Asian Journal of Research in Computer Science
Latest Publications


TOTAL DOCUMENTS

223
(FIVE YEARS 223)

H-INDEX

2
(FIVE YEARS 2)

Published By Sciencedomain International

2581-8260
Updated Friday, 15 October 2021

Author(s):  
Ekereke, Layefa ◽  
Prince O. Asagba

Jaundice is the abnormal accumulation of Bilirubin in the blood, constant checking of their content level in the blood of new born children is vital as going for Anti-natal because its effect is dangerous and irreversible. At the moment, the standard method to determining the concentration of bilirubin in neonates is Laboratory Blood Test (TSB) test and this method can be traumatic for babies due to the constant blood extraction. Our goal in this research is to use hybridized machine learning techniques to develop a jaundice detection system using all the possible physiological characteristics or symptoms. The developed jaundice detection system is capable of detecting the presence of jaundice in neonate non-invasively, it also has a 0.07% standard error coefficient and a Percentage Value of 0.001 when the outcome was compared to TSB of all Test and Validation samples.


Author(s):  
H. P. Suresha ◽  
Krishna Kumar Tiwari

Twitter is a well-known social media tool for people to communicate their thoughts and feelings about products or services. In this project, I collect electric vehicles related user tweets from Twitter using Twitter API and analyze public perceptions and feelings regarding electric vehicles. After collecting the data, To begin with, as the first step, I built a pre-processed data model based on natural language processing (NLP) methods to select tweets. In the second step, I use topic modeling, word cloud, and EDA to examine several aspects of electric vehicles. By using Latent Dirichlet allocation, do Topic modeling to infer the various topics of electric vehicles. The topic modeling in this study was compared with LSA and LDA, and I found that LDA provides a better insight into topics, as well as better accuracy than LSA.In the third step, the “Valence Aware Dictionary (VADER)” and “sEntiment Reasoner (SONAR)” are used to analyze sentiment of electric vehicles, and its related tweets are either positive, negative, or neutral. In this project, I collected 45000 tweets from Twitter API, related hashtags, user location, and different topics of electric vehicles. Tesla is the top hashtag Twitter users tweeted while sharing tweets related to electric vehicles. Ekero Sweden is the most common location of users related to electric vehicles tweets. Tesla is the most common word in the tweets related to electric vehicles. Elon-musk is the common bi-gram found in the tweets related to electric vehicles. 47.1% of tweets are positive, 42.4% are neutral, and 10.5% are negative as per VADER Finally, I deploy this project work as a fully functional web app.


Author(s):  
J. Sabo ◽  
Y. Skwame ◽  
T. Y. Kyagya ◽  
J. A. Kwanamu

In this article, the direct simulation of third order linear problems on single step block method has been proposed. In order to overcoming the setbacks in reduction method, direct method has been proposed using power series to reduce computational burden that occur in the reduction method. Numerical properties for the block method are established and the method developed is consistent, convergent and zero-stable. To validate the accuracy of the block method, certain numerical test problems were considered, the results shown that the accuracy of our method are more accurate over the existing method in literature.


Author(s):  
Richard Essah

In this 21st Century technology extent of time and worldwide integration, various narrow and medium enterprises exist adopting cloud calculate for their trade operations. Cloud calculate exist an increasing information in visible form Centre technology in accordance with the becoming more intense traffic connected to the internet fashionable the period of the Internet of Things (IoT). These electronics outwit the defect of conventional servers for speed, scalability and effectiveness. However, skilled exist still narrow enterprises that exist undecided of the appropriate of cloud computing time in military operation fashionable trade movement. Thus, this paper is inscribed to survey the views of person who is very involved in education and learning about the benefits of cloud computing rite of a fashionable trade movement that motivate bureaucracy to legally care for business enterprise. The aims of the study include to ascertain the benefits of cloud to small-scale enterprises in India, to determine the challenges facing cloud users and to unravel the strategies that can improve the strategic growth of cloud users in India enterprises.  The researcher used a case study design and a qualitative research approach. The place of the study is Chandigarh University of India and Busy Network company in India.


Author(s):  
Derrick Ngala

Most multi-national organizations in Kenya are adopting an entire suite of enterprise resource planning Software and customize them to fit the business processes. Despite the continued review of the enterprise resource planning suite, the realization of a successful enterprise resource planning implementation for multi-national organizations is becoming difficult, owing to user involvement issues. This research, therefore, addressed this by assessing the effect of user involvement on enterprise resource planning implementation for multi-national organizations in Kenya. The study used a descriptive research design, where it obtained a sample size of 70 respondents and selected the respondents from 85 subjects using stratified proportionate sampling. The data for the study was gathered from primary sources using a questionnaire. Data was evaluated using quantitative analysis to provide descriptive statistics accompanied by inferential analysis to estimate the model. Guided by the study findings, it was concluded that; there is a positive and significant relationship between users’ functional requirements activities and enterprise resource planning implementation; users’ presentation requirement activities positively significantly influence enterprise resource planning implementation, users’ quality assurance activities has a significant moderate influence on its enterprise resource planning implementation, and users’ project management activities have a significant moderate influence on enterprise resource planning implementation. The study recommends that these organizations should; develop users’ functional requirements activities policy, review policies on business processes to accommodate different system implementation practices; review current quality assurance activities by consumers to satisfy the planned enterprise resource planning system demand of the provider, and acquire as well as retain the appropriate users’ project management.


Author(s):  
Ming-Jong Lin

The purpose of this article is to explore and improve the effect of Bipolar Junction Transistor amplifier base-emitter on temperature changes. The prelude starts with Shockley's theory and its formula calculation. Research motivation, literature data and book principles cooperate with MATLAB application software skills to develop programs; it is used to calculate the relationship between various component parameters and temperature changes. The artificial calculation steps are too cumbersome and prone to clerical errors. Therefore, the program approach has been developed with report-style calculation results with both text and pictures. The feature of computer program calculation is the ability to compare and analyze the results produced at different temperatures, rapidly and repeatedly. The lack of known Bipolar Junction Transistors is replaced by Field Effect Transistors that are not affected by temperature. If the Bipolar Junction Transistor is used as the basis for the design, temperature changes must be considered to ensure the design quality. The purpose of this article is to introduce that the process of calculation has made the shift from an artificial-based way to a computer-based one.


Author(s):  
Christian Adu-Boahene ◽  
Solomon Nii Nikoi ◽  
Alberta Nsiah-Konadu

Network intruders are becoming more sophisticated in their approach, resulting in many difficulties in preventing them. They exploit both well-configured systems and vulnerable systems. Aims: To examines the performance of a campus network against attacks on the network systems. Place and Duration of Study: University of Education, Winneba- Kumasi campus. Methodology: Penetration testing was adopted to investigate the vulnerabilities that may occur in a university network. This helps to test for vulnerabilities on the network system that may expose the system to exploits. Results: The test revealed that system-based attacks might be propelled by malignant pariahs on the Internet and noxious insiders straightforwardly associated with inward systems. The perpetrators can exploit vulnerabilities in network foundations and frameworks, for example, servers (web servers, software servers, file and mail servers, etc.), routers, and firewalls.  Conclusion: This work presents a way to deal with evaluating the security stance of a college utilizing penetration testing that meddles negligibly with the flow of traffic and activities on the network infrastructure. attack Insurance against network-based attacks is mind-boggling and, in the offer, to relieving one framework normally gives a stage that can be utilized to dispatch more attacks.


Author(s):  
Chenxi Zhao ◽  
Haoxuan Yu

According to our previous work, we have found that the ZigBee WSN technology and sensors are actually suitable for the underground monitoring, but there are still many problems. So in this viewpoint paper, we showed our viewpoint that the underground driver-less electric transport vehicles could also play an important role in the underground monitoring, that is, underground electric transport vehicles running in the mine roadway could carry mobile sensors to monitor the environmental conditions in the transport roadway. If it could be realized, it will save the number of sensors installed around the mine so as to reduce costs. If it could be realized, the monitoring of underground mines will become more convenient.


Author(s):  
Addo Prince Clement ◽  
Dorgbefu Jnr. Maxwell ◽  
Kulbo Nora Bakabbey ◽  
Akpatsa Samuel Kofi ◽  
Ohemeng Asare Andy ◽  
...  

The survival of the global economy is rooted in the production of goods, rendering of valuable services, and formulation and implementation of favorable trade policies. These goods and services supported by related policies however, must reach prospective customers unblemished in good time, through planned advertisement strategies. Advertisement over the years has evolved from the traditional one-on-one to technology induced ones such as digital marketing and sales. Technological advancement has diversified advertisement into a multi-faceted and dynamic channel with enormous growth and prospects. In this paper, we made a significant effort to identify actual online data to justify why short video (SV) adoption is essential in e-commerce and digital marketing. A total of 23589 datasets were drawn from three global B2C and C2C websites using the scrappy web crawlers to investigate a resilience model in the relationship between SV advertising adoption, quality signals, customer satisfaction, price fairness, and sales in digital marketing. Whereas shop location is vital in traditional shopping, logistics service quality overrides its influence in online shopping settings.


Author(s):  
Ajita Patel ◽  
Krishna Kumar Tiwari

Market Basket Analysis (MBA) is a method for determining the association between entities, and it has often been used to study the association between products in a shopping basket. Trained Computer vision models are able to recognize objects in photos so accurately that it can even outperform humans in some instances. This study shows that combining objective detection techniques with market basket analysis can assist Stores/Kirana in organizing the products effectively. With the use of MBA and Object detection, we formulated recommendations for store arrangements along with putting a recommendation engine on top to help shoppers. After deploying this to local Kirana stores, the Kirana store was able to see an increase of 7% in the sale. The recommendation engine performed better than just the domain knowledge of the kirana store.


Sign in / Sign up

Export Citation Format

Share Document