Search
Now showing items 11-15 of 15
A Review of Security Techniques against Black Hole Attacks in Mobile Ad hoc Networks
(IEEE, 2019-05)
Mobile ad hoc network (MANET) is a special type of a wireless network formed by nodes that communicate without any fixed infrastructure or centralised management. Nodes in MANET act as a router and a host. These nodes are ...
Effective Use of Assistive Technologies for Inclusive Education in County Governments: Issues and Challenges from Two Case Studies
(2018-11)
County governments face innumerable impediments in the process of implementation of inclusive education (IE). Effective use of Assistive Technologies (AT) can help county governments in Kenya achieve inclusive education ...
E-Voting Challenges in Kenya
(2016-06)
Many developing countries have had disastrous presidential elections in recent years. In most of these cases, it was alleged that manual voting and vote-tallying took too long to produce the winning candidate, leading to ...
A New Complexity Metric for BPEL Processes based on Weighted Structured Activities and Invokes
(2018-05)
As is the case with traditional software, business processes created using the Business Process Execution Language (BPEL) have an inherent structural complexity that increases whenever the processes are modified. High ...
A Blood Pressure Monitoring Prototype for Preeclampsia Management in Antenatal Care in Kenya
(2018-10-25)
The health of women is a critical public health concern in public health as it impacts the
personal well-being, family reproduction, and societal development. Globally, it has been
noted that a significant number of women ...