Search
Now showing items 121-130 of 455
The user’s skills, capacity on security for mobile computing in universities
(International Journal of Computer Technology & Applications, 2017)
Universities are shifting from partially computerized to fully automated environments and technology is equally shifting from point to point to broadcasting options. These trends are resulting in mobile computing for most ...
Pervasiveness of green ICT awareness amongst Kenyan ICT personnel
(International Journal of Application or Innovation in Engineering & Management, 2013)
There has been growing concerns about the rising costs of doing business and environmental degradation world over. Green
ICT has been proposed to provide solutions to the two issues yet it is not being implemented fully ...
Trends in electronic money transfer in Kenya
(Journal of Emerging Trends in Computing and Information Sciences, 2013)
The paper looks at trends in Electronic money transfer in Kenya, based on literature survey of prior research done in this area. The Central Bank of Kenya was a key source of data because of its significance in financial ...
Influence of social personalization on performance in group learning
(IEEE, 2017)
Though personalization has been proposed as an approach that addresses learners' individual differences, the focus of studies in this domain has mainly been on tailoring learning to individual learners' needs as compared ...
The role of ICT in social inclusion: a review of literature
(International Journal of Science and Research, 2013)
The questions we seek to answer in this paper are; Have ICT contributed to enhance social inclusion? Has use of ICT
brought new forms of exclusion? And what is the way forward in using ICT for an inclusive society? Desk ...
Information security risks posed by the bluetooth security weaknesses to the bluetooth-enabled phones
(Journal of Emerging Trends in Computing and Information Sciences, 2015)
As the widespread use and acceptance of Bluetooth technology increases, concerns are being raised related to security vulnerabilities of this technology. Inadequate device resources and lack of user awareness has compounded ...
Information technology research in developing nations: major research methods and publication outlets
(International Journal of Information and Communication Technology Research, 2011)
The multi-disciplinary nature of Information Technology has brought many methods of research with it. This has left many Information Technology specialists whose background is from the rigid scientific disciplines in a ...
Students selection for university course admission at the joint admissions board (Kenya) using trained neural networks
(Journal of Information Technology Education, 2011)
Every year, the Joint Admission Board (JAB) is tasked to determine those students who are ex-pected to join various Kenyan public universities under the government sponsorship scheme. This exercise is usually extensive ...
Map of the various configuration attributes from IPv4 to IPv6 networks for dual stack, 6to4 tunnelling and NAT: modelling designs in OPNET modeller
(International Journal of Computer Science and Mobile Computing, 2018)
This paper presents a performance evaluation study of dual stack, 6to4 tunnelling, and Network Address Translation transition schemes on simulative method in IPv4/IPv6 networks. This research aims to find out what IPv4/IPv6 ...
Performance differences and gender in Kiswahili creative writing: a case study of selected secondary schools in Nyamira County, Kenya
(The Journal of Pan African Studies, 2013-09-04)
This study investigated comparative differences in performance among boys and girls in Kiswahili creative writing in selected secondary schools in Kenya. The study was carried out in Nyamira County in Kenya located at a ...