Browsing Journal Articles (CI) by Title
Now showing items 112-122 of 122
-
System Log Parameter Attributes for Predicting Software Failures: Systematic Literature Review
(International Journal of Advanced Trends in Computer Science and Engineering, 2025)The early prediction of software failure is important in the field of software engineering since it leads to the development of better quality software, along with a reduction in maintenance cost and effort. However, even ... -
A Systematic Literature Review of Meta-Learning Models for Classification Tasks
(International Journal of Computer Applications Technology and Research Volume 11–Issue 03, 56-65, 2022): Meta-learning is a field of learning that aims at addressing the challenges of conventional machine learning approaches such as learning from scratch for every new task. The main aim of this study was to do a systematic ... -
A systematic literature review on security indicators for open-source enterprise resource planning software
(2022-05)Open-source enterprise resource planning (ERP) software has become a preferred alternative for modern organizations due to its affordable cost, availability and ease of access. Open-source software allows access to ... -
Tackling Data Related Challenges in Healthcare Process Mining using Visual Analytics
(IJCAT, 2018-10)Data-science approaches such as Visual analytics tend to be process blind whereas process-science approaches such as process mining tend to be model-driven without considering the "evidence" hidden in the data. Use of ... -
Transaction Costs and Facilitating Conditions as Indicators of the Adoption of Mobile Money Services in Kenya
(2013)Kenya is depicted as one of the fastest growing mobile money ecosystem in the world. In addition to the traditional text and voice services, all mobile phone service providers in Kenya have incorporated mobile money as a ... -
Trust Attributes in Multi-Path Congestion Avoidance Techniques to Curb Wormhole Attacks in Wireless Sensor Networks
(Journal of Computer Networks,, 2024)Wireless sensor networks (WSNs) have become widespread in recent years due to their uses in healthcare, infrastructure monitoring, environmental sensing, tactical surveillance, and defense. However, their inherent ... -
Trust-Based Security Technique to Curb Cooperative Blackhole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3
(Global Journals, 2020-12)The advent of mobile technology led to the emergence of Mobile Ad-hoc networks (MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and ... -
Use of Concept Map Scaffolds to Promote Adaptive E-Learning in Web-Based System
(2016)Scaffolds are a good method of implementing self-regulated learning. Use of prior knowledge makes the learner to understand a topic better. Learner adaptation enables a learner to be presented with content that matches ... -
Using Feature Selection Methods to Discover Common Users’ Preferences for Online Recommender Systems
(2021-01)Recommender systems have taken over user’s choice to choose the items/services they want from online markets, where lots of merchandise is traded. Collaborative filtering-based recommender systems uses user opinions and ... -
Validating Complexity Metrics for Laravel Software
(International Journal of Software Engineering (IJSE),, 2025)The increasing complexity of Laravel software poses significant challenges to modifiability, necessitating the definition ofmetrics to assess and controlcomplexity. There exist metrics to measure Laravel complexity, ... -
Validating Structural Metrics for BPEL Process Models
(River Publishers, 2020-10-28)Business process models tend to get more and more complex with age, which hurts the ease with which designers can understand and modify them. Few metrics have been proposed to measure this complexity, and even fewer have ...