User profiles for Kudakwashe Madzima

K.Madzima

Lecturer, Computer Science
Verified email at univen.ac.za
Cited by 163

The current state of e-learning at universities in Zimbabwe: Opportunities and challenges

L Chitanana, D Makaza, K Madzima - International Journal of …, 2008 - learntechlib.org
E-learning is gaining some ground in University education throughout the world. Currently,
a large number of universities world–wide support e-learning in different forms. Despite this …

A scoping review of the “at-risk” student literature in higher education

C Chibaya, A Whata, K Madzima, G Rudolph… - bioRxiv, 2022 - biorxiv.org
Institutions’ inclination to fulfilling the mandate of producing quality graduates is overwhelming.
Insistent petition for institutions to understand their students is about creating equitable …

Is bring your own device an institutional information security risk for small-scale business organisations?

K Madzima, M Moyo, H Abdullah - 2014 Information Security …, 2014 - ieeexplore.ieee.org
The use of employees' own mobile devices, under the pretext of `bring your own device' (BYOD),
to access vital information assets has far reaching implications for an organisation's …

Empirical evaluation of software development methodology selection consistency: A case study using Analytical Hierarchy Process

…, N Soganile, G Dzawo, K Madzima - Proceedings of the …, 2013 - search.proquest.com
When developing software, the selection of an appropriate software development
methodology is an essential decision. The experience, knowledge, expertise, of the software …

Trends Matching as a Dataset Attack Detection Strategy During Machine Learning

…, C Chibaya, K Madzima - 2021 3rd International …, 2021 - ieeexplore.ieee.org
Machine learning systems rely on the validity and integrity of the datasets provided to make
correct predictions. However, datasets attacks are real. Datasets can be poisoned, spoiled, …

Mobile security threats: A survey of how mobile device users are protecting themselves from new forms of cybercrimes

K Madzima, M Moyo, G Dzawo… - Proceedings of the 10th …, 2015 - books.google.com
There has been a rapid increase in the use of mobile devices to conduct online business
transactions by ordinary people across the globe. Currently, commercial banks and retail stores …

A Comparative Modeling and Comprehensive Binding Site Analysis of the South African Beta COVID-19 Variant's Spike Protein Structure

…, IC Obagbuwa, A Whata, K Madzima - Advanced AI and Internet …, 2023 - Springer
Background The Covid-19 pandemic has been the cause of severe infections and deaths
worldwide. The emergence of variants only adds to the severity of it. Analyzing these variants’ …

Face Recognition using PCA and constrained images

N Shirindi, K Madzima… - 2021 3rd International …, 2021 - ieeexplore.ieee.org
The face recognition problem is receiving closer attention in the computer vision domain,
especially now when contact tracing is a new normal, when monitoring of venues is a top …

A Dynamic nDES Model for Hiding Datasets for Machine Learning

…, C Chibaya, K Madzima - 2021 3rd International …, 2021 - ieeexplore.ieee.org
The Data Encryption Standard (DES) is a block cipher for converting plain text into ciphertext.
It is a symmetric key algorithm grounded on the Feistel network. The DES uses 56-bit keys …

[PDF][PDF] INFORMATION AND COMMUNICATION TECHNOLOGY INTEGRATION IN CLASSROOM TEACHING: WHY SOUTH AFRICAN EDUCATORS LACK INTEREST …

M Moyo, K Madzima, H Abdullah - ISTE International Conference on …, 2014 - academia.edu
Information and Communication Technologies (ICTs) are effective tools for transforming
classroom teaching and learning and have a potential to improve outcomes of subjects such as …