Crime profiling helps law enforcement agencies understand, tackle and sometimes predict the next move by criminals. This can be achieved by monitoring and studying patterns and trends that have occurred in the past and continue to occur in the present. Social media platforms such as Facebook, Google Plus, Instagram, Reddit and in this case Twitter, have created platforms where people share views, opinions and emotions all the while influencing and informing others. This research set out with...
Over years, the economic impact of Small and Medium Enterprises in our societies has been significant. For instance, In Kenya, over 50 percent of jobs were created by this sector in 2005 leading to the growth of the country’s GDP. But despite its impact, SME’s often take the biggest blow in periods of slow business. When there are reduced orders, cancelation of orders, delayed payments by creditors, the impact is immediate as most of these firms don’t have a wide array of products or se...
The government of Kenya has undertaken an ambitious project to equip children with laptops and tablets for the purposes of facilitating electronic based learning. This initiative can only bear fruit provided that there is content relevant to the studies being undertaken. Many Kenyans learn English as a second language. Swahili or other African languages is the mother tongue. Therefore, with content in Swahili, a better and deeper understanding of subject matter takes place. Much of the academ...
Most organizations in private and public sector take a risk-based approach to mitigate any business venture also leveraging on customer satisfaction aligned with quality and keeping costs at bay. The purpose of this study was to investigate if the development of an integrated risk-based microservice can reduce the turnaround time for consignment clearance. Also ascertain whether use of microservices enhances level four Enterprise Resource Planning integration of organizational enterprise syst...
Social engineering refers to the use of deception by an attacker, with the intent of psychologically manipulating the target/victim, into sharing crucial/confidential information which could either be leaked or used to swindle them. Without a clear understanding of social engineering, mobile users may be highly likely to be victims of social engineering crimes. Regarding social engineering on the mobile money platform, there are few existing documents/statistics on the study. Therefore, this ...
ABSTRACT Solar thermal energy storage technology has made solar energy a potentially viable supplement for fossil fuels in much of the developing world. However one of the challenges in adopting the technology is the low efficiency of the storage media. Many thermal energy storage materials have difficulties and limitations such as handling, containment, storage and cost. Sand which is abundant, cheap, easy to handle and contain, can be used to alleviate the difficulties. Research carried out...
The growth of technology specifically the mobile devices has been exponential and this is evident in the growth of smart phones and mobile devices around the world. The growth has also encouraged its usage in educational environments such as in schools. In several countries the smartphones have been introduced in the various schools so as to aid in learning and many other different benefits. In Kenya, the government through the digital literacy programme, has provided tablet devices to variou...
The high profits posted each year by one of the major mobile phone operators in Kenya is an indication of the high smart phones and data usage in the country. Further the highest percentage of this mobile data usage is on social media which includes facebook, twitter, whatsapp, instagram, snapchat and others. While a lot of organizations especially companies have leveraged on information shared on these platforms to improve on product and service delivery while fostering better customer servi...
A huge number of studies have been done supporting seamless mobility networks and mobile technologies over the years. The recent innovations in mobile technologies have unveiled another revolution from the static architectural approach for client-server network relationships to more dynamic, and even mobile approaches. Due to the special equipment and infrastructure needed to support network mobility management, it is difficult to deploy such networks beyond the local network coverage witho...
Agriculture forms the backbone of Kenya's economy contributing 30% of the country's GDP. However, little is known about the prices, supply and demand of fruits and vegetables. Market price information is a very important agricultural concern which can be enhanced by big data and machine learning techniques like predictive analytics. This research work was based on developing an agricultural commodity price prediction application that uses a machine learning model on appropriate data to facili...
Internet of Things has been described as a system of related computing devices, machines, animals or people that are provided with unique identifiers to capture and transfer data over a network without requiring human intervention or human-to-computer interaction. It has been used in several fields such as surveillance, tracking and weather forecasting. Weather forecasting is the process by which the state of the atmosphere and the weather conditions are predicted for some future period. Weat...
Small and Medium Enterprises (SMEs) face numerous challenges in identification, setting up and making use of Information Technology (IT) as an enabler for business. Cloud computing could solve this problem by offering ready, low cost of entry IT solutions. Adoption of cloud computing among the SMEs in developing countries is however low due to a number of barriers as identified by previous studies. Over the years, research on adoption on innovation and technology has unveiled a number of theo...
The main objective of this project is to improve the MPESA authentication process through the incorporation of a voice biometric functionality that enables the remote control of the individual MPESA accounts by MPESA subscribers with higher efficiency, accuracy and a higher level of authentication. The voice biometric is a state of the art technology that factors in authentication with better usability with the aim of combating fraud, self-service empowerment and cost savings through proper u...
The main objective of this study was to identify factors promoting the adoption of M-health and determine usability challenges in the existing M-health applications in Kenya. Specifically the study aimed at establishing the factors promoting adoption of M-health, determining the usability challenges in M-health applications in Kenya. Consequently an Mhealth prototype application was developed to address the usability challenges. The M-health prototype application dubbed “Uzazi Poa” App. w...
Location-Based Services (LBSs) are rapidly expanding in both number and variety. LBSs are services provided via mobile applications with the help of network connectivity and the ability to detect the location of the user. LBSs offer a wide range of services; navigation tools to help you reach your destination (e.g., MapQuest); local search to help you find nearby businesses or events (e.g., Yelp); friend finders and social networking (e.g. Loopt and Google Buzz); applications that allow you t...