Now showing items 41-60 of 70

    • A Domains Approach to Remote Access Logical Vulnerabilities Classification 

      S. Ndichu, S. McOyowo, H Okoyo, C. Wekesa (MECS: http://www.mecspress.org/ijcnis/ijcnis-v11-n11/IJCNIS-V11-N11-5.pdf., 2019)
      Remote access facilitates collaboration and the creation of a seamless work environment. This technology enables employees to access the latest versions of data and resources from different locations other than the ...
    • Towards Logically Progressive Dialog for Future TODS to Serve in Complex Domains 

      K. Mugoye*, Dr. H. O. Okoyo, Dr. S. O. Mc Oyowo (International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019)
      Complex domains demand task-oriented dialog system (TODS) to be able to reason and engage with humans in dialog and in information retrieval. This may require contemporary dialog systems to have improved conversation ...
    • Open Source ERP Adoption-Use and Organisational Performance of Deposit-Taking Saccos in Kenya 

      James M Reuben, Johnmark Obura, Moses Oginda (International Journal of Information Technology, 2019)
      The cost and benefits of an ERP system are arguably the reason why Deposit-Taking SACCOs are opting for adoption-use of open source ERP in an effort to achieve organisation performance. Technology adoption is only important ...
    • Target Sentiment Analysis Model with Naïve Bayes and Support Vector Machine for Product Review Classification 

      Rhoda Viviane A Ogutu, Richard Rimiru, Calvins Otieno (Int. J. Comput. Sci. Inf. Secur.(IJCSIS), 2019)
      Sentiment analysis has demonstrated that the automation and computational recognition of sentiments is possible and evolving with time, due to factors such as; emergence of new technological trends and the continued dynamic ...
    • An Enhanced Browser Reference Model 

      Harun kamau, McOyowo Sylivester, Okoyo Henry (https://www.ijcat.com, 2019)
      Browsers are prime software applications in modern computing devices. They are essential in accessing internet rich content. Access to these contents pose a high memory demand on the host device thus affecting the user ...
    • A Software Agent for Vehicle Driver Modeling 

      James Imende Obuhuma, Henry Okora Okoyo, Sylvester Okoth McOyowo (IEEE, 2019)
      The world is experiencing a paradigm shift towards intelligent agents in form of machine learning for modeling any given task or process. Human vehicle drivers are agents that operate under stochastic environments, full ...
    • CYBER THREATS AND CYBER SECURITY IN THE KENYAN BUSINESS CONTEXT 

      Laureen Akumu Ndeda, Collins Otieno Odoyo (GSJ, 2019-09)
      Cyber security is basically the process of ensuring the safety of cyberspace from known and unknown threats. The International Telecommunication Union states that cyber security is the collective application of strategies, ...
    • Segmentation via principal component analysis for perceptron classification: a case study of kenyan mobile subscribers 

      Khamis Mwero Maneno, Richard Rimiru, Calvins Otieno (Semantic scholar, 2020)
    • Computer network quality of experience enriched analysis using fuzzy logic model 

      Walter Kihuya, Calvins Otieno, Richard Rimiru (International Conference on Intelligent and Innovative Computing Applications, 2020)
      Two important Quality of Experience (QoE) parameters in computer networks service-related performance metrics are throughput and end-to-end delay. A slow delay indicates high network efficiency thus high throughput. ...
    • Effects of membership functions for fuzzy logic controlled autonomous mobile robot 

      Aggrey Shitsukane, Calvin Otieno (International Conference on Intelligent and Innovative Computing Applications, 2020)
      There is a growing trend in autonomous robotics research. A consistent collision avoidance and path following method is needed for an intelligent and operative mobile robot navigation. Usually robots are fitted with sensors ...
    • Script acquisition: a crowdsourcing and text mining approach 

      Lilian Diana Awuor Wanzare (Saarländische Universitäts-und Landesbibliothek, 2020)
      According to Grice's (1975) theory of pragmatics, people tend to omit basic information when participating in a conversation (or writing a narrative) under the assumption that left out details are already known or can be ...
    • A Remote Access Security Model based on Vulnerability Management 

      Samuel Ndichu, Sylvester McOyowo, and Henry Okoyo,Cyrus Wekesa (Modern Education & Computer science Press, 2020)
      Information security threats exploit vulnerabilities in communication networks. Remote access vulnerabilities are evident from the point of communication initialization following the communication channel to data or ...
    • Social engineering based cyber-attacks in kenya 

      OBUHUMA, James , Shingai ZIVUKU (IEEE, 2020)
      Cybersecurity is a major challenge especially as the world transitions to the fourth industrial revolution. Cybercriminals are always perceived to be using complex sophisticated mechanisms to launch attacks to information ...
    • Enhancing students’ biology learning by using augmented reality as a learning supplement 

      Weng, Cathy; Otanga, Sarah; Christianto, Samuel Michael; Ju-Chun Chu, Regina (SAGE Publications, 2020-07)
      The purpose of this study was to investigate the effects of augmented reality (AR) technology on students’ learning outcomes (measured according to Bloom’s cognitive levels) and attitude toward biology. The print book was ...
    • Effects of tangrams on learning engagement and achievement: Case of preschool learners 

      Weng, Cathy; Otanga, Sarah; Weng, Apollo; Tran, Khanh Nguyen. Phuong (Journal of Computer Assisted Learning ,wiley., 2020-08)
      The purpose of this research was to compare the effectiveness of physical and virtual tangrams on preschool children's learning engagement and achievement. Children listened to an e‐storybook narration and solved puzzles ...
    • A Bring Your Own Device Risk Assessment Model 

      M. Cyprian Oonge S. Omboga, Muhambe, T. Mukisa , Ratemo (Computer Science Journals (CSJ), 2021)
      Bring Your Own Device (BYOD), a technology where individuals or employees use their own devices on the organization’s network to perform tasks assigned to them by the organization has been widely embraced. The reasons ...
    • Conceptualizing Success Factors in Collaborative Technology Innovation 

      Omondi Alan Odhiambo and Muhambe Titus Mukisa (IJPRSE Progressive Research, 2021)
      Technology Innovation has been identified as a key factor that is increasingly influencing the success and competitiveness of modern enterprises in their selected market niche. Traditionally, innovation viewed a company’s ...
    • Evaluation of Routing Performance using OSPF and Multi-Controller Based Network Architecture 

      Titus. M. Muhambe and Cyprian M. Ratemo Nicholas.J.Omumbo (MECS PRESS, 2021)
      Newer mobile applications are increasingly being defined using Internet Protocol, resulting in increased use of Internet Protocol and subsequent upsurge of smartphones. However, many communication service provider core ...
    • Fostering innovation and intercultural exchange during a global pandemic: Lessons learned from a virtual design thinking challenge in Nepal 

      Jens M Unger, Aman Bhattarai, Bettina Maisch, Johannes M Luetz, James Obuhuma (Springer, Cham, 2021)
      Countries in the majority world are widely argued to be most severely affected by the corona pandemic. To fight the outbreak of the virus and reduce risks of economic hardships and starvation these countries need an ability ...
    • Framework for Technology-Enriched Active Class Learning of Physics in Secondary Schools in Kenya 

      Abenga, Elizabeth Sarange. Bosire; Okono, Elijah Owuor; Awuor, Mzee; Otanga, Sarah (IGI Global, 2021)
      Active learning transforms the learning process and activities from tutor focused to learner-cantered and is driven by the learner's learning ability. In other words, active learning provides an opportunity for self-directed ...