Browsing School of Computing & Informatics by Title
Now showing items 55-66 of 66
-
Service Quality Provision in Higher Education: Case Study of Asia Pacific University of Technology and Innovation
(SDIWC, 2015)Managing the service sector in higher education has become a more significant issue, as a lot of competitors are emerging in these sectors. Managing quality in the education needs be separated from other service sectors, ... -
Simulation of Trust-Based Mechanism forEnhancing User Confidence in MobileCrowdsensing Systems
(IEEE, 2020-01-22)With the rapid development of mobile technology and subsequent mass adoption of mobile devices, mobile crowdsensing (MCS) has gained a lot of research attention. In MCS systems, trust is a key focus in the overall ... -
SIZE METRICS FOR SERVICE-ORIENTED ARCHITECTUR
(International Journal of Software Engineering & Applications (IJSEA), 2019)Determining the size, effort and cost of Service-orientedArchitecture (SOA) systems is important to facilitate project planning and eventually successful implementation of a software project. SOA approach is one ... -
Suitability of Agile Methods for Safety-Critical Systems Development: A Survey of Literature
(Mary Mwadulo Walowe, 2016) -
Suitable Image Features for Drought Stress Detection in Beans using Raspberry PI Imaging System
(International Journal of Innovations in Engineering and Technology, 2017)Crop stresses are often detected late and this leads to massive crop yield loss. There exists a need for development of a real time system for monitoring crop growth progress with a view of early detection of diseases and ... -
Supplier evaluation and Selection. A review
(Journal of Ultra Computer & Information Technology, 2019) -
Survey of Cyber Security Frameworks
(International Journal of Technology in Computer Science & Engineering, 2014)In a digital world, the national economy and welfare have grown critically dependent on the cyber infrastructure due to the capabilities and opportunities the Internet provides. This ... -
The Technology Acceptance Model (TAM) and its Application to the Utilization of Mobile Learning Technologies
(SCIENCEDOMAIN international, 2017)Researchers have argued that inclusion of technologies in the teaching-learning places must be preceded by the user accepting the technology. Without this effort, the technologies remain abandoned or heavily ... -
Visibility Graphlet Approach to Chaotic Time Series
(AIP Publishing LLC, 2016)Many novel methods have been proposed for mapping time series into complex networks. Although some dynamical behaviors can be effectively captured by existing approaches, the preservation and tracking of the temporal ... -
A vulnerability model for wireless local area networks in an insecure wardriving setting
(KCA UNIVERSITY, 2017)Wireless local area networks (WLAN) enable access to computing resources for devices that are not physically connected to a network infrastructure. WLANs usually function in a restricted geographical location ... -
Web based systems security review and trends
(Meru University of Science and Technology, 2022-06)Security of any web application is paramount because any breach to this can result to major consequences. Many developers have given web security an afterthought which has made it possible for the attackers to target these ...