Search
Now showing items 41-50 of 95
What Theory of Change Can Contribute to Capability Approach: Towards Evaluating ICT-Enabled Interventions
(IEEE, 2018)
Sen's Capability Approach (CA) has emerged as holistic lenses for theorising development within Information and Communication Technology for Development (ICT4D) discourses. There is ongoing research on operationalising CA ...
Security evaluation of cellular networks handover techniques
(MECS (http://www.mecs-press.org/), 2018-05)
This paper examined the handovers in cellular networks from both functional and informational security point of view. The aim was to find out if the security goals of confidentiality, integrity and availability (CIA) are ...
Multivariate probabilistic synthesis of cellular networks teletraffic blocking with poissonian distribution arrival rates
(MECS(http://www.mecs-press.net), 2018-07-08)
Cellular networks are characterized by mobility in which subscribers move freely within the coverage area. Since the radio spectrum is a scarce resource, the available bandwidth is divided by using a combination of Time- ...
Effectiveness of security controls on electronic health records
(IJSTR, 2017-12)
Electronic Health Record (EHR) systems enhance efficiency and effectiveness in handling patients ‘information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting ...
Mobile money users' functionings and freedoms: Amartya Sen's capability approach
(World Journal of Computer Application and Technology, 2018)
Over the last decade Amartya Sen’s Capability Approach has emerged as the leading alternative to standard economic frameworks for thinking about poverty, inequality and human development generally. Professor Sen has ...
Towards an integrated framework for rural development in Kenya
(IEEE, 2016)
Information Communication Technology (ICT) is a powerful tool which can accelerate socio-economic development in developing nations. The growth of information is the main compelling reason for new cutting edge technologies ...
Up Scaling Invasive Plant Biomass Briquette Production: Case of Kendu Bay, Lake Victoria, Kenya
(Advances in Social Sciences Research Journal, 2017-02-25)
Simple, production processes involving local community labour provide useful cottage fuel products. Such conversion of waste or intrusive bio mass to fuel briquettes is more about know-how than large capital infrastructure ...
Secure Handover Protocol for High Speed 5GNetworks
(Int.J. AdvancedNetworkingandApplications, 2020-07-07)
The motivations behind 5G networks include seamless handovers, higher data rates, lower latencies of about one milli second, and enhanced coverage compared to 4G networks. To achieve these goals, network densification has ...
Prototype Intelligent Log-based Intrusion Detection System
(Int. J. Advanced Networking and Applications, 2020-07-06)
The maintenance of web server security is a daunting task today. Threats arise from hardware failures, software flaws, tentative probing and worst of all malicious attacks. Analysing server logs to detect suspicious ...
Converting Water Hyacinth to Briquettes: A Beach Community Based Approach
(International Journal of Sciences: Basic and Applied Research (IJSBAR), 2014)
Attempts by the government of Kenya to control the noxious water hyacinth via various intervention efforts have had limited success only for the weed to resurge. The proliferation of water hyacinth in Lake Victoria – Kenya ...