Journal Articles (CI): Recent submissions
Now showing items 1-20 of 106
-
A Comparative Study of Transformer-based Models for Hate-Speech Detection in English-Kiswahili Code-Switched Social Media Text
(International Journal of Advanced Trends in Computer Science and Engineering, 2024)The transformer architecture, first introduced in 2017 by researchers at Google, has revolutionized natural language processing in various tasks, including text classification. This architecture formed the basis of future ... -
STRUCTURAL COMPLEXITY METRICS FOR LARAVEL SOFTWARE
(International Journal of Software Engineering & Applications (IJSEA),Vol.15, No.4, July 2024, 2024-07)Existing software complexity metrics do not adequately address the unique architectural patterns of Laravel. This research, therefore, solves this problem by proposing a suite of novel complexity metrics for Laravel software. ... -
A Comparative Study of Transformer-based Models for Text Summarization of News Articles
(International Journal of Advanced Trends in Computer Science and Engineering, 2024-04)Transformer-based models such as GPT, T5, BART, and PEGASUS have made substantial progress in text summarization, a sub-domain of natural language processing that entails extracting important information from lengthy texts. ... -
Discriminative spatial-temporal feature learning for modeling network intrusion detection systems
(Journal of Computer Security, 2023-02)Increasing interest and advancement of internet and communication technologies have made network security rise as a vibrant research domain. Network intrusion detection systems (NIDSs) have developed as indispensable defense ... -
A Suite of Metrics for UML Behavioral Diagrams Based on Complexity Perspectives
(International Journal of Software Engineering & Applications, 2024-03)Nowadays, software designers have adopted modelling languages that help to communicate the dynamic behavior of UML behavioral diagrams. As it is with other software artefacts, these diagrams tend to get more complex ... -
A Novel Alert Correlation Technique for Filtering Network Attacks
(International Journal of Network Security & Its Applications, 2023-05)An alert correlation is a high-level alert evaluation technique for managing large volumes of irrelevant and redundant intrusion alerts raised by Intrusion Detection Systems (IDSs).Recent trends show that pure intrusion ... -
Multi-Agent Systems Requirements Analysis for Patient-centered Healthcare Consultancy Service
(International Journal of Advanced Research in Computer Science, 2023-10)Agents are currently being discussed in nearly every domain of science and engineering. Through the utilization of IoT and agent-based systems, remote consultations and virtual doctors can provide essential healthcare ... -
Application of Real-Time Deep Learning in integrated Surveillance of Maize and Tomato Pests and Bacterial Diseases
(Journal of the Kenya National Commission for UNESCO, 2024-01)With an emphasis on maize and tomato crops specifically, this research explores the creative fusion of computer vision (CV) and machine learning (ML) to address the enduring problem of pests and crop diseases impacting ... -
Revolutionizing Kenyan Healthcare Consultancy: Exploring IoT Innovations and other Enabling Technologies– A Case Study
(International Journal of Advanced Research in Computer and Communication Engineering, 2023-08)The integration of powerful technologies such as Internet of Things (IoT) and Multi-Agent Systems (MAS) in healthcare addresses the complex nature of the industry, facilitating communication, coordination, and decision-making ... -
Comparative Analysis on the Evaluation of the Complexity of C, C++, Java, PHP and Python Programming Languages based on Halstead Software Science
(International Journal of Computer and Information Technology, 2023-03)Quality plays center stage in any software development industry. Software metrics have proven over time as the best measure to be used to assess and assure the software developers of the quality of their products. Halstead ... -
An extended k-means cluster head selection algorithm for efficient energy consumption in wireless sensor networks
(International Journal of Network Security & Its Applications, 2023-05)Effective use of sensor nodes’ batteries in wireless sensor networks is critical since the batteries are difficult to recharge or replace. This is closely connected to the networks’ lifespan since once the battery is used ... -
A Metrics-Based Model for Estimating the Maintenance Effort of Python Software
(2023-05)Software project management includes a substantial area for estimating software maintenance effort. Estimation of software maintenance effort improves the overall performance and efficiency of software. The Constructive ... -
Factors Affecting Software Maintenance Cost of Python Programs
(2022)One of the primary areas of software project management is cost estimation. The cost estimation problem remains unsolved today because of the ineffective cost estimation techniques which are unsuitable for handling current ... -
Evaluating Linear and Non-linear Dimensionality Reduction Approaches for Deep Learning-based Network Intrusion Detection Systems
(2023-08-08)Dimensionality reduction is an essential ingredient of machine learning modelling that seeks to improve the performance of such models by extracting better quality features from data while removing irrelevant and redundant ... -
A New Complexity Metric for UML Sequence Diagrams
(2023-01)Object-Oriented Programming (OOP) has been promoted as a way to produce high-quality software while increasing developer productivity through code reuse. Software systems and underlying designs get more extensive and more ... -
Metrics For Evaluating Alerts in Intrusion Detection Systems
(2023-01)Network intrusions compromise the network’s confidentiality, integrity and availability of resources. Intrusion detection systems (IDSs) have been implemented to prevent the problem. Although IDS technologies are promising, ... -
An Extended Security Measurement Framework For Open-Source Enterprise Resource Planning Software Security
(International Journal of Network Security & Its Applications (IJNSA), 2022-09)Modern organizations are adopting new ways of measuring their level of security for compliance and justification of security investments. The highly interconnected environment has seen organizations generate lots of personal ... -
Implementation of AI-based assistive technologies for learners with physical disabilities in Kenya: a practical design thinking approach
(African Journal of Science, Technology and Social Sciences (AJSTSS), 2022-06)Inclusion of Learners with disabilities continues to extensively rely on digital and Artificial Intelligence (AI) enabled Assistive Technologies (AT) as enablers for teaching and learning. However, the provision of ATs to ... -
Blockchain as a Solution of Information Security and Data Privacy Issues: Review
(2022-08)The growth of technology has seen development of smart devices that are connected to each other giving rise to device-mesh technology. This has given rise to many owners of these devices sharing data through various web ... -
A Comparative Study of Deep Learning and Transfer Learning in Detection of Diabetic Retinopathy
(2022)Computer vision has gained momentum in medical imaging tasks. Deep learning and Transfer learning are some of the approaches used in computer vision. The aim of this research was to do a comparative study of deep learning ...