Search
Now showing items 1-10 of 15
A Literature Survey of Visual Similarity Snooping Attacks in Emails
(2020-08)
Snooping is one of the biggest issues that the cyber security industry is facing in this modern era of technology and it leads to big losses of finances both for individuals and organizations. The detection of snooping ...
A Survey of Topic Model Inference Techniques
(International Journal of Computer and Information Technology, 2018)
— Latent Dirichlet Allocation (LDA) is a probabilistic
topic model that aims at organizing, visualizing, summarizing,
searching, predicting and understanding the content of any given
text data. The model enables users ...
Computer Laptop Project Strategy for Basic Education Schools in Kenya
(IJICT Journals, 2017-05)
Kenya’s Vision 2030 recognizes the enabling role of Information and Communication Technology (ICT) and anchors some of its key aspirations upon the availability and adoption of computers for schools. The overall objective ...
Impact of Managerial Interventions on Process in implementing Information Systems for Higher Education Institutions in a developing country
(African Journal of Computing and Information Systems, 2017)
Organizational Implementation of Information Systems Innovations (OIISI) Framework was developed
in the context of University in Kenya and can be used to understand the implementation of Information
Systems (IS) Innovations ...
A Suvery of Biometric Authentication Technologies Towards Secure And Robust Systems: A Case Study of Mount Kenya University
(2022-03)
In response to the increased demand for more effective authentication methods, the usage of biometric authentication to secure systems against unwanted access has grown. Because of the recent COVID-19 pandemic outbreak, ...
SSH-Brute Force Attack Detection Model based on Deep Learning
(2021-01)
The rising number of malicious threats on computer networks and Internet services owing to a large number of attacks makes the network security be at incessant risk. One of the predominant network attacks that poses ...
A Survey of Deep Learning Solutions for Anomaly Detection in Surveillance Videos
(Asian Online Journals, 2021-10)
Deep learning has proven to be a landmark computing approach to the computer vision domain. Hence, it has been widely applied to solve complex cognitive tasks like the detection of anomalies in surveillance videos. Anomaly ...
A Framework for Verification in Contactless Secure Physical Access Control and Authentication Systems
(2022-02)
Biometrics is one of the very popular techniques in user identification for accessing institutions and logging into attendance systems. Currently, some of the existing biometric techniques such as the use of fingerprints ...
Quadratic Approach for Fast Topic Selection in Modelling Big Text Analytics
(International Journal of Advancements in Computing Technology, 2018)
One challenging issue in application of Latent Dirichlet Allocation (LDA) is to select the optimal number of
topics which must depend on both the corpus itself and user modeling goals. This paper presents a topic
selection ...
Comparative Analysis of Machine Learning Algorithms Accuracy for Maize Leaf Disease Identification
(2022-03)
The number of data points predicted correctly out of the total data points is known as accuracy in image classification models. Assessment of the accuracy is very important since it compares the correct images to the ones ...