Search
Now showing items 61-70 of 161
Adaptive Congestion Control Algorithm for Virtualized Cloud Data Communication
(JOOUST, 2017-11)
The purpose of this research thesis was to design and implement an adaptive congestion control algorithm for virtualized cloud data communication. A congested network leads to packet losses and delays, which in extreme ...
Implementing a Risk Management Strategy for Funsoft in Three Public Hospitals in Kisumu County
(JOOUST, 2015)
As the adoption rate of electronic health record continues to accelerate, the need to enhance information risk management has become more critical to create, compliant health care environment. Healthcare providers and ...
Analysis of Cyber crime Preventation Measures and Practises in Public Cybercafes in Kisumu City
(JOOUST, 2015)
The dependency of government, industry and society on Information Communication Technology (ICT) has attracted criminals, who use these systems to defraud or cause harm to users of these systems, leading to increase in ...
Factors Influencing Sorghum Production by Smallholder Farmers in Waia Division, Makueni County, Kenya
(JOOUST, 2015-10)
Smallholder farmers in arid and semi arid lands in Kenya are frequently affected by drought and famine which lead to starvation and malnutrition especially of children, women, the aged and disabled. Maize being the most ...
Tensor Products and Norms of Inner Derivations Induced by Norm-Attainable Operators
(JOOUST, 2018)
Several investigations have been done on properties of derivations act¬ing on C* -algebras and their subalgebras and these include their norms, boundedness, numerical ranges, spectra and the operators inducing them. The ...
Effectiveness of Cloud Computing Security on Mobile Learning
(JOOUST, 2018)
In the last few years, most Kenyan universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing ...
Assessment of the Level of Compliance by the Universities to their ICT Security Policies: A Survey of Kisumu and Siaya Counties
(JOOUST, 2015-03)
Today, almost all organizations around the world are using Information Communication Technology (]CT) in their daily business. An ICT policy safeguards Confidentiality, Integrity and Availability (CIA) oflnformation Systems ...
Factors Affecting the Implementation of Community Afforestation Initiative Projects in Kenya: A Case of Kenya Forest Service
(JOOUST, 2016)
Afforestation projects are crucial for maintaining and improving the productivity of agricultural lands as well as sustaining the ecological balance of water catchment areas. The aim of the study was to assess factors ...
Effective Bandwith Management in a Campus
(JOOUST, 2013)
Small campus networks usually do not have a set of rules for users to access the network in order to protect network resources and enforce institutional policies (for instance, no sharing of music files or no gaming). This ...
Influence of Conflict Management strategies on Performance of National Registration Bureau in Busia County
(JOOUST, 2018)
Conflict becomes a problem when it lowers morale, causes more conflicts and causes inappropriate behaviors, which ultimately affects performance. Over 35.4% of 183 employees in national registration bureaus in Busia County ...