Search
Now showing items 1-7 of 7
Evaluation of guidelines for security threats in mobile-phone banking
(International Journal of Engineering and Mathematical Sciences, 2018)
Globally, banking institutions are using mobile phones to provide financial services to reach those with or without bank accounts. However mobile phones do suffer from security threats when used for banking purposes these ...
Factors influencing the selection of mobile phone among university students in Kenya
(International Journal of Innovative Research and Advanced Studies, 2018)
Mobile phone technology has reached unprecedented level leading to unconstrained selection nightmare. This study investigates the selection priorities of mobile phone among university students in Kenya. A total of 310 ...
An optimized model for transition from Ipv4 to Ipv6 networks in a cloud computing environment
(International Journal of Computer Networks and Communications Security, 2018)
The paper proposes a novel optimized model for transition from IPv4 to IPv6 networks. The aim of this paper is to design the Original IPv6 Transition Controller Application and compare its performance with 6to4 tunneling ...
Innovative features driving mobile phone usage by students in Kenya
(International Journal of Modern Trends in Engineering and Research, 2018)
Mobile phone adoption and usage enjoyed drastic and exponential success as far as the history of technology adoption goes. However, there are indications that users are becoming overwhelmed by the unconstraint addition of ...
Facilitating factors for cybersecurity vulnerabilities in Kenyan county governments
(Asian Journal of Research in Computer Science, 2018)
Globally, ICT is regarded as a driver and enabler; thus, organisations which have integrated ICT in their systems have had immense growth and output. The adoption of ICT into the Kenyan County Governments, therefore, ...
Performance and cost-effectiveness of change burst metrics in predicting software faults
(Knowledge and Information Systems, 2018)
The purpose of this study is to determine a type of software metric at file level exhibiting the best prediction performance. Studies have shown that software process metrics are better predictors of software faults than ...
Map of the various configuration attributes from IPv4 to IPv6 networks for dual stack, 6to4 tunnelling and NAT: modelling designs in OPNET modeller
(International Journal of Computer Science and Mobile Computing, 2018)
This paper presents a performance evaluation study of dual stack, 6to4 tunnelling, and Network Address Translation transition schemes on simulative method in IPv4/IPv6 networks. This research aims to find out what IPv4/IPv6 ...