School of Informatics & Innovative Systems: Recent submissions
Now showing items 61-80 of 119
-
A System Dynamics Model of Technology and Society: In the Context of a Developing Nation
(International Journal of System Dynamics Applications, 2020)Kenya has emerged in recent times as one of the fastest growing telecom markets in the world. There is not a single, widely used paradigm which has synthesized the various schools and theories dealing with technology and ... -
Determinants of Computerized System for Execution of Martime Security Systems
(Journal of Scientific and Engineering Research, 2020)This paper investigates the determinants of Computerized System for Execution of Martime Security systems at Mombasa port, Kenya:-In particular to establish the effect of Under Water Detection System-Band Radar and Vessel ... -
Secure Handover Protocol for High Speed 5GNetworks
(Int.J. AdvancedNetworkingandApplications, 2020-07-07)The motivations behind 5G networks include seamless handovers, higher data rates, lower latencies of about one milli second, and enhanced coverage compared to 4G networks. To achieve these goals, network densification has ... -
Prototype Intelligent Log-based Intrusion Detection System
(Int. J. Advanced Networking and Applications, 2020-07-06)The maintenance of web server security is a daunting task today. Threats arise from hardware failures, software flaws, tentative probing and worst of all malicious attacks. Analysing server logs to detect suspicious ... -
Delay Sensitive Protocol for High Availability LTE Handovers
(American Journal of Networks and Communications, 2020-04-01)Long delays during the handover process lead to dropped calls which deteriorate the network quality of service. In addition, these delays impede the incorporation of authentication during the handover process which exposes ... -
A System Dynamics Model of Technology and Society: In the Context of a Developing Nation
(International Journal of System Dynamics Applications, 2020)Kenya has emerged in recent times as one of the fastest growing telecom markets in the world. There is not a single, widely used paradigm which has synthesised the various schools and theories dealing with technology and ... -
ENVIRONMENTAL MICROBIOLOGY
(2019) -
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for Securing Data in Cloud Computing
(International Journal of Computer Science and Information Security (IJCSIS), 2018-04)Cloud computing is a technological paradigm that enables the consumer to enjoy the benefits of computing services and applications without necessarily worrying about the investment and maintenance costs. This paper focuses ... -
Up Scaling Invasive Plant Biomass Briquette Production: Case of Kendu Bay, Lake Victoria, Kenya
(Advances in Social Sciences Research Journal, 2017-02-25)Simple, production processes involving local community labour provide useful cottage fuel products. Such conversion of waste or intrusive bio mass to fuel briquettes is more about know-how than large capital infrastructure ... -
A Dynamic Scheduling Optimization Model (DSOM)
(International Journal of Research in Engineering and Science (IJRES), 2018-05-17)Scheduling in computing is the rearrangement of machine instructions to obtain the optimal level services subject to various constraints. The scheduling activity is controlled by a scheduler (part of the Operating Systems ... -
E-Marketing Adoption among Small Businesses in the Hospitality Industry in Kenya: The Institution Theory Perspective
(International Journal of Advanced Research in Computer and Communication Engineering, 2018-06)Small sized businesses play an important role in the growth of economies all over the world, yet they appear to be slow in adopting E-marketing technology to market their products and services which may lead to business ... -
Small Sized Businesses and E-Marketing Adoption: Towards A Conceptual Model
(International Journal of Scientific Research Engineering & Technology (IJSRET), 2018-04)The purpose of this study was to develop a conceptual framework for studying E-marketing adoption among small businesses in Kenya. The specific objective was to review existing information systems adoption theories and ... -
Load Balanced Network: Design, Implementation and Legal Consideration Issues
(Transactionss on Networks and Communication, 201-09-14)Computer networks have become extremely useful in the modern fast paced work and business environments. Every user of a computing device- desktops, laptops, tablets and mobile phones- wants to connect to a network and ... -
Mobile money users' functionings and freedoms: Amartya Sen's capability approach
(World Journal of Computer Application and Technology, 2018)Over the last decade Amartya Sen’s Capability Approach has emerged as the leading alternative to standard economic frameworks for thinking about poverty, inequality and human development generally. Professor Sen has ... -
Towards an integrated framework for rural development in Kenya
(IEEE, 2016)Information Communication Technology (ICT) is a powerful tool which can accelerate socio-economic development in developing nations. The growth of information is the main compelling reason for new cutting edge technologies ... -
Effectiveness of security controls on electronic health records
(IJSTR, 2017-12)Electronic Health Record (EHR) systems enhance efficiency and effectiveness in handling patients ‘information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting ... -
Multivariate probabilistic synthesis of cellular networks teletraffic blocking with poissonian distribution arrival rates
(MECS(http://www.mecs-press.net), 2018-07-08)Cellular networks are characterized by mobility in which subscribers move freely within the coverage area. Since the radio spectrum is a scarce resource, the available bandwidth is divided by using a combination of Time- ... -
Security evaluation of cellular networks handover techniques
(MECS (http://www.mecs-press.org/), 2018-05)This paper examined the handovers in cellular networks from both functional and informational security point of view. The aim was to find out if the security goals of confidentiality, integrity and availability (CIA) are ... -
Low latency automatic repeat request protocol for time sensitive GSM-enabled smart phone video streaming services
(IJSRCSEIT, 2018)Automatic repeat request protocols (ARQ) are fundamental error control techniques employed in wired as well as wireless networks. These protocols facilitate error recovery based on feedback messages and retransmissions. ... -
Security and acceptance of web based marketing information system among microfinance banks in Nairobi region, Kenya
(HR mars, 2012)Information system (IS) acceptance has been the subject of much research in the past two decades. Researchers have concentrated their efforts on identifying the conditions or factors that could facilitate the acceptance ...