Browsing Journal Articles (CI) by Title
Now showing items 72-91 of 118
-
MOBILE-ASSISTED INSTRUCTIONAL FOR DOMESTIC MAID (MAID-M)
(2014)Statistics from Immigration Department of Malaysia has shown that the foreign workers have increased tremendously over the past 4 years. Different nationalities of foreign maids usually speak in their own mother languages ... -
A Model for Face Recognition using EigenFace Algorithm
(International Journal of Formal Sciences: Current and Future Research Trends, 2023)The use of a computer to recognize a person by the means of their face is what is known as face recognition in artificial intelligence. The term biometrics is an umbrella term that includes face recognition as well as ... -
Multi-Agent Systems Requirements Analysis for Patient-centered Healthcare Consultancy Service
(International Journal of Advanced Research in Computer Science, 2023-10)Agents are currently being discussed in nearly every domain of science and engineering. Through the utilization of IoT and agent-based systems, remote consultations and virtual doctors can provide essential healthcare ... -
Multi-task Deep Learning in Medical Image Processing: A Systematic Review
(International Journal of Computing Sciences Research, 2025-01)Purpose — Multi-task learning (MTL) is a deep learning approach that aims to jointly learn two or more tasks with the goal of leveraging shared knowledge among the tasks. This study aimed to review existing MTL models in ... -
Network Intrusion Detection Systems: A Systematic Literature Review of Hybrid Deep Learning Approaches
(2022-06)Network Intrusion Detection Systems (NIDSs) have become standard security solutions that endeavours to discover unauthorized access to an organizational computer network by scrutinizing incoming and outgoing network traffic ... -
A New Complexity Metric for UML Sequence Diagrams
(2023-01)Object-Oriented Programming (OOP) has been promoted as a way to produce high-quality software while increasing developer productivity through code reuse. Software systems and underlying designs get more extensive and more ... -
A Novel Alert Correlation Technique for Filtering Network Attacks
(International Journal of Network Security & Its Applications, 2023-05)An alert correlation is a high-level alert evaluation technique for managing large volumes of irrelevant and redundant intrusion alerts raised by Intrusion Detection Systems (IDSs).Recent trends show that pure intrusion ... -
Optimized Trust-Based DSR Protocol to Curb Cooperative Blackhole Attacks in MANETs Using NS-3
(Scientific & Academic Publishing, 2020-05)MANETs Communication relies on special routing protocols that make security a challenging endeavor. MANETs are open to a range of active and passive attacks; black hole attack is an active attack affects the network layer. ... -
Organizational Implementation of Information Systems Innovations (OIISI) Framework was developed in the context of Universities in Kenya
(2016)Organizational Implementation of Information Systems Innovations (OIISI) Framework was developed in the context of Universities in Kenya and can be used to understand the implementation of Information Systems (IS) Innovations ... -
THE PEDAGOGICAL READINESS OF INSTRUCTORS TOWARDS ACHIEVING INTEGRATION OF ICTS IN TVET INSTITUTIONS IN KENYA
(2015)This paper points to the necessity to conduct research on the pedagogical readiness of instructors towards achieving integration of ICT’s in Technical and Vocational Education and Training (TVET) institutions in ... -
A Probabilistic Data Encryption scheme (PDES)
(2013)In this paper the author presents a probabilistic encryption scheme that is polynomially secure and has the efficiency of deterministic schemes. From the theoretical construction of Brands and Gill (1996), it is clear ... -
Production Management Procedures and the Growth of Jua Kali enterprises in Kenya
(2020-06)The Micro and Small Enterprises play an important role in the economic development of most countries globally despite their level of development. The sector act as vehicle for low-income people to escape poverty through ... -
Provision of digital reference services in academic libraries in Kenya: a review
(Regional Journal of Information and Knowledge Management, 2016)Rationale of the study - The popularity of internet as an avenue of communication and source of information has led to decreasing numbers of in-person reference transaction in academic libraries. Consequently, academic ... -
Quadratic Approach for Fast Topic Selection in Modelling Big Text Analytics
(International Journal of Advancements in Computing Technology, 2018)One challenging issue in application of Latent Dirichlet Allocation (LDA) is to select the optimal number of topics which must depend on both the corpus itself and user modeling goals. This paper presents a topic selection ... -
Quick Response Code Security Attacks and Countermeasures: A Systematic Literature Review
(Journal of Cyber Security, 2025)A quick response code is a barcode that allows users to instantly access information via a digital device. Quick response codes store data as pixels in a square-shaped grid. QR codes are prone to cyber-attacks. This ... -
A Reinforcement Learning-Based Multi-Agent System for Advanced Network Attack Prediction
(International Journal of Scientific Research in Computer Science and Engineering, 2024)This paper addresses the challenges of traditional Network Intrusion Detection Systems (NIDS) in handling the increasing complexity and volume of modern cyberattacks. The authors suggest a novel multi-agent deep reinforcement ... -
Research Methods in Machine Learning: A Content Analysis
(2021-03)Research methods in machine learning play a pivotal role since the accuracy and reliability of the results are influenced by the research methods used. The main aims of this paper were to explore current research methods ... -
A Review of Agent Based Interoperability Frameworks and Interoperability Assessment Models
(2014)In a heterogeneous world, concurrent distributed development has led to many types of multi-agent systems that offer diverse functionality in agents as different types of platforms are not in a position to interoperate. ... -
A Review of Agile Software Effort Estimation Methods
(2016)Software cost estimation is an essential aspect of software project management and therefore the success or failure of a software project depends on accuracy in estimating effort, time and cost. Software cost estimation ... -
A Review of Convergence in Information and Communication Technology
(International Journal of Scientific Footprints, 2015-11-18)Convergence is the interlinking of computing and other information technologies, telecommunications networks and media content that originally operated largely independently. Convergence has arisen as a result of the ...