首页 > 最新文献

i-manager's Journal on Computer Science最新文献

英文 中文
PERFORMANCE EVALUATION OF CULTURAL ARTIFICIAL BEE COLONY AND CULTURAL ARTIFICIAL FISH SWARM ALGORITHM 人工养殖蜂群及人工养殖鱼群算法的性能评价
Pub Date : 1900-01-01 DOI: 10.26634/jcom.6.4.15725
Hadir Adebiyi Busayo, Tijani Salawudeen Ahmed, Folashade O. Adebiyi Risikat
{"title":"PERFORMANCE EVALUATION OF CULTURAL ARTIFICIAL BEE\u0000 COLONY AND CULTURAL ARTIFICIAL FISH SWARM ALGORITHM","authors":"Hadir Adebiyi Busayo, Tijani Salawudeen Ahmed, Folashade O. Adebiyi Risikat","doi":"10.26634/jcom.6.4.15725","DOIUrl":"https://doi.org/10.26634/jcom.6.4.15725","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128843969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image steganography approach using spatial and transform domain technique 利用空间和变换域技术的图像隐写方法
Pub Date : 1900-01-01 DOI: 10.26634/jcom.10.1.18504
S. Radhe, Gupta Deepika, Jaiswal Madhuri, K. Vaishnavi, A. L. Prasanna
Cryptography is often used to keep information confidential by making it illegible. However, incomprehensible information may raise suspicions of the adversary and may lead him to sabotage this style of communication. Therefore, steganography has a place in the arena of information security. Steganography refers to the technique of hiding information in digital media to hide the existence of information. Data caching is the art of hiding data for colorful purposes similar as; to maintain private data, secure non-public data and so on. Securely exchange the data over the internet network is veritably important issue. So, to transfer the data securely to the destination, there are numerous approaches like cryptography and steganography. In this design we propose a LSB & DCT grounded steganographic system for hiding the data by applying Least Significant Bit (LSB) algorithm for bedding the data into the images which is enforced through the HTML, CSS, JavaScript.
密码学常被用来使信息难以辨认以保持机密。然而,难以理解的信息可能会引起对手的怀疑,并可能导致他破坏这种沟通方式。因此,隐写术在信息安全领域占有一席之地。隐写术是指在数字媒体中隐藏信息的技术,以掩盖信息的存在。数据缓存是一种隐藏数据的艺术,用于丰富多彩的目的,类似于;维护私人数据,保护非公共数据等。在internet网络上安全地交换数据是一个非常重要的问题。因此,为了将数据安全地传输到目的地,有许多方法,如加密和隐写。在本设计中,我们提出了一种基于LSB和DCT的隐写系统,该系统通过HTML, CSS, JavaScript实现,通过LSB(最低有效位)算法将数据嵌入图像中来隐藏数据。
{"title":"Image steganography approach using spatial and transform domain technique","authors":"S. Radhe, Gupta Deepika, Jaiswal Madhuri, K. Vaishnavi, A. L. Prasanna","doi":"10.26634/jcom.10.1.18504","DOIUrl":"https://doi.org/10.26634/jcom.10.1.18504","url":null,"abstract":"Cryptography is often used to keep information confidential by making it illegible. However, incomprehensible information may raise suspicions of the adversary and may lead him to sabotage this style of communication. Therefore, steganography has a place in the arena of information security. Steganography refers to the technique of hiding information in digital media to hide the existence of information. Data caching is the art of hiding data for colorful purposes similar as; to maintain private data, secure non-public data and so on. Securely exchange the data over the internet network is veritably important issue. So, to transfer the data securely to the destination, there are numerous approaches like cryptography and steganography. In this design we propose a LSB & DCT grounded steganographic system for hiding the data by applying Least Significant Bit (LSB) algorithm for bedding the data into the images which is enforced through the HTML, CSS, JavaScript.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127474651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AES-based encoding and decoding images using MATLAB 基于aes的图像编码和解码
Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.4.18595
Thakur Neelima, Choubey Siddhartha, Choubey Abha
This paper mainly deals with mixed-image secret writing techniques. From the point of view of information security, recording secret images are extremely important. Security is the most complex aspect of networks and network applications. The web and networked applications are growing in the blink of an eye, which increases the importance and, therefore, the value of the information transmitted through the web or alternative media. Encryption can be related to improve image security by scanning pixels. Encryption will protect privacy on its own. It works in a wide variety of fields, such as network communications, medical photography, and military communications. Due to the natural selection of images, such as high duplication of information and the ability of mass dissemination of information, image encryption is different from the text. Text encryption is the conversion of information into an encoded cipher code that cannot be easily decrypted by outsiders.
本文主要研究混合图像秘密书写技术。从信息安全的角度来看,记录秘密图像是极其重要的。安全是网络和网络应用最复杂的方面。网络和网络应用程序在眨眼之间不断发展,这增加了通过网络或其他媒体传播的信息的重要性和价值。加密可以通过扫描像素来提高图像安全性。加密本身就能保护隐私。它适用于各种领域,如网络通信、医学摄影和军事通信。由于图像的自然选择,如信息的高度重复和信息的大规模传播能力,图像加密不同于文本。文本加密是将信息转换为外人无法轻易解密的编码密码。
{"title":"AES-based encoding and decoding images using MATLAB","authors":"Thakur Neelima, Choubey Siddhartha, Choubey Abha","doi":"10.26634/jcom.9.4.18595","DOIUrl":"https://doi.org/10.26634/jcom.9.4.18595","url":null,"abstract":"This paper mainly deals with mixed-image secret writing techniques. From the point of view of information security, recording secret images are extremely important. Security is the most complex aspect of networks and network applications. The web and networked applications are growing in the blink of an eye, which increases the importance and, therefore, the value of the information transmitted through the web or alternative media. Encryption can be related to improve image security by scanning pixels. Encryption will protect privacy on its own. It works in a wide variety of fields, such as network communications, medical photography, and military communications. Due to the natural selection of images, such as high duplication of information and the ability of mass dissemination of information, image encryption is different from the text. Text encryption is the conversion of information into an encoded cipher code that cannot be easily decrypted by outsiders.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127480749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALYSING CUSTOMER'S PURCHASING PATTERN BY MARKET BASKET ANALYSIS 通过市场购物篮分析分析客户的购买模式
Pub Date : 1900-01-01 DOI: 10.26634/jcom.7.1.15582
Khandelwal Ritu, Divyasharma, Kanwar Harsh
{"title":"ANALYSING CUSTOMER'S PURCHASING PATTERN\u0000 BY MARKET BASKET ANALYSIS","authors":"Khandelwal Ritu, Divyasharma, Kanwar Harsh","doi":"10.26634/jcom.7.1.15582","DOIUrl":"https://doi.org/10.26634/jcom.7.1.15582","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130651878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PRECISE DETECTION OF PHISHING URLS USING RECURRENTNEURAL NETWORKS 使用递归神经网络精确检测钓鱼网址
Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.1.18154
Neeharika Kamireddy, K. P. RUPHAA SRI, B. Vishruthi, M. Suresh Anand
{"title":"PRECISE DETECTION OF PHISHING URLS USING RECURRENT\u0000NEURAL NETWORKS","authors":"Neeharika Kamireddy, K. P. RUPHAA SRI, B. Vishruthi, M. Suresh Anand","doi":"10.26634/jcom.9.1.18154","DOIUrl":"https://doi.org/10.26634/jcom.9.1.18154","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"15 9-10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123621110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MACHINE LEARNING APPROACH TO SENTIMENT ANALYSIS OF USERS’ MOVIE REVIEWS 用机器学习方法对用户的电影评论进行情感分析
Pub Date : 1900-01-01 DOI: 10.26634/jcom.7.1.15701
Adetunmbi Adebayo, A. Oluwafemi, Olutomilola Oluwayemisi, Boyinbode Olutayo
{"title":"MACHINE LEARNING APPROACH TO SENTIMENT\u0000 ANALYSIS OF USERS’ MOVIE REVIEWS","authors":"Adetunmbi Adebayo, A. Oluwafemi, Olutomilola Oluwayemisi, Boyinbode Olutayo","doi":"10.26634/jcom.7.1.15701","DOIUrl":"https://doi.org/10.26634/jcom.7.1.15701","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A review on gesture based MSG system using python 基于手势的python MSG系统综述
Pub Date : 1900-01-01 DOI: 10.26634/jcom.11.1.19391
Mandal Prapti, S. Akansha, Pandey Vibha
Video tracking and processing have become increasingly important in modern technologies due to their ability to provide data for various research projects and system representation. This paper sheds light on the capabilities for processing images using OpenCV, MediaPipe Library, Python programming language and a Convolutional Neural Network (CNN). To achieve the desired results, a wide range of methods for data processing and manipulation are utilized. OpenCV (Open Source Computer Vision) library is used to process real-time webcam data, allowing the user to write or draw simply by moving their hand and following their fingertip. Also, the CNN model is used to facilitate gesture detection.
视频跟踪和处理在现代技术中变得越来越重要,因为它们能够为各种研究项目和系统表示提供数据。本文阐明了使用OpenCV、MediaPipe库、Python编程语言和卷积神经网络(CNN)处理图像的能力。为了达到预期的结果,使用了广泛的数据处理和操作方法。OpenCV(开源计算机视觉)库用于处理实时网络摄像头数据,允许用户通过移动他们的手和跟随他们的指尖来写或画。同时,利用CNN模型进行手势检测。
{"title":"A review on gesture based MSG system using python","authors":"Mandal Prapti, S. Akansha, Pandey Vibha","doi":"10.26634/jcom.11.1.19391","DOIUrl":"https://doi.org/10.26634/jcom.11.1.19391","url":null,"abstract":"Video tracking and processing have become increasingly important in modern technologies due to their ability to provide data for various research projects and system representation. This paper sheds light on the capabilities for processing images using OpenCV, MediaPipe Library, Python programming language and a Convolutional Neural Network (CNN). To achieve the desired results, a wide range of methods for data processing and manipulation are utilized. OpenCV (Open Source Computer Vision) library is used to process real-time webcam data, allowing the user to write or draw simply by moving their hand and following their fingertip. Also, the CNN model is used to facilitate gesture detection.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124904231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EVOLUTION OF OS ARCHITECTURES: A SURVEY ON PARALLELCOMPUTING BASED OS KERNELS 操作系统架构的演变:基于并行计算的操作系统内核综述
Pub Date : 1900-01-01 DOI: 10.26634/jcom.8.3.18252
Najam Rohma, Deen Ebrahim
{"title":"EVOLUTION OF OS ARCHITECTURES: A SURVEY ON PARALLEL\u0000COMPUTING BASED OS KERNELS","authors":"Najam Rohma, Deen Ebrahim","doi":"10.26634/jcom.8.3.18252","DOIUrl":"https://doi.org/10.26634/jcom.8.3.18252","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120945070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HYBRID METHOD FOR DATA SHARING AMONG COOPERATIVEUSERS IN MOBILE ENVIRONMENT 移动环境下协作用户间数据共享的混合方法
Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.2.17113
Bhomini P. AMUDHA, J. Jayasudha
{"title":"HYBRID METHOD FOR DATA SHARING AMONG COOPERATIVE\u0000USERS IN MOBILE ENVIRONMENT","authors":"Bhomini P. AMUDHA, J. Jayasudha","doi":"10.26634/jcom.9.2.17113","DOIUrl":"https://doi.org/10.26634/jcom.9.2.17113","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115272350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AN ONLINE LECTURER EVALUATION SYSTEM: A CASE STUDY OF FUT MINNA 在线讲师评价系统:以fut minna为例
Pub Date : 1900-01-01 DOI: 10.26634/JCOM.7.1.16126
Sufyan Danmallan Sulaiman, David Apata Adeoluwa, A. O. Oluwaseun, Ifeoma Mustapha Segilola, S. A. Olawale
{"title":"AN ONLINE LECTURER EVALUATION SYSTEM:\u0000 A CASE STUDY OF FUT MINNA","authors":"Sufyan Danmallan Sulaiman, David Apata Adeoluwa, A. O. Oluwaseun, Ifeoma Mustapha Segilola, S. A. Olawale","doi":"10.26634/JCOM.7.1.16126","DOIUrl":"https://doi.org/10.26634/JCOM.7.1.16126","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115642699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
i-manager's Journal on Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1