Now showing items 23-42 of 117

    • Data and voice signal intelligence interception over the GSM Um Interface 

      Omollo, Vincent N.; Abeka, Silvance O.; Ogara, Solomon O. (International Journal of Research and Innovations in Science and Technology, 2016)
      The Enhanced Data rates for GSM Evolution (EDGE) is a digital mobile phone technology that permits enhanced data communication rates as a backward-compatible annex of the Global System for Mobile communications (GSM). It ...
    • Data Modeling Techniques Used for Big Data in Enterprise Networks 

      Omollo, Richard; Alago, Sabina (International Journal of Advanced Technology and Engineering Exploration, 2020-04-20)
      The deployment and maintenance of enterprise networks form the bedrock of any organization, be it government, commercial, academic, and/or non-profit making. These networks host vast amounts of information, databases, in ...
    • Delay Sensitive Protocol for High Availability LTE Handovers 

      Nyangaresi, Vincent Omollo; Abeka, Silvance Onyango; Rodrigues, Anthony Joachim (American Journal of Networks and Communications, 2020-04-01)
      Long delays during the handover process lead to dropped calls which deteriorate the network quality of service. In addition, these delays impede the incorporation of authentication during the handover process which exposes ...
    • Delay Sensitive Protocol for High Availability LTE Handovers 

      Nyangaresi, Vincent Omollo; Abeka, Silvance Onyango; Rodrigues, Anthony Joachim (Science Publishing Group, 2020-04-01)
      Long delays during the handover process lead to dropped calls which deteriorate the network quality of service. In addition, these delays impede the incorporation of authentication during the handover process which exposes ...
    • Deployment and Use of Mobile Technology to Control Malaria 

      Onoka, Kelvin Onyango; Ogalo, James Ochieng; Ogara, Solomon (Journal of Information Technology & Software Engineering, 2019-05-10)
      Malaria is a significant public health problem and impediment to socioeconomic development in the developing countries. According to World Health Organization (WHO) report, the number of malaria cases increased to 219 ...
    • Determinants of Computerized System for Execution of Martime Security Systems 

      Mutongwa, Sanja Michael; Rodrigues, Anthony J. (Journal of Scientific and Engineering Research, 2020)
      This paper investigates the determinants of Computerized System for Execution of Martime Security systems at Mombasa port, Kenya:-In particular to establish the effect of Under Water Detection System-Band Radar and Vessel ...
    • Determinants of adoption of internet banking by trade finance customers in East Africa 

      Abeka, Silvance O.; Abeka, Evance Ochieng’; Omondi., Ondoro Charle (HR mars, 2012)
      It is increasingly more interesting to the bank managers to understand what is important to customers when it comes to Internet banking, and especially banking conducted by the customers themselves. The purpose of this ...
    • Digital Community Currency Usability from the User’s Eyes: Cases of Sarafu and Maendeleo Trading Credit (Mtcr.) 

      Alago, Sabina; Ogara, Solomon; Oloko, Michael; Kiak, Richard (International Journal of Software Engineering & Applications (IJSEA), 2023-03)
      Day by day, users demand systems that fulfill their expectations. Often, users of a system are dissatisfied because systems do not meet their expectations. Indeed, user expectations vary, including unrealistic expectations ...
    • Domestic violence in relation to children rights in Dar es Salaam, Tanzania 

      Marco, Bitaho B.; Jagero, Nelson; Abeka, Silvance O. (2011-09)
      This paper discusses domestic violence in relation to children rights in Temeke District Dar es salaam Tanzania. The main objective is to investigate rights of domestic violence affected children in households in so as to ...
    • A Dynamic Scheduling Optimization Model (DSOM) 

      Agola, Joshua; Raburu, George (International Journal of Research in Engineering and Science (IJRES), 2018-05-17)
      Scheduling in computing is the rearrangement of machine instructions to obtain the optimal level services subject to various constraints. The scheduling activity is controlled by a scheduler (part of the Operating Systems ...
    • E-Marketing Adoption among Small Businesses in the Hospitality Industry in Kenya: The Institution Theory Perspective 

      Omoga, Charles Owuor; Raburu, George; Liyala, Samuel (International Journal of Advanced Research in Computer and Communication Engineering, 2018-06)
      Small sized businesses play an important role in the growth of economies all over the world, yet they appear to be slow in adopting E-marketing technology to market their products and services which may lead to business ...
    • E-Proctored Model: Electronic Solution Architect for Exam Dereliction in Kenya 

      Omol, Edwin; Abeka, Silvance; Wauyo, Fred (International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), 2007-02)
      The paper after reviewing various relevant literature proposes effective and efficient model to curb exam derelictions in pre-university exams in Kenya. Since all irregularities, including fraudulent results, have a ...
    • Effect of integrated financial management information system use in Kenya : case of government treasury 

      Mutong'wa, Sanja Michael; Rodrigues, Anthony J; Liyala, Samuel (ijaemr, 2017)
      The IFMIS has not been a success in Africa and Kenya in Particular .Why it was unsuccessful in the continent is unknown .This study therefore, aims at examining to assess the effect of IFMIS use : case of Government Treasury. ...
    • Effectiveness of security controls on electronic health records 

      Wanyonyi, Everleen; Rodrigues, Anthony; Abeka, Silvance O.; Ogara, Solomon (IJSTR, 2017-12)
      Electronic Health Record (EHR) systems enhance efficiency and effectiveness in handling patients ‘information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting ...
    • Effects of Information System Controls on Enhancing Security of Information Systems within Universities 

      Unknown author (IOSR Journal of Engineering (IOSRJEN), 2017-11-11)
      Universities in the world today consider information to be their most important asset. They therefore ensure information security by taking appropriate measures to ensure no information is leaked or passed to unauthorized ...
    • Efficient Group Authentication Protocol for Secure 5G Enabled Vehicular Communications 

      Omollo, Vincent Nyangaresi; Joachim, Anthony Rodrigues; Onyango, Silvance Abeka (IEEE, 2020-12-30)
      The fifth generation (5G) networks exhibit extremely low latency, extremely high bandwidth, and high density connections that are salient features for the support of vehicle to everything (V2X) services. Although a lot of ...
    • Efficient Resource Utilization in Information Security Risk Management Investment 

      Nyapete, Mitende Nicholus; Rodrigues, Anthony J.; Liyala, Samuel (International Journal of Computer Applications Technology and Research, 2018)
      Efficient Resource Utilization in Information Security Risk Management Investment can improve organization resiliency to information security threats through identifying key information assets and security risks so that ...
    • Elements enhancing the use of mobile phone money services: A case of Homa Bay region, Kenya 

      Otieno, Odoyo Collins; Liyala, Samuel; Odongo, Benson Charles; Abeka, Silvance O. (World Journal of Computer Application and Technology, 2016)
      The history of mobile payments is more than 10 years old and mobile money services in various countries such as Finland are still relatively unpopular, even though consumers have shown clear interest towards mobile money. ...
    • Emerging Security Challenges due to Bring Your Own Device Adoption 

      Ounza, Jairus E; Liyala, Samuel; Ogara, Solomon (International Journal of Science and Research (IJSR), 2018-01-01)
      Although a number of researches have been carried out by various organizations across the globe to establish security challenges facing education institutions due to BYOD adoption there is no evidence that a similar study ...
    • Empirical Analysis of Clustered Network Traffic over Digital Communication Channels 

      Nyangaresi, Vincent O.; Ogara, S.; Abeka, S. (EverScience Publications, 2016-11)
      The concept of clustering traffic is a noble idea from a number of perspectives. In digital communication channels, signals from different sources are multiplexed at the source and carried on a single communication channel. ...