Browsing Journal Articles (CI) by Title
Now showing items 63-82 of 118
-
An Investigation into Customers' Requirements for Electronic Banking: A Case Study of Microfinance Institutions (MFIs) in Keny
(2017)There is a general consensus that governments, businesses and all individuals need to harness the power of Information and Communication Technology (ICT) and ICT enabled services for wider access and improved welfare ... -
AN INVESTIGATION INTO THE APPLICABILITY OF GREEN IT CONCEPTS INTO GREEN IS
(IJAIEM, 2014-12)In the last five years, research on the role of IT in managing the environment has been accelerated by Information Technology (IT) practitioners such as Google, IBM and Microsoft as well as by the academic community. ... -
Kenya Towards Mobile Virtue Network Operator: Opportunities and Challenges
(Management Science and Information Technology, 2016)This paper points to the necessity to conduct research on Kenya towards Mobile Virtue Network Operator in regard to Opportunities and challenges. The telecommunication and financial business model is shifting away from ... -
A Literature Survey of Cognitive Complexity Metrics for Statechart Diagrams
(2019-07)Statechart diagrams have inherent complexity which keeps increasing every time the diagrams are modified. This complexity poses problems in comprehending statechart diagrams. The study of cognitive complexity has over the ... -
A Literature Survey of Visual Similarity Snooping Attacks in Emails
(2020-08)Snooping is one of the biggest issues that the cyber security industry is facing in this modern era of technology and it leads to big losses of finances both for individuals and organizations. The detection of snooping ... -
Machine Learning Load Balancing Techniques in Cloud Computing: A Review
(2022-06)Load balancing (LB) is the process of distributing the workload fairly across the servers within the cloud environment or within distributed computing resources. Workload includes processor load, network traffic and storage ... -
Metrics For Evaluating Alerts in Intrusion Detection Systems
(2023-01)Network intrusions compromise the network’s confidentiality, integrity and availability of resources. Intrusion detection systems (IDSs) have been implemented to prevent the problem. Although IDS technologies are promising, ... -
A Metrics-Based Fuzzy Logic Model for Predicting the Reusability of Object-Oriented Software
(Blue Eyes Intelligence Engineering and Sciences Publication, 2020-08)Software reusability facilitates the engineering of new software or systems functionalities without having to start coding from scratch. This software quality provides numerous merits to the software developers including ... -
A Metrics-Based Model for Estimating the Maintenance Effort of Python Software
(2023-05)Software project management includes a substantial area for estimating software maintenance effort. Estimation of software maintenance effort improves the overall performance and efficiency of software. The Constructive ... -
MOBILE-ASSISTED INSTRUCTIONAL FOR DOMESTIC MAID (MAID-M)
(2014)Statistics from Immigration Department of Malaysia has shown that the foreign workers have increased tremendously over the past 4 years. Different nationalities of foreign maids usually speak in their own mother languages ... -
A Model for Face Recognition using EigenFace Algorithm
(International Journal of Formal Sciences: Current and Future Research Trends, 2023)The use of a computer to recognize a person by the means of their face is what is known as face recognition in artificial intelligence. The term biometrics is an umbrella term that includes face recognition as well as ... -
Multi-Agent Systems Requirements Analysis for Patient-centered Healthcare Consultancy Service
(International Journal of Advanced Research in Computer Science, 2023-10)Agents are currently being discussed in nearly every domain of science and engineering. Through the utilization of IoT and agent-based systems, remote consultations and virtual doctors can provide essential healthcare ... -
Multi-task Deep Learning in Medical Image Processing: A Systematic Review
(International Journal of Computing Sciences Research, 2025-01)Purpose — Multi-task learning (MTL) is a deep learning approach that aims to jointly learn two or more tasks with the goal of leveraging shared knowledge among the tasks. This study aimed to review existing MTL models in ... -
Network Intrusion Detection Systems: A Systematic Literature Review of Hybrid Deep Learning Approaches
(2022-06)Network Intrusion Detection Systems (NIDSs) have become standard security solutions that endeavours to discover unauthorized access to an organizational computer network by scrutinizing incoming and outgoing network traffic ... -
A New Complexity Metric for UML Sequence Diagrams
(2023-01)Object-Oriented Programming (OOP) has been promoted as a way to produce high-quality software while increasing developer productivity through code reuse. Software systems and underlying designs get more extensive and more ... -
A Novel Alert Correlation Technique for Filtering Network Attacks
(International Journal of Network Security & Its Applications, 2023-05)An alert correlation is a high-level alert evaluation technique for managing large volumes of irrelevant and redundant intrusion alerts raised by Intrusion Detection Systems (IDSs).Recent trends show that pure intrusion ... -
Optimized Trust-Based DSR Protocol to Curb Cooperative Blackhole Attacks in MANETs Using NS-3
(Scientific & Academic Publishing, 2020-05)MANETs Communication relies on special routing protocols that make security a challenging endeavor. MANETs are open to a range of active and passive attacks; black hole attack is an active attack affects the network layer. ... -
Organizational Implementation of Information Systems Innovations (OIISI) Framework was developed in the context of Universities in Kenya
(2016)Organizational Implementation of Information Systems Innovations (OIISI) Framework was developed in the context of Universities in Kenya and can be used to understand the implementation of Information Systems (IS) Innovations ... -
THE PEDAGOGICAL READINESS OF INSTRUCTORS TOWARDS ACHIEVING INTEGRATION OF ICTS IN TVET INSTITUTIONS IN KENYA
(2015)This paper points to the necessity to conduct research on the pedagogical readiness of instructors towards achieving integration of ICT’s in Technical and Vocational Education and Training (TVET) institutions in ... -
A Probabilistic Data Encryption scheme (PDES)
(2013)In this paper the author presents a probabilistic encryption scheme that is polynomially secure and has the efficiency of deterministic schemes. From the theoretical construction of Brands and Gill (1996), it is clear ...