Browsing Journal Articles (CI) by Title
Now showing items 68-87 of 118
-
Machine Learning Load Balancing Techniques in Cloud Computing: A Review
(2022-06)Load balancing (LB) is the process of distributing the workload fairly across the servers within the cloud environment or within distributed computing resources. Workload includes processor load, network traffic and storage ... -
Metrics For Evaluating Alerts in Intrusion Detection Systems
(2023-01)Network intrusions compromise the network’s confidentiality, integrity and availability of resources. Intrusion detection systems (IDSs) have been implemented to prevent the problem. Although IDS technologies are promising, ... -
A Metrics-Based Fuzzy Logic Model for Predicting the Reusability of Object-Oriented Software
(Blue Eyes Intelligence Engineering and Sciences Publication, 2020-08)Software reusability facilitates the engineering of new software or systems functionalities without having to start coding from scratch. This software quality provides numerous merits to the software developers including ... -
A Metrics-Based Model for Estimating the Maintenance Effort of Python Software
(2023-05)Software project management includes a substantial area for estimating software maintenance effort. Estimation of software maintenance effort improves the overall performance and efficiency of software. The Constructive ... -
MOBILE-ASSISTED INSTRUCTIONAL FOR DOMESTIC MAID (MAID-M)
(2014)Statistics from Immigration Department of Malaysia has shown that the foreign workers have increased tremendously over the past 4 years. Different nationalities of foreign maids usually speak in their own mother languages ... -
A Model for Face Recognition using EigenFace Algorithm
(International Journal of Formal Sciences: Current and Future Research Trends, 2023)The use of a computer to recognize a person by the means of their face is what is known as face recognition in artificial intelligence. The term biometrics is an umbrella term that includes face recognition as well as ... -
Multi-Agent Systems Requirements Analysis for Patient-centered Healthcare Consultancy Service
(International Journal of Advanced Research in Computer Science, 2023-10)Agents are currently being discussed in nearly every domain of science and engineering. Through the utilization of IoT and agent-based systems, remote consultations and virtual doctors can provide essential healthcare ... -
Multi-task Deep Learning in Medical Image Processing: A Systematic Review
(International Journal of Computing Sciences Research, 2025-01)Purpose — Multi-task learning (MTL) is a deep learning approach that aims to jointly learn two or more tasks with the goal of leveraging shared knowledge among the tasks. This study aimed to review existing MTL models in ... -
Network Intrusion Detection Systems: A Systematic Literature Review of Hybrid Deep Learning Approaches
(2022-06)Network Intrusion Detection Systems (NIDSs) have become standard security solutions that endeavours to discover unauthorized access to an organizational computer network by scrutinizing incoming and outgoing network traffic ... -
A New Complexity Metric for UML Sequence Diagrams
(2023-01)Object-Oriented Programming (OOP) has been promoted as a way to produce high-quality software while increasing developer productivity through code reuse. Software systems and underlying designs get more extensive and more ... -
A Novel Alert Correlation Technique for Filtering Network Attacks
(International Journal of Network Security & Its Applications, 2023-05)An alert correlation is a high-level alert evaluation technique for managing large volumes of irrelevant and redundant intrusion alerts raised by Intrusion Detection Systems (IDSs).Recent trends show that pure intrusion ... -
Optimized Trust-Based DSR Protocol to Curb Cooperative Blackhole Attacks in MANETs Using NS-3
(Scientific & Academic Publishing, 2020-05)MANETs Communication relies on special routing protocols that make security a challenging endeavor. MANETs are open to a range of active and passive attacks; black hole attack is an active attack affects the network layer. ... -
Organizational Implementation of Information Systems Innovations (OIISI) Framework was developed in the context of Universities in Kenya
(2016)Organizational Implementation of Information Systems Innovations (OIISI) Framework was developed in the context of Universities in Kenya and can be used to understand the implementation of Information Systems (IS) Innovations ... -
THE PEDAGOGICAL READINESS OF INSTRUCTORS TOWARDS ACHIEVING INTEGRATION OF ICTS IN TVET INSTITUTIONS IN KENYA
(2015)This paper points to the necessity to conduct research on the pedagogical readiness of instructors towards achieving integration of ICT’s in Technical and Vocational Education and Training (TVET) institutions in ... -
A Probabilistic Data Encryption scheme (PDES)
(2013)In this paper the author presents a probabilistic encryption scheme that is polynomially secure and has the efficiency of deterministic schemes. From the theoretical construction of Brands and Gill (1996), it is clear ... -
Production Management Procedures and the Growth of Jua Kali enterprises in Kenya
(2020-06)The Micro and Small Enterprises play an important role in the economic development of most countries globally despite their level of development. The sector act as vehicle for low-income people to escape poverty through ... -
Provision of digital reference services in academic libraries in Kenya: a review
(Regional Journal of Information and Knowledge Management, 2016)Rationale of the study - The popularity of internet as an avenue of communication and source of information has led to decreasing numbers of in-person reference transaction in academic libraries. Consequently, academic ... -
Quadratic Approach for Fast Topic Selection in Modelling Big Text Analytics
(International Journal of Advancements in Computing Technology, 2018)One challenging issue in application of Latent Dirichlet Allocation (LDA) is to select the optimal number of topics which must depend on both the corpus itself and user modeling goals. This paper presents a topic selection ... -
Quick Response Code Security Attacks and Countermeasures: A Systematic Literature Review
(Journal of Cyber Security, 2025)A quick response code is a barcode that allows users to instantly access information via a digital device. Quick response codes store data as pixels in a square-shaped grid. QR codes are prone to cyber-attacks. This ... -
A Reinforcement Learning-Based Multi-Agent System for Advanced Network Attack Prediction
(International Journal of Scientific Research in Computer Science and Engineering, 2024)This paper addresses the challenges of traditional Network Intrusion Detection Systems (NIDS) in handling the increasing complexity and volume of modern cyberattacks. The authors suggest a novel multi-agent deep reinforcement ...