Browsing School of Computing and informatics by Title
Now showing items 5-24 of 70
-
A Bring Your Own Device Risk Assessment Model
(Computer Science Journals (CSJ), 2021)Bring Your Own Device (BYOD), a technology where individuals or employees use their own devices on the organization’s network to perform tasks assigned to them by the organization has been widely embraced. The reasons ... -
Building Text and Speech Datasets for Low Resourced Languages: A Case of Languages in East Africa
(AfricaNLP, 2022)Africa has over 2000 languages; however, those languages are not well repre sented in the existing Natural Language Processing ecosystem. African languages lack essential digital resources to be engaged effectively in the ... -
Challenges facing digitization projects in kenya: Case of implementation of national land information management system
(IJTS, 2018)Purpose: Technology has been the avenues used to bridge various challenges public service delivery. The government of Kenya has invested heavily in land digitization process in order to eradicate the perennial challenges ... -
The Challenges in the Use of Mobile Instant Messaging Systems in Universities
(2016-09)Mobile Instant Messaging (MIM) encompasses a range of internet-based facilities that enable exchange of real-time messages using mobile phones. The value of MIM has widely been recognized in recent times, instigating an ... -
Checkpointing as a Counter to Security Issues in Cloud Computing Infrastructure
(2019 IEEE AFRICON, 2019)The world is experiencing a paradigm shift towards intelligent agents in form of machine learning for modeling any given task or process. Human vehicle drivers are agents that operate under stochastic environments, full ... -
Computer network quality of experience enriched analysis using fuzzy logic model
(International Conference on Intelligent and Innovative Computing Applications, 2020)Two important Quality of Experience (QoE) parameters in computer networks service-related performance metrics are throughput and end-to-end delay. A slow delay indicates high network efficiency thus high throughput. ... -
Conceptualizing Success Factors in Collaborative Technology Innovation
(IJPRSE Progressive Research, 2021)Technology Innovation has been identified as a key factor that is increasingly influencing the success and competitiveness of modern enterprises in their selected market niche. Traditionally, innovation viewed a company’s ... -
A Content Based Image Retrieval Model for E-Commerce
(International Journal of Engineering and Computer Science, 2018)In the last decade, large database of images have grown rapidly. This trend is expected to continue in to the future. Retrieval and querying of these image in efficient way is a challenge in order to access the visual content ... -
A crowdsourced database of event sequence descriptions for the acquisition of high-quality script knowledge
(Universität des Saarlandes, 2016)Scripts are standardized event sequences describing typical everyday activities, which play an important role in the computational modeling of cognitive abilities (in particular for natural language processing). We present ... -
CYBER THREATS AND CYBER SECURITY IN THE KENYAN BUSINESS CONTEXT
(GSJ, 2019-09)Cyber security is basically the process of ensuring the safety of cyberspace from known and unknown threats. The International Telecommunication Union states that cyber security is the collective application of strategies, ... -
Detecting Everyday Scenarios in Narrative Texts
(Universitat des Saarlandes, 2019)Script knowledge consists of detailed information on everyday activities. Such information is often taken for granted in text and needs to be inferred by readers. Therefore, script knowledge is a central component to ... -
Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods
(Modern Education and Computer Science Press, 2023-04-01)Remote access technologies encrypt data to enforce policies and ensure protection. Attackers leverage such techniques to launch carefully crafted evasion attacks introducing malware and other unwanted traffic to the internal ... -
A Domains Approach to Remote Access Logical Vulnerabilities Classification
(2019)Remote access facilitates collaboration and the creation of a seamless work environment. This technology enables employees to access the latest versions of data and resources from different locations other than the ... -
A Domains Approach to Remote Access Logical Vulnerabilities Classification
(MECS: http://www.mecspress.org/ijcnis/ijcnis-v11-n11/IJCNIS-V11-N11-5.pdf., 2019)Remote access facilitates collaboration and the creation of a seamless work environment. This technology enables employees to access the latest versions of data and resources from different locations other than the ... -
Driver Behaviour Profiling Using Dynamic Bayesian Network
(Modern Education and Computer Science, 2018)In the recent past, there has been a rapid increase in the number of vehicles and diversification of road networks worldwide. The biggest challenge now lies on how to monitor and analyse behaviours of vehicle drivers ... -
E-Government Security: Information Security Management Model for Public Administration in Kenya
(Strathmore University, 2010)nformation security in e-government in public administration in Kenya has not been adequately addressed. In order to develop an Information Security Management Model for Public Administration in Kenya, a questionnaire was ... -
Effect of corporate governance on liquidity due to nonperforming asset portfolios in the banking sector: a case of commercial banks in Kenya
(www. ijern. com, 2017)It’s argued that corporate governance can be linked to liquidity due to non performing asset portfolios (NPAs) in commercial banks in Kenya but this has not been determined empirically. Information is lacking on effect of ... -
The Effect of Integrating Mobile Technology in Micro Finance Institutions. Case of Small and Micro-Enterprise Program (SMEP) In Kisumu County
(IOSR Journal of Business and Management, 2014)Recognizing the potential that M-banking holds in strengthening the socioeconomic position of those currently lacking access to banking, especially the rural poor, Safaricom in Kenya and the two leading mobile operators ... -
Effect of recruitment and selection of employees on the performance of small and medium enterprises in Kisumu municipality, Kenya
(International Journal of Human Resource Studie, 2012)The study investigated the effect recruitment and election on the performance of SMEs in Kisumu Municipality, Kenya. Kenya has 1.6 million SMEs, constituting 96% of business enterprises, employing 75% of the labour force ... -
Effectiveness of Security Controls On Electronic Health Records
(IJSTR, 2017)Electronic Health Record (EHR) systems enhance efficiency and effectiveness in handling patients ‘information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting ...