Search
Now showing items 1-10 of 11
CYBER THREATS AND CYBER SECURITY IN THE KENYAN BUSINESS CONTEXT
(GSJ, 2019-09)
Cyber security is basically the process of ensuring the safety of cyberspace from known and unknown threats. The
International Telecommunication Union states that cyber security is the collective application of strategies, ...
A Model for Code Restructuring, A Tool for Improving Systems Quality in Compliance with Object Oriented Coding Practice
(International Journal of Computer Science Issues (IJCSI), 2019)
A major goal of software restructuring is to preserve or increase
the value of a piece of software. Restructuring a system may
make it possible to add more features to the existing system or
make the software more ...
Detecting Everyday Scenarios in Narrative Texts
(Universitat des Saarlandes, 2019)
Script knowledge consists of detailed information on everyday activities. Such information
is often taken for granted in text and needs
to be inferred by readers. Therefore, script
knowledge is a central component to ...
A Domains Approach to Remote Access Logical Vulnerabilities Classification
(2019)
Remote access facilitates collaboration and the creation of a seamless work environment. This technology enables employees to access the latest versions of data and resources from different locations other than the ...
Shortcomings of Ultrasonic Obstacle Detection for Vehicle Driver Assistance and Profiling
(Int. J. Inf. Technol. Comput. Sci, 2019)
Obstacle detection is a challenging problem
that has attracted much attention recently, especially in the
context of research in self-driving car technologies. A
number of obstacle detection technologies exist.
Ultrasound ...
The Effects of Institutional Support Factors on Lecturer Adoption of eLearning at a Conventional University.
(Commonwealth of Learning. 4710 Kingsway Suite 2500, Burnaby, BC V5H 4M2 Canada, 2019)
Conventional Higher Education Institutions in Kenya are in the process of implementing
eLearning projects. These initiatives are, however, fraught with challenges. At the Maseno
University eCampus, an evaluation of ...
A Domains Approach to Remote Access Logical Vulnerabilities Classification
(MECS: http://www.mecspress.org/ijcnis/ijcnis-v11-n11/IJCNIS-V11-N11-5.pdf., 2019)
Remote access facilitates collaboration and the
creation of a seamless work environment. This
technology enables employees to access the latest
versions of data and resources from different locations
other than the ...
Towards Logically Progressive Dialog for Future TODS to Serve in Complex Domains
(International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019)
Complex domains demand task-oriented dialog system (TODS) to be able to reason and engage with humans in
dialog and in information retrieval. This may require contemporary dialog systems to have improved
conversation ...
Open Source ERP Adoption-Use and Organisational Performance of Deposit-Taking Saccos in Kenya
(International Journal of Information Technology, 2019)
The cost and benefits of an ERP system are arguably the reason why Deposit-Taking SACCOs are opting for adoption-use
of open source ERP in an effort to achieve organisation performance. Technology adoption is only important ...
Target Sentiment Analysis Model with Naïve Bayes and Support Vector Machine for Product Review Classification
(Int. J. Comput. Sci. Inf. Secur.(IJCSIS), 2019)
Sentiment analysis has demonstrated that the automation and computational recognition of sentiments is possible and
evolving with time, due to factors such as; emergence of new technological trends and the continued dynamic ...