Search
Now showing items 51-60 of 70
Socio-economic Factors Influencing the Spread of Drinking Water Diseases in Rural Africa: Case Study of Bondo-Sub-county, Kenya
(Journal of Water and Health, 2015)
Socio-economic and medical information on Bondo sub-county community was studied to help establish the relationship between the water quality challenges, community health and water rights conditions. Health challenges have ...
Efficient Resource Utilization in Information Security Risk Management Investment
(International Journal of Computer Applications Technology and Research, 2018)
Efficient Resource Utilization in Information Security Risk Management Investment can improve organization resiliency to information security threats through identifying key information assets and security risks so that ...
Information Communication Technology Training as A Prerequisite for E-Government In County Governments Of Kenya
(International Journal of Computer Applications Technology and Research, 2017)
Today, the Kenyan government has invested and endeavored to embrace electronic government (e-government) in almost all ministries to enable speedy service delivery and enhance transparency and accountability by eliminating ...
Assessing the Current Status of Information Security Policies Among Saccos in Kenya
(IISTE, 2019-09-30)
In 2013, Communication Authority of Kenya (CAK) recorded cyber-attacks amounting to Sh5.4 million loses. In April 2016, Bandari Savings and Credit Cooperative Society lost Sh5 million through fraudulent ATM withdrawals ...
Security Evaluation of the Adaptive Congestion Control Algorithms for Virtual Data Center Communication
(European Academic Research, 2016-11)
Virtualization has been vastly implemented in many organizations, facilitating the installation of more than one operating system in one physical machine. This helps save on costs associated with the physical hardware. ...
Greening Decent Employment Opportunities For Kenya’s Youth
(International Journal of Education and Research, 2019-08)
Unemployment of youth in any nation thwarts social fabrics and identity of young potential labor
force globally. This results in less effective and inefficient economic support from the most vibrant
members of the ...
Cyber Physical System Security Model For Remote Sensing Device Protection: A Technical Review
(International Journal of Computer Trends and Technology (IJCTT), 2019-09)
Remote sensing devices have emerged as a significant technology that enables the monitoring of processes and physical environment from far away locations. These remote sensing systems include physiological sensors installed ...
A Comparative Study of C, C++, C# and Java Programming Languages: Underpinning Structure Equation Modeling, Data Structures and Algorithm
(Journal of Scientific and Engineering Research,, 2019)
Equation Modeling technique has not been fully utilized in the field of Software analysis in handling complex data analysis and modeling on programming languages by a number of researches globally and specifically by ...
Empirical Analysis of Clustered Network Traffic over Digital Communication Channels
(EverScience Publications, 2016-11)
The concept of clustering traffic is a noble idea from a number of perspectives. In digital communication channels, signals from different sources are multiplexed at the source and carried on a single communication channel. ...
Deployment and Use of Mobile Technology to Control Malaria
(Journal of Information Technology & Software Engineering, 2019-05-10)
Malaria is a significant public health problem and impediment to socioeconomic development in the developing countries. According to World Health Organization (WHO) report, the number of malaria cases increased to 219 ...