Peter Nimbe
YOU?
Author Swipe
View article: Forensics Investigation Framework for Advanced Threat Detection in Quantum-Era Networks
Forensics Investigation Framework for Advanced Threat Detection in Quantum-Era Networks Open
Objectives: To address the urgent need for forensic systems capable of detecting and analyzing advanced persistent threats in hybrid quantum-classical communication infrastructures, particularly those that may compromise quantum key distri…
View article: Comparative analysis of loan risk forecasting using quantum machine learning and classical machine learning models
Comparative analysis of loan risk forecasting using quantum machine learning and classical machine learning models Open
Non-performing loans present a significant challenge to financial institutions, driven by the complexity of the dataset, default probability, and default correlation(Bellotti et al., 2019). To mitigate this risk, this study investigates th…
View article: An Integrated Framework for Prescriptive Analytics and Interactive Visualization to Optimize Financial fraud detection in High-Volume Digital Markets
An Integrated Framework for Prescriptive Analytics and Interactive Visualization to Optimize Financial fraud detection in High-Volume Digital Markets Open
This paper presents a novel prescriptive interactive analytics framework for financial anomaly detection designed to provide proactive decision support in volatile market environments. Traditional anomaly detection systems face significant…
View article: Surgical Procedure Recognition Using Quantum Machine Learning
Surgical Procedure Recognition Using Quantum Machine Learning Open
Surgical procedure recognition is the process of identifying tasks and gestures done during a surgical process and is a field that has been widely researched due to its use in robot assisted surgeries to improve surgical performances and t…
View article: Deployment of mobile application using a novel CNN model for the detection of COVID-19 thoracic disease
Deployment of mobile application using a novel CNN model for the detection of COVID-19 thoracic disease Open
In January 2021 and January 2022, COVID-19 caused roughly 13,000 and 6,000 deaths respectively per day. In August 2022, 26,000 deaths per day were estimated to be caused by COVID-19, followed by 13,000 deaths per day in February 2024. The …
View article: Convolutional Neural Network Model for Disease Detection in Corn Leaf at All Growing Stages
Convolutional Neural Network Model for Disease Detection in Corn Leaf at All Growing Stages Open
View article: SecHealth: Enhancing EHR Security in Digital Health Transformation
SecHealth: Enhancing EHR Security in Digital Health Transformation Open
In the contemporary wave of digital transformation, the implementation of electronic health records (EHRs) has become a pivotal undertaking for numerous nations. However, amidst this technological advancement, a critical facet deserving he…
View article: Artificial Intelligence Application in Law: A Scientometric Review
Artificial Intelligence Application in Law: A Scientometric Review Open
Several topics, problems, and established legal principles are already being challenged using artificial intelligence (AI) in numerous applications. The powers of AI have been snowballing to the point where it is evident that AI applicatio…
View article: CCMT: Dataset for crop pest and disease detection
CCMT: Dataset for crop pest and disease detection Open
View article: A Fraud Prevention and Secure Cognitive SIM Card Registration Model
A Fraud Prevention and Secure Cognitive SIM Card Registration Model Open
<h2>Abstract</h2>\n<p><strong>Background:</strong> Most subscriber identification module (SIM) which usually finds their way to mobile phone users are primarily unregistered or pre-registered. Criminals b…
View article: A Framework for Assessing Motivational Methods Towards Incentivizing Cybersecurity Practice in Healthcare
A Framework for Assessing Motivational Methods Towards Incentivizing Cybersecurity Practice in Healthcare Open
Data breaches in healthcare have become common in recent times due to the weakness of the human element. As a result, intrinsic and extrinsic motivations were identified, analyzed, and assessed through a literature survey. After a critical…
View article: Uncertainty Estimation Using Variational Mixture of Gaussians Capsule Network for Health Image Classification
Uncertainty Estimation Using Variational Mixture of Gaussians Capsule Network for Health Image Classification Open
Capsule Networks have shown great promise in image recognition due to their ability to recognize the pose, texture, and deformation of objects and object parts. However, the majority of the existing capsule networks are deterministic with …
View article: Investigation into Phishing Risk Behaviour among Healthcare Staff
Investigation into Phishing Risk Behaviour among Healthcare Staff Open
A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social engineering attacks …
View article: Understanding the Uses, Approaches and Applications of Sentiment Analysis
Understanding the Uses, Approaches and Applications of Sentiment Analysis Open
Sentiment Analysis (SA) is a field of text mining research that is still evolving. SA is the algorithmic treatment of text's opinions, sentiments, and subjectivity to determine if a text contains negative, positive, or neutral feelings. We…
View article: Investigating into phishing risk behaviour among healthcare staff: The phish or the patient? (Preprint)
Investigating into phishing risk behaviour among healthcare staff: The phish or the patient? (Preprint) Open
BACKGROUND Through phishing attacks, the memory of the negative impact of security breaches in healthcare will remain with the inflicted for long. The healthcare sector is mostly associated with time sensitivity and the urgency to access …
View article: Rotation of bits: a classical and quantum perspective
Rotation of bits: a classical and quantum perspective Open
Bit rotation is an operation similar to shift except that the bits that fall off at one end are put back to the other end. In left rotation, the bits that fall off at left end are put back at right end. In right rotation, the bits that fal…
View article: Web Vulnerability Measures for SMEs
Web Vulnerability Measures for SMEs Open
An investigation was conducted into web vulnerabilities in commonly used web application templates and frameworks (WAFs) systems such as Joomla, WordPress, Moodle and C #.Net framework. A web vulnerability scoring scheme was developed and …
View article: EVALUATION OF THE SMARTPHONE PLATFORMS A CASE STUDY WITH ANDROID, iOS AND WINDOWS PHONES
EVALUATION OF THE SMARTPHONE PLATFORMS A CASE STUDY WITH ANDROID, iOS AND WINDOWS PHONES Open
This paper performs an evaluation of the various smartphone platforms based on performance using simulation programs. Different experiments to test the platforms for their performance were conducted by means of some designed applications a…