Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Journal

2024

Institution
Keyword
Publication

Articles 1 - 30 of 230

Full-Text Articles in Entire DC Network

Data Collector Selection Ranking-Based Method For Collaborative Multi-Tasks In Ubiquitous Environments, Belal Z. Hassan, Ahmed. A. A. Gad-Elrab, Mohamed S. Farag, S. E. Abu-Youssef Aug 2024

Data Collector Selection Ranking-Based Method For Collaborative Multi-Tasks In Ubiquitous Environments, Belal Z. Hassan, Ahmed. A. A. Gad-Elrab, Mohamed S. Farag, S. E. Abu-Youssef

Al-Azhar Bulletin of Science

In Ubiquitous Computing and the Internet of Things, the sensing and control of objects involve numerous devices collecting and transmitting data. However, connecting these devices without fostering collaboration leads to suboptimal system performance. As the number of connected sensing devices in Internet of Things increases, efficient task accomplishment through collaboration becomes imperative. This paper proposes a Data Collector Selection Method for Collaborative Multi-Tasks to address this challenge, considering task preferences and uncertainty in data collectors' contributions. The proposed method incorporates three key aspects: (1) Using Fuzzy Analytical Hierarchy Process to determine optimal weights for task preferences; (2) Ranking data collectors …


Water Body Satellite Images Segmentation Using Maxwell Boltzmann Distribution, Lama Affara, Ali El-Zaart, Rabih Damaj Jun 2024

Water Body Satellite Images Segmentation Using Maxwell Boltzmann Distribution, Lama Affara, Ali El-Zaart, Rabih Damaj

BAU Journal - Science and Technology

Images can exhibit diverse attributes and characteristics, because of variations in both the quantity of each intensity level and their respective positions, histograms display varying distributions. Some images feature symmetric histograms, while others exhibit asymmetry. In image segmentation tasks, traditional mean-based thresholding methods work well with symmetric histograms, relying on Gaussian distribution definitions. However, situations arise where asymmetric distributions must be considered. Threshold-based segmentation entails the partitioning of intensity levels into separate regions determined by the threshold value. Within this category of thresholding methods, Minimum Cross Entropy Thresholding (MCET) stands out as a mean-based thresholding technique with a unique self-contained …


Hyper-Dimensional Computing And Its Applications In Tinyml, Ellis A. Weglewski Jun 2024

Hyper-Dimensional Computing And Its Applications In Tinyml, Ellis A. Weglewski

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

As computing systems enter the realm of nano form levels, new fields of computational development have spawned, each posing their own set of challenges. Amongst these fields is Tiny Machine Learning (tinyML), which aims to install machine learning on tiny embedded systems. The restrictions imposed upon algorithms by the limited hardware of nano-scale tiny systems make contemporary approaches to machine learning non-contenders. Hyperdimensional computing is an approach to representing data as high-dimensional vectors which allows for one-pass encoding and quick all-encompassing comparison operations via an associative memory. This approach is power-efficient, robust, and can be done in-memory, all of which …


Enhancing Evolutionary Computation Through Phylogenetic Analysis, Chenfei Peng Jun 2024

Enhancing Evolutionary Computation Through Phylogenetic Analysis, Chenfei Peng

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

In this paper, we will provide an overview of the paper “Phylogeny-informed fitness estimation for test-based parent selection” by Lalejini, et al. [7] Phylogenies, or ancestry trees, provide a detailed look into the evolutionary journey of a population. In evolutionary computation, a phylogeny can represent the progress of an evolutionary algorithm through a search space. Although phylogenetic analysis is mainly used to deepen the understanding of evolutionary algorithms after they have been run, this study explores its potential use in real-time to enhance parent selection during evolutionary searches. The research by Lalejini, et al. introduces the concept of phylogeny-informed fitness …


The Confluence, Volume3, Issue 2, Full Issue Jun 2024

The Confluence, Volume3, Issue 2, Full Issue

The Confluence

No abstract provided.


Unraveling The Versatility And Impact Of Multi-Objective Optimization: Algorithms, Applications, And Trends For Solving Complex Real-World Problems, Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, A. Salih Jun 2024

Unraveling The Versatility And Impact Of Multi-Objective Optimization: Algorithms, Applications, And Trends For Solving Complex Real-World Problems, Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, A. Salih

Journal of Soft Computing and Computer Applications

Multi-Objective Optimization (MOO) techniques have become increasingly popular in recent years due to their potential for solving real-world problems in various fields, such as logistics, finance, environmental management, and engineering. These techniques offer comprehensive solutions that traditional single-objective approaches fail to provide. Due to the many innovative algorithms, it has been challenging for researchers to choose the optimal algorithms for solving their problems. This paper examines recently developed MOO-based algorithms. MOO is introduced along with Pareto optimality and trade-off analysis. In real-world case studies, MOO algorithms address complicated decision-making challenges. This paper examines algorithmic methods, applications, trends, and issues in …


Optimization Of Resources Allocation Using Evolutionary Deep Learning, Sanaa Ali Jabber, Soukaena H. Hashem, Shatha H. Jafer Jun 2024

Optimization Of Resources Allocation Using Evolutionary Deep Learning, Sanaa Ali Jabber, Soukaena H. Hashem, Shatha H. Jafer

Journal of Soft Computing and Computer Applications

The Bidirectional Long Short-Term Memory (Bi-LSTM) network structure enables data analysis, enhances decision-making processes, and optimizes resource allocation in cloud computing systems. However, achieving peak network performance relies heavily on choosing the hyperparameters for configuring the network. Enhancing resource allocation improves the Service Level Agreement (SLA) by ensuring efficient utilization and allocation of computational resources based on dynamic workload demands. This paper proposes an approach that integrates a Multi-Objective Evolutionary Algorithm (MOEA) with deep learning techniques to address this challenge. This approach combines the optimization capabilities of MOEA with the learning predictive models to establish a framework for resource allocation …


Face Mask Detection Based On Deep Learning: A Review, Shahad Fadhil Abbas, Shaimaa Hameed Shaker, Firas. A. Abdullatif Jun 2024

Face Mask Detection Based On Deep Learning: A Review, Shahad Fadhil Abbas, Shaimaa Hameed Shaker, Firas. A. Abdullatif

Journal of Soft Computing and Computer Applications

The coronavirus disease 2019 outbreak caused widespread disruption. The World Health Organization has recommended wearing face masks, along with other public health measures, such as social distancing, following medical guidelines, and thermal scanning, to reduce transmission, reduce the burden on healthcare systems, and protect population groups. However, wearing a mask, which acts as a barrier or shield to reduce transmission of infection from infected individuals, hides most facial features, such as the nose, mouth, and chin, on which face detection systems depend, which leads to the weakness of these systems. This paper aims to provide essential insights for researchers and …


Strangeness Detection From Crowded Video Scenes By Hand-Crafted And Deep Learning Features, Ali A. Hussan, Shaimaa H. Shaker, Akbas Ezaldeen Ali Jun 2024

Strangeness Detection From Crowded Video Scenes By Hand-Crafted And Deep Learning Features, Ali A. Hussan, Shaimaa H. Shaker, Akbas Ezaldeen Ali

Journal of Soft Computing and Computer Applications

Video anomaly detection is one of the trickiest issues in intelligent video surveillance because of the complexity of real data and the hazy definition of anomalies. Since abnormal occurrences typically seem different from normal events and move differently. The global optical flow was determined with the maximum accuracy and speed using the Farneback approach for calculating the magnitudes. Two approaches have been used in this study to detect strangeness in the video. These approaches are Deep Learning (DL) and manuality. The first method uses the activity map's development of entropy to detect the oddity in the video using a particular …


A Comprehensive Analysis Of Deep Learning And Swarm Intelligence Techniques To Enhance Vehicular Ad-Hoc Network Performance, Hussein K. Abdul Atheem, Israa T. Ali, Faiz A. Al Alawy Jun 2024

A Comprehensive Analysis Of Deep Learning And Swarm Intelligence Techniques To Enhance Vehicular Ad-Hoc Network Performance, Hussein K. Abdul Atheem, Israa T. Ali, Faiz A. Al Alawy

Journal of Soft Computing and Computer Applications

The primary elements of Intelligent Transportation Systems (ITSs) have become Vehicular Ad-hoc NETworks (VANETs), allowing communication between the infrastructure environment and vehicles. The large amount of data gathered by connected vehicles has simplified how Deep Learning (DL) techniques are applied in VANETs. DL is a subfield of artificial intelligence that provides improved learning algorithms able to analyzing and process complex and heterogeneous data. This study explains the power of DL in VANETs, considering applications like decision-making, vehicle localization, anomaly detection, traffic prediction and intelligent routing, various types of DL, including Recurrent Neural Networks (RNNs), and Convolutional Neural Networks (CNNs) are …


A Novel Approach To Generate Dynamic S-Box For Lightweight Cryptography Based On The 3d Hindmarsh Rose Model, Ala'a Talib Khudhair, Abeer Tariq Maolood, Ekhlas Khalaf Gbashi Jun 2024

A Novel Approach To Generate Dynamic S-Box For Lightweight Cryptography Based On The 3d Hindmarsh Rose Model, Ala'a Talib Khudhair, Abeer Tariq Maolood, Ekhlas Khalaf Gbashi

Journal of Soft Computing and Computer Applications

In lightweight cryptography, the absence of an S-Box in some algorithms like speck, Tiny Encryption Algorithm, or the presence of a fixed S-Box in others like Advanced Encryption Standard can make them more vulnerable to attacks. This study introduces an innovative method for creating a dynamic 6-bit S-Box (8×8) in octal format. The generating process of S-Box passes through two phases. The first is the number initialization phase. This phase involves generating sequence numbers 1, sequence numbers 2, and sequence numbers 3 depending on Xi, Yi, and Zi values generated using the 3D Hindmarsh …


The Robust Digital Video Watermarking Methods: A Comparative Study, Ebtehal Talib, Abeer Salim Jamil, Nidaa Flaih Hassan, Muhammad Ehsan Rana Jun 2024

The Robust Digital Video Watermarking Methods: A Comparative Study, Ebtehal Talib, Abeer Salim Jamil, Nidaa Flaih Hassan, Muhammad Ehsan Rana

Journal of Soft Computing and Computer Applications

Digital data such as images, audio, and video have become widely available since the invention of the Internet. Due to the ease of access to this multimedia, challenges such as content authentication, security, copyright protection, and ownership determination arose. In this paper, an explanation of watermark techniques, embedding, and extraction methods are provided. It further discusses the utilization of artificial intelligence methods and conversion of host media from the spatial domain to the frequency domain; these methods aim to improve the quality of watermarks. This paper also included a classification of the basic characteristics of the digital watermark and the …


Foxann: A Method For Boosting Neural Network Performance, Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid, S. Vimal Jun 2024

Foxann: A Method For Boosting Neural Network Performance, Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid, S. Vimal

Journal of Soft Computing and Computer Applications

Artificial neural networks play a crucial role in machine learning and there is a need to improve their performance. This paper presents FOXANN, a novel classification model that combines the recently developed Fox optimizer with ANN to solve ML problems. Fox optimizer replaces the backpropagation algorithm in ANN; optimizes synaptic weights; and achieves high classification accuracy with a minimum loss, improved model generalization, and interpretability. The performance of FOXANN is evaluated on three standard datasets: Iris Flower, Breast Cancer Wisconsin, and Wine. The results presented in this paper are derived from 100 epochs using 10-fold cross-validation, ensuring that all dataset …


Surveying Machine Learning In Cyberattack Datasets: A Comprehensive Analysis, Azhar F. Al-Zubidi, Alaa Kadhim Farhan, El-Sayed M. El-Kenawy Jun 2024

Surveying Machine Learning In Cyberattack Datasets: A Comprehensive Analysis, Azhar F. Al-Zubidi, Alaa Kadhim Farhan, El-Sayed M. El-Kenawy

Journal of Soft Computing and Computer Applications

Cyberattacks have become one of the most significant security threats that have emerged in the last couple of years. It is imperative to comprehend such attacks; thus, analyzing various kinds of cyberattack datasets assists in constructing the precise intrusion detection models. This paper tries to analyze many of the available cyberattack datasets and compare them with many of the fields that are used to detect and predict cyberattack, like the Internet of Things (IoT) traffic-based, network traffic-based, cyber-physical system, and web traffic-based. In the present paper, an overview of each of them is provided, as well as the course of …


Addressing Social Inequalities Using Ai, Big Data, And Machine Learning, Erica L. Jensen, Lakell Archer, Sumaya Ali Jun 2024

Addressing Social Inequalities Using Ai, Big Data, And Machine Learning, Erica L. Jensen, Lakell Archer, Sumaya Ali

Journal of Nonprofit Innovation

No abstract provided.


Development Of Cyber Security Platform For Experiential Learning, Abhishek Vaish, Ravindra Kumar, Samo Bobek, Simona Sternad Jun 2024

Development Of Cyber Security Platform For Experiential Learning, Abhishek Vaish, Ravindra Kumar, Samo Bobek, Simona Sternad

Journal of Cybersecurity Education, Research and Practice

The cyber security education market has grown-up exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Fo- rum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour. Cybersecurity as a field has evolved as a multi-discipline, multi-stakeholder and multi-role discipline. Therefore, the need to address formal education with an outcome-based philosophy is imperative to address for a wider audience with varied past training in their formal education. With the Internet …


Scaling Expertise: A Note On Homophily In Online Discourse And Content Moderation, Dylan Weber Jun 2024

Scaling Expertise: A Note On Homophily In Online Discourse And Content Moderation, Dylan Weber

New England Journal of Public Policy

It is now empirically clear that the structure of online discourse tends toward homophily; users strongly prefer to interact with content and other users that are similar to them. I review the evidence for the ubiquity of homophily in discourse and highlight some of its worst effects including narrowed information landscape for users and increased spread of misinformation. I then discuss the current state of moderation frameworks at large social media platforms and how they are ill-equipped to deal with structural trends in discourse such as homophily. Finally, I sketch a moderation framework based on a principal of “scaling expertise” …


Heterogeneous Resources In Infrastructures Of The Edge Network Paradigm: A Comprehensive Review, Qusay S. Alsaffar, Leila Ben Ayed Jun 2024

Heterogeneous Resources In Infrastructures Of The Edge Network Paradigm: A Comprehensive Review, Qusay S. Alsaffar, Leila Ben Ayed

Karbala International Journal of Modern Science

The late 1990s saw the rise of the edge computing network paradigm, as well as an increase in the number of IoT de-vices. This concept is viewed as a link between cloud servers and end-devices, bringing processing and storage re-sources closer to clients. As a result of its low latency and high performance, researchers and developers have expressed interest in it. However, this paradigm confronts a number of obstacles and restrictions, including restricted and hetero-geneous resources at network edges. In this paper, we provide a detailed review of heterogeneous resources in edge network infrastructures using a three-dimensional method. These three …


Classification And Removal Of Hazy Images Based On A Transmission Fusion Strategy Using The Alexnet Network, Roa'a M. Al_Airaji, Haider Th. Salim Alrikabi, Rula Kamil Jun 2024

Classification And Removal Of Hazy Images Based On A Transmission Fusion Strategy Using The Alexnet Network, Roa'a M. Al_Airaji, Haider Th. Salim Alrikabi, Rula Kamil

Karbala International Journal of Modern Science

Outdoor images are used in many domains, such as surveillance, geospatial mapping, and autonomous vehicles. The occurrence of noise in outdoor images is a widely observed phenomenon. They are primarily attributed to extreme natural and manufactured meteorological conditions, such as haze, smog, and fog. In autonomous vehicle navigation, recovering the ground truth image is essential, enabling the system to make more informed decisions. Accurate air-light and transmission map calculation is vital in recovering the ground truth image. An efficient approach for image dehazing that utilizes the mean channel prior (MCP) is presented in this paper to estimate the transmission map, …


Designing Of Human Serum Albumin Nanoparticles For Drug Delivery: A Potential Use Of Anticancer Treatment, Ali Al-Ani, Rasha Alsahlanee Jun 2024

Designing Of Human Serum Albumin Nanoparticles For Drug Delivery: A Potential Use Of Anticancer Treatment, Ali Al-Ani, Rasha Alsahlanee

Karbala International Journal of Modern Science

Human serum albumin (HSA) nanoparticles have been widely used as versatile drug delivery systems for improving the efficiency and pharmaceutical properties of drugs. The present study aimed to design HSA nanoparticle encapsulated with the hydrophobic anticancer pyridine derivative (2-((2-([1,1'-biphenyl]-4-yl)imidazo[1,2-a]pyrimidin-3-yl)methylene)hydrazine-1-carbothioamide (BIPHC)). The synthesis of HSA-BIPHC nanoparticles was achieved using a desolvation process. Atomic force microscopy (AFM) analysis showed the average size of HSA-BIPHC nanoparticles was 80.21 nm. The percentages of entrapment efficacy, loading capacity and production yield were 98.11%, 9.77% and 91.29%, respectively. An In vitro release study revealed that HSA-BIPHC nanoparticles displayed fast dissolution at pH 7.4 compared to pH …


Modified Toulmin's Argumentation Model Based On Prior Experiences, Ali Hadi Hasan, Mohamad Ab. Saleh, Ahmed T. Sadiq Jun 2024

Modified Toulmin's Argumentation Model Based On Prior Experiences, Ali Hadi Hasan, Mohamad Ab. Saleh, Ahmed T. Sadiq

Karbala International Journal of Modern Science

Our work focuses on the usefulness of previously stored correct extracted results, which form a sort of stored knowledge got from previous experiences, from enhancing Toulmin's argument model that deals with drug conflict problems in therapeutic diagnostics. New patients are entered using friendly user interface to store in files and then they are matched with the records of previous results, patients’ symptoms and histories datasets which also contain the correct best drugs extracted results. If the new entered record of a patient is matching with any previous record then the correct result of drug will be found immediately and displayed. …


A Meta-Ensemble Predictive Model For The Risk Of Lung Cancer, Sideeqoh Oluwaseun Olawale-Shosanya, Olayinka Olufunmilayo Olusanya, Adeyemi Omotayo Joseph, Kabir Oluwatobi Idowu, Oyelade Babatunde Eriwa, Adedeji Oladimeji Adebare, Morufat Adebola Usman Jun 2024

A Meta-Ensemble Predictive Model For The Risk Of Lung Cancer, Sideeqoh Oluwaseun Olawale-Shosanya, Olayinka Olufunmilayo Olusanya, Adeyemi Omotayo Joseph, Kabir Oluwatobi Idowu, Oyelade Babatunde Eriwa, Adedeji Oladimeji Adebare, Morufat Adebola Usman

Al-Bahir Journal for Engineering and Pure Sciences

The lungs play a vital role in supplying oxygen to every cell, filtering air to prevent harmful substances, and supporting defense mechanisms. However, they remain susceptible to the risk of diseases such as infections, inflammation, and cancer that affect the lungs. Meta-ensemble techniques are prominent methods used in machine learning to enhance the accuracy of classifier learning systems in making predictions. This work proposes a robust predictive model using a meta-ensemble method to identify high-risk individuals with lung cancer, thereby taking early action to prevent long-term problems benchmarked upon the Kaggle Machine Learning practitioners' Lung Cancer Dataset. Three machine learning …


Ai's Ethical Frontier Jun 2024

Ai's Ethical Frontier

DePaul Magazine

Artificial intelligence (AI) is affecting every aspect of the university and society. Experts from across DePaul share their insights on artificial intelligence's advantages and pitfalls. Learn about DePaul's new Artificial Intelligence Institute and research projects that use AI for societal benefit.


Evaluating The Basement Design Of Low-Rise Building With Two-Stage Analysis Using Bim Integration: Hangar Study Case, Given Tohho, Jessica Sjah, Ayomi Dita Rarasati, Bambang Trigunarsyah Jun 2024

Evaluating The Basement Design Of Low-Rise Building With Two-Stage Analysis Using Bim Integration: Hangar Study Case, Given Tohho, Jessica Sjah, Ayomi Dita Rarasati, Bambang Trigunarsyah

Smart City

Building Information Modelling (BIM) has revolutionized the way the construction industry designs, constructs, and manages buildings. Certainly, the utilization of BIM can optimize the usage of materials in a construction project, considering the high level of concrete consumption globally and its significant environmental impact. The implementation of BIM is intended to calculate the volume of concrete and steel material usage in the design process of low-rise buildings with basements, exemplified in this case by a 5-story laboratory hangar with a 1-story basement. The building design is carried out through a two-stage analysis, which involves separating the upper portion from the …


An Alternative Approach To Data Carving Portable Document Format (Pdf) Files, Kevin Hughes, Michael Black Jun 2024

An Alternative Approach To Data Carving Portable Document Format (Pdf) Files, Kevin Hughes, Michael Black

Journal of Cybersecurity Education, Research and Practice

Traditional data carving relies on the successful identification of headers and trailers, unique hexadecimal signatures which are exclusive to specific file types. This can present a challenge for digital forensics examiners when pitted against modern anti-forensics techniques. The interest of this study is file signature obfuscation, a technique which alters headers and trailers. This research will focus on the development of a new, proof-of-concept algorithm that analyzes content in segments based on unique elements found within the body of a file. The file type being targeted is the Portable Document Format (PDF) and this research is built upon previously successful …


(R2073) Analysis Of Mmap/Ph(1), Ph(2)/1 Preemptive Priority Queueing Model With Single Vacation, Repair And Impatient Customers, S. Meena, G. Ayyappan Jun 2024

(R2073) Analysis Of Mmap/Ph(1), Ph(2)/1 Preemptive Priority Queueing Model With Single Vacation, Repair And Impatient Customers, S. Meena, G. Ayyappan

Applications and Applied Mathematics: An International Journal (AAM)

In this paper, we analyse a single server preemptive priority queue with phase-type vacation and repair, feedback, working breakdown, close-down and impatient customers. Customers arrive according to the Marked Markovian Arrival Process and their service time according to Phase-type distribution. If the High Priority customers need feedback, they lose their priority and join the Low Priority queue. At any instant, if the server is broken down, the server provide service with slow mode for that current customer and then the server will go into a repair process. When there are no customers present in both the queues, the server close-down …


Synthesis Of Dyes Sulfamidazole: Characterization, Evaluation, Molecular Docking And Global Descriptors By Density Functional Theory (Dft)., Athra G. Sager, Jawad Kadhim Abaies, Zeena R. Katoof May 2024

Synthesis Of Dyes Sulfamidazole: Characterization, Evaluation, Molecular Docking And Global Descriptors By Density Functional Theory (Dft)., Athra G. Sager, Jawad Kadhim Abaies, Zeena R. Katoof

Karbala International Journal of Modern Science

In the present work, novel azo compounds of sulfamidazole were created via the reaction of diazonium salt of sulfamidazole with several aromatic molecules including (resorcinol, 2-nitro phenol, 3-nitro phenol, and 4-nitro phenol)) (Z1–Z4). The new compounds (Z1-Z4) were identified using FTIR, 1HNMR techniques, in addition to melting point measurements. The biological activity of compounds (Z1-Z4) was studied against four kinds of bacteria including E. coli, Klebsiella pneumonia, Salmonella, and Staphylococcus aureus. The findings showed that all compounds (Z1-Z4) were active against the examined bacteria. Theoretical studies of the antibacterial ability of the prepared compound against DNA gyrase enzyme …


Intelligent Solutions For Retroactive Anomaly Detection And Resolution With Log File Systems, Derek G. Rogers, Chanvo Nguyen, Abhay Sharma May 2024

Intelligent Solutions For Retroactive Anomaly Detection And Resolution With Log File Systems, Derek G. Rogers, Chanvo Nguyen, Abhay Sharma

SMU Data Science Review

This paper explores the intricate challenges log files pose from data science and machine learning perspectives. Drawing inspiration from existing methods, LAnoBERT, PULL, LLMs, and the breadth of recent research, this paper aims to push the boundaries of machine learning for log file systems. Our study comprehensively examines the unique challenges presented in our problem setup, delineates the limitations of existing methods, and introduces innovative solutions. These contributions are organized to offer valuable insights, predictions, and actionable recommendations tailored for Microsoft's engineers working on log data analysis.


Leveraging Transformer Models For Genre Classification, Andreea C. Craus, Ben Berger, Yves Hughes, Hayley Horn May 2024

Leveraging Transformer Models For Genre Classification, Andreea C. Craus, Ben Berger, Yves Hughes, Hayley Horn

SMU Data Science Review

As the digital music landscape continues to expand, the need for effective methods to understand and contextualize the diverse genres of lyrical content becomes increasingly critical. This research focuses on the application of transformer models in the domain of music analysis, specifically in the task of lyric genre classification. By leveraging the advanced capabilities of transformer architectures, this project aims to capture intricate linguistic nuances within song lyrics, thereby enhancing the accuracy and efficiency of genre classification. The relevance of this project lies in its potential to contribute to the development of automated systems for music recommendation and genre-based playlist …


Crisis Management: Unveiling Information And Communication Technologies’ Revamped Role Through The Lens Of Sub-Saharan African Countries During Covid-19, Ruthbetha Kateule, Egidius Kamanyi, Mahadia Tunga May 2024

Crisis Management: Unveiling Information And Communication Technologies’ Revamped Role Through The Lens Of Sub-Saharan African Countries During Covid-19, Ruthbetha Kateule, Egidius Kamanyi, Mahadia Tunga

The African Journal of Information Systems

The management of COVID-19 pandemic has revealed inefficiencies in coordinating global response, particularly in African countries. Therefore, creating an urgent need to examine the literature on Information and Communication Technologies (ICT) in crisis management to appreciate its contextual role. Employing a systematic review, using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA), this paper critically assessed the extent of the use of ICT in crisis management in Africa’s response to COVID-19 to reconstruct its resilience against future crises. Findings indicate that while countries with limited ICT infrastructure faced considerable challenges in utilizing ICT solutions in COVID-19 management, countries …