Ledum Atu - Academia.edu (original) (raw)
Related Authors
Graduate Center of the City University of New York
Uploads
Papers by Ledum Atu
Many people have some sort of disability which impairs their ability to communicate, thus with al... more Many people have some sort of disability which impairs their ability to communicate, thus with all their intelligence they are not able to participate in conferences or meeting proceedings and consequently inhibit in a way their contributions to development of the nation. Work in alternative and augmentative communication (AAC) devices attempts to address this need. This paper tries to design a system that can be used to read out an input to its user. The system was developed using Visual Basic6.0 for the user interface, and was interfaced with the Lemout & Hauspie True Voice Text-to-Speech Engine (American English) and Microsoft agent. The system will allow the users to input the text to be read out, and also allows the user to open text document of the Rich Text Formant (.rtf) and Text File format (.txt) that have been saved on disk, for reading.
The attacks on computer security are becoming global and it is a very important security threats ... more The attacks on computer security are becoming global and it is a very important security threats issues to the cyberspace, that if an organization is not mindful of, important data will be accessed, modified, or deleted. Computer security attackers utilize the compulsions and security weaknesses in the computer network and data system to carry out an attack, which ideals the divulgence of system information and the capture of the privacy of users and threaten data availability or integrity. The proposed system aim in developing a model to detect network intrusion using machine learning algorithm. The dataset consists of different categories of intrusions stimulated in a military environment. The dataset consists of a raw TCP/IP data for a network by stimulating a typical US Air Force Lan. The dataset is made up of 41 Columns. The class column consists of two types, which are Normal Network Packets and Anomalous Network Packets. The dataset was preprocessed by converting some feature...
Many people have some sort of disability which impairs their ability to communicate, thus with al... more Many people have some sort of disability which impairs their ability to communicate, thus with all their intelligence they are not able to participate in conferences or meeting proceedings and consequently inhibit in a way their contributions to development of the nation. Work in alternative and augmentative communication (AAC) devices attempts to address this need. This paper tries to design a system that can be used to read out an input to its user. The system was developed using Visual Basic6.0 for the user interface, and was interfaced with the Lemout & Hauspie True Voice Text-to-Speech Engine (American English) and Microsoft agent. The system will allow the users to input the text to be read out, and also allows the user to open text document of the Rich Text Formant (.rtf) and Text File format (.txt) that have been saved on disk, for reading.
The attacks on computer security are becoming global and it is a very important security threats ... more The attacks on computer security are becoming global and it is a very important security threats issues to the cyberspace, that if an organization is not mindful of, important data will be accessed, modified, or deleted. Computer security attackers utilize the compulsions and security weaknesses in the computer network and data system to carry out an attack, which ideals the divulgence of system information and the capture of the privacy of users and threaten data availability or integrity. The proposed system aim in developing a model to detect network intrusion using machine learning algorithm. The dataset consists of different categories of intrusions stimulated in a military environment. The dataset consists of a raw TCP/IP data for a network by stimulating a typical US Air Force Lan. The dataset is made up of 41 Columns. The class column consists of two types, which are Normal Network Packets and Anomalous Network Packets. The dataset was preprocessed by converting some feature...