Now showing items 1-20 of 70

    • Acquiring Relational Patterns from Wikipedia: A Case Study 

      Rahmad Mahendra1, 2, Lilian Wanzare1,2, Bernardo Magnini1 , Raffaella Bernardi3 , Alberto Lavelli1 (Proc. of the 5th Language and Technology Conference, 2011)
      This paper proposes the automatic acquisition of binary relational patterns (i.e. portions of text expressing a relation between two entities) from Wikipedia. There are a few advantages behind the use of Wikipedia: (i) ...
    • Addressing Node Failures Using Node Management & Cluster Management Techniques in Cloud Computing 

      Msagha J Mbogholi, Henry O Okoyo, Okoth Sylvester J McOyowo (IJCSMC, 2018)
      Cloud computing has been the rave of users globally over the past few years. This has mainly been because of the many different services available in the cloud that has made it the technology of choice for many users. ...
    • An analysis of the effect of performance contracting on supply chain performance of public universities in Kenya 

      SJO Owuor, MN Oginda, J Obura (The Strategic Journal of Business & Change Management, 2019)
      Kenya Government has been implementing performance contracting in the public sector agencies with an overall goal of improve service delivery to the public. This is a performance improvement tool that assists in setting ...
    • Assessment of school information system utilization and factors that affect use in Kenyan secondary schools 

      Isaac O Owino (University of Nairobi, 2011)
      This paper describes a study on the utilization of School Information Systems (SIS) in secondary schools in Kenya. It begins by describing the structure of the Education system in Kenya, ICT in educational management and ...
    • A Bring Your Own Device Risk Assessment Model 

      M. Cyprian Oonge S. Omboga, Muhambe, T. Mukisa , Ratemo (Computer Science Journals (CSJ), 2021)
      Bring Your Own Device (BYOD), a technology where individuals or employees use their own devices on the organization’s network to perform tasks assigned to them by the organization has been widely embraced. The reasons ...
    • Building Text and Speech Datasets for Low Resourced Languages: A Case of Languages in East Africa 

      Claire Babirye, Joyce Nakatumba-Nabende, Andrew Katumba, Ronald Ogwang, Jeremy Tusubira Francis, Jonathan Mukiibi, Medadi Ssentanda, Lilian D Wanzare, Davis David (AfricaNLP, 2022)
      Africa has over 2000 languages; however, those languages are not well repre sented in the existing Natural Language Processing ecosystem. African languages lack essential digital resources to be engaged effectively in the ...
    • Challenges facing digitization projects in kenya: Case of implementation of national land information management system 

      Joseph Wang’ondu, Martin Okode Opiyo, Kariuki,Winifred N. Karugu, (IJTS, 2018)
      Purpose: Technology has been the avenues used to bridge various challenges public service delivery. The government of Kenya has invested heavily in land digitization process in order to eradicate the perennial challenges ...
    • The Challenges in the Use of Mobile Instant Messaging Systems in Universities 

      Ratemo, Cyprian M; Ikoha, Peters A; Micheni, Elyjoy (2016-09)
      Mobile Instant Messaging (MIM) encompasses a range of internet-based facilities that enable exchange of real-time messages using mobile phones. The value of MIM has widely been recognized in recent times, instigating an ...
    • Checkpointing as a Counter to Security Issues in Cloud Computing Infrastructure 

      James Imende Obuhuma; Henry Okora Okoyo; Sylvester Okoth McOyowo (2019 IEEE AFRICON, 2019)
      The world is experiencing a paradigm shift towards intelligent agents in form of machine learning for modeling any given task or process. Human vehicle drivers are agents that operate under stochastic environments, full ...
    • Computer network quality of experience enriched analysis using fuzzy logic model 

      Walter Kihuya, Calvins Otieno, Richard Rimiru (International Conference on Intelligent and Innovative Computing Applications, 2020)
      Two important Quality of Experience (QoE) parameters in computer networks service-related performance metrics are throughput and end-to-end delay. A slow delay indicates high network efficiency thus high throughput. ...
    • Conceptualizing Success Factors in Collaborative Technology Innovation 

      Omondi Alan Odhiambo and Muhambe Titus Mukisa (IJPRSE Progressive Research, 2021)
      Technology Innovation has been identified as a key factor that is increasingly influencing the success and competitiveness of modern enterprises in their selected market niche. Traditionally, innovation viewed a company’s ...
    • A Content Based Image Retrieval Model for E-Commerce 

      Gibson Kimutai, Wilson Cheruiyot, Calvins Otieno (International Journal of Engineering and Computer Science, 2018)
      In the last decade, large database of images have grown rapidly. This trend is expected to continue in to the future. Retrieval and querying of these image in efficient way is a challenge in order to access the visual content ...
    • A crowdsourced database of event sequence descriptions for the acquisition of high-quality script knowledge 

      Lilian DA Wanzare, Alessandra Zarcone, Stefan Thater, Manfred Pinkal (Universität des Saarlandes, 2016)
      Scripts are standardized event sequences describing typical everyday activities, which play an important role in the computational modeling of cognitive abilities (in particular for natural language processing). We present ...
    • CYBER THREATS AND CYBER SECURITY IN THE KENYAN BUSINESS CONTEXT 

      Laureen Akumu Ndeda, Collins Otieno Odoyo (GSJ, 2019-09)
      Cyber security is basically the process of ensuring the safety of cyberspace from known and unknown threats. The International Telecommunication Union states that cyber security is the collective application of strategies, ...
    • Detecting Everyday Scenarios in Narrative Texts 

      Lilian D.A. Wanzare, Michael Roth, Manfred Pinkal (Universitat des Saarlandes, 2019)
      Script knowledge consists of detailed information on everyday activities. Such information is often taken for granted in text and needs to be inferred by readers. Therefore, script knowledge is a central component to ...
    • Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods 

      Ndichu, Samuel; McOyowo, Sylvester; Okoyo, Henry; Wekesa, Cyrus (Modern Education and Computer Science Press, 2023-04-01)
      Remote access technologies encrypt data to enforce policies and ensure protection. Attackers leverage such techniques to launch carefully crafted evasion attacks introducing malware and other unwanted traffic to the internal ...
    • A Domains Approach to Remote Access Logical Vulnerabilities Classification 

      S. Ndichu, S. McOyowo, H Okoyo, C. Wekesa (2019)
      Remote access facilitates collaboration and the creation of a seamless work environment. This technology enables employees to access the latest versions of data and resources from different locations other than the ...
    • A Domains Approach to Remote Access Logical Vulnerabilities Classification 

      S. Ndichu, S. McOyowo, H Okoyo, C. Wekesa (MECS: http://www.mecspress.org/ijcnis/ijcnis-v11-n11/IJCNIS-V11-N11-5.pdf., 2019)
      Remote access facilitates collaboration and the creation of a seamless work environment. This technology enables employees to access the latest versions of data and resources from different locations other than the ...
    • Driver Behaviour Profiling Using Dynamic Bayesian Network 

      James I. Obuhuma, Henry O. Okoyo and Sylvester O. McOyowo (Modern Education and Computer Science, 2018)
      In the recent past, there has been a rapid increase in the number of vehicles and diversification of road networks worldwide. The biggest challenge now lies on how to monitor and analyse behaviours of vehicle drivers ...
    • E-Government Security: Information Security Management Model for Public Administration in Kenya 

      William O Oyieyo (Strathmore University, 2010)
      nformation security in e-government in public administration in Kenya has not been adequately addressed. In order to develop an Information Security Management Model for Public Administration in Kenya, a questionnaire was ...