Computer Science & Engineering
Permanent URI for this collection
Browse
Browsing Computer Science & Engineering by Issue Date
Now showing 1 - 19 of 19
Results Per Page
Sort Options
Item A Simplified Fractal Texture Analysis Approach using Quadtree Decomposition with Huffman Coding Technique 2021 September(Middle East Journal of Applied Science & Technology, 2021) Jacob, RaniFractal compression is compression of the lossy type, which is applied for natural textured images. A fractal image compression technique based on the Quadtree algorithm and Huffman coding is proposed in this work. Agonizingly, the term "fractal compression" refers to an image compression technique that uses the fractal geometry of the image data stream to achieve lossy compression. Realistic images and textures are created with the help of this tool. It is based on the fact that parts of an image are frequently similar to other parts of the same image, which allows for faster processing. The most widely used partitioning mechanism is image partitioning in a tree structure. In this emerging world of image processing, quad tree partitioning is a one-of-a-kind technique that divides an image into a set of homogeneous regions. Huffman coding is a type of data compression that is lossless. The Huffman encoding algorithm is introduced through this technique, which creates an alphabetic list of all of the alphabet symbols, which is then arranged in descending order of their likelihood of occurring. The peak signal-to-noise ratio is quite improved by employing the proposed technique, and the encoding time is reduced.Item An integral part of existence: Orientation of Data mining as a unique digital world(International Journal of Novel Research and Development, 2022) Jesu Arockia, VeniceData Mining’ is the latest field of enriched study of the computer technology. In accordance to Britannica Encyclopedia, ‘Data Mining’, is also called knowledge discovery in databases (KDD), in computer science, the process of discovering interesting and useful patterns and relationships in large volumes of data. It can also be defined as ‘the non trivial process of extracting interesting previously unknown, which brings about the discovery part and potentially useful pattern or knowledge from huge amount of data. The definitions reflect the significance of data discovery and the manner in which it is patterned. However, it has to be potentially useful and signifies to be an useful knowledge depending on the application. So, the knowledge often takes the form of patterns in data with some regularity or some kind of structure in the data taken from huge amount of data which is an important aspect of comprehending the text content.Item Impeccable MRI Image Compression with Non-Uniform Partition and U-System(International Journal of Creative Research Thoughts (IJCRT), 2022) Jacob, RaniIn MRI digital images have multivariate texture complexities, there is a need for a compression algorithm that is effective in the compression of such images with improved quality of the compressed image and successfully reduced blocking artifacts. This paper gives an efficient algorithm that compresses an MRI image by dividing the image into 8×8 high texture image blocks then 16×16 low texture image blocks using image texture adaptive non-uniform rectangular partition and a transform coding blocking of different sizes which finally uses a flexible adaptive quantization scheme while considering human visual system (HSV). The algorithm discussed in this paper is more efficient than the DCT algorithm and is more tolerant to low bit rate images create the compressed image to a high quality and conquer all the potential blocking artifacts that develop with DCT algorithm image compression.Item Performance Analysis of Image Compression in MRI BI using ROI & Non ROI coding technique(International Journal of Advanced in Management, Technology and Engineering Sciences, 2022) Jacob, RaniThe growing demand for medical image storage and transmission has resulted in a shortage of memory and bandwidth. Compression was used to find these issues. Clinical image compression is used to improve image quality, reduce bit rate, increase compression efficiency for storage and transmission, and reduce cost. MRI images are quite clinical. To store and transmit thousands of MRI pictures, you need a lot of storage space and bandwidth. Thus, high-quality MRI image compression is more research focused. Many Compression strategies for MRI with low compression rate cause loss of data on lesions, and lead to misdiagnose. This research proposed several MRI image compression methods. Our main goals are to provide more compressed clinical images, encourage early location and finding followed by therapy using multi-resolution compression technology. A two-dimensional (2D) picture arrangement is created by first converting 3D MRI scans into 2D images. Then range and area blocks are arranged by 3D object's spatio-temporal similarity. In addition, the proposed technique uses wavelet transform and MRG algorithm to analyse the performance of wavelet contains transformation, quantization, and entropy coding to compress the most significant piece of ROI using DWT and s. It compresses non-ROI using DCT and MHE (merging based Huffman encoding). Finally, residual compensation is used to provide good decompression quality MRI compression.Item Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI Brain Images(Asian Journal of Applied Science and Technology (AJAST), 2022) Jacob, RaniDigital image compression is a modern technology which comprises of wide range of use in different fields as in machine learning, medicine, research and many others. Many techniques exist in image processing. This paper aims at the analysis of compression using Discrete Cosine Transform (DCT) by using special methods of coding to produce enhanced results. DCT is a technique or method used to transform pixels of an image into elementary frequency component. It converts each pixel value of an image into its corresponding frequency value. There has to be a formula that has to be used during compression and it should be reversible without losing quality of the image. These formulae are for lossy and lossless compression techniques which are used in this project. The research test Magnetic Resonance Images (MRI) using a set of brain images. During program execution, original image will be inserted and then some algorithms will be performed on the image to compress it and a decompressing algorithm will execute on the compressed file to produce an enhanced lossless image.Item An Efficient Analysis of Wavelet Techniques on Image Compression(Irish Interdisciplinary Journal of Science & Research (IIJSR), 2022) Jacob, RaniCompression can be defined as an art form that involves the representation of information in a reduced form when compared to the original information. Image compression is extremely important in this day and age because of the increased demand for sharing and storing multimedia data. Compression is concerned with removing redundant or superfluous information from a file to reduce the size of the file. The reduction of the file size saves both memory and the time required to transmit and store data. Lossless compression techniques are distinguished from lossy compression techniques, which are distinguished from one another. This paper focuses on the literature studies on various compression techniques and the comparisons between them.Item Implications On the Effectiveness of Online Tertiary Education at Higher Education Levels of Imparting Education in Zambia(2023) Jesu Arockia, VeniceThis article aims at analyzing the effectiveness of the online tertiary education at higher education levels in Zambia. The background of this study is based on the policy direction of the revised curriculum of 2013 where stress and emphasis was given to teaching in Colleges and Universities using online teaching and learning platforms. The need for online teaching and learning methods has become the priority in most institutions of the world and in the space taken to study in this paper. This type of system is to enhance teaching prospects to students staying in distance from the place of the establishment of the institution. Furthermore, the pandemic effect on society in most parts of the world favored the tertiary teaching learning methodology and strategizes the innovative approach to imparting of education that became the most need to the reality in modernity. Nevertheless, this paper harps on the effectiveness of such an approach and a sample space was taken to comprehend the practicality of such usage. On analytical performances to derive a positive result, questionnaire method was taken to practice, which was specially designed to be used amongst the students of higher education levels. More than 100 students were taken for sample space and the students from the universities and colleges of varied professionalism took part in the survey. The survey turned to be a positive expression of effectiveness as taken to study.Item The Role and Challenges of Women in Cybersecurity in Nagapattinam District, TamilNadu, INDIA.(SCIENTIFIC CULTURE, 2024) Jacob, RaniAround quarter of cybersecurity occupations overall are held by women, which unfortunately doesn't exactly match the half of worldwide female populace. Despite the fact that there has been progress throughout the course of recent years, more work should be finished. Women face numerous impediments in the field of cybersecurity, including a shortage of mentors, deficient media portrayal, and an absence of industry good examples. Quick advancements in innovation, especially in the field of cyberspace, have introduced another time of information, opportunity, and development . Be that as it may, the web's quickly extending come to, the speedy scattering of data through cell phones, and the expanded utilization of virtual entertainment have likewise prompted an ascent in wrongdoing. In this specific circumstance, women's weaknesses in reality are reflected in the virtual world and are periodically exacerbated by its speedy and boundless scattering, anonymized utilize potential, and low client mindfulness. It's a given that a worldwide issue in cybersecurity is the absence of gender variety in the field. While there are different justifications for why women are still underrepresented in this field, significant bias and gender generalizations add to the discernment that a profession in cyber security is unsatisfactory for women. Fortinet is among the many organizations that are effectively resolving this issue. This reaches out past believing variety to be an honorable goal, which it is. Taking into account the developing emergency brought about by the worldwide security abilities hole, it is basic that more women join the positions of cyber security experts assuming our general public is to be safeguarded. Research demonstrates that women are underrepresented in the cyber security field, albeit this is slowly evolving. The new development offers women who are simply beginning their vocations an upper hand in the gig market. Hence, the present study has been done to highlight the role and challenges of women in cybersecurity in Nagapattinam District.Item Awareness and Usage of Academic Social Networking Sites: Female Research Scholars and Faculties(International Journal of Information Science and Management, 2024) Subaveerapandiyan, A; K. Sripathi, SumathiThe study examines the awareness and usage of Academic Social Networking Sites (ASNS) among female research scholars and faculty members in Tamil Nadu, India. A structured questionnaire was used to survey 838 female research scholars through online platforms. The results showed that most respondents use at least one ASNS, with Google Scholar being the most popular. The primary reasons for using ASNS are to disseminate scholarly work and discover research papers. However, a lack of awareness and time was the main reason for not having an account with these sites. The respondents learned about ASNS primarily through friends and colleagues and suggested increasing their use and awareness through seminars and training courses, library posters, and integration in the student courses. The study highlights the importance of ASNS in the research work of female scholars and faculties while also recognizing the need for increased awareness and access to these resourcesItem Design and Implementation of a Web-Based Result Management System: A Case Study of Emusa Day Secondary School, Chasefu District, ZAMBIA(ASET Journal of Management Science, 2025) Jesu Arockia, VeniceThe management of academic results is a critical function in secondary schools, directly impacting educational planning, student motivation, and administrative accountability. In many rural settings, manual systems for managing student records are still prevalent, posing challenges of inefficiency, error-proneness, and limited data accessibility. This research investigates the design and implementation of a web- based result management system (WRMS) specifically developed for Emusa Day Secondary School in Chasefu District, Eastern Province of Zambia. The aim was to address systemic challenges posed by the manual result management process and to enhance accuracy, efficiency, and data security. Using a mixed-methods case study approach, the research combined qualitative data from interviews and focus groups with quantitative data from system performance evaluations. The Technology Acceptance Model (TAM) and principles of the CIA Triad (Confidentiality, Integrity, and Availability) guided the system’s conceptual framework and evaluation. The development process followed an Agile methodology and employed PHP and MySQL to create a secure, user-friendly web application. Key features included role-based access, real-time data retrieval, secure authentication, and automated report generation. Results from the system evaluation indicated significant improvements in the accuracy and speed of result processing, as well as enhanced user satisfaction and data protection. The findings suggest that adopting context-specific WRMS solutions can greatly benefit secondary schools in resource-limited settings. The study contributes practical insights into ICT integration in educational management and provides a scalable model for similar institutions across Zambia and beyond.Item Enabling Personalized Learning and Adaptive Systems Through Strategic Management: Cloud Integration in Education(IGI-Global, 2025) Jesu Arockia, VeniceThe integration of cloud technology is transforming the educational landscape by facilitating personalized learning and adaptive systems. This chapter examines successful case studies showcasing the impact of cloud-based solutions, including Learning Management Systems (LMS), AI-driven analytics, and collaborative tools on educational outcomes. Notable examples include Khan Academy's extensive resource offerings, DreamBox Learning's adaptive learning engine, Purdue University's use of predictive analytics, and the global learning platform developed by Minerva Schools. While challenges such as data privacy concerns and the digital divide persist, these initiatives highlight how cloud technology can create customized learning experiences and equip educators with valuable insights. Looking ahead, emerging trends in artificial intelligence, virtual reality, global collaboration, and blockchain technology are poised to further enhance personalized and inclusive educational practices.Item Exploration on the Challenges faced by Administrators in the use of ict in Zambia: Review of the ict Subject Implementation in Schools of Lusaka province(ASET Journal of Management Science, 2025) Jesu Arockia, VeniceThis study explores the challenges faced by school administrators in the implementation of Information and Communication Technology (ICT) as a subject in secondary schools across Lusaka Province, Zambia. Utilizing a mixed-methods approach, data were collected through surveys and interviews with school administrators and ICT teachers. Findings reveal several impediments, including inadequate infrastructure, limited technical skills, insufficient training, and resource constraints that hinder effective ICT subject delivery and management. The study highlights the critical role of administrative support and capacity building in overcoming these challenges. Recommendations emphasize enhanced professional development, increased investment in ICT infrastructure, and policy reforms to support administrators and improve the quality of ICT education. This research provides valuable insights for policymakers, educators, and stakeholders aiming to strengthen ICT integration in Zambia’s education system.Item Integration of Technology in Administrative processes and its impact on school efficiency at Chilenje South Secondary School, Lusaka.(ASET Journal of Management Science, 2025) Jesu Arockia, VeniceThis study examined the integration of technology in administrative processes and its effect on school efficiency at Chilenje South Secondary School in Lusaka District. Guided by three objectives, the research assessed the overall impact of technology, challenges faced during implementation, and strategies for improvement. Using a mixed- methods approach, data were gathered from 20 administrative staff through structured questionnaires and interviews. The findings revealed that 70% of staff perceived technology to have a high or very high positive impact on efficiency. Key challenges included inadequate training, infrastructure deficits, and limited funding. Recommendations emphasized enhanced professional development, consistent technical support, and better inter-departmental communication. The study calls for proactive policy support to optimize technological integration for improved administrative effectiveness in Zambian schools.Item Institutionalisation of E-Learning in Zambian Schools as a viable alternative to classroom learning(ASET Journal of Management Science, 2025) Jesu Arockia, VeniceThis study examines the institutionalization of e-learning in Zambian schools as a viable alternative to traditional classroom learning. Using a mixed-methods approach, data were collected from educators, students, and school administrators to assess the current status, challenges, and potential of e-learning integration. Findings indicate that while e-learning offers flexibility, accessibility, and continuity of education, especially amid disruptions such as the COVID-19 pandemic, significant barriers exist, including inadequate infrastructure, limited digital literacy, and resistance to change. The study recommends strengthening ICT infrastructure, capacity building for teachers and learners, supportive policies, and community engagement to promote sustainable e-learning adoption. These insights contribute to educational planning in Zambia, highlighting e-learning as a complementary and transformative mode of instruction for enhancing educational access and quality.Item Managing Pupils’ Electronic Records in Primary Schools in Lusaka District: Benefits, Challenges, and Strategic Recommendations(ASET Journal of Management Science, 2025) Jesu Arockia, VeniceThis study explores the management of pupils’ electronic records in primary schools within Lusaka District, Zambia. With growing reliance on digital systems, schools have begun adopting SQL databases, cloud platforms, and educational software such as Glad Tiding to handle student data. The research employed a qualitative descriptive case study design, with data collected from 38 participants using semi-structured interviews. Findings reveal improved efficiency, data accuracy, access, and stakeholder communication. However, challenges persist, including limited training, data security concerns, resistance to change, and inadequate infrastructure. Recommendations include capacity-building for educators, investment in secure and scalable technologies, and stakeholder sensitization. This paper calls for policy alignment to support digital transformation in Zambian school administration systems.Item Integration of Technology in the teaching and learning of Physics in Zambia: Challenges, opportunities, and strategic alignment with the 2023 curriculum(ASET Journal of Management Science, 2025) Jesu Arockia, VeniceThis study investigates the integration of technology in the teaching and learning of physics in Zambia in line with the 2023 New Curriculum for Secondary Schools. Using a mixed-methods design, data were collected through questionnaires, interviews, and observations from physics teachers, students, and administrators. The study examines current practices, identifies challenges such as inadequate infrastructure, limited teacher training, and low digital literacy, and evaluates the opportunities presented by tools like mobile technologies, virtual labs, and open educational resources. The findings indicate a positive correlation between technology-enhanced teaching and improved student engagement and conceptual understanding. The paper concludes by proposing strategic interventions including professional development, policy revision, infrastructure investment, and curriculum reform to support sustainable and effective technology integration in physics education in Zambia.Item Investigating the role of civic education in reducing corruption at the grassroots level(ASET Journal of Management Science, 2025) Jesu Arockia, VeniceThis study investigates the role of civic education in mitigating corruption at the grassroots level. Using a mixed-methods approach, data were collected through surveys, interviews, and focus groups involving community members, educators, and local leaders. The findings reveal that effective civic education increases awareness of corruption’s negative impacts, strengthens ethical values, and empowers citizens to demand accountability. However, challenges such as limited resources, inadequate curriculum integration, and societal norms impede its full potential. The study recommends enhancing civic education programs, integrating anti-corruption content into school curricula, and fostering community engagement initiatives. These measures are critical for nurturing a culture of transparency and integrity essential to combating corruption at the grassroots.Item Social Deviance and the Influence of Internet Exposure A Study of Secondary School Students in Lusaka(ASET Journal of Management Science, 2025) Jesu Arockia, VeniceThis study investigates the relationship between internet usage and perceived social deviance among secondary school students in Lusaka, Zambia, with specific attention to the rise in awareness and expressions of LGBTQ identities. Using a mixed-methods approach, data were collected from 53 students across Matero Boys, Matero Girls, and Lusaka Hermann Gmeiner secondary schools. The research reveals that increased internet access broadens students’ exposure to global discourses on gender and identity, often challenging traditional norms and prompting cognitive dissonance. Findings indicate that digital platforms promote reflexive identity formation while raising tensions in educational institutions unprepared to address such transitions. The paper concludes by advocating for inclusive digital literacy, policy reform, educator capacity-building, and culturally sensitive support systems in schools.Item Importance of Cybersecurity and RegTech in FinTech.(Telecom Business Review, 2025) Jesu Arockia, VeniceThe digital infrastructure of FinTech and RegTech, applications have been at the threat of attackers ever since the development of technology-based methods used for transactions and other banking purposes. Many banks have preyed on cyberattacks such as ransomware, malware, Denial of Services, etc. Digitalization has provided comfort to consumers, but it has its trade-offs. Data innovation is presently seen as a potential development for stirring up the conventional Banking industry. FinTech and RegTech have been a big boon in terms of advancement in digitalization. However, the new episodes at the macroeconomic level like the 2008 monetary emergency or, significantly more recently, the Snowden case, the administrative climate is going through extreme changes. Due to this, banks and any other financial institutions’ cyber risks can cause catastrophic damage to the economy. Hence the purpose of this paper is to comprehend the threats encountered by the FinTech world and explore the vulnerabilities that can lead to substantial financial losses, the ways to mitigate the danger of any cyber-attack using cybersecurity and RegTech, and ultimately avoid any economic calamity.