Browsing Journal Articles (CI) by Title
Now showing items 26-45 of 106
-
Data Mining Model for Predicting Student Enrolment in STEM Courses in Higher Education Institutions
(2016-11-11)Educational data mining is the process of applying data mining tools and techniques to analyze data at educational institutions. In this paper, educational data mining was used to predict enrollment of students in Science, ... -
Data Preparation for Machine Learning Modelling
(2022)The world today is on revolution 4.0 which is data-driven. The majority of organizations and systems are using data to solve problems through use of digitized systems. Data lets intelligent systems and their applications ... -
Design and Implementation of Resilient Cooperative Bait Detection Technique to Curb Cooperative Black Hole Attacks in MANETs Using DSR Protocol
(Scientific & Academic Publishing, 2020-05)Mobile Ad-hoc networks (MANETs) are unique type of wireless networks that are infrastructureless and with no centralised management. Nodes in MANETs act as both routers and hosts. The nodes are free to join and leave the ... -
Detection of Visual Similarity Snooping Attacks in Emails using an Extended Client Based Technique
(2021-04)This paper provides an Extended Client Based Technique (ECBT) that performs classification on emails using the Bayessian classifier that attain in-depth defense by performing textual analysis on email messages and attachment ... -
Developing Hybrid-Based Recommender System with Naïve Bayes Optimization to Increase Prediction Efficiency
(2021-03)Commerce and entertainment world today have shifted to the digital platforms where customer preferences are suggested by recommender systems. Recommendations have been made using a variety of methods such as content-based, ... -
Development of Isolated Numeric Speech Corpus for Swahili Language for Development of Automatic Speech Recognition System
(2013-07)Speech corpus being the basic requirement for the development of Automatic speech recognition (ASR) system, it should be done with much accuracy in order to enhance the performance of the system. This paper describes the ... -
Discriminative spatial-temporal feature learning for modeling network intrusion detection systems
(Journal of Computer Security, 2023-02)Increasing interest and advancement of internet and communication technologies have made network security rise as a vibrant research domain. Network intrusion detection systems (NIDSs) have developed as indispensable defense ... -
An e-Readiness Assessment of ICT Integration in Public Primary Schools in Kenya Case of Nyeri County.
(2017)In primary schools, information and communication technologies (ICT) are widely seen as tools for enhancing learning. This expectation increases their rapid diffusion and adoption throughout developing countries. Despite ... -
An Effort Estimation Method for Service-Oriented Architecture
(2020-10-16)Determining size and effort of SOA systems is critical for managing SOA projects. As a consequence, a number of methods have been proposed to estimate effort of building SOA projects but the problem of estimating SOA ... -
An Enhanced Multiview Test Case Generation Technique for Object-oriented Software using Class and Activity Diagrams
(Blue Eyes Intelligence Engineering and Sciences Publication, 2020-11)Software testing is one of the vital steps in software development life cycle. Test case generation is the first process in software testing which takes a lot of time, cost and effort to build an effective product from the ... -
Evaluating Linear and Non-linear Dimensionality Reduction Approaches for Deep Learning-based Network Intrusion Detection Systems
(2023-08-08)Dimensionality reduction is an essential ingredient of machine learning modelling that seeks to improve the performance of such models by extracting better quality features from data while removing irrelevant and redundant ... -
An extended k-means cluster head selection algorithm for efficient energy consumption in wireless sensor networks
(International Journal of Network Security & Its Applications, 2023-05)Effective use of sensor nodes’ batteries in wireless sensor networks is critical since the batteries are difficult to recharge or replace. This is closely connected to the networks’ lifespan since once the battery is used ... -
An Extended Security Measurement Framework For Open-Source Enterprise Resource Planning Software Security
(International Journal of Network Security & Its Applications (IJNSA), 2022-09)Modern organizations are adopting new ways of measuring their level of security for compliance and justification of security investments. The highly interconnected environment has seen organizations generate lots of personal ... -
FACTORS AFFECTING CITIZEN READINESS FOR E-GOVERNMENT SYSTEMS IN KENYA
(2017-04)Electronic government (e-government) provides a common infrastructure and direction across the public sector. It enhances collaboration within and among public sector organizations between Government and the business ... -
Factors Affecting Requirements Elicitation for Heterogeneous Users of Information Systems
(2015)Modern organizations keep up with the fast changing technology through successful information systems development and integration to automate their business operations. Among others, this can be achieved through effective ... -
Factors Affecting Software Maintenance Cost of Python Programs
(2022)One of the primary areas of software project management is cost estimation. The cost estimation problem remains unsolved today because of the ineffective cost estimation techniques which are unsuitable for handling current ... -
Factors affecting sustainability of low priced computers for learning in Kenya
(2012)The debate on surging e-waste amounts in some African countries has seen the ban of importation of refurbished computers arguing that they are the main source of e-waste. The view that refurbished computers are bad contradicts ... -
Features of Resource Based View Theory: An Effective Strategy in Outsourcing
(International Journal of Management and Commerce Innovations, 2016)In Resource Based viewpoint theory (RBV), the resources possessed by a firm are the primary determinants of its performance. The resources may remain latent until the firm deploy its capabilities, with these may contribute ...