Search
Now showing items 1-10 of 24
Secure Handover Protocol for High Speed 5GNetworks
(Int.J. AdvancedNetworkingandApplications, 2020-07-07)
The motivations behind 5G networks include seamless handovers, higher data rates, lower latencies of about one milli second, and enhanced coverage compared to 4G networks. To achieve these goals, network densification has ...
Prototype Intelligent Log-based Intrusion Detection System
(Int. J. Advanced Networking and Applications, 2020-07-06)
The maintenance of web server security is a daunting task today. Threats arise from hardware failures, software flaws, tentative probing and worst of all malicious attacks. Analysing server logs to detect suspicious ...
Determinants of Computerized System for Execution of Martime Security Systems
(Journal of Scientific and Engineering Research, 2020)
This paper investigates the determinants of Computerized System for Execution of Martime Security systems at Mombasa port, Kenya:-In particular to establish the effect of Under Water Detection System-Band Radar and Vessel ...
Assessment Of Ict Disaster Recovery And Preparedness Among Health Research Institutions In Kisumu County, Kenya
(International Journal of Scientific & Engineering Research (IJSER), 2020-05)
Research organizations utilize information technology to generate process and transmit both sensitive and vital data that is critical in development of drugs, vaccines and health policy. Despite the role ICT plays in this ...
Delay Sensitive Protocol for High Availability LTE Handovers
(Science Publishing Group, 2020-04-01)
Long delays during the handover process lead to dropped calls which deteriorate the network quality of service. In addition, these delays impede the incorporation of authentication during the handover process which exposes ...
Exploring a Social Learning Perspective on Computer Forensics Barriers and Factors Affecting Cybercrime Investigation in Kenya
(International Research Journal of Innovations in Engineering and Technology (IRJIET), 2020-07)
As Kenya matures into an information society, she is exposed to various cyber threats and challenges resulting from the ubiquity of the internet and advancement of technology. Social engineering tricks have been applied ...
Implementation of MKopa Solar Services for Poverty Eradication
(2020)
M-Kopa Solar is the market leader in 'pay-as-you-go' energy services for off-grid customers; the service has proved to be a key component of poverty reduction in East Africa. Despite its market, the product is undergoing ...
An Information Security Awareness Framework For Secondary School Teachers In Kenya
(International Journal of Innovative Research and Advanced Studies (IJIRAS), 2020-05)
Over the last decade, secondary schools have increased ICT usage in teaching and learning. The technological devices mostly belong to students and staff hence advancing the BYOD culture that makes the ability of the school ...
Application of Technology in Strengthening Collaboration in Research, Teaching and Learning for African Universities in the post COVID-19 Era
(World Journal of Innovative Research, 2020-09-03)
The collaboration and sharing of teaching and technology among universities is increasingly perceived as a vehicle to improve quality in education and innovation through knowledge exchange. The discussion explores how ...
Legal Issues in Computer Forensics and Digital Evidence Admissibility
(ResearchGate, 2020-07-07)
Computer forensics integrates the fields of computer science and law to investigate crime. For digital evidence to be legally admissible in court, investigators should follow proper legal procedures when recovering and ...