Department of Computer Science
Permanent URI for this collectionhttps://cris.hit.ac.zw/handle/123456789/22
Browse
Item Profile Impostoring:A Use Case on the Rising Social Engineering Attack on Facebook Users(International Journal of Science and Research (IJSR), 2014-06-06) Mawere, Cephas; Mpofu, Thabiso PeterSocial engineering attacks have taken a new twist as a growing number of people use online social networking sites to foster social relationships among each other and market products. Of interest is Facebook whose users have exponentially increased; some of these users are prominent individuals with high influence in various communities like celebrities, philanthropists, religious ministers and non- profit organizations. Data retrieval from Facebook profiles is thus becoming a major tool for business which has led to most unsuspecting users being victims of deception. Profile impostoring, also known as identity theft, is increasingly on the rise and becoming an underlying threat to information security. The cyber perpetrators are creating fake Facebook profiles of prominent individuals who have a large following. Ordinary individuals are also not at their mercy. With such high pending risk of identity theft there is need to develop methods that help Facebook fans to automatically detect deception, identify imposters and get them arrested.Item The Impact and Application of 3D Printing Technology(International Journal of Science and Research (IJSR), 2014-06-12) Mukosera, Macdonald; Mawere, Cephas; Mpofu, Thabiso Peter3D printing also known as Additive manufacturing technology has been dubbed the next big thing and be as equally wide spread as cellular telephone industry. 3D printers print objects from a digital template to a physical 3-dimensional physical object. The printing is done layer by layer (Additive manufacturing) using plastic, metal, nylon, and over a hundred other materials. 3D printing has been found to be useful in sectors such as manufacturing, industrial design, jewellery, footwear, architecture, engineering and construction, automotive, aerospace, dental and medical industries, education, geographic information systems, civil engineering, and many others. It has been found to be a fast and cost effective solution in whichever field of use. The applications of 3D printing are ever increasing and it’s proving to be a very exciting technology to look out for. In this paper we seek to explore how it works and the current and future applications of 3D printing.Item A study of User Adjustment plans for the Introduction of Facebook Timeline(International Journal of Scientific & Engineering Research, 2014-07-05) Mpofu, Thabiso Peter; Gati, Nicholaus; Babu, Suresh; Elisa, NoeThis work applies coping theory to learn user adaptation strategies to major interface changes on Social Networking Sites (SNSs). Specifically, we qualitatively examine 1,798 user comments posted to the Facebook’s official Timeline blog in order to get a large and blended sample of real Facebook users’ perceptions about the launch of Timeline. Our data suggests a high level of stress associated with the transition to the new interface introduced by Timeline. We also found evidence which suggests that increasing users’ perceptions of control over major interface changes may help facilitate user adaptation to these changes. This study offers valuable insights to SNSs for mitigating user stress and facilitating successful adaptation during major interface changesItem A Study on Cloud Robotics: Ad-hoc cloud (Cloud Seeding)(International Journal of Innovative Research in Computer and Communication Engineering, 2015-04-01) Chifamba, ShepardCloud seeding in cloud robotics is the concept of forming an adhoc cloud using the available robot resources. A team of robots working in the same field utilizing cloud robotics might experience a connection failure to the main node however this should not stop field work. The teamed robots surrender their resources to form a virtual adhoc cloud not only to load balance tasks but to share resources and information. In this paper the researcher explores further on how cloud seeding can best be done, the security implications as well as networking concerns involved. This however is not a permanent infrastructure but a way of circumventing the challenge of network failure between the main cloud infrastructure and the field robots in cloud robotics.Item ACCESS CONTROL USING ATTRIBUTE BASED ENCRYPTION IN CLOUD COMPUTING: A SURVEY(/International Journal of Pharmacy & Technology, 2016-11-02) Shashank, Joseph; Mugauri, Calvin; Anilkumar, Chunduru; Sumathy., SAn efficient way of ensuring data security in the cloud is via access control which has however proven to be a challenge due to data outsourcing and entrusted cloud servers in cloud storage. Cloud storage systems are no longer trustworthy because they either produce several encrypted copies of the same data or require a fully trusted cloud server. Weighted attribute based encryption (WABE) is a capable technique for access control of encrypted data. Access of data in cloud should be strongly protected. The survey focuses to recognize the challenges faced in securing data and suggest solutions that allow organizations to benefit from hosting data in the cloud. They as well support fine grained and stretchy access control of shared data hosted in the cloud. Information about privacy and security issues with regard to storage of data in the cloud and access via the internet has been a great concern for many organizations in present day.Item Sentiment analysis of feature ranking methods for classification accuracy(IOP Conference Series: Materials Science and Engineering., 2017-01-01) Shashank, Joseph; Mugauri, Calvin; Sumathy., SText pre-processing and feature selection are important and critical steps in text mining. Text pre-processing of large volumes of datasets is a difficult task as unstructured raw data is converted into structured format. Traditional methods of processing and weighing took much time and were less accurate. To overcome this challenge, feature ranking techniques have been devised. A feature set from text preprocessing is fed as input for feature selection. Feature selection helps improve text classification accuracy. Of the three feature selection categories available, the filter category will be the focus. Five feature ranking methods namely: document frequency, standard deviation information gain, CHISQUARE, and weighted-log likelihood –ratio is analyzed.Item Risk Level Prediction of Chronic Kidney Disease Using Neuro- Fuzzy and Hierarchical Clustering Algorithm (s)(International Journal of Multimedia and Ubiquitous Engineering, 2017-01-02) Chimwayi, Kerina Blessmore; Haris, Noorie; Caytiles, Ronnie D; Iyengar, Ch. S. NChronic Kidney Disease (CKD) is usually characterized by a gradual loss of the functioning which the kidney does over time due to various factors. Early prediction and treatment save the kidney and halts the progress of CKD. CKD disease is being viewed as global public health issue for the past decade. The greatest threat for this deadly disease is developing countries where getting therapy is very expensive. The importance of predicting individuals who are at risk of CKD as well as applying clustering techniques cannot be underestimated since these can modify the progression of the disease. Identifying the silent killer disease early offers best opportunities for implementing possible strategies for lessening the probability of kidney loss. Neuro-fuzzy algorithm is applied to determine the risk of CKD in patients. Predictions done using neuro-fuzzy gave an accuracy of 97 percent. Using selected features, prediction for CKD disease is done so as to identify the risk. The results of the prediction are clustered to identify the percentage of patients with a high risk of having kidney disease who have a higher probability of being diabetic. Using hierarchical clustering three clusters formed show that there is a strong relationship between chronic kidney and diabetes