School of Computing and IT (CP)
Browse by
Recent Submissions
-
Harnessing our ICT Skill Set and Research Efforts for Sustainable Development
(2022-06)For some time now, ICTs have become ubiquitous, making them a common place phenomenon in modern society. Almost all electronics are ICT enabled to date, with most people who can read and write having interacted with ICTs ... -
Empirical Evaluation of Adaptive Optimization on the Generalization Performance of Convolutional Neural Networks
(2021-10)Recently, deep learning based techniques have garnered significant interest and popularity in a variety of fields of research due to their effectiveness in search for an optimal solution given a finite amount of data. ... -
A Novel Hybrid Deep Learning Model for Early Detection of Diabetic Retinopathy
(, 2021)Diabetic retinopathy is one of the most frightening complications of diabetes mellitus affecting the working-age population worldwide leading to irreversible blindness if left untreated. A major challenge is early detection, ... -
Implementation of a Structural Complexity Metrics Tool for Sassy Cascading Style Sheets (SCMT-SCSS)
(2020)The development of metrics tool is a basic requirement for the defined software metrics to be acceptable in the software industry. There are several metrics proposed over the years without tool support and this trend cannot ... -
A New Complexity Metric for BPEL Processes based on Weighted Structured Activities and Invokes
(2018-05)As is the case with traditional software, business processes created using the Business Process Execution Language (BPEL) have an inherent structural complexity that increases whenever the processes are modified. High ... -
Effective Use of Assistive Technologies for Inclusive Education in County Governments: Issues and Challenges from Two Case Studies
(2018-11)County governments face innumerable impediments in the process of implementation of inclusive education (IE). Effective use of Assistive Technologies (AT) can help county governments in Kenya achieve inclusive education ... -
A Review of Security Techniques against Black Hole Attacks in Mobile Ad hoc Networks
(IEEE, 2019-05)Mobile ad hoc network (MANET) is a special type of a wireless network formed by nodes that communicate without any fixed infrastructure or centralised management. Nodes in MANET act as a router and a host. These nodes are ... -
E-Voting Challenges in Kenya
(2016-06)Many developing countries have had disastrous presidential elections in recent years. In most of these cases, it was alleged that manual voting and vote-tallying took too long to produce the winning candidate, leading to ... -
A Blood Pressure Monitoring Prototype for Preeclampsia Management in Antenatal Care in Kenya
(2018-10-25)The health of women is a critical public health concern in public health as it impacts the personal well-being, family reproduction, and societal development. Globally, it has been noted that a significant number of women ... -
Designing of new proposed technique for lie Detection using EEG Signals
(2011-03)The proposed system is designed to make EEG database of criminals during the investigation by crime branch. System will be detecting the criminals on the bases of thought related to crime to be stored in brain, when the ... -
Designing and Development of Speech Database The Technical Review
(2011-01)The speech database is one of the crucial items used for the automatic speech recognition system (ASR System). The paper reviews numerous techniques to design and development speech databases for different purpose. The ... -
Accelerating Research in Africa through Sustainable Virtual Research Communities
(2012)Despite the commendable efforts by African NRENs to interconnect universities and research institutions, research capacity in Africa is still a major challenge. In particular African universities and research institutions ... -
A Survey on Cyber Crime Perpetration and Prevention: A Review and Model for CyberCrime prevention
(2012)Threats posed to organizations by cyber crimes have increased faster than potential victims or cyber security professionals can deal with them, placing targeted organizations at considerable risk. The growth of the ... -
Size measures for large Web service systems
(2012)Web service systems grow larger with age whenever organizations add new services to existing systems. As is the case with other types of software, very large Web service systems are difficult to understand and maintain and ... -
An Audit of ICT Funding on Effective Integration of ICT’s In Selected TVET Institution in Kiambu and Murang’a County, Kenya
(2016)Developing countries like Kenya has begun to realize the significant role TVET has to play in the development of a competitive workforce and an equally discouraging realization has arose that governments can no longer be ...