Browsing School of Computing and informatics by Title
Now showing items 53-70 of 70
-
A Remote Access Security Model based on Vulnerability Management
(Modern Education & Computer science Press, 2020)Information security threats exploit vulnerabilities in communication networks. Remote access vulnerabilities are evident from the point of communication initialization following the communication channel to data or ... -
A Review of Availability Mechanisms in Dynamic Cloud Computing Environments
(IJERT, 2015)Cloud computing is arguably a ubiquitous technology in today’s digital age. The cloud has changed the way users utilize computing services such as applications and storage and thin clients is the buzzword in the fast ... -
A Review of Smartphone as an Office: Security Risks and Mitigation Measures
(setjournal.com, 2023-04-24)Smartphones have become the most popular mode of communication as well as a novel mode of work, allowing users to work from anywhere and increasing their efficiency and responsiveness. However, the flexibility and convenience ... -
Role of livestock projects in empowering women smallholder farmers for sustainable food security in rural Kenya
(African Journal of Food, Agriculture, Nutrition and Development, 2009)Women are a major human resource and assure adequate nutrition, health and cognitive development of their households and children in their formative years. However, women are over-represented among the poor, suffer heavy ... -
Script acquisition: a crowdsourcing and text mining approach
(Saarländische Universitäts-und Landesbibliothek, 2020)According to Grice's (1975) theory of pragmatics, people tend to omit basic information when participating in a conversation (or writing a narrative) under the assumption that left out details are already known or can be ... -
Shortcomings of Ultrasonic Obstacle Detection for Vehicle Driver Assistance and Profiling
(Int. J. Inf. Technol. Comput. Sci, 2019)Obstacle detection is a challenging problem that has attracted much attention recently, especially in the context of research in self-driving car technologies. A number of obstacle detection technologies exist. Ultrasound ... -
Smart-bot Technology: Conversational Agents Role in Maternal Healthcare Support
(2019 IST-Africa Week Conference (IST-Africa), 2019)There is a need for a system that respond to various queries in real-time, to advice and inform expectant mothers during their pregnancy. Several smart services have been deployed, bundled with health information systems, ... -
Social engineering based cyber-attacks in kenya
(IEEE, 2020)Cybersecurity is a major challenge especially as the world transitions to the fourth industrial revolution. Cybercriminals are always perceived to be using complex sophisticated mechanisms to launch attacks to information ... -
A Software Agent for Vehicle Driver Modeling
(IEEE, 2019)The world is experiencing a paradigm shift towards intelligent agents in form of machine learning for modeling any given task or process. Human vehicle drivers are agents that operate under stochastic environments, full ... -
Strengthening Online Education Approaches in Institutions of Higher Learning
(Emerald Publishing Limited, 2023-05-15)Online, distance, and eLearning (ODeL) continue to gain recognition as a mandatory component of delivery of education in institutions of higher learning (IHL) around the world following the outbreak of coronavirus disease ... -
Target Sentiment Analysis Model with Naïve Bayes and Support Vector Machine for Product Review Classification
(Int. J. Comput. Sci. Inf. Secur.(IJCSIS), 2019)Sentiment analysis has demonstrated that the automation and computational recognition of sentiments is possible and evolving with time, due to factors such as; emergence of new technological trends and the continued dynamic ... -
Technique and results of measuring surface-acoustic-wave reflection coefficients with the use of laser sounding
(Nauka/Interperiodica, 2007-08-01)A technique of measuring the surface-acoustic-wave (SAW) reflection with the use of a laser sounding facility containing a reference diffraction grating is described. The characteristics of the SAW reflections from the ... -
Technique and Results of Measuring Surface-Acoustic-Wave Reflection Coefficients with the use of Laser Sounding
(Nauka/Interperiodica, 2007-08-01)A technique of measuring the surface-acoustic-wave (SAW) reflection with the use of a laser sounding facility containing a reference diffraction grating is described. The characteristics of the SAW reflections from the ... -
Techniques to Control Memory Hogging by Web browsers: An in-depth review
(https:// www.ijcat.com, 2018)The Web Browser is to date a popular piece of software in modern computing systems. They are the main interface for vast information access from the Internet. Browsers technologies have advanced to a stage where they do ... -
Towards Clean Information and Communication Technology Campaign in Public Universities in Kenya
(2015-01-04)Information and Communication Technology (ICT) accounts for about 2% of total Greenhouse gas (GHG) emissions. This figure is likely to grow if the use of ICT keeps on growing unmanaged. Rapid technological advances have ... -
Towards Logically Progressive Dialog for Future TODS to Serve in Complex Domains
(International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019)Complex domains demand task-oriented dialog system (TODS) to be able to reason and engage with humans in dialog and in information retrieval. This may require contemporary dialog systems to have improved conversation ... -
USE OF ENTERPRISE REPORTING SYSTEMS AT KISII BOTTLERS (K) LTD
(2011)Reports have widely indicated the need for organizations to step up utilization of electronic data through use of Enterprise Reporting (ER). In this regard, this study sought to investigate the use of enterprise reporting ...