Browsing School of Computing and informatics by Title
Now showing items 1-20 of 76
-
Accelerometry-derived Moderate-to-vigorous Physical Activity Predicts Overall Survival In Patients With Cancer In The Pleural Space: 2896
(Ovid Technologies (Wolters Kluwer Health), 2024-10-01)To investigate the association of accelerometry-derived moderate-to-vigorous physical activity (MVPA) with 3-year overall survival (OS) in patients with MPE. -
Acquiring Relational Patterns from Wikipedia: A Case Study
(Proc. of the 5th Language and Technology Conference, 2011)This paper proposes the automatic acquisition of binary relational patterns (i.e. portions of text expressing a relation between two entities) from Wikipedia. There are a few advantages behind the use of Wikipedia: (i) ... -
Addressing Node Failures Using Node Management & Cluster Management Techniques in Cloud Computing
(IJCSMC, 2018)Cloud computing has been the rave of users globally over the past few years. This has mainly been because of the many different services available in the cloud that has made it the technology of choice for many users. ... -
An analysis of the effect of performance contracting on supply chain performance of public universities in Kenya
(The Strategic Journal of Business & Change Management, 2019)Kenya Government has been implementing performance contracting in the public sector agencies with an overall goal of improve service delivery to the public. This is a performance improvement tool that assists in setting ... -
Assessment of school information system utilization and factors that affect use in Kenyan secondary schools
(University of Nairobi, 2011)This paper describes a study on the utilization of School Information Systems (SIS) in secondary schools in Kenya. It begins by describing the structure of the Education system in Kenya, ICT in educational management and ... -
A Bring Your Own Device Risk Assessment Model
(Computer Science Journals (CSJ), 2021)Bring Your Own Device (BYOD), a technology where individuals or employees use their own devices on the organization’s network to perform tasks assigned to them by the organization has been widely embraced. The reasons ... -
Building Text and Speech Datasets for Low Resourced Languages: A Case of Languages in East Africa
(AfricaNLP, 2022)Africa has over 2000 languages; however, those languages are not well repre sented in the existing Natural Language Processing ecosystem. African languages lack essential digital resources to be engaged effectively in the ... -
Challenges facing digitization projects in kenya: Case of implementation of national land information management system
(IJTS, 2018)Purpose: Technology has been the avenues used to bridge various challenges public service delivery. The government of Kenya has invested heavily in land digitization process in order to eradicate the perennial challenges ... -
The Challenges in the Use of Mobile Instant Messaging Systems in Universities
(2016-09)Mobile Instant Messaging (MIM) encompasses a range of internet-based facilities that enable exchange of real-time messages using mobile phones. The value of MIM has widely been recognized in recent times, instigating an ... -
Checkpointing as a Counter to Security Issues in Cloud Computing Infrastructure
(2019 IEEE AFRICON, 2019)The world is experiencing a paradigm shift towards intelligent agents in form of machine learning for modeling any given task or process. Human vehicle drivers are agents that operate under stochastic environments, full ... -
Computer network quality of experience enriched analysis using fuzzy logic model
(International Conference on Intelligent and Innovative Computing Applications, 2020)Two important Quality of Experience (QoE) parameters in computer networks service-related performance metrics are throughput and end-to-end delay. A slow delay indicates high network efficiency thus high throughput. ... -
Conceptualizing Success Factors in Collaborative Technology Innovation
(IJPRSE Progressive Research, 2021)Technology Innovation has been identified as a key factor that is increasingly influencing the success and competitiveness of modern enterprises in their selected market niche. Traditionally, innovation viewed a company’s ... -
A Content Based Image Retrieval Model for E-Commerce
(International Journal of Engineering and Computer Science, 2018)In the last decade, large database of images have grown rapidly. This trend is expected to continue in to the future. Retrieval and querying of these image in efficient way is a challenge in order to access the visual content ... -
A crowdsourced database of event sequence descriptions for the acquisition of high-quality script knowledge
(Universität des Saarlandes, 2016)Scripts are standardized event sequences describing typical everyday activities, which play an important role in the computational modeling of cognitive abilities (in particular for natural language processing). We present ... -
CYBER THREATS AND CYBER SECURITY IN THE KENYAN BUSINESS CONTEXT
(GSJ, 2019-09)Cyber security is basically the process of ensuring the safety of cyberspace from known and unknown threats. The International Telecommunication Union states that cyber security is the collective application of strategies, ... -
Detecting Everyday Scenarios in Narrative Texts
(Universitat des Saarlandes, 2019)Script knowledge consists of detailed information on everyday activities. Such information is often taken for granted in text and needs to be inferred by readers. Therefore, script knowledge is a central component to ... -
Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods
(Modern Education and Computer Science Press, 2023-04-01)Remote access technologies encrypt data to enforce policies and ensure protection. Attackers leverage such techniques to launch carefully crafted evasion attacks introducing malware and other unwanted traffic to the internal ... -
A Domains Approach to Remote Access Logical Vulnerabilities Classification
(2019)Remote access facilitates collaboration and the creation of a seamless work environment. This technology enables employees to access the latest versions of data and resources from different locations other than the ... -
A Domains Approach to Remote Access Logical Vulnerabilities Classification
(MECS: http://www.mecspress.org/ijcnis/ijcnis-v11-n11/IJCNIS-V11-N11-5.pdf., 2019)Remote access facilitates collaboration and the creation of a seamless work environment. This technology enables employees to access the latest versions of data and resources from different locations other than the ... -
Driver Behaviour Profiling Using Dynamic Bayesian Network
(Modern Education and Computer Science, 2018)In the recent past, there has been a rapid increase in the number of vehicles and diversification of road networks worldwide. The biggest challenge now lies on how to monitor and analyse behaviours of vehicle drivers ...