Search
Now showing items 11-20 of 23
Multivariate probabilistic synthesis of cellular networks teletraffic blocking with poissonian distribution arrival rates
(MECS(http://www.mecs-press.net), 2018-07-08)
Cellular networks are characterized by mobility in which subscribers move freely within the coverage area. Since the radio spectrum is a scarce resource, the available bandwidth is divided by using a combination of Time- ...
Mobile money users' functionings and freedoms: Amartya Sen's capability approach
(World Journal of Computer Application and Technology, 2018)
Over the last decade Amartya Sen’s Capability Approach has emerged as the leading alternative to standard economic frameworks for thinking about poverty, inequality and human development generally. Professor Sen has ...
Small Sized Businesses and E-Marketing Adoption: Towards A Conceptual Model
(International Journal of Scientific Research Engineering & Technology (IJSRET), 2018-04)
The purpose of this study was to develop a conceptual framework for studying E-marketing adoption among small businesses in Kenya. The specific objective was to review existing information systems adoption theories and ...
E-Marketing Adoption among Small Businesses in the Hospitality Industry in Kenya: The Institution Theory Perspective
(International Journal of Advanced Research in Computer and Communication Engineering, 2018-06)
Small sized businesses play an important role in the growth of economies all over the world, yet they appear to be slow in adopting E-marketing technology to market their products and services which may lead to business ...
A Dynamic Scheduling Optimization Model (DSOM)
(International Journal of Research in Engineering and Science (IJRES), 2018-05-17)
Scheduling in computing is the rearrangement of machine instructions to obtain the optimal level
services subject to various constraints. The scheduling activity is controlled by a scheduler (part of the Operating Systems ...
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for Securing Data in Cloud Computing
(International Journal of Computer Science and Information Security (IJCSIS), 2018-04)
Cloud computing is a technological paradigm that enables the consumer to enjoy the benefits of computing services and applications without necessarily worrying about the investment and maintenance costs. This paper focuses ...
A Systems Dynamics Model for Mobile Industry Governance in the Context of the Kenyan Vision 2030
(International Journal of System Dynamics Applications, 2018)
This article describes how Kenya has emerged in recent times as one of the fastest-growing telecom markets in the world. This article presents a system dynamics-integrated model of the Kenyan telecommunication sector—mobile ...
Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks
(International Journal of Cyber-Security and Digital Forensics, 2018)
Heterogeneous networks and their applications introduce new shortcomings in terms of access control and confidentiality during handover process. Unfortunately, implementing stronger security mechanisms during the handover ...
A Stratified Cyber Security Vigilance Model: An Augmentation of Risk -Based Information System Security
(Transactions on Networks and Communications, 2018-09-14)
Information system security in the current interconnected environment called the cyber-space is continually getting more sophisticated. All the players involved- governments, corporates, IS security experts and users, both ...
Mobile Phone Penetration and Economic Growth in Kenya: A System Dynamic Approach in the Context of the Kenyan Vision 2030
(Global Scientific Journals, 2018-12-12)
System dynamics modelling is a scientific method for modelling complex, nonlinear natural, economic and technical systems. This research assesses the Kenyan mobile industry thus, identifying success factors and challenges ...