Faculty of Computing and Information Management: Recent submissions
Now showing items 101-112 of 112
-
An evaluation of network vulnerability assessment tools
(2014-10-14)The evolution of communication networks has resulted into complex interconnection of devices in wired/wireless networks. While these networks have many benefits, there are security concerns for private and public networks ... -
A vulnerability model for wireless local area networks in an insecure war driving setting
(2013-09-27)Wireless local area networks (WLAN) enable access to computing resources for devices that are not physically connected to a network infrastructure. WLANs usually function in a restricted geographical location such as a ... -
Optimization model of internet usage among Kenyan public universities: A case study of moi university Nairobi campus
(2017-11-17)The aim of this research is to investigate optimization of internet usage among Kenyan Public Universities- Moi University Nairobi Campus as a case study which is a necessity at this current information age where internet ... -
Bandwidth capacity measurement in small-scale wireless IP networks
(2013-11-13)User applications on the internet cannot beget bandwidth guarantees from the network. Therefore, it is important to measure the available capacity bandwidth as well as link capacities so that the user applications may adopt ... -
Integrating femtocells with internet protocol multimedia subsystem
(2017-11-17)The functionality of IMS was to work with wireless access technologies and other network coverage like macro cell, microcells and Femtocells. The trend of next generation networks’ evolution is towards providing multiple ... -
A Model for selecting security protocols for wireless sensor networks
(2013-11-24)ABSTRACT The process of mapping security requirements to the most appropriate security protocol has over the time proved a great challenge. Though there are various security mechanisms designed to curb security threats, ... -
A framework of wide area network (WAN) optimization
(2014-08-11)The fast increasing adoption of information technology and increased digitization has led to generation of large data which needs to be sent across the network. The world is becoming a small globe by the essence of networking ... -
A tool for predicting loss-to-follow-up among people living with HIV at Busia border
(2017-11-09)Human Immuno-Deficiency Virus (HIV) and Acquired Immune Deficiency Syndrome (AIDS) are a global emergency. Infection with HIV can lead to poor health, loss of lives, increased number of orphans and reduced national ... -
Improving performance of 3G mobile data offloading through WiFi networks by data caching
(2013-08-07)In the recent years there has been a skyrocket rise in mobile data usage especially due to the large number of smartphones in use. This has led to a rigorous traffic overloading in cellular networks and the trend is expected ... -
Implementation of a universal public Wi-Fi access
(2013-11-20)As demand for Internet grows and its usage keeps evolving, there is need to create an avenue through which users can have access to this facility wherever they are without subjection to ISP providers; this will facilitate ... -
A road map model towards unified software requirements engineering process management: System dynamics approach
(2018-10-05)The Success of software projects heavily and critically depends on the effectiveness of Requirements Engineering (RE) and the Requirements Engineering Process Improvement (REPI). This research study adopts and applies ... -
Generic model for estimating wlan infrastructure costs
(2013-11-08)In setting up LAN or WLAN infrastructure, the business has to make careful decisions on the choice of LAN or WLAN infrastructure to be laid for them to have a robust LAN infrastructure as well as have cost effective solution. ...