Now showing items 21-40 of 70

    • A Remote Access Security Model based on Vulnerability Management 

      Samuel Ndichu, Sylvester McOyowo, and Henry Okoyo,Cyrus Wekesa (Modern Education & Computer science Press, 2020)
      Information security threats exploit vulnerabilities in communication networks. Remote access vulnerabilities are evident from the point of communication initialization following the communication channel to data or ...
    • Techniques to Control Memory Hogging by Web browsers: An in-depth review 

      Kamau Harun, McOyowo Sylivester (https:// www.ijcat.com, 2018)
      The Web Browser is to date a popular piece of software in modern computing systems. They are the main interface for vast information access from the Internet. Browsers technologies have advanced to a stage where they do ...
    • An Enhanced Browser Reference Model 

      Harun kamau, McOyowo Sylivester, Okoyo Henry (https://www.ijcat.com, 2019)
      Browsers are prime software applications in modern computing devices. They are essential in accessing internet rich content. Access to these contents pose a high memory demand on the host device thus affecting the user ...
    • Gal operon of Streptomyces 

      Craig W Adams, Mary E Brawner, James A Fornwald, Francis J Schmidt (1995)
      his invention relates to a recombinant DNA mole cule comprising the Streptomyces gal operon. Hodgson, J. Gen. Micro, 128, 2417-2430 (1982), re port that Streptomyces coelicolor A3 (2) has a glucose repression system which ...
    • A Bring Your Own Device Risk Assessment Model 

      M. Cyprian Oonge S. Omboga, Muhambe, T. Mukisa , Ratemo (Computer Science Journals (CSJ), 2021)
      Bring Your Own Device (BYOD), a technology where individuals or employees use their own devices on the organization’s network to perform tasks assigned to them by the organization has been widely embraced. The reasons ...
    • Evaluation of Routing Performance using OSPF and Multi-Controller Based Network Architecture 

      Titus. M. Muhambe and Cyprian M. Ratemo Nicholas.J.Omumbo (MECS PRESS, 2021)
      Newer mobile applications are increasingly being defined using Internet Protocol, resulting in increased use of Internet Protocol and subsequent upsurge of smartphones. However, many communication service provider core ...
    • Conceptualizing Success Factors in Collaborative Technology Innovation 

      Omondi Alan Odhiambo and Muhambe Titus Mukisa (IJPRSE Progressive Research, 2021)
      Technology Innovation has been identified as a key factor that is increasingly influencing the success and competitiveness of modern enterprises in their selected market niche. Traditionally, innovation viewed a company’s ...
    • A Content Based Image Retrieval Model for E-Commerce 

      Gibson Kimutai, Wilson Cheruiyot, Calvins Otieno (International Journal of Engineering and Computer Science, 2018)
      In the last decade, large database of images have grown rapidly. This trend is expected to continue in to the future. Retrieval and querying of these image in efficient way is a challenge in order to access the visual content ...
    • A Model for Code Restructuring, A Tool for Improving Systems Quality in Compliance with Object Oriented Coding Practice 

      Moses Kibet Yegon Ngetich, Calvins Otieno, Michael Kimwele (International Journal of Computer Science Issues (IJCSI), 2019)
      A major goal of software restructuring is to preserve or increase the value of a piece of software. Restructuring a system may make it possible to add more features to the existing system or make the software more ...
    • Target Sentiment Analysis Model with Naïve Bayes and Support Vector Machine for Product Review Classification 

      Rhoda Viviane A Ogutu, Richard Rimiru, Calvins Otieno (Int. J. Comput. Sci. Inf. Secur.(IJCSIS), 2019)
      Sentiment analysis has demonstrated that the automation and computational recognition of sentiments is possible and evolving with time, due to factors such as; emergence of new technological trends and the continued dynamic ...
    • Effects of membership functions for fuzzy logic controlled autonomous mobile robot 

      Aggrey Shitsukane, Calvin Otieno (International Conference on Intelligent and Innovative Computing Applications, 2020)
      There is a growing trend in autonomous robotics research. A consistent collision avoidance and path following method is needed for an intelligent and operative mobile robot navigation. Usually robots are fitted with sensors ...
    • Computer network quality of experience enriched analysis using fuzzy logic model 

      Walter Kihuya, Calvins Otieno, Richard Rimiru (International Conference on Intelligent and Innovative Computing Applications, 2020)
      Two important Quality of Experience (QoE) parameters in computer networks service-related performance metrics are throughput and end-to-end delay. A slow delay indicates high network efficiency thus high throughput. ...
    • Segmentation via principal component analysis for perceptron classification: a case study of kenyan mobile subscribers 

      Khamis Mwero Maneno, Richard Rimiru, Calvins Otieno (Semantic scholar, 2020)
    • Role of livestock projects in empowering women smallholder farmers for sustainable food security in rural Kenya 

      Unknown author (African Journal of Food, Agriculture, Nutrition and Development, 2009)
      Women are a major human resource and assure adequate nutrition, health and cognitive development of their households and children in their formative years. However, women are over-represented among the poor, suffer heavy ...
    • The Performance of South African and Kenyan Universities on the World Wide Web: a Web Link Analysis 

      Omwoyo B. Onyancha, Dennis N. Ocholla (Cybermetrics: International Journal of Scientometrics, Informetrics and Bibliometrics, 2007)
      The study used Link Analysis to compare Kenyan and South African universities according to several Web-based indicators, some of which include the number of pages, and the number of in and out-links. The authors examined ...
    • IEEE EMBS Fellows List Correction 

      Hal Oscar Anger, Thomas Charles Cetas, Howard Jay Chizeck, David R Jackson, Charles Stephen Lessard, J Patrick Reilly, Michael Andreas Unser, Max Eugene Valentinuzzi (IEEE ENGINEERING IN MEDICINE AND BIOLOGY, 1999)
      The list of 1999 IEEE Fellows who are EMBS members was incorrect in the January/February issue (vol. 18, no. 1, p. 14). The confirmed list of newly elected Fellows follows. The IEEE Fellow Committee and its staff extend ...
    • Effectiveness of Security Controls On Electronic Health Records 

      Everleen Wanyonyi, Anthony Rodrigues, Silvance O Abeka, Solomon Ogara (IJSTR, 2017)
      Electronic Health Record (EHR) systems enhance efficiency and effectiveness in handling patients ‘information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting ...
    • E-Government Security: Information Security Management Model for Public Administration in Kenya 

      William O Oyieyo (Strathmore University, 2010)
      nformation security in e-government in public administration in Kenya has not been adequately addressed. In order to develop an Information Security Management Model for Public Administration in Kenya, a questionnaire was ...
    • An Enhanced Model For Adoption Of Local Softwares: A Case Of Kenya 

      Maurine Awuor Onyango, Kimwele Michael (CARI Journals, 2017)
      Purpose: This study attempted to explain how adoption of local software development is affected by the individual, technological, environmental and organizational determinants in Kenya. Methodology:In this framework, ...
    • The Effect of Integrating Mobile Technology in Micro Finance Institutions. Case of Small and Micro-Enterprise Program (SMEP) In Kisumu County 

      Kwama Leonard Ogweno, Obare Erick Oteyo, Ondiek Alfred Collins (IOSR Journal of Business and Management, 2014)
      Recognizing the potential that M-banking holds in strengthening the socioeconomic position of those currently lacking access to banking, especially the rural poor, Safaricom in Kenya and the two leading mobile operators ...