Now showing items 1-10 of 38
An Analysis of Information Technology (IT) Security Practices: A Case Study of Kenyan Small and Medium Enterprises (SMEs) in the Financial Sector
Organizations of all sizes are now significantly reliant upon information and communication technology for the performance of their business activities. They therefore need to ensure that their systems and data are ...
Mathematical Models For Human And Baboon Brain Parameters
In this paper linear measurements from ten human and ten baboon brains were used to predict various values for human and baboon brain and body parameters, through multiple regression models. Inter-species values were also ...
Application Of Sperner’s Lemma In Fair Division
In this paper, we describe the approximate envy-free division using a mathematical technique from "game theory"; with help of Sperner’s lemma. The examples of land distribution in families and other heterogeneous resources ...
Electromagnetic Tensor Field Of First And Second Class
The author and R.S. Mishra established the identities in Nijenhuis tensor for first, second and third class of electromagnetic tensor fields. The identities for first class were non zero. In this paper I have obtained the ...
Curvature tensors and their relativistic significance (II)
In this paper we have defined the curvature tensors and their properties are studied.
The Influence of Weather On Measles And Pneumonia In Nairobi
Observed Similarity In Satellite Derived Total Column Ozone Data And Ground Based Dobson And Ozonesonde Over Nairobi Kenya
This study sought comparison of satellite total column Ozone data from 1985 to 2003 against ground based Dobson spectrophotometer and Ozonesonde data. The area of study was Nairobi and the main objective was to ascertain ...
A grapheme-based approach for accent restoration in Gıkuyu
The orthography of G˜ık˜uy˜u includes a number of accented characters to represent the entire vowel system. These characters are however not readily available on standard computer keyboards and are usually represented as ...
Understanding Intention to Use Computer Assisted Audit Tools and Techniques (CAATTs) Using UTAUT Model: Perspectives of Auditors in Kenya National Audit Ofﬁ ce (KENAO)
Adoption of computer assisted audit tools and techniques (CAATTs) has become fundamental in many audit methodologies owing to rapid advances in clients' information system usage. Audit standards encourage auditors to ...
Linear Estimation Of Standard Deviation Of Logistic Distribution: Theory And Algorithm
The paper presents a theoretical method based on order statistics and a FORTRAN program for computing the variance and relative efficiencies of the standard deviation of the logistic population with respect to the Cramer-Rao ...