Information Technology Research Papers/Topics

Adoption Of Mobile Technology For Knowledge Management In Manufacturing Firms: A Case Study Of Mahashakti Kenya Limited, Athi River

Knowledge management is a field with a lot of potential that can benefit individuals as well as different types of organizations. Despite this fact, most organizations in Kenya have focused on knowledge storage, but have not adopted sharing of the stored knowledge. This study examined the adoption of mobile technology for knowledge management in Mahashakti Kenya Limited, Athi River. The study was guided by the following objectives: To assess the extent of adoption of mobile technology fo...

Blockchain Based Smart Contract Model For Real Estate Management

Industries worldwide are facing a technological revolution where there is a need for technologies that can speed up business processes with more safety and transparency. The real estate industry is among many other industries that would benefit from such technologies due to the magnitude of financial transactions handled. The current management strategy employed by real estate owners depends on a number of intermediaries, including brokers, agents and banking service providers. This strategy ...

The Forward And Reverse Engineering Of Information Technology In An Emerging Economic System

ABSTRACT Africa is generally believed to be the mother of mankind supported both by archaeological findings [ Davidson, 1974]; and biblical evidences [ Munroe, 2001]. The contribution of Africa to early civilization is a clear testimony and reinforcement to this claim. Some advancements in science and technology were first made in Africa long before they were known in Europe. For example, in Egypt the great engineering ingenuity of constructing the pyramid of 250 meter by 250 meter base, the ...

A System Dynamics Study Of MTN Customer Service Queuing System

ABSTRACT Customer service is the most important aspect of every business that builds its processes on the basis of customers going through the queue before receiving any service from the organization. These businesses become ineffective and inefficient if the queues are not moving well or the queues are not fluid. This research was inspired by the customer service of MTN Sokoto branch. System Dynamics was used in order to solve the overcrowd problem of the organization. System Dynamics is a ...

Smartbin: Efficient Waste Handling Based On The Internet Of Things (IOT)

ABSTRACT In our present society today, it is clearly seen that garbage cans are being placed in open environments because it needs to be accessed by the public. It can be observed that those garbage cans usually get filled up and overflow and litter the environment. Patil (2015) claims that this uncontrolled littering can lead to a gradual encroachment of diseases that can be very harmful to the human health. Littered trash can also produce bad and offensive smell around the surroundings. To...

A Fused Machine Learning Intrusion Detection Model In Manets.

Mobile Ad-Hoc Networks – MANETs are prevalent in healthcare monitoring of high blood pressure, high cholesterol levels and various heart conditions and cardiac misnomers like syncope, third murmurs and atrial fibrillation. These irregularities that cause mysterious fainting, unexplained stroke, heart palpitations and atrial fibrillation need to be monitored remotely, accurately and effortlessly. However, the growth and provision of MANETs in smart healthcare monitoring has faced variou...

Sms-based Authentication Framework For A Joint Account Atm Transaction.

Information and Communication Technology (ICT) has transformed the way people conduct business today. The banking industry has not been left behind in the utilization of ICT to provide alternative banking channels. Competition for customers and customer expectations have pushed various industry players to acclimatize emerging technologies, as well as innovative alternative service delivery channels, to gain a competitive advantage in the provision of financial services beyond the tradit...

A Web-based Model To Determine Cybersecurity Readiness Index For Hospitals Towards Adoption Of E-health

The main goal of healthcare sector worldwide is to provide quality and efficient health services to citizens. As the threat landscape on healthcare continues to escalate, many hospitals still lag behind in terms of protecting its critical infrastructure and electronic protected health information (ePHI).This research provided solution by designing a web application that will help the healthcare determine its Cybersecurity Readiness Index (CRI). The research targeted 55 respondents from 1...

Adoptability Model For Digital Forensic Evidence In Kenya

The traditional techniques used by forensic investigators through the incident response operations include mostly pulling out the power cable of the suspected machines. This method normally causes a major interference of the evidence gathering process, hence the need for a better investigation method. The purpose of the study was to provide a means for the Kenya Police in evaluating their forensic adoptability in digital forensic evidence. This study was intended for those who were opera...

Developing A Threat Matrix For Smart Mobile Devices In A University Network Towards A Secure Local Area Network Ecosystem

The need by staff and students to use smart mobile devices in university network is indisputable. This is because they help them to work and study more effectively as well as achieve better work-life balance. However smart mobile devices pose a security challenge as they continue toexpand the corporate  network unchecked thus increasing the attack surface. This creates a major security burden to security professionals who are supposed to ensure that smart mobile devices’ adherence to t...

A Model For An Integrated And Secure Personal Identification System (Ispis)

Personal Identification Systems are implemented to assist in identifying, authenticating and authorizing the right persons to the right entitlements. Criminals have however discovered ways of by-passing them in order to perpetrate identity fraud. As a result, the problem of identity fraud has become one of the fastest growing crimes in the world today, and a key facilitator of terrorism, money laundering and trafficking (of people, drugs, weapons and illicit material). In this study, an ...

Reducing Road Carnage Using A Web Based Model For Monitoring Road Traffic Crime

Road traffic accidents have been a major cause of deaths in Kenya. The effort by Kenya police to enforce traffic laws has done little to salvage the situation. Although there has been other remedies towards curbing road accidents such as; improvements in vehicle design and licensing to skill the situation calls for further solution particularly targeting driver behavior since careless driving has been identified as a major cause of road accidents. The research provides a solution by designing...

A Zigbee Model For Telemetry Based Water Flow Billing.

Water and Sewerage service providers in Kenya have encountered challenges in proficient collection of water billing data from customer’s meters. This necessitates the need to implement a proper data collection mechanism that can be implemented remotely, effortlessly, and accurately. Recent advances in telemetry now provide reliable water meter data. However no water utility has implemented a technology based, remote data collection strategy. A Zigbee WPAN-to-WAN solution for water meter dat...

The E-government Artifact In The Context Of A Developing Country: Towards A Nomadic Framework

This thesis is concerned with exploring alternative conceptualizations of the e-government artifact relevant to developing countries in Africa. The premise is that e-government, as an artifact of human conception, remains relatively poorly developed at the levels of theory, methodologies and practice. The investigation is focused on two problematic areas of e-government: its conceptualization and its operationalization as an artifact. There is evidence to suggest that conceptualization of...

Fingerprint Image Quality Analysis And Enhancement Using Fuzzy Logic Technique

The quality of fingerprint image greatly affects the performance of minutiae extraction and the process of matching in fingerprint identification system. In order to improve the performance of the fingerprint identification system, a fuzzy techniques used for bothfingerprint image quality analysis and enhancement. First, the quality analysis performed by extracting four features from a fingerprint image which are the local clarity score (LCS), global clarity score (GCS), ridge_valley thi...


211 - 225 Of 395 Results