Browsing by Title
Now showing items 10505-10524 of 12107
-
Seasonality of food supply, coping strategies and child nutritional outcome in Sabatia-Kenya
(Airiti library, 2010)This study was conducted in Kenya. Samples of children and caregivers were selected using the EPI method. Food vendors and procurement strategy, demographic and socio-economic indicators of household were analyzed. A social ... -
Seawater Intrusion Vulnerability Assessment of a Coastal Aquifer: North Coast Of Mombasa, Kenya as a Case Study
(International Journal of Engineering Research and Application, 2016-08)Groundwater pollution in the north coast of Mombasa is not only from surface sources but also from the intrusion of seawater via the Indian Ocean and creeks. This study assessed the vulnerability of the coastal aquifer to ... -
SECONDARY SCHOOL CURRICULUM
(2018-04) -
SECONDARY SCHOOL CURRICULUM
(JOOUST, 2013) -
Secondary school internet and network usage policy and students’ learning outcome in public day secondary schools in Kenya
(HRMARS, 2017)The school network access should offer students with exceptional chances to obtain information, engage in discussion, and liaise with individuals, organizations and groups in the so as to increase skills, knowledge and ... -
Secondary school principals in Nyamira County in Kenya: Issues and challenges
(SAVAP International, 2013)The purpose of this study was to establish the challenges that confront principals of secondary schools in Nyamira County in Kenya. The study adopted a descriptive survey and questionnaires were employed to collect data. ... -
Secrets in stone
(Kenya Museum Society, 2006-01)Ohingni (singular: ohinga) are ruins of dry-stone walled settlement enclosures unique in Kenya and East Africa. They are architecturally similar to the dry-stone structures of Zimbabwe and Botswana, though less skillfully ... -
Secure end point data security using java application programming interface
(IJSRSET, 2017-02)Most of the current instant messaging applications such as Telegram Secret Chat transmit packets in plain text. This means that an intruder equipped with appropriate remote monitoring tools can sniff the packets being ... -
Secure Handover Protocol for High Speed 5GNetworks
(Int.J. AdvancedNetworkingandApplications, 2020-07-07)The motivations behind 5G networks include seamless handovers, higher data rates, lower latencies of about one milli second, and enhanced coverage compared to 4G networks. To achieve these goals, network densification has ... -
Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks
(International Journal of Cyber-Security and Digital Forensics, 2018)Heterogeneous networks and their applications introduce new shortcomings in terms of access control and confidentiality during handover process. Unfortunately, implementing stronger security mechanisms during the handover ... -
Secure Virtualized Client Server Insant Messging Through Port-Based Algorithm
(JOOUST, 2018)Instant messaging has grown to become a very important means of communication among organization staff and among individuals outside an organization. The problem with this form of communication is that some of the instant ... -
SECURING AN E COMMERCE INFRASTRUCTURE
(JOOUST, 2013) -
SECURING AN E-COMMERCE INFRASTRUCTURE
(JOOUST, 2017) -
SECURING E-COMMERCE INFRASTRUCTURE
(JOOUST, 2013) -
SECURITY ANALYSIS AND VALUATION
(JOOUST, 2016) -
SECURITY ANALYSIS AND VALUATION
(JOOUST, 2019) -
Security Analysis and Valuation
(2019) -
Security Analysis and Valuation
(2019)