Institutional Repository
Search
Login
DSpace Home
→
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
Search
Search:
All of DSpace
Conference /Workshop / Seminar Papers-(CW)
Journal Articles (JA)
Master Theses
Past Examination Papers & Tests
Speeches
White Papers
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
Date issued
Has File(s)
Filename
File description
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
Date issued
Has File(s)
Filename
File description
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 2 out of a total of 12 results.
(0.001 seconds)
Now showing items 11-12 of 12
Previous Page
1
2
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
An Enhanced Multiview Test Case Generation Technique for Object-Oriented Software using Class and Activity Diagrams
Oirere, Aaron
;
Muketha, Geoffrey
;
Mburu, James
(
International Journal of Recent Technology and Engineering
,
2020-11
)
Evaluating Linear and Non-Linear Dimensionality Reduction Approaches for Deep Learning-Based Network Intrusion Detection Systems
Oirere, Aaron
;
Wambugu, Geoffrey
;
Wanjau, Stephen
(
International Journal of Wireless and Microwave Technologies
,
2023-08
)
Now showing items 11-12 of 12
Previous Page
1
2
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Browse
All of DSpace
Communities & Collections
By Issue Date
Authors
Titles
Subjects
My Account
Login
Register
Discover
Author
Oirere, Aaron (12)
Wambugu, Geoffrey (4)
Deshmukh, Ratnadeep (3)
Shrishrimal, Pukhraj (3)
Kamiri, Jackson (2)
Mariga, Geoffrey (2)
Muhindi, George (2)
Muketha, Geoffrey (2)
Wanjau, Stephen (2)
Kulkarni, Devyani (1)
... View More
Subject
Behavioral models, Structural models, Test case generation, UML. (1)
Classification, Dimensionality Reduction, Feature Extraction, Network Intrusion Detection System, Isometric Feature Mapping, Principal Component Analysis. (1)
Client-based, Naïve Bayes, Snooping Attacks, Technique, Visual Similarity, Security, Emails, Technique, Bayers Theorem. (1)
Complexity Control, Empirical Risk Minimization, Hybrid Deep Learning, Network Intrusion Detection, Optimization. (1)
Email; Malware; Snooping Attacks (1)
HTK, HMM, Acoustic model, digit recognition, Grammar, MFCC (1)
Machine Learning; Meta-Learning; Few-Shot Learning; Transfer-Learning (1)
Meta-Learning, Transfer learning, Deep learning, Medical Image processing, Diabetic Retinopathy (1)
Network intrusion detection, Deep learning, Spatial feature learning, Temporal feature learning, Convolutional Neural Networks, Bi-directional Long Short Term Memory (1)
Swahili, Sentences collection, Phonetics, TextCorpus and speech Corpus, Speech recognition (1)
... View More
Date Issued
2020 - 2024 (9)
2013 - 2019 (3)
Has File(s)
Yes (12)