Recent Submissions

  • Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods 

    Ndichu, Samuel; McOyowo, Sylvester; Okoyo, Henry; Wekesa, Cyrus (Modern Education and Computer Science Press, 2023-04-01)
    Remote access technologies encrypt data to enforce policies and ensure protection. Attackers leverage such techniques to launch carefully crafted evasion attacks introducing malware and other unwanted traffic to the internal ...
  • A Review of Smartphone as an Office: Security Risks and Mitigation Measures 

    Murumba Julius, Mukisa; Muhambe Titus, Mukisa (setjournal.com, 2023-04-24)
    Smartphones have become the most popular mode of communication as well as a novel mode of work, allowing users to work from anywhere and increasing their efficiency and responsiveness. However, the flexibility and convenience ...
  • Phonemic Representation and Transcription for Speech to Text Applications for Under-resourced Indigenous African Languages: The Case of Kiswahili 

    Awino Ebbie, Lilian Wanzare, Lawrence Muchemi, Barack Wanjawa, Edward Ombui, Florence Indede, Owen McOnyango, Benard Okal (arxiv.org, 2022)
    Building automatic speech recognition (ASR) systems is a challenging task, especially for under resourced languages that need to construct corpora nearly from scratch and lack sufficient training data. It has emerged ...
  • A Software Agent for Vehicle Driver Modeling 

    James Imende Obuhuma, Henry Okora Okoyo, Sylvester Okoth McOyowo (IEEE, 2019)
    The world is experiencing a paradigm shift towards intelligent agents in form of machine learning for modeling any given task or process. Human vehicle drivers are agents that operate under stochastic environments, full ...
  • Social engineering based cyber-attacks in kenya 

    OBUHUMA, James , Shingai ZIVUKU (IEEE, 2020)
    Cybersecurity is a major challenge especially as the world transitions to the fourth industrial revolution. Cybercriminals are always perceived to be using complex sophisticated mechanisms to launch attacks to information ...
  • Fostering innovation and intercultural exchange during a global pandemic: Lessons learned from a virtual design thinking challenge in Nepal 

    Jens M Unger, Aman Bhattarai, Bettina Maisch, Johannes M Luetz, James Obuhuma (Springer, Cham, 2021)
    Countries in the majority world are widely argued to be most severely affected by the corona pandemic. To fight the outbreak of the virus and reduce risks of economic hardships and starvation these countries need an ability ...
  • Online Assessment and Examinations practices at the eCampus of Maseno University in Response to COVID 19 lockdown 

    Barbara Khavugwi, Peter Kiprotich (EasyChair, 2022)
    The COVID-19 pandemic resulted in an increasing demand for online learning and led to the demand for the offer of online assessment at Maseno university. Prior to the COVID19 pandemic the institution had put in place measures ...
  • Building Text and Speech Datasets for Low Resourced Languages: A Case of Languages in East Africa 

    Claire Babirye, Joyce Nakatumba-Nabende, Andrew Katumba, Ronald Ogwang, Jeremy Tusubira Francis, Jonathan Mukiibi, Medadi Ssentanda, Lilian D Wanzare, Davis David (AfricaNLP, 2022)
    Africa has over 2000 languages; however, those languages are not well repre sented in the existing Natural Language Processing ecosystem. African languages lack essential digital resources to be engaged effectively in the ...
  • Driver Behaviour Profiling Using Dynamic Bayesian Network 

    James I. Obuhuma, Henry O. Okoyo and Sylvester O. McOyowo (Modern Education and Computer Science, 2018)
    In the recent past, there has been a rapid increase in the number of vehicles and diversification of road networks worldwide. The biggest challenge now lies on how to monitor and analyse behaviours of vehicle drivers ...
  • Towards Logically Progressive Dialog for Future TODS to Serve in Complex Domains 

    K. Mugoye*, Dr. H. O. Okoyo, Dr. S. O. Mc Oyowo (International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019)
    Complex domains demand task-oriented dialog system (TODS) to be able to reason and engage with humans in dialog and in information retrieval. This may require contemporary dialog systems to have improved conversation ...
  • A Remote Access Security Model based on Vulnerability Management 

    Samuel Ndichu, Sylvester McOyowo, and Henry Okoyo,Cyrus Wekesa (Modern Education & Computer science Press, 2020)
    Information security threats exploit vulnerabilities in communication networks. Remote access vulnerabilities are evident from the point of communication initialization following the communication channel to data or ...
  • Techniques to Control Memory Hogging by Web browsers: An in-depth review 

    Kamau Harun, McOyowo Sylivester (https:// www.ijcat.com, 2018)
    The Web Browser is to date a popular piece of software in modern computing systems. They are the main interface for vast information access from the Internet. Browsers technologies have advanced to a stage where they do ...
  • An Enhanced Browser Reference Model 

    Harun kamau, McOyowo Sylivester, Okoyo Henry (https://www.ijcat.com, 2019)
    Browsers are prime software applications in modern computing devices. They are essential in accessing internet rich content. Access to these contents pose a high memory demand on the host device thus affecting the user ...
  • A Bring Your Own Device Risk Assessment Model 

    M. Cyprian Oonge S. Omboga, Muhambe, T. Mukisa , Ratemo (Computer Science Journals (CSJ), 2021)
    Bring Your Own Device (BYOD), a technology where individuals or employees use their own devices on the organization’s network to perform tasks assigned to them by the organization has been widely embraced. The reasons ...
  • Evaluation of Routing Performance using OSPF and Multi-Controller Based Network Architecture 

    Titus. M. Muhambe and Cyprian M. Ratemo Nicholas.J.Omumbo (MECS PRESS, 2021)
    Newer mobile applications are increasingly being defined using Internet Protocol, resulting in increased use of Internet Protocol and subsequent upsurge of smartphones. However, many communication service provider core ...
  • Conceptualizing Success Factors in Collaborative Technology Innovation 

    Omondi Alan Odhiambo and Muhambe Titus Mukisa (IJPRSE Progressive Research, 2021)
    Technology Innovation has been identified as a key factor that is increasingly influencing the success and competitiveness of modern enterprises in their selected market niche. Traditionally, innovation viewed a company’s ...
  • A Content Based Image Retrieval Model for E-Commerce 

    Gibson Kimutai, Wilson Cheruiyot, Calvins Otieno (International Journal of Engineering and Computer Science, 2018)
    In the last decade, large database of images have grown rapidly. This trend is expected to continue in to the future. Retrieval and querying of these image in efficient way is a challenge in order to access the visual content ...
  • A Model for Code Restructuring, A Tool for Improving Systems Quality in Compliance with Object Oriented Coding Practice 

    Moses Kibet Yegon Ngetich, Calvins Otieno, Michael Kimwele (International Journal of Computer Science Issues (IJCSI), 2019)
    A major goal of software restructuring is to preserve or increase the value of a piece of software. Restructuring a system may make it possible to add more features to the existing system or make the software more ...
  • Target Sentiment Analysis Model with Naïve Bayes and Support Vector Machine for Product Review Classification 

    Rhoda Viviane A Ogutu, Richard Rimiru, Calvins Otieno (Int. J. Comput. Sci. Inf. Secur.(IJCSIS), 2019)
    Sentiment analysis has demonstrated that the automation and computational recognition of sentiments is possible and evolving with time, due to factors such as; emergence of new technological trends and the continued dynamic ...
  • Effects of membership functions for fuzzy logic controlled autonomous mobile robot 

    Aggrey Shitsukane, Calvin Otieno (International Conference on Intelligent and Innovative Computing Applications, 2020)
    There is a growing trend in autonomous robotics research. A consistent collision avoidance and path following method is needed for an intelligent and operative mobile robot navigation. Usually robots are fitted with sensors ...

View more