• Login
  • Help Guide
Search 
  •   JOOUST IR Home
  • Conference/Workshop/Seminar Papers
  • School of Informatics & Innovative Systems
  • Search
  •   JOOUST IR Home
  • Conference/Workshop/Seminar Papers
  • School of Informatics & Innovative Systems
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-4 of 4

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Improving health care service delivery in public health facilities by use of an integrated e- health system for optimal management of patients’ throughput 

Ondulo, Jasper (JOOUST, 2015-06-24)
The challenge of communicable and non-communicable diseases is placing a heavy burden on health and social care systems in the developing nations (Kenya included). Currently, public healthcare systems have scarce resources ...
Thumbnail

Analysis of fully homomorphic encryption schemes in enhancing data security in cloud computation 

Omollo, R.; Ongati, Naftali O.; Raburu, George. (2015-06-24)
Cloud computing is an emerging technological paradigm in the field of digital resource management where such in cloud environment, it involves processing critical data hosted under preferred deployment model. A computational ...
Thumbnail

Mobile device security: proposing framework for securing mobile devices Remove selected 

Ogara, Solomon O. (JOOUST, 2015-06-24)
As the number of mobile devices accessing corporate networks increases, there is growing concern regarding the security of corporate data. The rate at which new malware and malicious apps are being introduced into the app ...
Thumbnail

Effect of varying filler-size in profile injection attacks on the Robust Weighted Slope One 

Masinde, Newton W.; Fatima, Sameen S. (IEEE Xplore, 2015-03)
The use of recommender systems has become the de-facto standard in e-commerce systems. The most popular recommendation techniques are the collaborative filtering techniques. Their open nature of collaborative recommender ...

Browse

All of JOOUST IRCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Discover

AuthorFatima, Sameen S. (1)Masinde, Newton W. (1)Ogara, Solomon O. (1)Omollo, R. (1)Ondulo, Jasper (1)Ongati, Naftali O. (1)Raburu, George. (1)SubjectAccuracy (1)Availability (1)Cloud computation (1)Collaboration (1)Collaborative Filtering (1)Confidentiality (1)Data security, Technique (1)Fully homomorphic encryption scheme (1)Integrity (1)Malware (1)... View MoreDate Issued
2015 (4)
Has File(s)Yes (4)

Contact Us

Copyright © 2023-4 Jaramogi Oginga Odinga University of Science and Technology (JOOUST)
P.O. Box 210 - 40601
Bondo – Kenya

Useful Links

  • Report a problem with the content
  • Accessibility Policy
  • Deaccession/Takedown Policy

TwitterFacebookYouTubeInstagram

  • University Policies
  • Access to Information
  • JOOUST Quality Statement