Now showing items 21-40 of 57

    • Addressing Node Failures Using Node Management & Cluster Management Techniques in Cloud Computing 

      Msagha J Mbogholi, Henry O Okoyo, Okoth Sylvester J McOyowo (IJCSMC, 2018)
      Cloud computing has been the rave of users globally over the past few years. This has mainly been because of the many different services available in the cloud that has made it the technology of choice for many users. ...
    • A Content Based Image Retrieval Model for E-Commerce 

      Gibson Kimutai, Wilson Cheruiyot, Calvins Otieno (International Journal of Engineering and Computer Science, 2018)
      In the last decade, large database of images have grown rapidly. This trend is expected to continue in to the future. Retrieval and querying of these image in efficient way is a challenge in order to access the visual content ...
    • Managing Configuration Errors in Cloud Computing Using Cluster & Node Management Techniques 

      Msagha J Mbogholi, Henry O Okoyo, Okoth Sylvester J McOyowo (IJCSMC, 2018)
      Cloud computing has been the technology of choice for most users globally due to the numerous advantages that it offers. This technology is offered to users with different levels of expertise who utilize the different ...
    • A Framework for secure mobile cloud computing in effective electronic learning 

      Laureen Akumu Ndeda, Solomon O Ogara, Silvance O Abeka (International Journal of Innovative Research and Advanced Studies, 2018)
      In the last few years, most universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing concept ...
    • Techniques to Control Memory Hogging by Web browsers: An in-depth review 

      Kamau Harun, McOyowo Sylivester (https:// www.ijcat.com, 2018)
      The Web Browser is to date a popular piece of software in modern computing systems. They are the main interface for vast information access from the Internet. Browsers technologies have advanced to a stage where they do ...
    • Driver Behaviour Profiling Using Dynamic Bayesian Network 

      James I. Obuhuma, Henry O. Okoyo and Sylvester O. McOyowo (Modern Education and Computer Science, 2018)
      In the recent past, there has been a rapid increase in the number of vehicles and diversification of road networks worldwide. The biggest challenge now lies on how to monitor and analyse behaviours of vehicle drivers ...
    • MAS Architectural Model for Dialog Systems with Advancing Conversations 

      K Mugoye, H Okoyo, S McOyowo (International Journal of Scientific Research, 2018-11)
      Recent handcrafts on dialog manager in task-oriented dialog systems (TODS) offer great promises on handling conversations. However, most tend to be shortsighted in handling advancing conversations. Modelling the future ...
    • An analysis of the effect of performance contracting on supply chain performance of public universities in Kenya 

      SJO Owuor, MN Oginda, J Obura (The Strategic Journal of Business & Change Management, 2019)
      Kenya Government has been implementing performance contracting in the public sector agencies with an overall goal of improve service delivery to the public. This is a performance improvement tool that assists in setting ...
    • Checkpointing as a Counter to Security Issues in Cloud Computing Infrastructure 

      James Imende Obuhuma; Henry Okora Okoyo; Sylvester Okoth McOyowo (2019 IEEE AFRICON, 2019)
      The world is experiencing a paradigm shift towards intelligent agents in form of machine learning for modeling any given task or process. Human vehicle drivers are agents that operate under stochastic environments, full ...
    • Smart-bot Technology: Conversational Agents Role in Maternal Healthcare Support 

      Kevin Mugoye; Henry Okoyo; Sylvester Mcoyowo (2019 IST-Africa Week Conference (IST-Africa), 2019)
      There is a need for a system that respond to various queries in real-time, to advice and inform expectant mothers during their pregnancy. Several smart services have been deployed, bundled with health information systems, ...
    • A Model for Code Restructuring, A Tool for Improving Systems Quality in Compliance with Object Oriented Coding Practice 

      Moses Kibet Yegon Ngetich, Calvins Otieno, Michael Kimwele (International Journal of Computer Science Issues (IJCSI), 2019)
      A major goal of software restructuring is to preserve or increase the value of a piece of software. Restructuring a system may make it possible to add more features to the existing system or make the software more ...
    • Detecting Everyday Scenarios in Narrative Texts 

      Lilian D.A. Wanzare, Michael Roth, Manfred Pinkal (Universitat des Saarlandes, 2019)
      Script knowledge consists of detailed information on everyday activities. Such information is often taken for granted in text and needs to be inferred by readers. Therefore, script knowledge is a central component to ...
    • A Domains Approach to Remote Access Logical Vulnerabilities Classification 

      S. Ndichu, S. McOyowo, H Okoyo, C. Wekesa (2019)
      Remote access facilitates collaboration and the creation of a seamless work environment. This technology enables employees to access the latest versions of data and resources from different locations other than the ...
    • Shortcomings of Ultrasonic Obstacle Detection for Vehicle Driver Assistance and Profiling 

      J.I. Obuhuma, H.O Okoyo, S.O. McOyowo (Int. J. Inf. Technol. Comput. Sci, 2019)
      Obstacle detection is a challenging problem that has attracted much attention recently, especially in the context of research in self-driving car technologies. A number of obstacle detection technologies exist. Ultrasound ...
    • The Effects of Institutional Support Factors on Lecturer Adoption of eLearning at a Conventional University. 

      Barbara Khavugwi Makhaya, Betty Obura Ogange (Commonwealth of Learning. 4710 Kingsway Suite 2500, Burnaby, BC V5H 4M2 Canada, 2019)
      Conventional Higher Education Institutions in Kenya are in the process of implementing eLearning projects. These initiatives are, however, fraught with challenges. At the Maseno University eCampus, an evaluation of ...
    • A Domains Approach to Remote Access Logical Vulnerabilities Classification 

      S. Ndichu, S. McOyowo, H Okoyo, C. Wekesa (MECS: http://www.mecspress.org/ijcnis/ijcnis-v11-n11/IJCNIS-V11-N11-5.pdf., 2019)
      Remote access facilitates collaboration and the creation of a seamless work environment. This technology enables employees to access the latest versions of data and resources from different locations other than the ...
    • Towards Logically Progressive Dialog for Future TODS to Serve in Complex Domains 

      K. Mugoye*, Dr. H. O. Okoyo, Dr. S. O. Mc Oyowo (International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019)
      Complex domains demand task-oriented dialog system (TODS) to be able to reason and engage with humans in dialog and in information retrieval. This may require contemporary dialog systems to have improved conversation ...
    • Open Source ERP Adoption-Use and Organisational Performance of Deposit-Taking Saccos in Kenya 

      James M Reuben, Johnmark Obura, Moses Oginda (International Journal of Information Technology, 2019)
      The cost and benefits of an ERP system are arguably the reason why Deposit-Taking SACCOs are opting for adoption-use of open source ERP in an effort to achieve organisation performance. Technology adoption is only important ...
    • Target Sentiment Analysis Model with Naïve Bayes and Support Vector Machine for Product Review Classification 

      Rhoda Viviane A Ogutu, Richard Rimiru, Calvins Otieno (Int. J. Comput. Sci. Inf. Secur.(IJCSIS), 2019)
      Sentiment analysis has demonstrated that the automation and computational recognition of sentiments is possible and evolving with time, due to factors such as; emergence of new technological trends and the continued dynamic ...
    • An Enhanced Browser Reference Model 

      Harun kamau, McOyowo Sylivester, Okoyo Henry (https://www.ijcat.com, 2019)
      Browsers are prime software applications in modern computing devices. They are essential in accessing internet rich content. Access to these contents pose a high memory demand on the host device thus affecting the user ...