Journal Articles (CI): Recent submissions
Now showing items 41-60 of 132
-
Evaluating Linear and Non-linear Dimensionality Reduction Approaches for Deep Learning-based Network Intrusion Detection Systems
(2023-08-08)Dimensionality reduction is an essential ingredient of machine learning modelling that seeks to improve the performance of such models by extracting better quality features from data while removing irrelevant and redundant ... -
A New Complexity Metric for UML Sequence Diagrams
(2023-01)Object-Oriented Programming (OOP) has been promoted as a way to produce high-quality software while increasing developer productivity through code reuse. Software systems and underlying designs get more extensive and more ... -
Metrics For Evaluating Alerts in Intrusion Detection Systems
(2023-01)Network intrusions compromise the network’s confidentiality, integrity and availability of resources. Intrusion detection systems (IDSs) have been implemented to prevent the problem. Although IDS technologies are promising, ... -
An Extended Security Measurement Framework For Open-Source Enterprise Resource Planning Software Security
(International Journal of Network Security & Its Applications (IJNSA), 2022-09)Modern organizations are adopting new ways of measuring their level of security for compliance and justification of security investments. The highly interconnected environment has seen organizations generate lots of personal ... -
Implementation of AI-based assistive technologies for learners with physical disabilities in Kenya: a practical design thinking approach
(African Journal of Science, Technology and Social Sciences (AJSTSS), 2022-06)Inclusion of Learners with disabilities continues to extensively rely on digital and Artificial Intelligence (AI) enabled Assistive Technologies (AT) as enablers for teaching and learning. However, the provision of ATs to ... -
Blockchain as a Solution of Information Security and Data Privacy Issues: Review
(2022-08)The growth of technology has seen development of smart devices that are connected to each other giving rise to device-mesh technology. This has given rise to many owners of these devices sharing data through various web ... -
A Comparative Study of Deep Learning and Transfer Learning in Detection of Diabetic Retinopathy
(2022)Computer vision has gained momentum in medical imaging tasks. Deep learning and Transfer learning are some of the approaches used in computer vision. The aim of this research was to do a comparative study of deep learning ... -
Developing Hybrid-Based Recommender System with Naïve Bayes Optimization to Increase Prediction Efficiency
(2021-03)Commerce and entertainment world today have shifted to the digital platforms where customer preferences are suggested by recommender systems. Recommendations have been made using a variety of methods such as content-based, ... -
Data Preparation for Machine Learning Modelling
(2022)The world today is on revolution 4.0 which is data-driven. The majority of organizations and systems are using data to solve problems through use of digitized systems. Data lets intelligent systems and their applications ... -
An e-Readiness Assessment of ICT Integration in Public Primary Schools in Kenya Case of Nyeri County.
(2017)In primary schools, information and communication technologies (ICT) are widely seen as tools for enhancing learning. This expectation increases their rapid diffusion and adoption throughout developing countries. Despite ... -
Network Intrusion Detection Systems: A Systematic Literature Review of Hybrid Deep Learning Approaches
(2022-06)Network Intrusion Detection Systems (NIDSs) have become standard security solutions that endeavours to discover unauthorized access to an organizational computer network by scrutinizing incoming and outgoing network traffic ... -
Cluster Head Selection Algorithms for Enhanced Energy Efficiency in Wireless Sensor Networks: A Systematic Literature Review
(2022-06)The extension of the sensor node's life span is an essential requirement in a Wireless Sensor Network. Cluster head selection algorithms undertake the task of cluster head election and rotation among nodes, and this has ... -
Internet of Things Based Model For Identifying Pediatric Emergency Cases
(2021-08)Pediatric emergency cases need rapid systems that measure vital body parameters data, analyze and categorize emergency cases for precise action. Current systems use manual examination resulting in delayed medication, death, ... -
Machine Learning Load Balancing Techniques in Cloud Computing: A Review
(2022-06)Load balancing (LB) is the process of distributing the workload fairly across the servers within the cloud environment or within distributed computing resources. Workload includes processor load, network traffic and storage ... -
Complexity Metrics for Statechart Diagrams
(2022-05)Model-Driven Development and the Model-Driven Architecture paradigm have in the recent past been emphasizing on the importance of good models. In the Object-Oriented paradigm one of the key artefacts are the Statechart ... -
A systematic literature review on security indicators for open-source enterprise resource planning software
(2022-05)Open-source enterprise resource planning (ERP) software has become a preferred alternative for modern organizations due to its affordable cost, availability and ease of access. Open-source software allows access to ... -
A Systematic Literature Review of Meta-Learning Models for Classification Tasks
(International Journal of Computer Applications Technology and Research Volume 11–Issue 03, 56-65, 2022): Meta-learning is a field of learning that aims at addressing the challenges of conventional machine learning approaches such as learning from scratch for every new task. The main aim of this study was to do a systematic ... -
A Suvery of Biometric Authentication Technologies Towards Secure And Robust Systems: A Case Study of Mount Kenya University
(2022-03)In response to the increased demand for more effective authentication methods, the usage of biometric authentication to secure systems against unwanted access has grown. Because of the recent COVID-19 pandemic outbreak, ... -
A Survey of Deep Learning Solutions for Anomaly Detection in Surveillance Videos
(Asian Online Journals, 2021-10)Deep learning has proven to be a landmark computing approach to the computer vision domain. Hence, it has been widely applied to solve complex cognitive tasks like the detection of anomalies in surveillance videos. Anomaly ... -
A Framework for Verification in Contactless Secure Physical Access Control and Authentication Systems
(2022-02)Biometrics is one of the very popular techniques in user identification for accessing institutions and logging into attendance systems. Currently, some of the existing biometric techniques such as the use of fingerprints ...