Search
Now showing items 11-20 of 25
congestion aware packet routing for delay sensitive cloud communications
(International Journal of Computer Networks and Applications, 2017-07)
In the recent years, many organizations have turned to cloud technology to support their information technology services. The cloud servers are therefore increasingly holding huge and sensitive information belonging to ...
Data and voice signal intelligence interception over the GSM Um Interface
(International Journal of Research and Innovations in Science and Technology, 2016)
The Enhanced Data rates for GSM Evolution (EDGE) is a digital mobile phone technology that permits enhanced data communication rates as a backward-compatible annex of the Global System for Mobile communications (GSM). It ...
Elements enhancing the use of mobile phone money services: A case of Homa Bay region, Kenya
(World Journal of Computer Application and Technology, 2016)
The history of mobile payments is more than 10 years old and mobile money services in various countries such as Finland are still relatively unpopular, even though consumers have shown clear interest towards mobile money. ...
Challenges facing the use and adoption of mobile phone money services
(World Journal of Computer Application and Technology, 2016)
The Mobile phone banking idea was initially born out of the intention to reach the unbanked rural poor. However, there still existed mobile phone money service divide, highly skewed against the rural poor population. This ...
Factors affecting integrated financial management information system application in Kenyan public sector
(Journal of Scientific and Engineering Research, 2017)
The research aimed at assessing the factors affecting Integrated Financial Management Information system application in Kenyan public sector. There has been a very little improvement in financial management in Kenyan public ...
Theory of reasoned action as an underpinning to technological innovation adoption studies
(World Journal of Computer Application and Technology, 2016)
There are a number of theories and models that have been employed over the years in understanding and studying users’ technology adoption behaviors. These theories and models focus on people’s intention to engage in a ...
Validation of extended theory of reasoned action to predict mobile phone money usage
(World Journal of Computer Application and Technology, 2018)
Theory of Reasoned Action (TRA), postulated by social psychologist, has been established to be relevant in guiding Information Systems studies. The theory resulted from attitude research using the Expectancy Value Models. ...
Evaluation of TCP congestion control modus operandi in mesh networks
(Ever Science Publications, 2017)
In mesh networks, the sender machine is connected to the receiver machine via multiple paths. Efficient transmissions along these paths require proper link choice so as to quickly deliver the packets the destination. Poor ...
Low latency automatic repeat request protocol for time sensitive GSM-enabled smart phone video streaming services
(IJSRCSEIT, 2018)
Automatic repeat request protocols (ARQ) are fundamental error control techniques employed in wired as well as wireless networks. These protocols facilitate error recovery based on feedback messages and retransmissions. ...
Security and acceptance of web based marketing information system among microfinance banks in Nairobi region, Kenya
(HR mars, 2012)
Information system (IS) acceptance has been the subject of much research in the past two decades. Researchers have concentrated their efforts on identifying the conditions or factors that could facilitate the acceptance ...