Search
Now showing items 1-10 of 23
Computer network quality of experience enriched analysis using fuzzy logic model
(International Conference on Intelligent and Innovative Computing Applications, 2020)
Two important Quality of Experience (QoE) parameters in computer networks service-related performance metrics are throughput and end-to-end delay. A slow delay indicates high network efficiency thus high throughput. ...
Effects of membership functions for fuzzy logic controlled autonomous mobile robot
(International Conference on Intelligent and Innovative Computing Applications, 2020)
There is a growing trend in autonomous robotics research. A consistent collision avoidance and path following method is needed for an intelligent and operative mobile robot navigation. Usually robots are fitted with sensors ...
A Bring Your Own Device Risk Assessment Model
(Computer Science Journals (CSJ), 2021)
Bring Your Own Device (BYOD), a technology where individuals or employees use their own
devices on the organization’s network to perform tasks assigned to them by the organization has
been widely embraced. The reasons ...
Conceptualizing Success Factors in Collaborative Technology Innovation
(IJPRSE Progressive Research, 2021)
Technology Innovation has been identified as a key factor that is increasingly influencing the success and
competitiveness of modern enterprises in their selected market niche. Traditionally, innovation viewed a company’s ...
Script acquisition: a crowdsourcing and text mining approach
(Saarländische Universitäts-und Landesbibliothek, 2020)
According to Grice's (1975) theory of pragmatics, people tend to omit basic information when participating in a conversation (or writing a narrative) under the assumption that left out details are already known or can be ...
Evaluation of Routing Performance using OSPF and Multi-Controller Based Network Architecture
(MECS PRESS, 2021)
Newer mobile applications are increasingly being defined using Internet Protocol, resulting in increased use
of Internet Protocol and subsequent upsurge of smartphones. However, many communication service provider core ...
A Remote Access Security Model based on Vulnerability Management
(Modern Education & Computer science Press, 2020)
Information security threats exploit vulnerabilities in communication networks. Remote access
vulnerabilities are evident from the point of communication initialization following the communication channel to data
or ...
Building Text and Speech Datasets for Low Resourced Languages: A Case of Languages in East Africa
(AfricaNLP, 2022)
Africa has over 2000 languages; however, those languages are not well repre sented in the existing Natural Language Processing ecosystem. African languages
lack essential digital resources to be engaged effectively in the ...
Online Assessment and Examinations practices at the eCampus of Maseno University in Response to COVID 19 lockdown
(EasyChair, 2022)
The COVID-19 pandemic resulted in an increasing demand for online learning and led to the demand for the
offer of online assessment at Maseno university. Prior to the COVID19 pandemic the institution had put in place
measures ...