Search
Now showing items 31-40 of 48
Managing Configuration Errors in Cloud Computing Using Cluster & Node Management Techniques
(IJCSMC, 2018)
Cloud computing has been the technology of choice for most users globally due to the numerous advantages that it
offers. This technology is offered to users with different levels of expertise who utilize the different ...
Acquiring Relational Patterns from Wikipedia: A Case Study
(Proc. of the 5th Language and Technology Conference, 2011)
This paper proposes the automatic acquisition of binary relational patterns (i.e. portions of text expressing a relation between two
entities) from Wikipedia. There are a few advantages behind the use of Wikipedia: (i) ...
Target Sentiment Analysis Model with Naïve Bayes and Support Vector Machine for Product Review Classification
(Int. J. Comput. Sci. Inf. Secur.(IJCSIS), 2019)
Sentiment analysis has demonstrated that the automation and computational recognition of sentiments is possible and
evolving with time, due to factors such as; emergence of new technological trends and the continued dynamic ...
Effect of corporate governance on liquidity due to nonperforming asset portfolios in the banking sector: a case of commercial banks in Kenya
(www. ijern. com, 2017)
It’s argued that corporate governance can be linked to liquidity due to non performing asset portfolios (NPAs) in commercial banks in Kenya but this has not been determined empirically. Information is lacking on effect of ...
A Framework for secure mobile cloud computing in effective electronic learning
(International Journal of Innovative Research and Advanced Studies, 2018)
In the last few years, most universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing concept ...
MAS Architectural Model for Dialog Systems with Advancing Conversations
(International Journal of Scientific Research, 2018-11)
Recent handcrafts on dialog manager in task-oriented dialog systems (TODS) offer great promises on handling conversations. However, most tend to be shortsighted in handling advancing conversations. Modelling the future ...
A Remote Access Security Model based on Vulnerability Management
(Modern Education & Computer science Press, 2020)
Information security threats exploit vulnerabilities in communication networks. Remote access
vulnerabilities are evident from the point of communication initialization following the communication channel to data
or ...
Effectiveness of Security Controls On Electronic Health Records
(IJSTR, 2017)
Electronic Health Record (EHR) systems enhance efficiency and effectiveness in handling patients ‘information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting ...
Techniques to Control Memory Hogging by Web browsers: An in-depth review
(https:// www.ijcat.com, 2018)
The Web Browser is to date a popular piece of software in modern computing systems. They are the main interface for vast
information access from the Internet. Browsers technologies have advanced to a stage where they do ...
USE OF ENTERPRISE REPORTING SYSTEMS AT KISII BOTTLERS (K) LTD
(2011)
Reports have widely indicated the need for organizations to step up utilization of
electronic data through use of Enterprise Reporting (ER). In this regard, this study
sought to investigate the use of enterprise reporting ...