Search
Now showing items 31-40 of 56
Tackling Data Related Challenges in Healthcare Process Mining using Visual Analytics
(IJCAT, 2018-10)
Data-science approaches such as Visual analytics tend to be process blind whereas process-science approaches such as process mining tend to be model-driven without considering the "evidence" hidden in the data. Use of ...
Interface Features, Program Complexity and Memorability as Indicators of Learnability of Mobile Social Software
(2017-10)
Social Computing aims to support the tendency of humans to interact with mobile devices. Technology reinforces this interaction by producing appropriate responses that then lead to improved communication between humans and ...
A Literature Survey of Cognitive Complexity Metrics for Statechart Diagrams
(2019-07)
Statechart diagrams have inherent complexity which keeps increasing every time the diagrams are modified. This complexity poses problems in comprehending statechart diagrams. The study of cognitive complexity has over the ...
FACTORS AFFECTING CITIZEN READINESS FOR E-GOVERNMENT SYSTEMS IN KENYA
(2017-04)
Electronic government (e-government) provides a common infrastructure and direction across the public sector. It enhances collaboration within and among public sector organizations between Government and the business ...
ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION
(2013)
There various algorithms that can factor large integers but very few of these algorithms run in polynomial time. This fact makes them inefficient. The apparent difficulty of factoring large integers is the basis of some ...
A Review of Security Techniques against Black Hole Attacks in Mobile Ad hoc Networks
(IEEE, 2019-05)
Mobile ad hoc network (MANET) is a special type of a wireless network formed by nodes that communicate without any fixed infrastructure or centralised management. Nodes in MANET act as a router and a host. These nodes are ...
Trust-Based Security Technique to Curb Cooperative Blackhole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3
(Global Journals, 2020-12)
The advent of mobile technology led to the emergence of Mobile Ad-hoc networks
(MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and ...
Effective Use of Assistive Technologies for Inclusive Education in County Governments: Issues and Challenges from Two Case Studies
(2018-11)
County governments face innumerable impediments in the process of implementation of inclusive education (IE). Effective use of Assistive Technologies (AT) can help county governments in Kenya achieve inclusive education ...
Cloud Data Privacy Preserving Model for Health Information Systems Based on Multi Factor Authentication
(2020-09)
With cloud computing (CC) becoming popular in recent years, variety of institutions, organizations, businesses and individual users are creating interest. They are adopting the technology in order to take advantage of ...