has initiated a revolution in the field of agriculture also. Instant communication, swift exchange …
Read More »A Cybersecurity Culture Framework for grassroots levels in Zimbabwe
Introduction Background Cybersecurity is a combination of technologies, processes and operations that are designed to protect information systems, computers, devices, programs, data and networks from internal or external threats, harm, damage, attacks or unauthorized access 2 .The essence of cybersecurity is to consolidate the confidentiality, integrity, and availability of computing resources, networks, software programs, and data into a coherent collection …
Read More »A Novel Protocol for Data Transmission Between Device-to-Device Communications in IEEE 802.11 Standards
Introduction To engage more users in cellular networks keeping up high spectral efficiency, the device to-device (D2D) communication using spectrum resources, which are as of now authorize. To cell devices, was presented. As to-Device communications, the resource allocation has been mostly read for Device-to-Device underlay cell networks in different aspects, for example, energy efficient maximization with joint force control of …
Read More »Classification of Lumber Spine Disc Herniation Using Machine Learning Methods
Introduction Lower back pain (LBP) may result from a herniated intervertebral disc by lifting too heavy objects or fracture of the vertebrae due to bruise or osteoporosis 1. The vertebral column, also known as the spinal column, spine, or backbone, is a bony structure that runs through the middle of the body 2. The human spinal column is made up …
Read More »