Global Journal of Computer Science and Technology (GJCST)
Not a member yet
    1830 research outputs found

    Towards Optimized K Means Clustering using Nature-inspired Algorithms for Software Bug Prediction

    Get PDF
    In today s software development environment the necessity for providing quality software products has undoubtedly remained the largest difficulty As a result early software bug prediction in the development phase is critical for lowering maintenance costs and improving overall software performance Clustering is a well-known unsupervised method for data classification and finding related patterns hidden in dataset

    Blockchain Challenges: Advantages and Algorithms

    Get PDF
    Cryptocurrency is the innovation that has changed the way of life most significantly over the past ten years Bitcoins is a term that often comes up when discussing the blockchain system Although they are not identical Ethereum and Cryptocurrency nevertheless remain widely misunderstood Innovative technologies had to be created as a result from rising degrees of globalization These groundbreaking innovations improve the speed of international trade There are many technical experiments some of them were successful whereas others died or required development The decentralized ledger technology its benefits and methods for consensus are described on this articl

    Socio-Technical Power System Resilience

    Get PDF
    Abstract Power systems serve social communities that consist of residential commercial and industrial customers The social behavior and degree of collaboration of all stakeholders such as consumers prosumers and utilities affect the level of pre- paredness mitigation recovery adaptability and thus power system resilience Nonetheless the literature pays scant attention to stakeholders social characteristics and collaborative efforts when confronted with a disaster and views the problem solely as a cyber-physical system However power system resilience which is not a standalone discipline is inherently a cyber-physical- social problem making it complex to address To this end in this paper we develop a socio-technical power system resilience model based on neuroscience social science and psychological theories and using the threshold model to simulate the behavior of power system stakeholders during a disaste

    A Study of Artificial Intelligence in Education

    Get PDF
    Artificial Intelligence AI refers to the simulation of human intelligence in machines that are programmed to think and mimic human cognitive processes It includes a wide range of tools that enable machines to carry out operations that otherwise need human intelligence Learning logical thinking problem-solving perception speech recognition and language understanding are some of these tasks One of the key areas where AI will have a profound effect is education Both students and teachers benefit from enhanced educational experiences because of AI It offers a personalized learning experience Although AI in education hasn t received much attention over the years understanding its concepts functions methodology and applications would provide the groundwork for the development of the education secto

    Literature Study on Analyzing and Designing of Algorithms

    Get PDF
    The fundamental goal of problem solution under numerous limitations such as those imposed by issue size performance and cost in terms of both space and time Designing a quick effective and efficient solution to a problem domain is the objective Certain problems are simple to resolve while others are challenging To develop a quick and effective answer much intelligence is needed A new technology is required for system design and the foundation of the new technology is the improvement of an already existing algorithm The goal of algorithm research is to create effective algorithms that improve scalability dependability and availability in addi

    Strengthening Smart Contracts: An AI-Driven Security Exploration

    Get PDF
    Smart contracts are automated agreements in which the conditions between the purchaser and the vendor are encoded directly into lines of code allowing them to execute automatically Smart contracts have emerged as a ground-breaking technology facilitating the decentralized and trustless execution of agreements on blockchain platforms However the widespread adoption of smart contracts exposes them to various security threats leading to substantial financial losses and reputational harm Artificial Intelligence has the capability to aid in the detection and reduction of vulnerabilities thereby enhancing the overall strength and resilience of smart contracts This integration can create highly secure and transparent systems that reduce the risk of fraud corruption and other malicious activities thereby increasing trust and confidence in these systems and improving overall security This research paper delves into the innovative applications of Artificial Intelligence techniques to enhance the security of smart contracts Investigating the potential of AI in detecting vulnerabilities identifying potential attacks and offering automated solutions for safer smart contracts will significantly contribute to the development and flawless execution of this emerging technolog

    Providing in RDBMSs the Flexibility to Work with Various Non-Relational Data Models

    Get PDF
    The inability of pure relational DBMSs to meet the new requirements of the applications which have emerged on the web has led to the advent of NoSQL DBMSs In recent years significant progress has been made in integrating into relational DBMSs the features essentials for taking into consideration these new requirements which mainly concern flexibility performances horizontal scaling and very high availability This paper focuses on the features which can enable the relational DBMSs to provide applications with the flexibility to work with various non-relational data models while providing the guarantees of independence integrity and performance of query evaluatio

    Use of Design Sprint in PBL Modules– A Longitudinal Case Study Approach

    Get PDF
    Project Based Learning PBL modules have become an inevitable part in SE curriculums Industry relevance of PBL mechanisms have further strengthened this crucial need Design Sprint is well known as a PBL approach which enhances transferable skills in students Design Sprint is also a widely used mechanism in software industry projects Therefore Design Sprint could be used to enhance the outcomes of SE undergraduate PBL projects This study makes use of a longitudinal case study approach to investigate the effectiveness of using Design Sprint approach in a SE undergraduate module which used PBL The study focusses a group of students 111 and academics 12 in SE degree program in a private higher education institute in Sri Lanka Qualitative data gathered from the target audience in two distinctive occasions to investigate the effectiveness of Design Sprint in PBL project

    Comparison of Prim and Kruskal’s Algorithm

    Get PDF
    The goal of this research is to compare the performance of the common Prim and the Kruskal of the minimum spanning tree in building up super metric space We suggested using complexity analysis and experimental methods to evaluate these two methods After analysing daily sample data from the Shanghai and Shenzhen 300 indexes from the second half of 2005 to the second half of 2007 the results revealed that when the number of shares is less than 100 the Kruskal algorithm is relatively superior to the Prim algorithm in terms of space complexity however when the number of shares is greater than 100 the Prim algorithm is more superior in terms of time complexity A spanning tree is defined in the glossary as a connected graph with non-negative weights on its edges and the challenge is to identify a maz weight spanning tree Surprisingly the greedy algorithm yields an answer For the problem of finding a min weight spanning tree we propose greedy algorithms based on Prim and Kruskal respectively Graham and Hell provide a history of the issue which began with Czekanowski s work in 1909 The information presented here is based on Rose

    Machine Learning Algorithm to Detect Impersonation in an Essay-Based E-Exam

    Get PDF
    Essay-based E-exams require answers to be written out at some length in an E- learning platform The questions require a response with multiple paragraphs and should be logical and well-structured These type of examinations are increasingly becoming popular in academic institutions of higher learning based on the experience of COVID-19 pandemic Since the exam is mainly done virtually with reduced supervision the risk of impersonation and stolen content from other sources increases Due to this there is need to design cost effective and accurate techniques that are able to detect cheating in an essay based E- exa

    1,699

    full texts

    1,830

    metadata records
    Updated in last 30 days.
    Global Journal of Computer Science and Technology (GJCST) is based in United States
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇