Search
Now showing items 51-60 of 85
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for Securing Data in Cloud Computing
(International Journal of Computer Science and Information Security (IJCSIS), 2018-04)
Cloud computing is a technological paradigm that enables the consumer to enjoy the benefits of computing services and applications without necessarily worrying about the investment and maintenance costs. This paper focuses ...
ENVIRONMENTAL MICROBIOLOGY
(2019)
A Systems Dynamics Model for Mobile Industry Governance in the Context of the Kenyan Vision 2030
(International Journal of System Dynamics Applications, 2018)
This article describes how Kenya has emerged in recent times as one of the fastest-growing telecom markets in the world. This article presents a system dynamics-integrated model of the Kenyan telecommunication sector—mobile ...
Kenya's vision 2030: Modelling technology usage and the economy
(Technology in Science, 2019-11)
Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks
(International Journal of Cyber-Security and Digital Forensics, 2018)
Heterogeneous networks and their applications introduce new shortcomings in terms of access control and confidentiality during handover process. Unfortunately, implementing stronger security mechanisms during the handover ...
A Conceptual Model for ICT for Economic Development Using Complex Adaptive System Approach: Case of a Micro and Small Enterprise (MSE) Association
(International Journal of Computing and ICT Research, 2013)
The purpose of the paper is to contribute towards providing a methodology which researchers in Information and Communication Technology (ICT) for development can use to design result-oriented programs. In this paper CAS ...
An Adaptive ICT-Enabled Model for Knowledge Identification and Management for Enterprise Development
(International Journal of System Dynamics Applications, 2014)
Knowledge is vital in achieving enterprise growth and development. This paper argues that treating knowledge management as a Complex Adaptive System (CAS) presents an alternative lens within which processes within knowledge ...
Model for HIV infection and database
(Research Gate, 2015-08)
In this paper the development of HIV infection and its different stages are described first by medical stages. By making use of the differential equations, model for various stages and the growth of HIV infection has been ...
Converting Water Hyacinth to Briquettes: A Beach Community Based Approach
(International Journal of Sciences: Basic and Applied Research (IJSBAR), 2014)
Attempts by the government of Kenya to control the noxious water hyacinth via various intervention efforts have had limited success only for the weed to resurge. The proliferation of water hyacinth in Lake Victoria – Kenya ...
A Stratified Cyber Security Vigilance Model: An Augmentation of Risk -Based Information System Security
(Transactions on Networks and Communications, 2018-09-14)
Information system security in the current interconnected environment called the cyber-space is continually getting more sophisticated. All the players involved- governments, corporates, IS security experts and users, both ...