User profiles for Kudakwashe Madzima
K.MadzimaLecturer, Computer Science Verified email at univen.ac.za Cited by 163 |
The current state of e-learning at universities in Zimbabwe: Opportunities and challenges
E-learning is gaining some ground in University education throughout the world. Currently,
a large number of universities world–wide support e-learning in different forms. Despite this …
a large number of universities world–wide support e-learning in different forms. Despite this …
A scoping review of the “at-risk” student literature in higher education
Institutions’ inclination to fulfilling the mandate of producing quality graduates is overwhelming.
Insistent petition for institutions to understand their students is about creating equitable …
Insistent petition for institutions to understand their students is about creating equitable …
Is bring your own device an institutional information security risk for small-scale business organisations?
The use of employees' own mobile devices, under the pretext of `bring your own device' (BYOD),
to access vital information assets has far reaching implications for an organisation's …
to access vital information assets has far reaching implications for an organisation's …
Empirical evaluation of software development methodology selection consistency: A case study using Analytical Hierarchy Process
…, N Soganile, G Dzawo, K Madzima - Proceedings of the …, 2013 - search.proquest.com
When developing software, the selection of an appropriate software development
methodology is an essential decision. The experience, knowledge, expertise, of the software …
methodology is an essential decision. The experience, knowledge, expertise, of the software …
Trends Matching as a Dataset Attack Detection Strategy During Machine Learning
Machine learning systems rely on the validity and integrity of the datasets provided to make
correct predictions. However, datasets attacks are real. Datasets can be poisoned, spoiled, …
correct predictions. However, datasets attacks are real. Datasets can be poisoned, spoiled, …
Mobile security threats: A survey of how mobile device users are protecting themselves from new forms of cybercrimes
There has been a rapid increase in the use of mobile devices to conduct online business
transactions by ordinary people across the globe. Currently, commercial banks and retail stores …
transactions by ordinary people across the globe. Currently, commercial banks and retail stores …
A Comparative Modeling and Comprehensive Binding Site Analysis of the South African Beta COVID-19 Variant's Spike Protein Structure
Background The Covid-19 pandemic has been the cause of severe infections and deaths
worldwide. The emergence of variants only adds to the severity of it. Analyzing these variants’ …
worldwide. The emergence of variants only adds to the severity of it. Analyzing these variants’ …
Face Recognition using PCA and constrained images
N Shirindi, K Madzima… - 2021 3rd International …, 2021 - ieeexplore.ieee.org
The face recognition problem is receiving closer attention in the computer vision domain,
especially now when contact tracing is a new normal, when monitoring of venues is a top …
especially now when contact tracing is a new normal, when monitoring of venues is a top …
A Dynamic nDES Model for Hiding Datasets for Machine Learning
The Data Encryption Standard (DES) is a block cipher for converting plain text into ciphertext.
It is a symmetric key algorithm grounded on the Feistel network. The DES uses 56-bit keys …
It is a symmetric key algorithm grounded on the Feistel network. The DES uses 56-bit keys …
[PDF][PDF] INFORMATION AND COMMUNICATION TECHNOLOGY INTEGRATION IN CLASSROOM TEACHING: WHY SOUTH AFRICAN EDUCATORS LACK INTEREST …
Information and Communication Technologies (ICTs) are effective tools for transforming
classroom teaching and learning and have a potential to improve outcomes of subjects such as …
classroom teaching and learning and have a potential to improve outcomes of subjects such as …