Browsing School of Informatics & Innovative Systems by Title
Now showing items 75-94 of 117
-
Machine Learning Protocol for Secure 5G Handovers
(JOOUST, 2022-01-27)The fifth generation (5G) networks are characterized with ultra-dense deployment of base stations with limited footprint. Consequently, user equipment’s handover frequently as they move within 5G networks. In addition, 5G ... -
Mobile money users' functionings and freedoms: Amartya Sen's capability approach
(World Journal of Computer Application and Technology, 2018)Over the last decade Amartya Sen’s Capability Approach has emerged as the leading alternative to standard economic frameworks for thinking about poverty, inequality and human development generally. Professor Sen has ... -
Mobile Phone Penetration and Economic Growth in Kenya: A System Dynamic Approach in the Context of the Kenyan Vision 2030
(Global Scientific Journals, 2018-12-12)System dynamics modelling is a scientific method for modelling complex, nonlinear natural, economic and technical systems. This research assesses the Kenyan mobile industry thus, identifying success factors and challenges ... -
Model for HIV infection and database
(Research Gate, 2015-08)In this paper the development of HIV infection and its different stages are described first by medical stages. By making use of the differential equations, model for various stages and the growth of HIV infection has been ... -
Model for information security governance prediction in public Universities in Kenya
(2018)Information is one of the most important assets in Organizations worldwide. To enable secure business operations, an organization must have an effective security governance strategy. The study focused on Information security ... -
Multivariate probabilistic synthesis of cellular networks teletraffic blocking with poissonian distribution arrival rates
(MECS(http://www.mecs-press.net), 2018-07-08)Cellular networks are characterized by mobility in which subscribers move freely within the coverage area. Since the radio spectrum is a scarce resource, the available bandwidth is divided by using a combination of Time- ... -
On Theory and Applications of Mathematics to Security in Cloud Computing: A Case of Addition-Composition Fully Homomorphic Encryption Scheme
(International Journal of Academic Studies, 2016-04-12)Addition-Composition Fully Homomorphic Encryption is given inthis paper to solve data security equation in cloud computation. An earlierattempt to solve security problem has been proposed by Craig Gentry,who combined ... -
Organizational Factors Influencing Corporates Implementing Server Virtualization Technology: A Survey of Companies Listed on the Nairobi Securities Exchange, Kenya
(CIS, 2014)Although it is widely acknowledged that server virtualization technology has the potential to transform a large part of the IT industry, issues surrounding the adoption of virtualization technology have received relatively ... -
Perceived importance and perfomance of information systems in Azam company- Dar es Salaam
(International Journal of Learning & Development, 2012)It is increasingly more interesting to the Companies to understand the relationship existing between perceived importance and performance of information systems within their companies. The purpose of this paper is to explore ... -
Perceived usefulness, ease of use, organizational and bank support as determinants of adoption of internet banking in east Africa
(HRMARS, 2012-10)The purpose of this paper to identify the factors that influence corporate customers adoption of Internet banking services in Kenya, Uganda, Tanzania and Rwanda. The hypotheses are empirically evaluated by using Trade ... -
Prototype Intelligent Log-based Intrusion Detection System
(Int. J. Advanced Networking and Applications, 2020-07-06)The maintenance of web server security is a daunting task today. Threats arise from hardware failures, software flaws, tentative probing and worst of all malicious attacks. Analysing server logs to detect suspicious ... -
A Review of Factors Influencing e-Health Adoption in Kenya: Barriers And Facilitators
(2014)Over the past few decades, there has been a great leap in the development of Information and Communication Technology (ICT); both in hardware and software capabilities. This has provided a sound platform for their ... -
The Role of ICT in Appreciating Tri-Axis Efforts of Research, Publications and Library Services in Higher Education
(2013)Information and Communication Technology (ICT) is a principal enabler to nearly all functional efforts including quality assurance sustenance in higher education. Studies have revealed that research has a feeder effect ... -
Secure end point data security using java application programming interface
(IJSRSET, 2017-02)Most of the current instant messaging applications such as Telegram Secret Chat transmit packets in plain text. This means that an intruder equipped with appropriate remote monitoring tools can sniff the packets being ... -
Secure Handover Protocol for High Speed 5GNetworks
(Int.J. AdvancedNetworkingandApplications, 2020-07-07)The motivations behind 5G networks include seamless handovers, higher data rates, lower latencies of about one milli second, and enhanced coverage compared to 4G networks. To achieve these goals, network densification has ... -
Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks
(International Journal of Cyber-Security and Digital Forensics, 2018)Heterogeneous networks and their applications introduce new shortcomings in terms of access control and confidentiality during handover process. Unfortunately, implementing stronger security mechanisms during the handover ... -
Security and acceptance of web based marketing information system among microfinance banks in Nairobi region, Kenya
(HR mars, 2012)Information system (IS) acceptance has been the subject of much research in the past two decades. Researchers have concentrated their efforts on identifying the conditions or factors that could facilitate the acceptance ... -
Security evaluation of cellular networks handover techniques
(MECS (http://www.mecs-press.org/), 2018-05)This paper examined the handovers in cellular networks from both functional and informational security point of view. The aim was to find out if the security goals of confidentiality, integrity and availability (CIA) are ... -
Security Evaluation of the Adaptive Congestion Control Algorithms for Virtual Data Center Communication
(European Academic Research, 2016-11)Virtualization has been vastly implemented in many organizations, facilitating the installation of more than one operating system in one physical machine. This helps save on costs associated with the physical hardware. ... -
Server Virtualization Technology: A proposed Implementation Model
(IISTE, 2019-04-30)The study sought to fill the existing gap on issues surrounding the implementation of Server virtualization technology, which have received relatively little attention. The study investigated the implementation ...