Computer Science and ICT
Browse by
Recent Submissions
-
Salmonella enterica serovar Typhimurium, a Gram-negative bacterium, can cause infectious diseases ranging from gastroenteritis to systemic dissemination and infection. However, the molecular mechanisms underlying this bacterial dissemination have yet to be elucidated. A study indicated that using the lipopolysaccharide (LPS) core as a ligand, S. Typhimurium was able to bind human dendritic cell-specific intercellular adhesion molecule-3-grabbing nonintegrin (hCD209a), an HIV receptor that promotes viral dissemination by hijacking antigen-presenting cells (APCs). In this study, we showed that S. Typhimurium interacted with CD209s, leading to the invasion of APCs and potentially the dissemination to regional lymph nodes, spleen, and liver in mice. Shielding of the exposed LPS core through the expression of O-antigen reduces dissemination and infection. Thus, we propose that similar to HIV, S. Typhimurium may also utilize APCs via interactions with CD209s as
(taylor and Francis, 2019-08-06)This study reviews the literature on the role of technology innovation in job creation through small businesses in developing countries. A sevenstep approach to the literature review is used for synthesising relevant data. ... -
The Effect of Adaptive Learning Rate on the Accuracy of Neural Networks
((IJACSA) International Journal of Advanced Computer Science and Applications, 2021)Learning rates in gradient descent algorithms have significant effects especially on the accuracy of a Capsule Neural Network (CNN). Choosing an appropriate learning rate is still an issue to date. Many developers still ... -
Maximizing the Value of Information Communication Technologies (ICTs) and Its Implications on Library Operations in Public Universities in Kenya: Potential and Challenges
(Centre for Democracy, Research and Development (CEDRED), Nairobi, Kenya., 2022)The advent of information age has significantly changed the environment in which libraries operate in the 21st century. Technological encroachment has forced librarians to adopt various technologies for their continued ... -
WLAN SECURITY: A TRUSTED COMPUTING BASE APPROACH
(2019-01)This paper identifies the gaps in IEEE 802.11 standards and supporting technologies and then proposes a conceptual architecture that can be used to develop a model for analyzing and predicting the security performance of ... -
User’s perception on ICT adoption in High schools
(2012)Information Communication Technology (ICT) plays a crucial role in the effectiveness, efficiency and service delivery of any institution. ICT has also been credited with the potential to integrate world economies thus ... -
Assessment of ICT Infrastructure on ICT Adoption in Educational Institutions
(2013-06)Globalization and liberalization have facilitated intensive business competition which in turn has increased the need for adoption of new technologies to increase the efficiency in service delivery. ICT has wide application ... -
A Multi-Faceted Approach to Mobile Agent Security
(2015-06)Mobile agents are increasingly becoming popular in the development of current distributed applications. However, the mobility and autonomy factors of mobile agents present a host of security challenges in a ... -
Adoption of Near Field Communication in Universities in Kenya
(2015-09)In our day to day life, the adoption of new technology to new innovation in various sectors is rising. Campus life has shifted from students’ carrying laptops and a bag full of pass cards to carrying Ipads or smart phones. ... -
School ICT Policy, a Factor Influencing Implementation of Computer Studies Curriculum in Secondary Schools.
(2013)The introduction of ICT curriculum in education among schools in many countries was as a result of National ICT policy initiatives by the government. The National ICT curriculum differs from regions depending on the education ... -
Algorithm for Selection of EAP Authentic
(2016-06)ABSTRACT Several recent studies indicate that many implementations of authentication and access control in public WLANs are compromisable. This is because IEEE 802.11 standard leaves the choice of EAP method to use to ...