Browsing by Title
Now showing items 2555-2574 of 3023
-
Roulette Wheel Selection Algorithm (RWSA) and Reinforcement Learning (RL) for personalizing and improving e-learning system
(Strathmore University, 2015)Various mechanisms to improve the learning process with the main objective of maximizing learning and dynamically selecting the best teaching operation to achieve learning goals have been done in the field of personalized ... -
Route selection impacts on achieving enhanced IMS QoS
The different planes in the IMS interact via specific reference points to deliver multimedia services to the user. QoS provisioning for IMS communications has been standardized for access networks only, with the assumption ... -
Ruin probabilities in finite and discrete time - a case study on General Insurance Companies
(Strathmore University, 2014-12)The following paper presents a research done on the probability of ruin in five general insurance companies in Kenya based on data from their financial statements in the past ten years (2004 - 2013). Past data was used to ... -
Rural Electrification using off-grid Solar PV powered Energy Kiosks
Access to electricity in rural Kenya and other developing African countries is low because historically power utilities employ a centralized grid system of electrification that is expensive to expand and would take decades ... -
Rural madrasas of the Southern Kenya Coast, 1971-92
The past two decades in Kenya have witnessed the opening of a large number of new Muslim educational institutions (madrasas), in rural as well as urban areas, in places where Muslim communities predominate and in places ... -
A Sandboxing based security model to contain malicious traffic in smart homes
(Strathmore University, 2017)The Internet of Things (lOT) is a developing Next Generation Network (NGN) paradigm that aims to have more devices connected to the Internet and the possibility of these devices to autonomously communicate with each other. ... -
Scalable dataspace construction
(Strathmore University, 2017)This paper proposes the design and implementation of scalable dataspaces based on efficient data structures. Dataspaces are often likely to exhibit a multidimensional structure due to the unpredictable neighbour relationship ... -
The Sceptical challenge
(Routledge, 1997) -
A Scheme for improving data confidentiality in the cloud computing environment
(Strathmore University, 2017)Cloud computing has ushered in an era whereby small and medium sized companies enjoy computing power which was usually a preserve for big corporations. Despite these benefits, the present cloud data confidentiality techniques ... -
Scientific method : an historical and philosophical introduction
(Routledge, 1996) -
Scientific realism : how science tracks truth
(Routledge, 1965) -
Scientism : philosophy and the infatuation with science
(Routledge, 1991) -
Section 43(5) of the sexual offences act: the legal dispensation for marital rape in kenya
(Strathmore University, 2017-01)Law is an instrument to effect change in society and to protect rights of the marginalized. Where law fails to do this, its objects fail to be realized. The Constitution of Kenya provides for gender equality and the freedom ... -
A Sectoral analysis of the impact of foreign aid on public investment and economic growth in Kenya
(Strathmore University, 2016)The purpose of this study was to find out the effectiveness of foreign aid in boosting economic growth in Kenya and its impact on public investment. This paper uses an Autoregressive Distributed Lag (ARDL) Model to estimate ... -
Sectoral public investment on economic growth
(Strathmore University, 2016)The purpose of this study was to find out the impact of sectoral public investment on economic growth in Kenya. This paper uses a Vector Autoregressive (VAR) Model to analyze the impact of sectoral public expenditure on ... -
A Secure and verifiable internet voting system using homomorphic scheme.
(Strathmore University, 2009)Institutions are changed with the actions of ensuring the rights of its members to participate in a democratic election, this is surpassing all the limitations of the traditional voting system, and the development of an ... -
The Secure distributed data exchange protocol
(Strathmore University, 2017)Distributed protocols implementations over a large network is a well-studied problem that converges asymptotically; however, existing protocols do not provide a way for each node to distributively detect the level of trust ... -
A Secure electronic document management system using public key encryption: a case of Strathmore University
(Strathmore University, 2018)The need to safeguard and ensure the authenticity of academic records is paramount for any reputable educational institution. As institutions are moving into the digital era, more and more documents are being stored in ... -
A Secure end to end verifiable e-voting system using cryptography: a case of Independent Electoral and Boundaries Commission of Kenya
(Strathmore University, 2019)Elections that are run purely on manual voting system have presented a plethora of challenges that have often affected the credibility of elections done entirely using the traditional manual voting system. Countries round ... -
A Secure M-payment for M-commerce in Kenya
(Strathmore University, 2008)There has been a tremendous growth in mobile communications in Kenya over the last decade that has totally transformed how people communicate. This has presented opportunities for business to change how they operate, which ...