Search
Now showing items 1-10 of 15
CYBER THREATS AND CYBER SECURITY IN THE KENYAN BUSINESS CONTEXT
(GSJ, 2019-09)
Cyber security is basically the process of ensuring the safety of cyberspace from known and unknown threats. The
International Telecommunication Union states that cyber security is the collective application of strategies, ...
An analysis of the effect of performance contracting on supply chain performance of public universities in Kenya
(The Strategic Journal of Business & Change Management, 2019)
Kenya Government has been implementing performance contracting in the public sector agencies with an overall goal of improve service delivery to the public. This is a performance improvement tool that assists in setting ...
Checkpointing as a Counter to Security Issues in Cloud Computing Infrastructure
(2019 IEEE AFRICON, 2019)
The world is experiencing a paradigm shift towards intelligent agents in form of machine learning for modeling any given task or process. Human vehicle drivers are agents that operate under stochastic environments, full ...
Smart-bot Technology: Conversational Agents Role in Maternal Healthcare Support
(2019 IST-Africa Week Conference (IST-Africa), 2019)
There is a need for a system that respond to various queries in real-time, to advice and inform expectant mothers during their pregnancy. Several smart services have been deployed, bundled with health information systems, ...
A Model for Code Restructuring, A Tool for Improving Systems Quality in Compliance with Object Oriented Coding Practice
(International Journal of Computer Science Issues (IJCSI), 2019)
A major goal of software restructuring is to preserve or increase
the value of a piece of software. Restructuring a system may
make it possible to add more features to the existing system or
make the software more ...
Detecting Everyday Scenarios in Narrative Texts
(Universitat des Saarlandes, 2019)
Script knowledge consists of detailed information on everyday activities. Such information
is often taken for granted in text and needs
to be inferred by readers. Therefore, script
knowledge is a central component to ...
A Domains Approach to Remote Access Logical Vulnerabilities Classification
(2019)
Remote access facilitates collaboration and the creation of a seamless work environment. This technology enables employees to access the latest versions of data and resources from different locations other than the ...
Shortcomings of Ultrasonic Obstacle Detection for Vehicle Driver Assistance and Profiling
(Int. J. Inf. Technol. Comput. Sci, 2019)
Obstacle detection is a challenging problem
that has attracted much attention recently, especially in the
context of research in self-driving car technologies. A
number of obstacle detection technologies exist.
Ultrasound ...
The Effects of Institutional Support Factors on Lecturer Adoption of eLearning at a Conventional University.
(Commonwealth of Learning. 4710 Kingsway Suite 2500, Burnaby, BC V5H 4M2 Canada, 2019)
Conventional Higher Education Institutions in Kenya are in the process of implementing
eLearning projects. These initiatives are, however, fraught with challenges. At the Maseno
University eCampus, an evaluation of ...
A Domains Approach to Remote Access Logical Vulnerabilities Classification
(MECS: http://www.mecspress.org/ijcnis/ijcnis-v11-n11/IJCNIS-V11-N11-5.pdf., 2019)
Remote access facilitates collaboration and the
creation of a seamless work environment. This
technology enables employees to access the latest
versions of data and resources from different locations
other than the ...