Browsing Journal Articles (CI) by Title
Now showing items 11-30 of 106
-
Blockchain as a Solution of Information Security and Data Privacy Issues: Review
(2022-08)The growth of technology has seen development of smart devices that are connected to each other giving rise to device-mesh technology. This has given rise to many owners of these devices sharing data through various web ... -
Challenges in achieving interoperability in distributed systems: a survey of literature
(2012)As need for collaboration and distributed systems among organizations increase, there is the challenge of different standards in almost all communication issues. This calls for scrutiny of systems used by different ... -
Cloud Data Privacy Preserving Model for Health Information Systems Based on Multi Factor Authentication
(2020-09)With cloud computing (CC) becoming popular in recent years, variety of institutions, organizations, businesses and individual users are creating interest. They are adopting the technology in order to take advantage of ... -
Cluster Head Selection Algorithms for Enhanced Energy Efficiency in Wireless Sensor Networks: A Systematic Literature Review
(2022-06)The extension of the sensor node's life span is an essential requirement in a Wireless Sensor Network. Cluster head selection algorithms undertake the task of cluster head election and rotation among nodes, and this has ... -
Comparative Analysis of Machine Learning Algorithms Accuracy for Maize Leaf Disease Identification
(2022-03)The number of data points predicted correctly out of the total data points is known as accuracy in image classification models. Assessment of the accuracy is very important since it compares the correct images to the ones ... -
Comparative Analysis on the Evaluation of the Complexity of C, C++, Java, PHP and Python Programming Languages based on Halstead Software Science
(International Journal of Computer and Information Technology, 2023-03)Quality plays center stage in any software development industry. Software metrics have proven over time as the best measure to be used to assess and assure the software developers of the quality of their products. Halstead ... -
A Comparative Study of Deep Learning and Transfer Learning in Detection of Diabetic Retinopathy
(2022)Computer vision has gained momentum in medical imaging tasks. Deep learning and Transfer learning are some of the approaches used in computer vision. The aim of this research was to do a comparative study of deep learning ... -
A Comparative Study of Transformer-based Models for Hate-Speech Detection in English-Kiswahili Code-Switched Social Media Text
(International Journal of Advanced Trends in Computer Science and Engineering, 2024)The transformer architecture, first introduced in 2017 by researchers at Google, has revolutionized natural language processing in various tasks, including text classification. This architecture formed the basis of future ... -
A Comparative Study of Transformer-based Models for Text Summarization of News Articles
(International Journal of Advanced Trends in Computer Science and Engineering, 2024-04)Transformer-based models such as GPT, T5, BART, and PEGASUS have made substantial progress in text summarization, a sub-domain of natural language processing that entails extracting important information from lengthy texts. ... -
Complexity Metrics for Measuring the Understandability and Maintainability of Business Process Models using Goal-Question-Metric (GQM)
(2008)Business Process Models (BPMs), often created using a modeling language such as UML activity diagrams, EventDriven Process Chains Markup Language (EPML) and Yet Another Workflow Language (YAWL), serve as a base for ... -
Complexity Metrics for Sassy Cascading Style Sheets
(2019-01)Many front-end web developers are nowadays increasingly using sassy cascading stylesheets (SCSS) instead of the regular cascading style sheets (CSS). Despite its increased demand, SCSS has inherent complexity which arises ... -
Complexity Metrics for Statechart Diagrams
(2022-05)Model-Driven Development and the Model-Driven Architecture paradigm have in the recent past been emphasizing on the importance of good models. In the Object-Oriented paradigm one of the key artefacts are the Statechart ... -
Computer Laptop Project Strategy for Basic Education Schools in Kenya
(IJICT Journals, 2017-05)Kenya’s Vision 2030 recognizes the enabling role of Information and Communication Technology (ICT) and anchors some of its key aspirations upon the availability and adoption of computers for schools. The overall objective ... -
Curriculum Content Relevancy in Integration of ICTs in Kenya TVET Institutions in Readiness to Industry Needs
(International Journal of Secondary Education, 2017)The development of curricula content and their implementation is one of the key competences of instructors in the area of educational planning and practical training for Technical and Vocational Education and Training ... -
Data Mining Model for Predicting Student Enrolment in STEM Courses in Higher Education Institutions
(2016-11-11)Educational data mining is the process of applying data mining tools and techniques to analyze data at educational institutions. In this paper, educational data mining was used to predict enrollment of students in Science, ... -
Data Preparation for Machine Learning Modelling
(2022)The world today is on revolution 4.0 which is data-driven. The majority of organizations and systems are using data to solve problems through use of digitized systems. Data lets intelligent systems and their applications ... -
Design and Implementation of Resilient Cooperative Bait Detection Technique to Curb Cooperative Black Hole Attacks in MANETs Using DSR Protocol
(Scientific & Academic Publishing, 2020-05)Mobile Ad-hoc networks (MANETs) are unique type of wireless networks that are infrastructureless and with no centralised management. Nodes in MANETs act as both routers and hosts. The nodes are free to join and leave the ... -
Detection of Visual Similarity Snooping Attacks in Emails using an Extended Client Based Technique
(2021-04)This paper provides an Extended Client Based Technique (ECBT) that performs classification on emails using the Bayessian classifier that attain in-depth defense by performing textual analysis on email messages and attachment ...