Theses and Dissertations: Recent submissions
Now showing items 721-740 of 792
-
Remote server management using cell phone technologies
(2014-11-16)Server management has the capability to provide configuration, operations, problem fixing and performance management services between the servers and clients in different locations on the network, this is basically a ... -
RFID hand held devices tracing and recovery
(2017-11-18)Hand held devices such as laptops, mobile phones and tablets are small in size and therefore easily concealable. They have a ready market and a high resale value making them an easy target for theft for their hardware value ... -
Hybrid trust model to prevent black hole attack in mobile ad-hoc network
(2016-10-17)Mobile Ad Hoc Network is an emerging technology which allows nodes to communicate together irrespective of where they are located. MANET is composed of mobile devices with self-configuring capability and which exchange ... -
A model for measuring impact Of digitization in schools
(2017-11-20)Certainly, digitization has become ubiquitous; now. Almost in all the sectors we routinely interact with digital technologies. In this generation it is elating to be referred as ‗digital‘ and degrading to be referred to ... -
Using information gain to evaluate Weigh-in-motion axle load management information system
(2017-10-06)Delays and other operational inefficiencies at weighbridges in Kenya has remained persistent over the years. This delays have led to astronomical rise in transport costs to transporters. These costs are mostly passed on ... -
Data mining using frat-rfm analysis approach for customer segmentation and profiling: Case study co-operative bank of Kenya
(2017-11-10)With the Mobile Phones access increases rapidly and multi-channeling becoming increasingly widespread, studies of consumers will need to focus not just on understanding product choice, the reasons for channel choice but ... -
An integrated model of information system adoption in organizations
(2017-11-27)Most organizations are classified as either small, medium or large. Based on the level of classification, there are determinant variables which influence the adoption of Information Systems information systems (IS) within ... -
Model for narrow band interference control in ultra-wide band (UWB) indoor wireless networks
(2017-11-18)Ultra-wide band (UWB) also known as digital pulse wireless is a wireless technology for transmitting large amount of digital data over a wide spectrum frequency bands with low power over short distances. Ultra-wide band ... -
A byod framework for secure use of mobile devices in universities: The case of universities in Kenya
(2017-11-16)This project was to find out security threats, challenges and attacks brought about by BYOD adoption in institutions. Universities in Kenya as institutions of higher learning were chosen as a case study because BYOD was ... -
Churn prediction in telecommunication industry in Kenya using decision tree – Case study orange Kenya
(2017-10-15)Customer churn in the telecommunication industry is still a big problem because emerging new technologies, lower costs, among other factors. Right now Kenya is developing at a very fast rate and the market is getting new ... -
An algorithm for green communication signal reconstruction in wireless sensor network. Case study Kenya prisons telecommunication
(2017-11)Environmental consideration provides news trends in wireless communication network known as green communication. The main object of green communication is to save as much as possible the energy consumption of the communication ... -
A tool for detecting and distributing TV white spaces for commercial purposes
(2017-11)Chapter one contains the title of the project, the background information, the problem statement and the source of the problem. A description of the general objective, the aim of the study, a brief description of the ... -
Vishing attack detection model for mobile users.
(2017-11-04)Voice phishing (vishing) is a type of phishing attack where social engineers manipulate individuals during phone conversation into divulging sensitive information. Mobile users are target to most criminals, through mobile ... -
A job matching system to transform casual job market in Kenya
(2018-08-14)This project objective was to come up with job matching application for use by casual workers and employers. The process of identifying challenges, opportunities, desired features and solution was designed to be a rigorous ... -
Data-centric security and governance for data
(2016-11-14)The information security has never been as important as it is today for the business, Health, Banking and education organizations and individuals alike, because Many organizations around the world depend today on reliable ... -
Usability of mobile based participatory sensing application using intelligent agents
(2017-10-10)Citizens can act as sensors in crises management and volunteers for Geographic information and their surroundings. The proliferation of mobile phone in the developing countries sets a stage for the users to become participants ... -
Adoption model for smart learning devices as e-learning tools in TVET institution: a case study of Rift Valley Technical Training Institute (RVTTI)
(2018-08-11)Smart learning is the growth of e-learning from the 19th century to 21st-century generations, which enhances the missing component of an e-learning solution. Smart learning most suits for those smart boards, laptops, and ...