Search
Now showing items 1-10 of 15
Analysis of partial least squares on split path models: underpinning delone & maclean theory
(Journal of Scientific and Engineering Research, 2017)
The analysis of partial least squares utilizing Structural Equation Modeling is well known as a second generation technique .Its true that , this technique has not been fully utilized in the field of research to handle ...
Enterprise resource planning systems and integrated financial management information system in Kenyan public sector: an assessment
(ijaemr, 2017-02)
Enterprise Resource Planning Systems and Integrated Financial Management Information System have such an important role in global success and become more complex overtime. ERP and IFMIS have not been addressed in full, ...
Effect of integrated financial management information system use in Kenya : case of government treasury
(ijaemr, 2017)
The IFMIS has not been a success in Africa and Kenya in Particular .Why it was unsuccessful in the continent is unknown .This study therefore, aims at examining to assess the effect of IFMIS use : case of Government Treasury. ...
TCP IP header attack vectors and countermeasures
(Science publishing group, 2017-02)
The TCP IP header has security vulnerabilities that make it prone to numerous kinds of attacks such as TCP SYN flooding, TCP RST, source quench, TCP session hijacking, TCP sequence number prediction, port scanning, CHARGEN ...
Assessing emerging innovative applications used in county governments of Kenya
(International Journal of Advanced Research in Computer and Communication Engineering, 2017-08)
In this modern age, the world has witnessed rapid growth and ever-increasing importance of e-government and governments are under pressure from citizens to quick and efficient services. Despite the Kenyan government efforts ...
Secure end point data security using java application programming interface
(IJSRSET, 2017-02)
Most of the current instant messaging applications such as Telegram Secret Chat transmit packets in plain text. This means that an intruder equipped with appropriate remote monitoring tools can sniff the packets being ...
Evaluation of TCP congestion control modus operandi in mesh networks
(International Journal of Computer Networks and Applications, 2017-01)
Abstract – In mesh networks, the sender machine is connected to the receiver machine via multiple paths. Efficient transmissions along these paths require proper link choice so as to quickly deliver the packets the ...
congestion aware packet routing for delay sensitive cloud communications
(International Journal of Computer Networks and Applications, 2017-07)
In the recent years, many organizations have turned to cloud technology to support their information technology services. The cloud servers are therefore increasingly holding huge and sensitive information belonging to ...
Factors affecting integrated financial management information system application in Kenyan public sector
(Journal of Scientific and Engineering Research, 2017)
The research aimed at assessing the factors affecting Integrated Financial Management Information system application in Kenyan public sector. There has been a very little improvement in financial management in Kenyan public ...
Evaluation of TCP congestion control modus operandi in mesh networks
(Ever Science Publications, 2017)
In mesh networks, the sender machine is connected to the receiver machine via multiple paths. Efficient transmissions along these paths require proper link choice so as to quickly deliver the packets the destination. Poor ...