Search
Now showing items 21-30 of 44
A Review of Agile Software Effort Estimation Methods
(2016)
Software cost estimation is an essential aspect of software project management and therefore the success or failure of a software project depends on accuracy in estimating effort, time and cost. Software cost estimation ...
A Survey on Cyber Crime Perpetration and Prevention: A Review and Model for CyberCrime prevention
(2012)
Threats posed to organizations by cyber crimes have increased faster than potential victims or cyber
security professionals can deal with them, placing targeted organizations at considerable risk. The
growth of the ...
Tackling Data Related Challenges in Healthcare Process Mining using Visual Analytics
(IJCAT, 2018-10)
Data-science approaches such as Visual analytics tend to be process blind whereas process-science approaches such as process mining tend to be model-driven without considering the "evidence" hidden in the data. Use of ...
Interface Features, Program Complexity and Memorability as Indicators of Learnability of Mobile Social Software
(2017-10)
Social Computing aims to support the tendency of humans to interact with mobile devices. Technology reinforces this interaction by producing appropriate responses that then lead to improved communication between humans and ...
A Literature Survey of Cognitive Complexity Metrics for Statechart Diagrams
(2019-07)
Statechart diagrams have inherent complexity which keeps increasing every time the diagrams are modified. This complexity poses problems in comprehending statechart diagrams. The study of cognitive complexity has over the ...
FACTORS AFFECTING CITIZEN READINESS FOR E-GOVERNMENT SYSTEMS IN KENYA
(2017-04)
Electronic government (e-government) provides a common infrastructure and direction across the public sector. It enhances collaboration within and among public sector organizations between Government and the business ...
ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION
(2013)
There various algorithms that can factor large integers but very few of these algorithms run in polynomial time. This fact makes them inefficient. The apparent difficulty of factoring large integers is the basis of some ...
A Review of Security Techniques against Black Hole Attacks in Mobile Ad hoc Networks
(IEEE, 2019-05)
Mobile ad hoc network (MANET) is a special type of a wireless network formed by nodes that communicate without any fixed infrastructure or centralised management. Nodes in MANET act as a router and a host. These nodes are ...
Effective Use of Assistive Technologies for Inclusive Education in County Governments: Issues and Challenges from Two Case Studies
(2018-11)
County governments face innumerable impediments in the process of implementation of inclusive education (IE). Effective use of Assistive Technologies (AT) can help county governments in Kenya achieve inclusive education ...