Search
Now showing items 41-50 of 68
Organizational Implementation of Information Systems Innovations (OIISI) Framework was developed in the context of Universities in Kenya
(2016)
Organizational Implementation of Information Systems Innovations (OIISI) Framework was developed in the context of Universities in Kenya and can be used to understand the implementation of Information Systems (IS) Innovations ...
A Literature Survey of Cognitive Complexity Metrics for Statechart Diagrams
(2019-07)
Statechart diagrams have inherent complexity which keeps increasing every time the diagrams are modified. This complexity poses problems in comprehending statechart diagrams. The study of cognitive complexity has over the ...
Production Management Procedures and the Growth of Jua Kali enterprises in Kenya
(2020-06)
The Micro and Small Enterprises play an important role in the economic development of most countries globally despite their level of development. The sector act as vehicle for low-income people to escape poverty through ...
FACTORS AFFECTING CITIZEN READINESS FOR E-GOVERNMENT SYSTEMS IN KENYA
(2017-04)
Electronic government (e-government) provides a common infrastructure and direction across the public sector. It enhances collaboration within and among public sector organizations between Government and the business ...
Automatic Speech Recognition and Verification using LPC, MFCC and SVM
(2015-10)
Speech has much capability as an interface between human and computer which comes under the Human Computer interaction (HCI). The major challenge has been the nature of voice is ever varying speech signal. The paper presents ...
Curriculum Content Relevancy in Integration of ICTs in Kenya TVET Institutions in Readiness to Industry Needs
(International Journal of Secondary Education, 2017)
The development of curricula content and their implementation is one of the key competences of instructors in
the area of educational planning and practical training for Technical and Vocational Education and Training ...
ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION
(2013)
There various algorithms that can factor large integers but very few of these algorithms run in polynomial time. This fact makes them inefficient. The apparent difficulty of factoring large integers is the basis of some ...
Trust-Based Security Technique to Curb Cooperative Blackhole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3
(Global Journals, 2020-12)
The advent of mobile technology led to the emergence of Mobile Ad-hoc networks
(MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and ...
A Review of Convergence in Information and Communication Technology
(International Journal of Scientific, 2014)
Convergence is the interlinking of computing and other information technologies,
telecommunications networks and media content that originally operated largely
independently. Convergence has arisen as a result of the ...