Elisha Opiyo

Elisha Opiyo
University of Nairobi | UON · School of Computing and Informatics

About

34
Publications
39,204
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
158
Citations
Citations since 2017
21 Research Items
134 Citations
20172018201920202021202220230102030
20172018201920202021202220230102030
20172018201920202021202220230102030
20172018201920202021202220230102030

Publications

Publications (34)
Article
In this paper we present a method for modeling information in clinical narrative texts into coherent semantically meaningful classes using text classification and visualization. We based our technique on SOAP clinical documentation format which is represented by four information facets: subjective, objective, assessment and plan (SOAP). We modeled...
Article
Full-text available
The increasing use of Electronic Health Records (EHRs) in healthcare delivery settings has led to increase availability of electronic clinical data. They generate a lot of patients’ clinical data each day, requiring physicians to review them to find clinically relevant information of different patients during care episodes. The availability of elec...
Article
Full-text available
Cloud service providers have a QoS monitoring capability integrated in their cloud platforms. This is to aid in monitoring the performance of the platform as well as for Service Level Agreement confirmation to the clients. Unfortunately this arrangement serves the interest of the cloud provider more than the cloud client since the service providers...
Article
Full-text available
Objectives Information and communication technology (ICT) tools are increasingly important for clinical care, research, data management, international collaborations, and dissemination. Many technologies would be particularly useful for healthcare workers in resource-limited settings; however, these individuals are the least likely to utilize ICT t...
Article
Full-text available
Many governments, globally, have in the last two decades started adopting E-government to improve efficiency and effectiveness in service delivery. However, the implementation of E-government is capital intensive and hence requires adequate financial resources. The purpose of this study was to establish the influence of financial capacity on the ad...
Article
Full-text available
Many governments, globally, have in the last two decades started adopting E-government to improve efficiency and effectiveness in service delivery. However, the implementation of E-government is capital intensive and hence requires adequate financial resources. The purpose of this study was to establish the influence of financial capacity on the ad...
Article
Full-text available
Through advancement of ICT, many governments around the world embarked on projects that introduced Egovernment initiatives for efficient and effective government operations geared towards making a government accountable and transparent as well as providing timely services which are more convenient and cost-effective. The purpose of this study was t...
Article
Full-text available
Rapid growth in technology in the last two decades has made governments to start E-government initiatives as a way of ensuring effective and efficient operations. E-government has been shown to improve accountability and transparency as well as delivery of services in a timely and cost-effective manner. The purpose of this study was to establish th...
Book
Due to the advancements in ICT, there’s huge amount of data amount of data collected in organizations and law enforcement agencies especially police is not an exception. The research by Xerox of 2013 found out that police crime data will be doubling every two years and only 17% of the crime data at police departments is used for their operations. T...
Article
Full-text available
The inauguration of the new constitution in Kenya has led to the devolution of health care in the counties. It is against this backdrop that has necessitated the need to develop a model of grouping these regions into natural groups with similar characteristics that can influence the child health for the purpose of health care planning and regulatio...
Article
Full-text available
There had been an enormous increase in the crime in the recent past. Crimes are a common social problem affecting the quality of life and the economic growth of a society. With the increase of crimes, law enforcement agencies are continuing to demand advanced systems and new approaches to improve crime analytics and better protect their communities...
Article
Full-text available
Law enforcement agencies like other organizations are facing a difficult task of handling and making use of crime data which is in different formats that is generated every day which would otherwise help them in effective crime management. Developing a low cost Business Intelligence system for crime data analytics requires low cost development tool...
Article
Full-text available
Law enforcement agencies like other organizations are facing a difficult task of handling and making use of crime data which is in different formats that is generated every day which would otherwise help them in effective crime management. Developing a low cost Business Intelligence system for crime data analytics requires low cost development tool...
Article
Full-text available
Law Enforcement agencies are faced with a problem of effectively predicting the likelihood of crime happening given the past crime data which would otherwise help them to do so. There is a need to identify the most efficient algorithm that can be used in crime prediction given the past crime data. In this research, Business intelligence techniques...
Article
Full-text available
Most Prisons in the developing countries are still using the traditional system – pen and papers, to keep track of their records. This system takes long to finish a single transaction; this has led to loss of information of some cases (crimes files), insecurity and data redundancy. Similarly, some cases have been reported where some prison staff co...
Article
Full-text available
Dynamic webservice composition (DWSC) is a promising technology in supporting Virtual organizations to autogenerate composite services that maximize the utility of Internet commerce service consumers over a range of the consumer's QoS constraints. However, over the last decade DWSC remains a non polynomial deterministic problem, making its industri...
Article
Full-text available
Dynamic webservice composition is a promising ICT support service for virtual organizations. However, dynamic webservice composition remains a nondeterministic polynomial (NP) hard problem despite more than 10 years of extensive research, making the applicability of the technique to problems of industrial relevance limited. In [48], we proposed a l...
Article
Full-text available
The use of ATMs has become fundamental in the banking industry owing to the values transacted using these systems and their 24/7 usage. Although several researchers have studied the role of biometrics in security applications for financial institutions, no systematic empirical research has been applied to studying the role of organizational charact...
Article
Full-text available
This paper presents IEEE 802.11 implementation specific issues that may contribute to poor WLAN authentication and access control security performance in a public WLAN. It will also analyse five EAP methods and present a proposed implementation environment based approach for selection of an Extensible Authentication protocol (EAP) method for a Publ...
Article
Full-text available
This paper presents IEEE 802.11 implementation specific issues that may contribute to poor WLAN authentication and access control security performance in a public WLAN. It will also analyse five EAP methods and present a proposed implementation environment based approach for selection of an Extensible Authentication protocol (EAP) method for a Publ...
Article
Full-text available
A major benefit of service composition is the ability to support agile global collaborative virtual organizations. However, being global in nature, collaborative virtual organizations can have several virtual industry clusters (VIC), where each VIC has hundreds to thousands of virtual enterprises that provide functionally similar services exposed a...
Article
Game theory is not only useful in understanding the performance of human and autonomous game players, but it is also widely employed in solving resource allocation problems in distributed decision-making systems. Reinforcement learning is a promising technique that can be used by agents to learn and adapt their strategies in such systems. We have e...
Conference Paper
Developing countries still suffer lack of adequate skilled medical health personnel and poor infrastructure. Expert systems have been identified as potential tools in addressing some aspects of these problems. In particular, most of the earlier researchers investigated the possibility of incorporating diagnostic-support applications in the medical...
Article
Full-text available
Grid computers are integrated environments in which software and hardware resources are pooled in ways that give any user the impression of working with a single fast computer. This paper examines the current advances in grid computers from the point of view of their structures, global attention and support. We particularly relate these matters wit...
Article
Full-text available
Resource allocation involves assigning the resources to the resource users. Where the resources and the resource users do not change with time, the resource allocation problem can be solved as a scheduling problem. Where the resources and the resource users change with time then some different allocation mechanisms are needed. In this paper an envi...
Article
Full-text available
This paper considers the scheduling of n independent jobs on m non-identical machines using the ideas from game theory and multi-agent systems. The values of n and m are fixed at 30 and 6 respectively giving a schedule space with a dimension of approximately 10�� schedules. The agents are used to represent the jobs and they select machines on which...
Article
Full-text available
________________________________________________________________ In this paper the scheduling of n independent jobs on m non-identical machines is considered for a large concrete schedule space for 30 jobs and 6 machines. The schedule space is about 10 23 which is large enough to render exhaustive systematic search for the optimal schedule limited....

Network

Cited By