Fredrick Mtenzi
Orcid: 0000-0003-3361-9056
According to our database1,
Fredrick Mtenzi
authored at least 37 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
5
10
1
1
1
1
1
1
1
4
1
1
1
3
1
2
1
5
6
1
3
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on comp.dit.ie
On csauthors.net:
Bibliography
2024
Applying the 6E learning by design model to support student teachers to integrate artificial intelligence applications in their classroom.
Educ. Inf. Technol., December, 2024
2023
The Conceptual Framing, Design, and Development of Mobile-Mediated Professional Development for Primary Mathematics Teachers.
Int. J. Mob. Blended Learn., 2023
2019
Energy-Efficient Load Balancing Ant Based Routing Algorithm for Wireless Sensor Networks.
IEEE Access, 2019
2018
Energy Efficient Hybrid Routing Protocol Based on the Artificial Fish Swarm Algorithm and Ant Colony Optimisation for WSNs.
Sensors, 2018
2017
Proceedings of the Tomorrow's Learning: Involving Everyone. Learning with and about Technologies and Computing, 2017
2016
Int. J. ICT Res. Afr. Middle East, 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Proceedings of the Tackling Society's Grand Challenges with Design Science, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
2013
Comput. Sci. Inf. Syst., 2013
Proceedings of the ACM Annual Conference on Special Interest Group on University and College Computing Services, 2013
Characterisation of Knowledge Incorporation into Solution Models for the Meal Planning Problem.
Proceedings of the Foundations of Health Information Engineering and Systems, 2013
2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
2010
Advances in Information Security 53, Springer, ISBN: 978-0-387-84817-4, 2010
V-isoNet: A Virtualised and Isolated Network using Open Source Technologies.
J. Digit. Inf. Manag., 2010
Proceedings of the Networked Digital Technologies - Second International Conference, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
2009
Multiple Anonymisation Techniques can balance Data Usefulness and 218Protection of Personal Identifiable Information (PII).
Int. J. Web Appl., 2009
Int. Arab J. Inf. Technol., 2009
Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Dataset threshold for the performance estimators in supervised machine learning experiments.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
An approach for developing comparative security metrics for healthcare organizations.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
2008
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
2007
End user Authentication (EUA).
Proceedings of the WEBIST 2007, 2007
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007
Proceedings of the Advances in Grid and Pervasive Computing, 2007
2005
Distributed Construction of Weakly Connected Dominating Sets for Clustering Mobile Ad hoc Networks.
J. Digit. Inf. Manag., 2005
2004
Optimized priority based energy efficient routing algorithm for mobile ad hoc networks.
Ad Hoc Networks, 2004