Search
Now showing items 1-10 of 15
Data Preparation for Machine Learning Modelling
(2022)
The world today is on revolution 4.0 which is data-driven. The majority of organizations and systems are using data to solve problems through use of digitized systems. Data lets intelligent systems and their applications ...
Network Intrusion Detection Systems: A Systematic Literature Review of Hybrid Deep Learning Approaches
(2022-06)
Network Intrusion Detection Systems (NIDSs) have become standard security solutions that endeavours to discover unauthorized access to an organizational computer network by scrutinizing incoming and outgoing network traffic ...
A Suvery of Biometric Authentication Technologies Towards Secure And Robust Systems: A Case Study of Mount Kenya University
(2022-03)
In response to the increased demand for more effective authentication methods, the usage of biometric authentication to secure systems against unwanted access has grown. Because of the recent COVID-19 pandemic outbreak, ...
A systematic literature review on security indicators for open-source enterprise resource planning software
(2022-05)
Open-source enterprise resource planning (ERP) software has become a preferred alternative for modern organizations due to its affordable cost, availability and ease of access. Open-source software allows access to ...
A Framework for Verification in Contactless Secure Physical Access Control and Authentication Systems
(2022-02)
Biometrics is one of the very popular techniques in user identification for accessing institutions and logging into attendance systems. Currently, some of the existing biometric techniques such as the use of fingerprints ...
Comparative Analysis of Machine Learning Algorithms Accuracy for Maize Leaf Disease Identification
(2022-03)
The number of data points predicted correctly out of the total data points is known as accuracy in image classification models. Assessment of the accuracy is very important since it compares the correct images to the ones ...
A Comparative Study of Deep Learning and Transfer Learning in Detection of Diabetic Retinopathy
(2022)
Computer vision has gained momentum in medical imaging tasks. Deep learning and Transfer learning are some of the approaches used in computer vision. The aim of this research was to do a comparative study of deep learning ...
An Extended Security Measurement Framework For Open-Source Enterprise Resource Planning Software Security
(International Journal of Network Security & Its Applications (IJNSA), 2022-09)
Modern organizations are adopting new ways of measuring their level of security for compliance and justification of security investments. The highly interconnected environment has seen organizations generate lots of personal ...
Factors Affecting Software Maintenance Cost of Python Programs
(2022)
One of the primary areas of software project management is cost estimation. The cost estimation problem remains unsolved today because of the ineffective cost estimation techniques which are unsuitable for handling current ...
Machine Learning Load Balancing Techniques in Cloud Computing: A Review
(2022-06)
Load balancing (LB) is the process of distributing the workload fairly across the servers within the cloud environment or within distributed computing resources. Workload includes processor load, network traffic and storage ...