Browsing School of Computing & Informatics by Title
Now showing items 58-66 of 66
-
Suitability of Agile Methods for Safety-Critical Systems Development: A Survey of Literature
(Mary Mwadulo Walowe, 2016) -
Suitable Image Features for Drought Stress Detection in Beans using Raspberry PI Imaging System
(International Journal of Innovations in Engineering and Technology, 2017)Crop stresses are often detected late and this leads to massive crop yield loss. There exists a need for development of a real time system for monitoring crop growth progress with a view of early detection of diseases and ... -
Supplier evaluation and Selection. A review
(Journal of Ultra Computer & Information Technology, 2019) -
Survey of Cyber Security Frameworks
(International Journal of Technology in Computer Science & Engineering, 2014)In a digital world, the national economy and welfare have grown critically dependent on the cyber infrastructure due to the capabilities and opportunities the Internet provides. This ... -
The Technology Acceptance Model (TAM) and its Application to the Utilization of Mobile Learning Technologies
(SCIENCEDOMAIN international, 2017)Researchers have argued that inclusion of technologies in the teaching-learning places must be preceded by the user accepting the technology. Without this effort, the technologies remain abandoned or heavily ... -
Visibility Graphlet Approach to Chaotic Time Series
(AIP Publishing LLC, 2016)Many novel methods have been proposed for mapping time series into complex networks. Although some dynamical behaviors can be effectively captured by existing approaches, the preservation and tracking of the temporal ... -
A vulnerability model for wireless local area networks in an insecure wardriving setting
(KCA UNIVERSITY, 2017)Wireless local area networks (WLAN) enable access to computing resources for devices that are not physically connected to a network infrastructure. WLANs usually function in a restricted geographical location ... -
Web based systems security review and trends
(Meru University of Science and Technology, 2022-06)Security of any web application is paramount because any breach to this can result to major consequences. Many developers have given web security an afterthought which has made it possible for the attackers to target these ...