Theses and Dissertations: Recent submissions
Now showing items 741-760 of 793
-
Adoption model for smart learning devices as e-learning tools in TVET institution: a case study of Rift Valley Technical Training Institute (RVTTI)
(2018-08-11)Smart learning is the growth of e-learning from the 19th century to 21st-century generations, which enhances the missing component of an e-learning solution. Smart learning most suits for those smart boards, laptops, and ... -
A model to evaluate the effects of information and communication technology (ICT) on small and medium enterprises (SME’s) performance in African cities: case of Nairobi county
(2017-11-10)The study set out to assess the role of Information and Communication Technology (E- commerce tools, Networking components/Internet, and communication technology) on the growth of Small and Medium Enterprises (SMEs), analyze ... -
Data mining approach for building predictive model for crop yield data
(2017-11-05)The application of computer science has led to advancements in various sectors of economies including agricultural production, manufacturing and marketing. Computer algorithms have been used for prediction. There has been ... -
A framework for knowledge as a service in the support of mobile interface ambient learning.
(2017-11-10)Knowledge as a Service (KaaS) has been a promising computing paradigm in the circles of cloud computing environments. In recent times there has been a growing need for access to knowledge on demand that is fully aligned ... -
Framework for bandwidth sharing and reuse in IPTV deployment via wireless spectrum
(2014-11-21)The current evolution of technology in the recent past, television is geared to take a different turn from its traditional form of distribution which has been labeled ‘analogue’ to digital transmission via wireless ... -
Enhancing current aircraft communications addressing and recording system (ACARS)
(2013-10-10)To many people travelling is a normal routine in life. During every day to day activity the issue of transportation does not linger in our minds as it is a norm. However, this is only realised when a horrific accident ... -
Enhanced mobile forensic process model for hand-held devices – A case of smartphones
(2013-11-09)This research is aimed at developing an operating system independent mobile forensics Process Model for Hand-held devices. The earlier works in digital forensics process model have mainly concentrated on process models for ... -
Framework for securing wireless local area network
(2013-09-10)For several decades security and wireless communication will remain to be interesting research areas. Change in technology enables the need of ease of use and flexibility of communications in the computer world without ... -
Design of user authentication model for bluetooth piconet
(2012-11-11)The main objective of this research was to design a user authentication model for the Bluetooth piconets. Bluetooth is a new and young technology of data communication, since its birth it has been facing a lot of challenges. ... -
Data security in government network infrastructure
(2014-11-06)Most public organizations have deployed Local Area Networks in their buildings to enhance sharing of resources. These networks are poorly done such that security of data and information is compromised thereby exposing data ... -
Cloud banking security through third party auditing with a digital signature
(2013-11-10)Cloud computing from the last few years has rapidly grown from a business initiative into one of the fastest growing Emerging Technologies of Information and Communication Technology. It is an Internet based model that ... -
Data security: A tool to address challenges of data confidentiality against domain users in an organization
(2016-11-11)Threats resulting from authorized users, specifically insiders, pose as one of the most challenging security issues that many organizations face today. Insiders often attack using authorized access and with actions very ... -
An integrated web based unified telecommunication solution on an n-tier server architecture.
(2014-11-14)Telecommunications technology is ever evolving to meet the rapid changing needs for services in organizations. Private Automated Branch Exchange/Private Branch Exchange (PABX/PBX) is a telephony platform that is privately ... -
Credit risk assessment for customers of Kenyan commercial banks: A case of co-operative bank
(2018-09-23)Over the last two decades, credit assessments made by commercial banks have been evolving. Instead of the traditional assessment of the banks’ credit experts which is subjective, increased credit risk means that comprehensive ... -
Enhancing the management of wireless clients on infrastructure based WLAN’s: Case of UNDP somalia
(2013-11-11)Network Managements entail managing faults, configurations, accounting, performance and security. This is done to guarantee reliability, availability and confidentially key issues in computer and network systems. Most of ... -
An evaluation of network vulnerability assessment tools
(2014-10-14)The evolution of communication networks has resulted into complex interconnection of devices in wired/wireless networks. While these networks have many benefits, there are security concerns for private and public networks ... -
A vulnerability model for wireless local area networks in an insecure war driving setting
(2013-09-27)Wireless local area networks (WLAN) enable access to computing resources for devices that are not physically connected to a network infrastructure. WLANs usually function in a restricted geographical location such as a ... -
Optimization model of internet usage among Kenyan public universities: A case study of moi university Nairobi campus
(2017-11-17)The aim of this research is to investigate optimization of internet usage among Kenyan Public Universities- Moi University Nairobi Campus as a case study which is a necessity at this current information age where internet ... -
Bandwidth capacity measurement in small-scale wireless IP networks
(2013-11-13)User applications on the internet cannot beget bandwidth guarantees from the network. Therefore, it is important to measure the available capacity bandwidth as well as link capacities so that the user applications may adopt ... -
Integrating femtocells with internet protocol multimedia subsystem
(2017-11-17)The functionality of IMS was to work with wireless access technologies and other network coverage like macro cell, microcells and Femtocells. The trend of next generation networks’ evolution is towards providing multiple ...