School of Information Science and Technology

Permanent URI for this communityhttps://cris.hit.ac.zw/handle/123456789/2

Browse

Search Results

Now showing 1 - 8 of 8
  • Thumbnail Image
    Item
    The Impact and Application of 3D Printing Technology
    (International Journal of Science and Research (IJSR), 2014-06-12) Mukosera, Macdonald; Mawere, Cephas; Mpofu, Thabiso Peter
    3D printing also known as Additive manufacturing technology has been dubbed the next big thing and be as equally wide spread as cellular telephone industry. 3D printers print objects from a digital template to a physical 3-dimensional physical object. The printing is done layer by layer (Additive manufacturing) using plastic, metal, nylon, and over a hundred other materials. 3D printing has been found to be useful in sectors such as manufacturing, industrial design, jewellery, footwear, architecture, engineering and construction, automotive, aerospace, dental and medical industries, education, geographic information systems, civil engineering, and many others. It has been found to be a fast and cost effective solution in whichever field of use. The applications of 3D printing are ever increasing and it’s proving to be a very exciting technology to look out for. In this paper we seek to explore how it works and the current and future applications of 3D printing.
  • Thumbnail Image
    Item
    Profile Impostoring:A Use Case on the Rising Social Engineering Attack on Facebook Users
    (International Journal of Science and Research (IJSR), 2014-06-06) Mawere, Cephas; Mpofu, Thabiso Peter
    Social engineering attacks have taken a new twist as a growing number of people use online social networking sites to foster social relationships among each other and market products. Of interest is Facebook whose users have exponentially increased; some of these users are prominent individuals with high influence in various communities like celebrities, philanthropists, religious ministers and non- profit organizations. Data retrieval from Facebook profiles is thus becoming a major tool for business which has led to most unsuspecting users being victims of deception. Profile impostoring, also known as identity theft, is increasingly on the rise and becoming an underlying threat to information security. The cyber perpetrators are creating fake Facebook profiles of prominent individuals who have a large following. Ordinary individuals are also not at their mercy. With such high pending risk of identity theft there is need to develop methods that help Facebook fans to automatically detect deception, identify imposters and get them arrested.
  • Thumbnail Image
    Item
    Digital Currency:The Emergence of Bitcoins
    (International Journal of Science and Research (IJSR), 2014-06-06) Mpofu, Thabiso Peter; Masaiti, Budwell; Mukosera, Macdonald
    : Bitcoins are a crypto currency whose concept was developed in 2009 by Satoshi Nakamoto. Bitcoins are digital currencies which operate on a peer to peer system. The system is decentralized as there is no central regulatory authority as with fiat currency. For an individual to transact you need a bitcoin wallet which has one or more private and public keys associated with it. Unlike fiat currency and electronic payment methods such as Visa and MasterCard which are based on trust, Bitcoin usage is based on cryptographic proof. Bitcoin usage has been on the increase and they can be converted into fiat currency through bitcoin exchange
  • Thumbnail Image
    Item
    Credit Scoring Techniques:A Survey
    (International Journal of Science and Research (IJSR), 2012-01-01) Mpofu, Thabiso Peter; Mukosera, Macdonald
    : Credit scoring is a numerical expression of the credit worthiness of an individual. A Value with a specific creditworthiness associated is assigned to an individual. Overall objective is to determine the creditworthiness of an individual. Ability of an individual to repay is determined in the credit scoring process. The credit scoring process looks at specific criteria such as income, credit history and many others. All this is done with the intent to reduce the overall default rate thereby decreasing the overall risk of financial institutions such as banks and micro lending institutions. Several credit scoring methodologies have been proposed and implemented and are varied from statistical based methods to Artificial Intelligence based techniques.
  • Thumbnail Image
    Item
    A study of User Adjustment plans for the Introduction of Facebook Timeline
    (International Journal of Scientific & Engineering Research, 2014-07-05) Mpofu, Thabiso Peter; Gati, Nicholaus; Babu, Suresh; Elisa, Noe
    This work applies coping theory to learn user adaptation strategies to major interface changes on Social Networking Sites (SNSs). Specifically, we qualitatively examine 1,798 user comments posted to the Facebook’s official Timeline blog in order to get a large and blended sample of real Facebook users’ perceptions about the launch of Timeline. Our data suggests a high level of stress associated with the transition to the new interface introduced by Timeline. We also found evidence which suggests that increasing users’ perceptions of control over major interface changes may help facilitate user adaptation to these changes. This study offers valuable insights to SNSs for mitigating user stress and facilitating successful adaptation during major interface changes
  • Thumbnail Image
    Item
    Artificial Immune Systems:A Predictive Model for credit scoring
    (International Journal of Scientific & Engineering Research, 2014-08-01) Mpofu, Thabiso Peter; Reddy, G Venkata Rami
    With the advent of the global financial crisis which hit the global economy, credit scoring has become of the essence. The global financial crisis also known as the “credit crunch” was largely attributed to the issuance of credit to individuals with no capacity to return the money. Credit scoring has become a very important task in the credit industry. Various credit scoring methods such in areas as artificial neural networks (ANNs), statistical based methods and decision trees have been proposed to increase the accuracy of credit scoring models. The proposed Artificial Immune Systems (AIS) are an artificial intelligence technique modelled on natural immune system processes have been used to solve various kinds of real life processes with success. In this paper we compare the performance of current classifiers used in credit rating against Artificial Immune Systems. Artificial Immune Systems have various algorithms used to implement them. The algorithm under consideration is the negative selection algorithm. Artificial Immune Systems (AIS) are found to be produce competitive results very close to traditional artificial intelligent systems such as Neural Network
  • Thumbnail Image
    Item
    Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System
    (International Journal of Science and Research (IJSR), 2012-01-08) Mukosera, Macdonald; Mpofu, Thabiso Peter; Masaiti, Budwell
    In a bid to provide useful information for intrusion detection, we focused on analyzing the NSL-KDD dataset. In this analysis, we seek to simplify the process of mining fuzzy rules by reducing the features and categorizing the dataset into various smaller clusters as smaller units of the dataset are easier to work with than the whole single large dataset. It is less complex to observe and discover sound fuzzy rules from a smaller dataset and this work serves as a foundation to a fuzzy logic based intrusion detection system. This paper presents a methodology for data preprocessing towards an intrusion detection system and Microsoft excel was used in the process.
  • Thumbnail Image
    Item
    The Heartbleed Bug: An Open Secure Sockets Layer Vulnerability
    (International Journal of Science and Research (IJSR), 2012-05-17) Mpofu, Thabiso Peter; Noe, Elisa; Gati, Nicholaus
    The Open Secure Sockets Layer (OpenSSL) is used to provide a secure platform for transactions that happen over theinternet. About two thirds of the servers on the internet use the OpenSSL platform to provide secure transaction over the internet. The OpenSSL is a widely used open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS). Transactions such as online shopping, emails and online banking are carried out on the internet through the OpenSSL and other platforms which provide a security. Vulnerabilities have however been found in the OpenSSL that has resulted in a wide public outcry all over the world. A vulnerability referred to as the Heartbleed Bug has sent shockwaves all over the internet. From the study we conducted, the scope of the data that has been potentially compromised is astronomical and includes usernames, passwords, bank account and credit card numbers, medical data, documents in online cloud storage. Not only has all of this user data been directly compromised, but, what are worse, the private keys of the servers running the vulnerable versions of OpenSSL were also almost certainly compromised. We recommend patching of affected applications or/and upgrade to versions that are not vulnerable in order to mitigate the risks identified.