A CONVERSATIONAL SYSTEM (Chatbot) FOR HANDLING ADMINISTRATION-RELATED STUDENTS’ QUERIES

ABSTRACT The administrative challenge of efficiently answering the questions of several thousands of students is one that tertiary institutions are looking for innovative ways to solve. There seems to be no shortage of enquiries and queries, leaving the student affairs administrative unit overwhelmed with repetitive work. This Research study details the creation of a chatbot

A COMPARATIVE STUDY OF BOOSTING CLASSIFICATION METHODS FOR DETECTION OF PARKINSON’S DISEASE

ABSTRACT Parkinson’s disease is a disorder of the nervous system that impacts the human brain. Several forms of research output are already in existence concerning Parkinson’s disease. Especially, its detection, prediction, diagnosis, and so on. This study aimed to compare the performance results of some boosting classification approaches for the detection of the same disease.

TOMATODETECT: A MOBILE APPLICATION FOR DETECTING TOMATO LEAF DISEASES BASED ON VGG-16 CONVNET

ABSTRACT Tomatoes are a staple in Nigerian food, appearing in a wide range of recipes and providing several nutritional benefits such as Vitamin C, potassium, and lycopene, which help prevent heart disease and cancer. Nigeria is currently Africa’s second-largest producer of fresh tomatoes, accounting for 10.8% of the continent’s total. However, several diseases that infect

SYNTHETIC MINORITY OVER-SAMPLING TECHNIQUE AND RESAMPLE APPROACH FOR ANDROID MALWARE DETECTION USING TREE-BASED CLASSIFIERS

ABSTRACT As a result of malicious actions such as harvesting user data and sending spam emails, phone calls, and so on, malware for mobile devices is getting more sophisticated, posing a serious challenge. When it comes to malware detection, a heuristic approach is needed. This research proposes a novel approach to detect malware in android

SECURING TEXTUAL AND MULTIMEDIA DATA USING CRYPTOGRAPHY AND STEGANOGRAPHY ALGORITHM: A SYSTEMATIC REVIEW

ABSTRACT This study gives a survey of the research on cryptography and steganography techniques for data security during the previous six years, from 2016 to 2022. Several authors have contributed significantly to the field of information and communication security. Traditional data security techniques do not fulfill data protection requirements considering the proliferation of hacking tool