Browsing by Title
Now showing items 1903-1922 of 12067
-
COMPLEX ANALYSIS 1
(JOOUST, 2016) -
Complex Analysis I
(2019) -
COMPLEX ANALYSIS I
(JOOUST, 2018) -
Compliance with Physical Planning Standards by Residential Developments in Kisii Town, Kenya
(Scientific & Academic Publishing, 2018)The objective of this study was to determine the extent to which residential developments in Kisii Town complied with Building Coverage Ratio (BCR) and Floor Area Ratio (FAR) physical planning standards. To attain this, ... -
Compliance with Quality Guidelines in Hiv Anti-Retroviral Interventions (Art) Interventions at Kisii Teaching And Referral Hospital
(JOOUST, 2020-10)The goal of Antiretroviral Therapy/Treatment (ART) is to reduce morbidity and mortality among people living with HIV (PLHIV) hence improve their health. Use of ART also contributes to preventing new HIV infections. To ... -
The complimentary role of wild habitats in crop pollination: A case study on the eggplant (Solatium melongena L., Solanaceae)
(2001)In this study, carried out in Nguruman, southwestern Kenya, 10 bee species were identified as eggplant pollinators. Their foraging behaviour was shown to be affected by the prevailing ambient temperature and not time of ... -
The composition of the floral fragrance of polianthes tuberosa l cut flower grown in Kenya
(EAJEST, 2013)Tuberose sold on the domestic market fetches very low prices during the low export season. Value addition to the crop would make its production more sustainable. A study was carried out to identify the constituent chemical ... -
Computational Finance
(JOOUST, 2020) -
COMPUTATIONAL FINANCE
(2019) -
COMPUTATIONAL FINANCE
(JOOUST, 2022) -
COMPUTATIONAL FINANCE.
(JOOUST, 2022) -
COMPUTER LAW ETHICS & SOCIETY
(2013) -
COMPUTER LAW ETHICS & SOCIETY
(2013) -
COMPUTER LAW ETHICS & SOCIETY
(2013) -
Computer & Network Security
(2021) -
COMPUTER AIDED CARTOGRAPHY
(JOOUST, 2022) -
COMPUTER AIDED CARTOGRAPHY (CAC)
(2019) -
COMPUTER AIDED DESIGN
(JOOUST, 2022) -
COMPUTER AND NETWORK SECURITY
(2013) -
COMPUTER AND NETWORK SECURITY
(2014)