Browsing School of Computing and informatics by Title
Now showing items 36-55 of 70
-
IEEE EMBS Fellows List Correction
(IEEE ENGINEERING IN MEDICINE AND BIOLOGY, 1999)The list of 1999 IEEE Fellows who are EMBS members was incorrect in the January/February issue (vol. 18, no. 1, p. 14). The confirmed list of newly elected Fellows follows. The IEEE Fellow Committee and its staff extend ... -
Implications of service quality on customer loyalty in the banking sector. A survey of Banks in Homabay county, Kenya
(Centre for Promoting Ideas, USA, 2012)Marketing management research has advocated for the establishment of the determinants of customer loyalty to improve customer retention and performance. However, studies on the direct relationship between these determinants ... -
Inducing script structure from crowdsourced event descriptions via semi-supervised clustering
(Universitat des Saarlandes, 2017)We present a semi-supervised clustering approach to induce script structure from crowdsourced descriptions of event sequences by grouping event descriptions into paraphrase sets (representing event types) and inducing ... -
Kencorpus: A Kenyan Language Corpus of Swahili, Dholuo and Luhya for Natural Language Processing Tasks
(arxiv.org, 2022)Indigenous African languages are categorized as under-served in Artificial Intelligence and suffer poor digital inclusivity and information access. The challenge has been how to use machine learning and deep learning models ... -
KenSwQuAD – A Question Answering Dataset for Swahili Low Resource Language
(arxiv.org, 2022)This research developed a Kencorpus Swahili Question Answering Dataset KenSwQuAD from raw data of Swahili language, which is a low resource language predominantly spoken in Eastern African and also has speakers in other ... -
Managing Configuration Errors in Cloud Computing Using Cluster & Node Management Techniques
(IJCSMC, 2018)Cloud computing has been the technology of choice for most users globally due to the numerous advantages that it offers. This technology is offered to users with different levels of expertise who utilize the different ... -
MAS Architectural Model for Dialog Systems with Advancing Conversations
(International Journal of Scientific Research, 2018-11)Recent handcrafts on dialog manager in task-oriented dialog systems (TODS) offer great promises on handling conversations. However, most tend to be shortsighted in handling advancing conversations. Modelling the future ... -
Measuring thickness of thin metallic films with the use of laser probing technique
(Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования «Российский университет дружбы народов», 2005)Proposed and practically carried out поп-contact method of measuring thickness of thin metallic films. The recommended range of the thickness measured is from 100A to 1500A. The method is based on probing by a laser beam ... -
A Model for Code Restructuring, A Tool for Improving Systems Quality in Compliance with Object Oriented Coding Practice
(International Journal of Computer Science Issues (IJCSI), 2019)A major goal of software restructuring is to preserve or increase the value of a piece of software. Restructuring a system may make it possible to add more features to the existing system or make the software more ... -
Online Assessment and Examinations practices at the eCampus of Maseno University in Response to COVID 19 lockdown
(EasyChair, 2022)The COVID-19 pandemic resulted in an increasing demand for online learning and led to the demand for the offer of online assessment at Maseno university. Prior to the COVID19 pandemic the institution had put in place measures ... -
Open Source ERP Adoption-Use and Organisational Performance of Deposit-Taking Saccos in Kenya
(International Journal of Information Technology, 2019)The cost and benefits of an ERP system are arguably the reason why Deposit-Taking SACCOs are opting for adoption-use of open source ERP in an effort to achieve organisation performance. Technology adoption is only important ... -
Ownership concentration and financial performance of listed firms in Kenya: An econometric analysis using panel data
(European Scientific Journal, 2013)In this study, we use panel methodology comprising 53 firms listed at the Nairobi Securities Exchange to establish the effect of ownership concentration on financial performance of these firms for the period 2007 to 2011. ... -
The Performance of South African and Kenyan Universities on the World Wide Web: a Web Link Analysis
(Cybermetrics: International Journal of Scientometrics, Informetrics and Bibliometrics, 2007)The study used Link Analysis to compare Kenyan and South African universities according to several Web-based indicators, some of which include the number of pages, and the number of in and out-links. The authors examined ... -
Phonemic Representation and Transcription for Speech to Text Applications for Under-resourced Indigenous African Languages: The Case of Kiswahili
(arxiv.org, 2022)Building automatic speech recognition (ASR) systems is a challenging task, especially for under resourced languages that need to construct corpora nearly from scratch and lack sufficient training data. It has emerged ... -
Phonemic Representation and Transcription for Speech to Text Applications for Under-resourced Indigenous African Languages: The Case of Kiswahili
(Cornell University, 2022)Building automatic speech recognition (ASR) systems is a challenging task, especially for underresourced languages that need to construct corpora nearly from scratch and lack sufficient training data. It has emerged that ... -
PolitiKweli: A Swahili-English Code-switched Twitter Political Misinformation Classification Dataset
(Deep Learning Indaba 2023, 2023-08-30)In the age of freedom of speech, users of the social media platform Twitter post millions of messages per day. These messages are not always fact-checked resulting in misinformation which is false or misleading news. ... -
Proposing Parameters for Evaluating Sustainability of mHealth Systems in Developing Countries.
(Research gate, 2018)The exponential rise in global healthcare challenges; the rise in morbidity and mortality, especially in developing countries have compelled stakeholders to explore alternative ways of overcoming the crisis. Guided by the ... -
A Remote Access Security Model based on Vulnerability Management
(Modern Education & Computer science Press, 2020)Information security threats exploit vulnerabilities in communication networks. Remote access vulnerabilities are evident from the point of communication initialization following the communication channel to data or ... -
A Review of Availability Mechanisms in Dynamic Cloud Computing Environments
(IJERT, 2015)Cloud computing is arguably a ubiquitous technology in today’s digital age. The cloud has changed the way users utilize computing services such as applications and storage and thin clients is the buzzword in the fast ... -
A Review of Smartphone as an Office: Security Risks and Mitigation Measures
(setjournal.com, 2023-04-24)Smartphones have become the most popular mode of communication as well as a novel mode of work, allowing users to work from anywhere and increasing their efficiency and responsiveness. However, the flexibility and convenience ...