Cyberbullying is when someone is bullied using technology as an intermediary. Despite the fact that it has been a problem for many years, the impact on young people has just recently become more widely recognized.
Bullies thrive on social media platforms, and teens and children who use them are vulnerable to attacks. A copious amount of usergener...
|
Background: During CSSR (Collapsed Structure Search and Rescue) operations, NDRF teams encounter challenges in identifying buried deceased bodies amidst rubble and debris. Traditional search methods are often time-consuming and labor-intensive, hampering the timely recovery of victims and increasing the risk of further casualties. Description: THe ...
|
Background: The AYUSH sector, encompassing Ayurveda, Yoga & Naturopathy, Unani, Siddha, and Homoeopathy, is burgeoning with innovative startups. However, these startups face challenges in registering their ventures due to cumbersome, opaque, and decentralized processes.
An efficient registration portal is crucial for fostering growth, facilitatin...
|
since 2000, various authorities like parliaments and government offices have introduced electronic petitions systems (e-petitions).
Compared to most other means of petitions made available by public institutions, e-petitions have moved past the test organization and are portrayed by a significant level of institutionalization and procedural devel...
|
Nigeria's energy sector is plagued by poor, inadequate and disorganized electricity billing and consumer relations management.
Despite the introduction of prepaid billing meters, electricity billing and collection remains a major challenge in some communities in Nigeria.
Because the electricity consumer must first go to the bank to make the pay...
|
Computerized lecture reminder is a tool that permites academic students and lectures to know like due dates and locations.
Lecture reminder has turned to be a very important tool in the time management and it is a common saying in the time management that it is better to keep track of things using a system rather than your memory.
A computerized...
|
Our society suffers a lot from the things that are thrown uselessly; these things may be beneficial to our society. On the other hand, communities suffer a lot of waste especially plastic waste; this has led to environmental pollution and depletion of natural resources.
Therefore, this research aims to achieve sustainable development and achieve ...
|
As artificial intelligence (AI) develops quickly, Python has become the de facto fully object-oriented programming language. Python'ssimplicity, language variety, and vast library ecosystem make it a valuable tool for image processing .
This research study examines Python's role in image processing in detail, outlining its benefits, drawbacks, a...
|
Before computerized Hospital Management System came into practice, it was difficult to keep proper records of the daily activities of hospitals, patient information, maintenance schedule of equipments in the hospital, and how funds are being allocated and used.
This resulted in waste of money, time and manpower. Hospital Management System is an...
|
Computer as a medium for language learning has been acknowledged by many educators in the past years. Using computers for language learning has proved not only interesting but also positive and stimulating for many language teachers and learners. The present paper tries to show the impact/s of computers in the field of second and foreign langua...
|
As object recognition technology has developed recently, various technologies have been applied to autonomous vehicles, robots, and industrial facilities. However, the benefits of these technologies are not reaching the visually impaired, who need it the most. In this paper, we proposed an object detection system for the blind using deep learning t...
|
With the rapid development of wireless communication technology, people's life has undergone great changes. In recent years, the comfort and safety of the building environment have become a universal concern. However, building fire is the greatest threat to building safety. In consideration of the current issues on building security, the design app...
|
In this study, we present our implementation of using a motion controller to control the motion of a drone via simple human gestures. We have used the Leap as the motion controller and the Parrot AR DRONE 2.0 for this implementation. The Parrot AR DRONE is an off the shelf quad rotor having an on board Wi-Fi system. The AR DRONE is connected to the...
|
Vehicle tracking system is a well-established technology in this era which is used by fleet system and owner of vehicle all over the world. It is a very safe and reliable technology. In our thesis we are going to design a system which is used for tracking and positioning of any vehicle by using Global Positioning System [GPS] and Global System for ...
|
Every cooperate organization, institution or government agency requires data and good quality information to function effectively. It is not an over statement to say that many organizations, institutions or government agencies have become critically dependent on the use of database system for their successes especially in the hospital. Data collect...
|
A hostel management system (HOMASY) was designed to provide a computerized process that is stress free, reliable and quick through the use of PHP computer programming language and MySQL database application to both the students and the staff in charge of the registration and hostel management processes. HTML would be at the front-end and provide th...
|
This cool little combinatorial puzzle has been around for thousands of years in many different forms, but the most popular version that we know of today gained a mainstream audience only within the last decade. Most people believe that the game originated in Japan, but earliest records indicate that during the 18th century, the genius, Swedish math...
|
Attendance management is the act of managing attendance or presence in a work setting. Considering an academic institute, the conventional method of taking staff attendance is by signing on paper is very time consuming and insecure, hence inefficient. Maintaining these records for a long time adds to the difficulty of the task. In lieu of this, an ...
|
Security threats against computer systems are a big problem today which also includes PHP made applications. The report is focused on protection with the help of code and not how you protect a web server. Its purpose is not to educate the readers of the thesis how to make a PHP application, the purpose is how to program a safer PHP application. The...
|
The purpose of developing this software project is to fully automate salary system for an organization sweden sports academy. This software is capable of calculating monthly salaries, tax and social security of employees of that organization. On the basis of certain formulas it will generate files as an output such as bank files and salary slips et...
|
The management and booking of Rooms in hotels is a tedious and complicated task especially if it is done manually. Keeping track of large customers and all their details requires an inordinate space for file cabinets, not to mention the time the hotel administrator would spend going back and forth to file cabinets so as to look up each customer’s i...
|
Student Information Management System can be used by education institutes to maintain the records of students easily. Achieving this objective is difficult using a manual system as the information is scattered, can be redundant and collecting relevant information may be very time consuming. All these problems are solved using this project....
|
Speech is one of the oldest and most natural means of information exchange between human. Over the years, Attempts have been made to develop vocally interactive computers to realise voice/speech synthesis. Obviously such an interface would yield great benefits. In this case a computer can synthesize text and give out a speech. Text-To-Speech Synthe...
|
The Java Application World application world soft- ware is totally user oriented and only users access the software programs. The user can use multiple applications that re made with the help of java. In the J Appsor the Java application world, the user can use calculator, word count tool, ip finder etc java run software. Any particular IDE can...
|
Online Examination is an essential ingredient in electronic and interactive learning, however, in educational environment most of examinations are done in the classical paper-based way due to the lack of resumption capability when power/network/physical computer’s component failures. For this reason, adopting and developing an online examination sy...
|
Currently there exist severe fragmentation, different development standards, lack of sufficient support and other problems in the development of college student information management system. Therefore accelerating the development of student information management system is of necessity to improve universities’ management and administration efficie...
|
This paper describes experiences with online quizzes in an operations management course. Online quizzes were introduced to offset larger class sizes. During several quarters, experimentation with online quizzes took place including the number of attempts, the amount of time allowed and the topical coverage in the quizzes. Three research questions a...
|
In the past two decades, wireless sensor networks (WSNs) and their applications have been the topic of many studies. Different multi-sensor nodes are used to collect, process and distribute data over wireless links to perform different tasks such as smart detection, target tracking, node localization, etc. In this article, the problem of distribute...
|
The ATM Fraudulence occurring in the society has become very common nowadays. Even though technology has boomed in various aspects it is being misused in different ways for stealing money through ATM’S. Skimming and Trapping of the ATM devices have been designed by many Burglars. Recognition based Verification system as been implemented for many AT...
|
With the development of cloud computing, the great amount of storage data requires safe and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of shared data is ensured to achieve data privacy preservation. Second, the security of stored data is ensured. That is, when stored shared data are subject to frequent ac...
|
? Automated Machine Learning (AutoML) seeks to automatically find so-called machine learning pipelines that maximize the prediction performance when being used to train a model on a given dataset. One of the main and yet open challenges in AutoML is an effective use of computational resources: An AutoML process involves the evaluation of many candi...
|
Home automation is the control of any electrical and electronic device in our home, whether we are there or not. Some products are available that allow us to control over the devices automatically using raspberry pi model either by remote control. This home automation system provide the user with remote control of various lights and appliances with...
|
The recent incorporation of new Data Mining and Machine Learning services within Cloud Computing providers is empowering users with extremely comprehensive data analysis tools including all the advantages of this type of environment. Providers of Cloud Computing services for Data Mining publish the descriptions and definitions in many formats and o...
|
This Android application (stand alone too), where one can set the question for different technology i.e. Android, Java etc and one can register them self for test as a student, he can choose the choice of technology (Android, Java), and simultaneously he can get the exam result. After submit or End of the Test the form will be submitted and evaluat...
|
Orphanage is the name to describe a residential place dedicated for orphans whose parents are dead. Parent and grandparent are legally responsible for taking up the responsibility of taking care of their grandchildren, but in case both parents and grandparents, or other relations willing to take up the responsibility of the children, they lose all ...
|