Here, at the Faculty of Computing and Information Management, we offer premium courses that push students to reach their full potential as well as inspire our future world business leaders.
Sensor networks are one of the dominant technology trends in the coming decades and the use of wireless Sensor Networks (WSNs) is bringing huge changes in data gathering, processing and propagation of different environments ...
Smart learning is the growth of e-learning from the 19th century to 21st-century generations, which enhances the missing component of an e-learning solution. Smart learning most suits for those smartboards, laptops, and ...
Over the last two decades, credit assessments made by commercial banks have been evolving. Instead of the traditional assessment of the banks’ credit experts which is subjective, increased credit risk means that comprehensive ...
This project objective was to come up with job matching application for use by casual workers
and employers. The process of identifying challenges, opportunities, desired features and
solution was designed to be a ...
The Success of software projects heavily and critically depends on the effectiveness of Requirements
Engineering (RE) and the Requirements Engineering Process Improvement (REPI). This research study
adopts and applies ...
The immune system protects the body against diseases or any foreign body that is harmful to the body, it is the body’s natural defense against illnesses. The threats that the immune system attacks include viruses, bacteria ...
Information and Communication Technology (ICT) has become an integral part of the lives of many people today. In the business scene, ICT has been embedded into the fabric of many organizations. The modern business environment ...
With the Mobile Phones access increases rapidly and multi-channeling becoming increasingly widespread, studies of consumers will need to focus not just on understanding product choice, the reasons for channel choice but ...
The functionality of IMS was to work with wireless access technologies and other network
coverage like macro cell, microcells and Femtocells. The trend of next generation networks’
evolution is towards providing multiple ...
The aim of this research is to investigate optimization of internet usage among Kenyan Public Universities- Moi University Nairobi Campus as a case study which is a necessity at this current information age where internet ...
Delays and other operational inefficiencies at weighbridges in Kenya has remained persistent over the years. This delays have led to astronomical rise in transport costs to transporters. These costs are mostly passed on ...
Certainly, digitization has become ubiquitous; now. Almost in all the sectors we routinely interact with digital technologies. In this generation it is elating to be referred as ‗digital‘ and degrading to be referred to ...
Citizens can act as sensors in crises management and volunteers for Geographic information and
their surroundings. The proliferation of mobile phone in the developing countries sets a stage for the
users to become ...
Customer churn in the telecommunication industry is still a big problem because emerging new technologies, lower costs, among other factors. Right now Kenya is developing at a very fast rate and the market is getting new ...
This document contains the results of the research study entitled in:-
Chapter one contains the title of the project, the background information, the problem statement and the source of the problem. A description of the ...
The document is a project work on study of call toll fraud. It presents a method of detection and
prevention/mitigation of toll fraud in VoIP PBX infrastructure. The method is based on
measuring call setup delay time, ...
Voice phishing (vishing) is a type of phishing attack where social engineers manipulate individuals during phone conversation into divulging sensitive information. Mobile users are target to most criminals, through mobile ...
The study set out to assess the role of Information and Communication Technology (Ecommerce
tools, Networking components/Internet, and communication technology) on the
growth of Small and Medium Enterprises (SMEs), analyze ...
This project was to find out security threats, challenges and attacks brought about by BYOD adoption in institutions. Universities in Kenya as institutions of higher learning were chosen as a case study because BYOD was ...