CRISPR-Cas for bacterial communities

There is an academic demand to drive research into the use of genetic engineering techniques in metagenomics for enhanced biodegradation Yu2013 of micropollutants in wastewater, especially using the novel CRISPR-Cas (Clustered Regularly Interspaced Short Palindromic Repeats and CRISPR associated) system for genome manipulation in bacterial communities. The CRISPR-Cas systems requires a custom single-guide RNA (sgRNA … Read more

AN ONLINE SALES AND INVENTORY SYSTEM WITH CREDIT-LINE MONITORING FOR IYAMU ENTERPRISES

Nowadays online process systems are utilized everywhere throughout the web. One of the online process systems is the online sales and inventory system. It became convenient in every aspect of businesses. Every process data are required details of the costumers such as Items purchased, price list and date, using sales and inventory system can benefit … Read more

Design a system to extract ontology from unstructured information sources for enhancing user search results

Abstract With the fast growth of information volume through the World Wide Web causes an increasing requirement to develop new automatic system for retrieval of documents and ranking them according to their relevance to the user query. There are many search engines available out there. Most of the search engines are hit based which is … Read more

Data mining and Twitter

INTRODUCTION Data analysis for twitter using clustering and classification involves different techniques of data mining, web mining and algorithms used. Data mining is also called knowledge discovery in databases (KDD). It is commonly defined as the process of discovering useful patterns or knowledge from data sources, e.g., databases, texts, images, the Web, etc. The patterns … Read more

bio-metric authentication systems

Abstract: Distributing software and hardware components of a bio-metric authentication system over hosts linked by a network introduces additional challenges compared to developing a centralised system. Among these, fault tolerance and network transfer resilience are of particular importance. Specifically, transmission of data over IP networks is not without flaws: overflowing router queues, parallelised data streams, … Read more

Wireless Sensor Networks

Abstract A Wireless Sensor Network is the gathering of vast number of sensor nodes, that are technically or financially doable and measure the encompassing condition in nature encompassing them. The distinction between common wireless Networks and WSNs is that sensors are delicate to energy utilization (energy consumption). The majority of the consideration is given to … Read more

Face tracking

Abstract: – Face Tracking is an important & challenging research area in the field of computer vision & image processing. Tracking is the method of identification, the position of the moving object in the video. Identifying the face is much more challenging task & then tracking the facial features in a moving video. Facial features … Read more

AI Classifiers

INTRODUCTION My task is produce an output decision based on a dataset that I was given. I am going to use machine learning to experiment with the data using various classifier and then report on the best classifier approach. This report will be about comparing classifiers and offering an insight into why I have taken … Read more

Cyber attacks – attribution

The development in any attribution documentation for cyber related attacks, is to review all information from collected digital evidence to any other pertinent facts founds. While the topic is broad in nature, we will review a cyber attack that was perpetrated from ally countries and third world countries. However, after further investigation found to be … Read more

Artificial intelligence

INTRODUCTION Technology is one of the most important things in human civilization. In this modern era, the development of technology is growing rapidly. In everyday life, people are increasingly in need of technology assistance in their activities. Therefore, in technological development, artificial intelligence required as a supporting component to realize the desired technology. According to … Read more

Spectre

Spectre relies on a generalised idea of memory management, instead of targeting on specific feature of the processor. For example, when speculative execution is performed that accesses memory, it could depend on private data, which could cause the data cache to become vulnerable for attacks through a side channel. The attacker can use timing attack … Read more

HUMAN action recognition

I. INTRODUCTION HUMAN action recognition has become one of the very important topics on the field of pattern recognition especially due to its continually growing use in modern applications in everyday life. Automated crowd surveillance, smart houses and assistive environments, gaming, automated sport analysis, human-machine interaction and others are examples of such applications. The problem … Read more

Cybercrime

The 177 Internet Service Providers (ISPs) in the Philippines offering their services to the country boosted the internet users range to 33.6 million. With a large growth contributed by internet cafes which lead to increase number of small and medium enterprises (SMEs).For many years, Philippines has been considered as a haven for crime committed online … Read more

Information anonymisation

Abstract—Data security and privacy of data is one of the major concerns now days. Distributed computing is the most predominant worldview in late patterns for registering purposes as well as putting away purposes. In the distributed computing Information security and protection of information is one of the significant worry. Information isolation has been broadly examined … Read more

Deep Architectures

Introduction and related work: Permitting computing agent to model our reality all around ok to display what we call intelligence has been the center of more than a large portion of a century of exploration. To accomplish this, unmistakably a vast amount of data about our reality ought to by one means or another be … Read more

Hand Image based Personal Authentication System

Abstract. Hand geometry is widely accepted biometric modality for identification of human beings. This is considered as safest biometric indicator due to its strong resistance against the unauthorized access and easy to use modality from the user point of view. This chapter presents an approach for the personal authentication using geometrical structure of hand images. … Read more

Enhanced Load Balanced Min-Min Algorithm in Cloud Computing

ABSTRACT Cloud computing provides the applications and services presented over the Internet. These services are offered from the data-center all over the world. By using the environments of cloud computing many tasks are requires to be executed by available resources to achieve best performance, to reduce minimum response time, minimum completion time and utilization of … Read more

Integrated Application for Caller-Identification System

ABSTRACT This is an Integrated Application for Caller-Identification System (Caller-ID System). It is the service where the CLI (Caller Line Identity) is sent to the admin. CNAM (Caller Name) is the character text field used in caller name service. Caller-ID System typically consists of the caller’s contact number with contact information. The information made available … Read more

Our computer science essays and dissertations cover popular topics including Artificial Intelligence (AI), Computer Engineering, Computer Networks, The Internet, Data Structure, Discrete Mathematics, File Sharing, Hacking and Security, Programming, Robotics and Software Engineering.