ABSTRACT The sun emits ultraviolet radiation in the form of ultraviolet-A (UV-A), ultraviolet-B (UV-B), and ultraviolet-C (UV-C) bands. Ultraviolet light has the potential to boost vitamin D2 production in mushrooms which are the only non-animal food source of vitamin D for humans. The ergosterol in mushrooms, a component of fungal cell membranes which serves the same function as cholesterol in animal cells, can be converted into vitamin D2 by exposure to controlled UV light. However, mushroo...
ABSTRACT Production of potato (Solanum tuberosum L.) in Kenya is constrained by many biotic, abiotic and socio-economic factors. Among the biotic constraints, bacterial wilt, caused by Ralstonia solanacearum (Yabuuchi et al., 1995) presents major management difficulties. Attempts to combat the disease have been difficult due to the complex heterogeneous genetic make-up of the pathogen, comprising different races and biovars, its survival mechanisms and its large number of hosts, including wee...
ABSTRACT In Anopheles gambiae mosquito vector of malaria, mating is mediated by transfer of a plug (mating plug protein) from males to females. In the females, the constituents of the plug include male accessory glands (MAGs) proteins and female specific proteins that influence ovulation, oviposition, lifetime refractoriness to mating and other post-mating behaviors in the females. Manipulation of the plug can significantly affect the reproduction potential and concomitant population density ...
ABSTRACT Ganoderma polypore species are hard, leathery poroid mushrooms that lack the distinct stipe. They are a unique group of fungi usually ignored by most fungi enthusiasts because of their typical inedibility, unfamiliar habitat and general opacity. In addition to their traditional use, contemporary research has suggested many applications for cancer treatment and boosting of the immune system. Due to increase in bacterial resistance to existing antibiotics infectious diseases have ...
ABSTRACT Tea-drinking is a habit that has over time spread globally. The chemical composition of tea is very complex and is currently a subject of broad medical and toxicological scientific studies. Thus, the accurate quantification of the levels of both essential and non-essential elements in tea is very important in assessing it’s standard and quality as they are directly related to health and disease. This study examined the levels of Iron (Fe), Zinc (Zn), Copper (Cu), Lead (Pb), Cadmium...
The use of and reliance on information systems for business has been on the rise especially in recent years. This has had a serious impact on the security of business information. Previous studies have identified two areas that must be considered when creating a secure information system: technology and human compliance to policies. Many researchers have stated that technology vulnerabilities are a key source of weakness and data loss in many information systems in organizations. Additio...
The emerging Broadband Integrated Services Digital Networks |||(B-ISDN) will become the core of the future telecommunication infrastructure based on the Asynchronous Transfer Mode (ATM) technology and will provide a wide range of services such as video conferencing, video mail, image transfer high definition television, video on demand and video telephony. An aspect of Broadband ATM networks is the multiplexing of the multiple terminals (TEs) and diverse traffic types at the Customer premises...
Security problems have become a major concern in most urban settlements across the globe. The use of technology can be incorporated into the security systems to enhance operational measures that have been deployed. The aim of this study was to examine the challenges stakeholders face in crime reporting and develop a mobile-based system that would support intelligence collection and real-time reporting. The study employed design science to develop the proposed system. Primary data was col...
Smart phones are powerful minicomputers characterized by high performance, large memory capacity and enhanced applications that enable various ways of communication. They are widely used for other purposes besides making phone calls, for instance browsing the internet, reading and responding to emails, road navigation, editing documents, video conferencing, playing music, taking videos and photo, to mention but a few. The problem at hand is that forensic investigators often encounter diff...
ABSTRACT: Activities of the distilled water, ethanolic and chloroform extracts of Daldina concentrica an ascomycetous fungus was investigated on Escherichia coli, Proteus mirabilis, Pseudomonas aeruginosa, Bacillus cereus and Staphylococcus aureus) using agar well diffusion method. Ethanolic extract of Daldina concentrica showed significantly antibacterial activity against all the test microorganisms except Bacilllus cereus (P ≤0.05). Staphylococcus aureus was the most sensitive organism t...
Abstract The rise in the number of musculoskeletal disorders (MSDs) due to the increase in aging population and advancement in medical technology has led to an increasing demand for medication to prevent and treat these diseases. The development of new drugs or formulations to allow treatment of these diseases in their very early stages is only increasing. Local direct and multidelivery of medication and key minerals to support bone repair and regeneration at the defect site, from flexible de...
The purpose of this study was to investigate the factors influencing adoption of secure cryptographic QR application by focusing on alcohol vendors who engage in the business of selling alcoholic beverages in Nairobi and its environs. This research was based on four specific objectives which were: to study the influence of cryptographic embedded QR code characteristics on the adoption of secure QR technology; influence of merchant attitudes; government factors on adoption of secure QR; a...
The purpose of this research was to develop a low cost system for identifying logon anomalies based on the time a user provides login credentials and also the physical location of the workstation on the LAN. The specific objectives of the project were (i) to evaluate how logon anomalies based on physical locations have been addressed in the literature (ii) to develop specifications, design and implement a solution to address the problem of determining the physical location of a logon eve...
Information technology evolution and the spread of internet connectivity have enabled globalization which allows communication and transaction of businesses across different countries. To ensure information infrastructure protection, understanding how the organizational, individual and technical aspects all together affect the outcome in information security is important. Having the necessary skill required to be able know how to react or what action to take in the event of a security in...
With the growth of the Internet and the increase in number of online devices, IPv4 address space approaches exhaustion. This has led to the deployment of IPv6. However, IPv6 has not been widely adopted, particularly in Kenya. According to Akamai (2016) IPv6 has an adoption rate of 0.02% in Kenya despite recent studies showing that adoption is increasing in some parts of the world. Some of the shortcomings of the current methods of measuring IPv6 adoption are: (a) There is limited informa...