View Vol. 3 ,  Iss. 3 (July 2021)

Journal of Computer Science Research

ISSN: 2630-5151 (Online)

Vol. 3 , Iss. 3 (July 2021)

Articles

  • Web Application Authentication Using Visual Cryptography and Cued Clicked Point Recall-based Graphical Password

    Mary Ogbuka Kenneth, Stephen Michael Olujuwon
    29-41

    Article ID: 3535
    770  (Abstract) 61  (Download)

    Alphanumerical usernames and passwords are the most used computer authentication technique. This approach has been found to have a number of disadvantages. Users, for example, frequently choose passwords that are simple to guess. On the other side, if a password is difficult to guess, it is also difficult to remember. Graphical passwords have been...

  • Unmanned Drug Delivery Vehicle for COVID-19 Wards in Hospitals

    Uttam U. Deshpande, Aditya Barale, V. S. Malemath
    8-15

    Article ID: 3489
    1603  (Abstract) 52  (Download)

    The prime reason for proposing the work is designing and developing a low-cost guided wireless Unmanned Ground Vehicle (UGV) for use in hospitals for assistance in contactless drug delivery in COVID-19 wards. The Robot is designed as per the requirements and technical specifications required for the healthcare facility. After a detailed survey and tests of...

  • Student Performance Prediction Using A Cascaded Bi-level Feature Selection Approach

    Wokili Abdullahi, Mary Ogbuka Kenneth, Morufu Olalere
    16-28

    Article ID: 3534
    375  (Abstract) 49  (Download)

    Features in educational data are ambiguous which leads to noisy features and curse of dimensionality problems. These problems are solved via feature selection. There are existing models for features selection. These models were created using either a single-level embedded, wrapperbased or filter-based methods. However single-level filter-based methods ignore feature dependencies and ignore the interaction...

  • Self-health Monitoring and Reporting System for COVID-19 Patients Using CAN Data Logger

    Uttam U. Deshpande, Pooja Hulajatti, Shraddha Suryavanshi, Vrunda Balgi
    1-7

    Article ID: 3487
    477  (Abstract) 51  (Download)

    In the evolving situation of highly infectious coronavirus, the number of confirmed cases in India has largely increased, which has resulted in a shortage of health care resources. Thus, the Ministry of Health and Family Welfare- Government of India issued guidelines for the ‘Home isolation of COVID-19 positive patients’ methodology for asymptomatic patients or with...

  • Intrusion Detection through DCSYS Propagation Compared to Auto-encoders

    Fatima Isiaka, Zainab Adamu
    42-49

    Article ID: 3578
    380  (Abstract) 38  (Download)

    In network settings, one of the major disadvantages that threaten the network protocols is the insecurity. In most cases, unscrupulous people or bad actors can access information through unsecured connections by planting software or what we call malicious software otherwise anomalies. The presence of anomalies is also one of the disadvantages, internet users are...