Search
Now showing items 41-50 of 73
A Literature Survey of Cognitive Complexity Metrics for Statechart Diagrams
(2019-07)
Statechart diagrams have inherent complexity which keeps increasing every time the diagrams are modified. This complexity poses problems in comprehending statechart diagrams. The study of cognitive complexity has over the ...
FACTORS AFFECTING CITIZEN READINESS FOR E-GOVERNMENT SYSTEMS IN KENYA
(2017-04)
Electronic government (e-government) provides a common infrastructure and direction across the public sector. It enhances collaboration within and among public sector organizations between Government and the business ...
ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION
(2013)
There various algorithms that can factor large integers but very few of these algorithms run in polynomial time. This fact makes them inefficient. The apparent difficulty of factoring large integers is the basis of some ...
A Review of Security Techniques against Black Hole Attacks in Mobile Ad hoc Networks
(IEEE, 2019-05)
Mobile ad hoc network (MANET) is a special type of a wireless network formed by nodes that communicate without any fixed infrastructure or centralised management. Nodes in MANET act as a router and a host. These nodes are ...
Trust-Based Security Technique to Curb Cooperative Blackhole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3
(Global Journals, 2020-12)
The advent of mobile technology led to the emergence of Mobile Ad-hoc networks
(MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and ...
Effective Use of Assistive Technologies for Inclusive Education in County Governments: Issues and Challenges from Two Case Studies
(2018-11)
County governments face innumerable impediments in the process of implementation of inclusive education (IE). Effective use of Assistive Technologies (AT) can help county governments in Kenya achieve inclusive education ...
Cloud Data Privacy Preserving Model for Health Information Systems Based on Multi Factor Authentication
(2020-09)
With cloud computing (CC) becoming popular in recent years, variety of institutions, organizations, businesses and individual users are creating interest. They are adopting the technology in order to take advantage of ...
Interoperability of ERP Software
(IGI Global, 2019)
Even though most organizations are using enterprise resource planning applications, very few people understand the underlying interoperability nature within them. Interoperability is the ability of systems to provide ...
E-Voting Challenges in Kenya
(2016-06)
Many developing countries have had disastrous presidential elections in recent years. In most of these cases, it was alleged that manual voting and vote-tallying took too long to produce the winning candidate, leading to ...
Complexity Metrics for Measuring the Understandability and Maintainability of Business Process Models using Goal-Question-Metric (GQM)
(2008)
Business Process Models (BPMs), often created using a modeling language such as UML activity diagrams, EventDriven Process Chains Markup Language (EPML) and Yet Another Workflow Language (YAWL), serve as a base for ...