Browsing by Author "Kimeu, Japheth"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Item Deep learning-based mobile application for the enhancement of pneumonia medical imaging analysis: A case-study of West-Meru Hospital(Elsevier, 2024-09) Kimeu, Japheth; Kisangiri, Michael; Mbelwa, Hope; Leo, JudithPneumonia remains a significant global health challenge, demanding innovative solutions. This study presents a novel approach to pneumonia diagnosis and medical imaging analysis, leveraging advanced technologies. The study used a Literature Review Methodology to study various scientific articles and involved healthcare staff, including Doctors, Nurses, Radiologists and the community, in sharing their requirements for the study. The findings led to the proposal for the integration of Deep Learning techniques, including Convolutional Neural Network (CNN), as well as tools like YOLOv8, Roboflow, and Ultralytics, to revolutionize pneumonia detection and classification. The EfficientDet-Lite2 model architecture was subsequently used to generate a TensorFlow Lite Model, deployable in both Android and iOS mobile applications. The study’s outcomes reveal a substantial improvement in the precision and recall metrics. These results signify a promising step forward in empowering healthcare professionals with timely and reliable results for optimal patient management.Item Internet of Things Security in Cloud: A Review on Fog Layer Security(IEEE AFRICON, 2023-10-31) Kimeu, Japheth; Mtoi, Mary; Riwa, Janeth; Sinde, RamadhaniCloud computing in IoT systems enables flexible design with distributed data, infrastructure, and resources accessible from diverse industrial settings. The tremendous rise of the Internet of Things (IoT) has posed numerous issues to the centralized cloud computing architecture which are solved by fog computing. A passive rogue fog node acting as a man-in-the-middle attack poses a significant security vulnerability in the cloud fog layer, compromising data confidentiality and making identification difficult. This survey paper proposes an Intrusion Detection System (IDS) to protect the fog layer from the Man-in-the-Middle Attack (MitM/MITM/MiTM) which is present in the rogue node. Literature review methodology is employed to study various scientific articles providing a comprehensive survey of the existing security and privacy concerns in cloud computing.