Browsing Department of Computer science by Title
Now showing items 29-48 of 57
-
IEEE EMBS Fellows List Correction
(IEEE ENGINEERING IN MEDICINE AND BIOLOGY, 1999)The list of 1999 IEEE Fellows who are EMBS members was incorrect in the January/February issue (vol. 18, no. 1, p. 14). The confirmed list of newly elected Fellows follows. The IEEE Fellow Committee and its staff extend ... -
Implications of service quality on customer loyalty in the banking sector. A survey of Banks in Homabay county, Kenya
(Centre for Promoting Ideas, USA, 2012)Marketing management research has advocated for the establishment of the determinants of customer loyalty to improve customer retention and performance. However, studies on the direct relationship between these determinants ... -
Inducing script structure from crowdsourced event descriptions via semi-supervised clustering
(Universitat des Saarlandes, 2017)We present a semi-supervised clustering approach to induce script structure from crowdsourced descriptions of event sequences by grouping event descriptions into paraphrase sets (representing event types) and inducing ... -
Managing Configuration Errors in Cloud Computing Using Cluster & Node Management Techniques
(IJCSMC, 2018)Cloud computing has been the technology of choice for most users globally due to the numerous advantages that it offers. This technology is offered to users with different levels of expertise who utilize the different ... -
MAS Architectural Model for Dialog Systems with Advancing Conversations
(International Journal of Scientific Research, 2018-11)Recent handcrafts on dialog manager in task-oriented dialog systems (TODS) offer great promises on handling conversations. However, most tend to be shortsighted in handling advancing conversations. Modelling the future ... -
Measuring thickness of thin metallic films with the use of laser probing technique
(Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования «Российский университет дружбы народов», 2005)Proposed and practically carried out поп-contact method of measuring thickness of thin metallic films. The recommended range of the thickness measured is from 100A to 1500A. The method is based on probing by a laser beam ... -
A Model for Code Restructuring, A Tool for Improving Systems Quality in Compliance with Object Oriented Coding Practice
(International Journal of Computer Science Issues (IJCSI), 2019)A major goal of software restructuring is to preserve or increase the value of a piece of software. Restructuring a system may make it possible to add more features to the existing system or make the software more ... -
Online Assessment and Examinations practices at the eCampus of Maseno University in Response to COVID 19 lockdown
(EasyChair, 2022)The COVID-19 pandemic resulted in an increasing demand for online learning and led to the demand for the offer of online assessment at Maseno university. Prior to the COVID19 pandemic the institution had put in place measures ... -
Open Source ERP Adoption-Use and Organisational Performance of Deposit-Taking Saccos in Kenya
(International Journal of Information Technology, 2019)The cost and benefits of an ERP system are arguably the reason why Deposit-Taking SACCOs are opting for adoption-use of open source ERP in an effort to achieve organisation performance. Technology adoption is only important ... -
Ownership concentration and financial performance of listed firms in Kenya: An econometric analysis using panel data
(European Scientific Journal, 2013)In this study, we use panel methodology comprising 53 firms listed at the Nairobi Securities Exchange to establish the effect of ownership concentration on financial performance of these firms for the period 2007 to 2011. ... -
The Performance of South African and Kenyan Universities on the World Wide Web: a Web Link Analysis
(Cybermetrics: International Journal of Scientometrics, Informetrics and Bibliometrics, 2007)The study used Link Analysis to compare Kenyan and South African universities according to several Web-based indicators, some of which include the number of pages, and the number of in and out-links. The authors examined ... -
Phonemic Representation and Transcription for Speech to Text Applications for Under-resourced Indigenous African Languages: The Case of Kiswahili
(arxiv.org, 2022)Building automatic speech recognition (ASR) systems is a challenging task, especially for under resourced languages that need to construct corpora nearly from scratch and lack sufficient training data. It has emerged ... -
A Remote Access Security Model based on Vulnerability Management
(Modern Education & Computer science Press, 2020)Information security threats exploit vulnerabilities in communication networks. Remote access vulnerabilities are evident from the point of communication initialization following the communication channel to data or ... -
A Review of Availability Mechanisms in Dynamic Cloud Computing Environments
(IJERT, 2015)Cloud computing is arguably a ubiquitous technology in today’s digital age. The cloud has changed the way users utilize computing services such as applications and storage and thin clients is the buzzword in the fast ... -
A Review of Smartphone as an Office: Security Risks and Mitigation Measures
(setjournal.com, 2023-04-24)Smartphones have become the most popular mode of communication as well as a novel mode of work, allowing users to work from anywhere and increasing their efficiency and responsiveness. However, the flexibility and convenience ... -
Role of livestock projects in empowering women smallholder farmers for sustainable food security in rural Kenya
(African Journal of Food, Agriculture, Nutrition and Development, 2009)Women are a major human resource and assure adequate nutrition, health and cognitive development of their households and children in their formative years. However, women are over-represented among the poor, suffer heavy ... -
Script acquisition: a crowdsourcing and text mining approach
(Saarländische Universitäts-und Landesbibliothek, 2020)According to Grice's (1975) theory of pragmatics, people tend to omit basic information when participating in a conversation (or writing a narrative) under the assumption that left out details are already known or can be ... -
Shortcomings of Ultrasonic Obstacle Detection for Vehicle Driver Assistance and Profiling
(Int. J. Inf. Technol. Comput. Sci, 2019)Obstacle detection is a challenging problem that has attracted much attention recently, especially in the context of research in self-driving car technologies. A number of obstacle detection technologies exist. Ultrasound ... -
Smart-bot Technology: Conversational Agents Role in Maternal Healthcare Support
(2019 IST-Africa Week Conference (IST-Africa), 2019)There is a need for a system that respond to various queries in real-time, to advice and inform expectant mothers during their pregnancy. Several smart services have been deployed, bundled with health information systems, ...