Search
Now showing items 31-40 of 54
Technique and results of measuring surface-acoustic-wave reflection coefficients with the use of laser sounding
(Nauka/Interperiodica, 2007-08-01)
A technique of measuring the surface-acoustic-wave (SAW) reflection with the use of a laser sounding facility containing a reference diffraction grating is described. The characteristics of the SAW reflections from the ...
A Framework for secure mobile cloud computing in effective electronic learning
(International Journal of Innovative Research and Advanced Studies, 2018)
In the last few years, most universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing concept ...
Technique and Results of Measuring Surface-Acoustic-Wave Reflection Coefficients with the use of Laser Sounding
(Nauka/Interperiodica, 2007-08-01)
A technique of measuring the surface-acoustic-wave (SAW) reflection with the use of a laser sounding facility containing a reference diffraction grating is described. The characteristics of the SAW reflections from the ...
MAS Architectural Model for Dialog Systems with Advancing Conversations
(International Journal of Scientific Research, 2018-11)
Recent handcrafts on dialog manager in task-oriented dialog systems (TODS) offer great promises on handling conversations. However, most tend to be shortsighted in handling advancing conversations. Modelling the future ...
A Remote Access Security Model based on Vulnerability Management
(Modern Education & Computer science Press, 2020)
Information security threats exploit vulnerabilities in communication networks. Remote access
vulnerabilities are evident from the point of communication initialization following the communication channel to data
or ...
Effectiveness of Security Controls On Electronic Health Records
(IJSTR, 2017)
Electronic Health Record (EHR) systems enhance efficiency and effectiveness in handling patients ‘information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting ...
Techniques to Control Memory Hogging by Web browsers: An in-depth review
(https:// www.ijcat.com, 2018)
The Web Browser is to date a popular piece of software in modern computing systems. They are the main interface for vast
information access from the Internet. Browsers technologies have advanced to a stage where they do ...
USE OF ENTERPRISE REPORTING SYSTEMS AT KISII BOTTLERS (K) LTD
(2011)
Reports have widely indicated the need for organizations to step up utilization of
electronic data through use of Enterprise Reporting (ER). In this regard, this study
sought to investigate the use of enterprise reporting ...
Implications of service quality on customer loyalty in the banking sector. A survey of Banks in Homabay county, Kenya
(Centre for Promoting Ideas, USA, 2012)
Marketing management research has advocated for the establishment of the determinants of customer loyalty to improve customer retention and performance. However, studies on the direct relationship between these determinants ...
Role of livestock projects in empowering women smallholder farmers for sustainable food security in rural Kenya
(African Journal of Food, Agriculture, Nutrition and Development, 2009)
Women are a major human resource and assure adequate nutrition, health and cognitive development of their households and children in their formative years. However, women are over-represented among the poor, suffer heavy ...