Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Geoffrey Mariga Wambugu"'
Autor:
Stephen Kahara Wanjau, Geoffrey Mariga Wambugu, Aaron Mogeni Oirere, Geoffrey Muchiri Muketha
Publikováno v:
Journal of Computer Security. :1-30
Increasing interest and advancement of internet and communication technologies have made network security rise as a vibrant research domain. Network intrusion detection systems (NIDSs) have developed as indispensable defense mechanisms in cybersecuri
Publikováno v:
International Journal of Computer Applications Technology and Research. 11:247-254
Computer vision has gained momentum in medical imaging tasks. Deep learning and Transfer learning are some of the approaches used in computer vision. The aim of this research was to do a comparative study of deep learning and transfer learning in the
Publikováno v:
International Journal of Science and Engineering Applications. 11:66-71
Software complexity refers to the factors that determine the complexity level of a software project. High complexity is caused by the many attributes used in the system and the complex logic relationships among these attributes and features. The incr
Object-Oriented Programming (OOP) has been promoted as a way to produce high-quality software while increasing developer productivity through code reuse. Software systems and underlying designs get more extensive and more complicated while maintainin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::76c8d2c15e63cfa1fd55abe1a4cade58
Publikováno v:
International Journal of Engineering and Advanced Technology. 10:24-36
This paper provides an Extended Client Based Technique (ECBT) that performs classification on emails using the Bayessian classifier that attain in-depth defense by performing textual analysis on email messages and attachment extensions to detect and
Publikováno v:
International Journal of Computer Applications Technology and Research. 10:42-50
The rising number of malicious threats on computer networks and Internet services owing to a large number of attacks makes the network security be at incessant risk. One of the predominant network attacks that poses distressing threats to networks se
Network Intrusion Detection Systems (NIDSs) have become standard security solutions that endeavours to discover unauthorized access to an organizational computer network by scrutinizing incoming and outgoing network traffic for signs of malicious act
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2659::a66c76541fd233c416fa0ce000701607
https://zenodo.org/record/8081100
https://zenodo.org/record/8081100
Publikováno v:
International Journal of Computer and Information Technology(2279-0764). 11
The paper presents feature extraction methods and classification algorithms used to classify maize leaf disease images. From maize disease images, features are extracted and passed to the machine learning classification algorithm to identify the poss