Master of Science in Applied Computer Science
Permanent URI for this collectionhttps://192.168.0.29/handle/123456789/128
Browse
Recent Submissions
Item Design and implementation of an online platform for integration and analyzing multivariate multisource malaria data(Adventist University of Africa, 2023-04) Ochola, Micah AsukeOne of the common public health problems reported by the World Health Organization (WHO) in the African Region is malaria, where the burden of the disease is highest globally. The greatest challenge experienced in the fight against Malaria is, surveillance, which leads to early detection and treatment, and is crucial for reducing transmission and preventing deaths. Malaria surveillance includes gathering, analyzing, and interpreting malaria-related data. Though there exist many facilities with Malaria data, the collection and integration of data from different sources has been a major challenge that needs to be addressed. The proposed solution is aimed at the development of an online solution that can be used to collect malaria data from multiple sources including hospitals, drug stores and weather stations in various formats and aggregated into a format that can further be used in the prediction of malaria outbreak. From the results, the system collects data from hospitals and drug stores, which is then integrated with weather data. The generated data was used to train a machine learning model, as a proof of concept to validate that it can it be used to predict malaria outbreaks. This solution does not only solve the problem of data collection and integration but also ensures timely actions are taken in cases of out breaks. The implementation of this solution therefore significantly improves on the current practices by ensuring that hospital records and over the counter sale of drugs are reported electronically, daily and in real-time as opposed to manually and weekly. The solution also introduces the use of multi-source data in the analysis of malaria outbreaks rather than only focusing on hospital records as the only source of information for outbreak detection. Further to this, the project has the potential to contribute to the WHO Global Malaria Technical Strategy 2016-2030, as early detection and treatment of malaria are essential for reducing the burden of the disease. The methodology and system produced in this study can be used in other regions to improve malaria surveillance and outbreak prediction.Item Combining Meta-Heuristic Technique and Neural Networks to Detect Internet of Things Network Attacks(Adventist University of Africa, 2023-03) SAMBA, SteveThe Internet of Things (IoT) refers to ordinary objects equipped with wearable sensors and batteries that can communicate over the internet and perform predefined actions. These devices are evading our everyday lives in many ways. It is now possible to sense temperature, and heart rate with a smartphone, while cloud applications can monitor security systems or smart home equipment. Consequently, IoT networks have simplified life. However, the growing popularity of Internet of Things devices poses security concerns that need attention. For instance, attackers may target IoT networks for several reasons, including a quest for personal, medical, or financial information and espionage. In certain circumstances, these attacks can have severe repercussions for people's lives. Others may face extortion, damaged reputation, impersonation, fraud, or financial damages. Detection is critical for defending IoT networks and avoiding the negative repercussions of cyberattacks. Detection consists of identifying assaults before they occur. Numerous writers have examined the security of IoT networks and proposed promising solutions based on machine learning. This research investigated how efficient could combining Neural Networks and Metaheuristic technique be in detecting IoT network attacks. To address that concern this study proposed a novel method that integrates neural networks for attack classification and Particle Swarm Optimization, a metaheuristic strategy for feature selection and hyperparameter tuning. The outcomes of the suggested strategy using two different IoT data sets, namely the BaIoT and the CICIDS 2017 datasets yielded accuracy scores of 98% and 99.95% for multiclass classification. The binary categorization was nearly flawless. Furthermore, this study revealed the potential of CNN, MLP and FFNN when dealing with classification problems for IoT environments. The study also highlighted interesting future venues for improving IoT network security, such as deployment, training models with higher quality datasets, or even tweaking more parameters.Item Combining Meta-Heuristic Technique and Neural Networks to Detect Internet of Things Network Attacks(Adventist University of Africa, 2023-03) Samba, SteveThe Internet of Things (IoT) refers to ordinary objects equipped with wearable sensors and batteries that can communicate over the internet and perform predefined actions. These devices are evading our everyday lives in many ways. It is now possible to sense temperature, and heart rate with a smartphone, while cloud applications can monitor security systems or smart home equipment. Consequently, IoT networks have simplified life. However, the growing popularity of Internet of Things devices poses security concerns that need attention. For instance, attackers may target IoT networks for several reasons, including a quest for personal, medical, or financial information and espionage. In certain circumstances, these attacks can have severe repercussions for people's lives. Others may face extortion, damaged reputation, impersonation, fraud, or financial damages. Detection is critical for defending IoT networks and avoiding the negative repercussions of cyberattacks. Detection consists of identifying assaults before they occur. Numerous writers have examined the security of IoT networks and proposed promising solutions based on machine learning. This research investigated how efficient could combining Neural Networks and Metaheuristic technique be in detecting IoT network attacks. To address that concern this study proposed a novel method that integrates neural networks for attack classification and Particle Swarm Optimization, a metaheuristic strategy for feature selection and hyperparameter tuning. The outcomes of the suggested strategy using two different IoT data sets, namely the BaIoT and the CICIDS 2017 datasets yielded accuracy scores of 98% and 99.95% for multiclass classification. The binary categorization was nearly flawless. Furthermore, this study revealed the potential of CNN, MLP and FFNN when dealing with classification problems for IoT environments. The study also highlighted interesting future venues for improving IoT network security, such as deployment, training models with higher quality datasets, or even tweaking more parameters.Item A compensatory approach to anti-virus shortfalls(Adventist University of Africa, School of Postgraduate Studies, 2020-05) Ongaro, Tom OngagaComputer systems security has become an increasingly important field. In the quest to provide the much-needed security many options exist. Systems have however continued to suffer attacks from malware despite the existing controls that have been put in place. One such control is the use of Anti-viruses which are widely used in many systems. Today malware exists that can bypass anti-viruses and cause harm to systems. Many controls exist to try to combat malware infiltration. Organizations and small businesses may not always be in a position to choose the best option for their environment when it comes to dealing with malware. They may not also be able to configure system security tools that may be available to deal with malware detection and prevention. One freely available tool is Sysmon. Sysmon logs critical events in a windows environment and can send them out for further analysis and classification. This research seeks to understand why some malware can bypass anti-viruses and seeks to close the gap by providing tangible recommendations. The end goal provides results that can be adopted by anyone to try to identify malicious activity in their systems by using freely available tools.