Browsing by Title
Now showing items 1078-1097 of 1192
-
Suitability of aggregation methods of induction motor models for transient stability load modeling of Kenya power transmission and distribution system
(2010)Current trend indicate that there has been increase on power outage frequency. This has partly been as a result of unstable power system with very small security margin of operation. Therefore, this paper focusses on the ... -
Suitability of aggregation methods of induction motor models for voltage stability analysis
(2012)This paper focusses on the aggregation of multiple induction motors (IM) connected in parallel on the same bus into a single equivalent model using aggregation based on transformer equivalent circuit (method 1) and on ... -
A Suite of Metrics for UML Behavioral Diagrams Based on Complexity Perspectives
(International Journal of Software Engineering & Applications, 2024-03)Nowadays, software designers have adopted modelling languages that help to communicate the dynamic behavior of UML behavioral diagrams. As it is with other software artefacts, these diagrams tend to get more complex ... -
Supplier’s Past Performance Criteria and its Effect on Procurement Performance in County Governments in Kenya
(2023-07-04)The major focus of the study is to investigate the supplier selection criteria and its effect on procurement performance in county governments. The specific objective was to examine the effect of supplier’s past performance ... -
A Support Vector Machine and Artificial Neural Network Model for Enhanced Image Classification of Maize Leaf Diseases
(2022-10)Image classification accuracy is the total number of images predicted correctly out of the total images in the test dataset in the field of computer vision. Classifying the images accurately is still a challenge due to ... -
A SURVEY OF CASCADING STYLE SHEETS COMPLEXITY METRICS
(2019-05)Cascading style sheets (CSS) is a Web-based style sheet language that is used for the presentation of Web documents. CSS has advanced from CSS1 to CSS3.and extensions to CSS known as CSS pre-processors have also emerged ... -
A SURVEY OF CHALLENGES FACED IN DATA MIGRATION BY COMPANIES QUOTED AT THE NAIROBI STOCK EXCHANGE
(2008)The study objective was to investigate the challenges faced in data migration by companies listed at Nairobi Stock Exchange (NSE). In order to achieve the objective, a survey design was used and data was collected using ... -
Survey of Cyber Security Frameworks
(2014)In a digital world, the national economy and welfare have grown critically dependent on the cyber infrastructure due to the capabilities and opportunities the Internet provides. This leaves organizations open to various ... -
A Survey of Deep Learning Solutions for Anomaly Detection in Surveillance Videos
(Asian Online Journals, 2021-10)Deep learning has proven to be a landmark computing approach to the computer vision domain. Hence, it has been widely applied to solve complex cognitive tasks like the detection of anomalies in surveillance videos. Anomaly ... -
A Survey of Security Protocols for Wireless Sensor Networks
(International Journal of Applied computer Science, 2017)There are numerous wireless sensor network (WSN) applications being developed day to day. These applications range from simple environmental monitoring such as collecting temperatures in an agricultural farm to complex ... -
Survey of sweet potato viruses in Western Kenya and detection of cucumber mosaic virus
(Journal of Plant Pathology, 2010)Sweet potato is an important food crop worldwide, but several pests and diseases limit its production. In eastern Africa, virus-induced diseases rank second to weevils in causing yield reduction. Symptomatic sweet potato ... -
A Survey of Topic Model Inference Techniques
(International Journal of Computer and Information Technology, 2018)— Latent Dirichlet Allocation (LDA) is a probabilistic topic model that aims at organizing, visualizing, summarizing, searching, predicting and understanding the content of any given text data. The model enables users ... -
A Survey on Cyber Crime Perpetration and Prevention: A Review and Model for CyberCrime prevention
(2012)Threats posed to organizations by cyber crimes have increased faster than potential victims or cyber security professionals can deal with them, placing targeted organizations at considerable risk. The growth of the ... -
Survival Analysis of Cancer Patients Using Weibull Parametric Model
(2019-05)Cancer incidence and mortality are rapidly growing worldwide. The reasons are complex but reflect both aging and growth of the population, as well as changes in the prevalence and distribution of the main risk factors for ... -
Surviving liberalization: the cooperative movement in Kenya
(2016)The Cooperative Facility for Africa (CoopAfrica) is a regional technical cooperation programme of the ILO contributing to the achievement of the Millennium Development Goals and the promotion of decent work in Africa by ... -
Sustainability of Livelihood Strategies of Riparian Communities in Murang’a County, Kenya.
(2021-06)Wetlands have played a key role in support of the riparian community’s livelihoods and development and have been the source of forest, wildlife, minerals, agriculture, recreation, water and energy. Murang’a County in Kenya, ... -
Sustainable Adaptation
(2022-07)Sustainable-adaptation is defined as adaptation measures and strategies aimed to reduce vulnerability and enhance resilience of an individual, society or system without compromising social justice and environmental integrity ... -
Sustainable Development in East Africa: Impact Evaluation of Regional Agricultural Development Projects in Burundi, Kenya, Rwanda, Tanzania, and Uganda
(Wiley, 2020-02)Investments in agricultural technologies, capacity building and policy harmonization are needed to support sustainable development across Africa. Regional development projects can facilitate the adoption of agricultural ... -
A Suvery of Biometric Authentication Technologies Towards Secure And Robust Systems: A Case Study of Mount Kenya University
(2022-03)In response to the increased demand for more effective authentication methods, the usage of biometric authentication to secure systems against unwanted access has grown. Because of the recent COVID-19 pandemic outbreak, ...