Browsing Journal Articles (CI) by Title
Now showing items 42-61 of 124
-
An English-Swahili Email Spam Detection Model for Improved Accuracy Using Convolutional Neural Networks
(Mesopotamian journal of Cybersecurity, 2025)E-mail has become an essential tool for digital communication, facilitating global networking and information exchange. However, spam emails, particularly those in multilingual contexts, pose a significant threat to ... -
An Enhanced Multiview Test Case Generation Technique for Object-oriented Software using Class and Activity Diagrams
(Blue Eyes Intelligence Engineering and Sciences Publication, 2020-11)Software testing is one of the vital steps in software development life cycle. Test case generation is the first process in software testing which takes a lot of time, cost and effort to build an effective product from the ... -
Enhancing Personalized Learning in Programming Education through Generative Artificial Intelligence Frameworks: A Systematic Literature Review
(International Journal of Advanced Trends in Computer Science and Engineering, 2025)Generative Artificial Intelligence (Gen AI) has revolutionized education by enabling personalized learning in computer programming, improving engagement and outcomes. Despite its potential, challenges like accuracy, ... -
Ensemble Feature Selection for Network Intrusion Detection: Combining Information Gain and Random Forest with Recursive Feature Elimination
(International Journal of Computer and Information Technology, 2024)Network intrusion detection systems (NIDS) are essential for protecting computer networks against cyberattacks. The selection of a nominal set of essential features that may adequately discriminate malicious traffic from ... -
Evaluating Linear and Non-linear Dimensionality Reduction Approaches for Deep Learning-based Network Intrusion Detection Systems
(2023-08-08)Dimensionality reduction is an essential ingredient of machine learning modelling that seeks to improve the performance of such models by extracting better quality features from data while removing irrelevant and redundant ... -
An extended k-means cluster head selection algorithm for efficient energy consumption in wireless sensor networks
(International Journal of Network Security & Its Applications, 2023-05)Effective use of sensor nodes’ batteries in wireless sensor networks is critical since the batteries are difficult to recharge or replace. This is closely connected to the networks’ lifespan since once the battery is used ... -
An Extended Security Measurement Framework For Open-Source Enterprise Resource Planning Software Security
(International Journal of Network Security & Its Applications (IJNSA), 2022-09)Modern organizations are adopting new ways of measuring their level of security for compliance and justification of security investments. The highly interconnected environment has seen organizations generate lots of personal ... -
FACTORS AFFECTING CITIZEN READINESS FOR E-GOVERNMENT SYSTEMS IN KENYA
(2017-04)Electronic government (e-government) provides a common infrastructure and direction across the public sector. It enhances collaboration within and among public sector organizations between Government and the business ... -
Factors Affecting Requirements Elicitation for Heterogeneous Users of Information Systems
(2015)Modern organizations keep up with the fast changing technology through successful information systems development and integration to automate their business operations. Among others, this can be achieved through effective ... -
Factors Affecting Software Maintenance Cost of Python Programs
(2022)One of the primary areas of software project management is cost estimation. The cost estimation problem remains unsolved today because of the ineffective cost estimation techniques which are unsuitable for handling current ... -
Factors affecting sustainability of low priced computers for learning in Kenya
(2012)The debate on surging e-waste amounts in some African countries has seen the ban of importation of refurbished computers arguing that they are the main source of e-waste. The view that refurbished computers are bad contradicts ... -
Feature Extraction using Histogram of Oriented Gradients for Image Classification in Maize Leaf Diseases
(International Journal of Computer and Information Technology, 2022)The paper presents feature extraction methods and classification algorithms used to classify maize leaf disease images. From maize disease images, features are extracted and passed to the machine learning classification ... -
Features of Resource Based View Theory: An Effective Strategy in Outsourcing
(International Journal of Management and Commerce Innovations, 2016)In Resource Based viewpoint theory (RBV), the resources possessed by a firm are the primary determinants of its performance. The resources may remain latent until the firm deploy its capabilities, with these may contribute ... -
A Framework for Analyzing UML Behavioral Metrics based on Complexity Perspectives
(International Journal of Software Engineering (IJSE), 2024)As software systems become more complex, software modeling is crucial. Software engineers are adopting UML behavioral diagrams to model the dynamic features of a system. These dynamic diagrams keep changing for further ... -
A Framework for E-Learning Implementation in Developing Countries: A Students' Perspective
(2012)Institutions of higher learning in developing countries have lagged behind those in the developed world in e-learning (eL) adoption, mainly due to cost and poor Internet infrastructure. Introduction of eL in such institutions ... -
A Framework for Verification in Contactless Secure Physical Access Control and Authentication Systems
(2022-02)Biometrics is one of the very popular techniques in user identification for accessing institutions and logging into attendance systems. Currently, some of the existing biometric techniques such as the use of fingerprints ... -
Impact of Managerial Interventions on Process in implementing Information Systems for Higher Education Institutions in a developing country
(African Journal of Computing and Information Systems, 2017)Organizational Implementation of Information Systems Innovations (OIISI) Framework was developed in the context of University in Kenya and can be used to understand the implementation of Information Systems (IS) Innovations ... -
Implementation of AI-based assistive technologies for learners with physical disabilities in Kenya: a practical design thinking approach
(African Journal of Science, Technology and Social Sciences (AJSTSS), 2022-06)Inclusion of Learners with disabilities continues to extensively rely on digital and Artificial Intelligence (AI) enabled Assistive Technologies (AT) as enablers for teaching and learning. However, the provision of ATs to ... -
Improving Student Enrollment Prediction Using Ensemble Classifiers
(2018)In the recent years, data mining has been utilized in education settings for extracting and manipulating data, and for establishing patterns in order to produce useful information for decision making. There is a growing ...