MSIS Theses and Dissertations (2016)
Permanent URI for this collection
Browse
Browsing MSIS Theses and Dissertations (2016) by Title
Now showing 1 - 10 of 10
Results Per Page
Sort Options
- ItemAnalyzing error detection performance of checksums in embedded networks(Strathmore University, 2016) Mirza, Ali NaqiNetworks are required to transport data from one device to another with adequate precision. For a majority of applications a system is expected to ensure that received data and transmitted data is uniform and consistent. Many elements can change one or more bits of a message sent. Applications therefore need a procedure for the purpose of identification and correction of errors during transmission. Checksums are frequently used by embedded networks for the purpose of identifying errors in data transmission. But decisions regarding which checksum to utilize for error detection in embedded networks are hard to make, since there is an absence of statistics and knowledge about the comparative usefulness of choices available. The aim of this research was to analyze the error detection performance of these checksums frequently utilized: XOR, one‟s complement addition, two‟s complement addition, Adler checksum, Fletcher checksum, and Cyclic Redundancy Check (CRC) and to assess the error detection effectiveness of checksums for those networks which are prepared to give up error detection efficiency in order to curtail costs regarding calculations and computations, for those wanting uniformity between error identification and costs, and finally for those networks which are ready to yield elevated costs for notably enhanced error detection. Even though there is no one size fits all method available, this research gives recommendations in order to decide as to which checksum approach to adopt. A bit flip fault design with manufactured error simulations was utilized for this research. Mathematical technique used for the proposed fault design was Monte Carlo simulations using Mersenne twister random number generator. This study concludes that the error identification performance of XOR, and Adler checksums for arbitrary and autonomous bit and burst errors is below an accepted level, rather 1‟s and 2‟s complement checksums should be utilized for networks prepared to surrender error identification efficiency in order to minimize the cost of calculations. Fletcher checksum should be utilized by networks wanting symmetry between computational costs and error identification and CRCs by networks prepared to yield greater costs of computation for notably enhanced error identification.
- ItemE-Learning technologies adoption framework for enhanced productivity of small and medium enterprises in Kenya(Strathmore University, 2016) Thuo, Nicholas MbuguaThe potential of e-learning in transforming the performance of Small and Medium Enterprises (SMEs) through its effects on employee productivity and hence organizational output is acknowledged in literature in both developing and developed countries. The ubiquitous nature of e-learning offers unlimited opportunity for employees to engage in learning and act as a catalyst for transformation through lifelong learning. However, there is a dearth of empirical evidence in the Kenyan context on adoption of e-learning in SMEs as well as success. The purpose of this study was therefore to examine usage of e-learning by SMEs and the outcomes as measured by performance of SMEs in Kenya with a view to proposing a framework for enhanced adoption of e-learning in these organizations. The study was guided by the Roger’s Diffusion of Innovation Theory, a theory that identifies the determinants of the uptake of an innovation such as e-learning. The study adopted the descriptive design entailing a survey of 100 HR Managers and 100 employees of SMEs in the 2015-16 top 100 SMEs from a survey done annually by KPMG Kenya and Nation Media Group. A sample of 50 HR Managers and 50 employees were selected for the survey using simple random sampling techniques and purposive sampling respectively. The SME HR questionnaire and the SME Employee questionnaire were used to collect both quantitative and qualitative data on the extent, determinants, and outcomes of use of e-learning in the SMEs. Quantitative data analysis was done through descriptive statistics to demonstrate the extent, outcomes and challenges of adoption of e-learning in SMEs. Qualitative through thematic grouping and descriptions. With regards to the extent of adoption of e-learning in the SMEs the study found limited adoption of e-learning, with only 10 firms out of the study 50 SMEs reporting adoption. On the influence of employer factors on adoption, the perceptions were positive on all aspects such as innovativeness and IT competencies. On the employee aspects of e-learning usage, the study found positive perceptions on ease of use and user satisfaction, which were in turn, proxy measures of satisfaction with the quality of the information on the system and the system itself. On the outcomes of e-learning on employers and employees, the study reported positive perceptions on these outcomes. The most influential barriers were organizational and technical. The study therefore concludes that although there is limited adoption of e-learning among SMEs, there are many positive characteristics among adopting firms. The study therefore recommends more support for infrastructure to support e-learning for SMEs among government and the business sector and more studies on the influence of pedagogical aspects such as content and media design.
- ItemE-portfolio model for student assessment in education : a case of Nairobi secondary schools(Strathmore University, 2016) Maate, Philip MalingaA number of public secondary schools in Kenya lack a properly operational information management system to capture student academic and personal data as an evidence to show one’s learning journey over time. From the current system it is difficult to isolate student’s personal traits or talents such as negotiation skills, public relations, or even other key goals as stipulated in the Kenyan secondary school syllabus like promoting love for and loyalty to the nation. A good information management system inform of e-portfolio in a school would provide data on evidence of student’s abilities in a holistic sense and show a complete picture of what a student is. Such a system would be a better basis for informing interested parties like universities and potential employers of the student’s abilities other than use of test scores only. This study sought to develop an e-portfolio model that could aid in assessment in public secondary schools in Kenya. The study also sought to establish the content requirements for e-portfolios in public secondary schools within Nairobi County. This study adopted exploratory research design of a case study of public secondary schools in Nairobi County. Random sampling was used to select the sample size. Data collection was done through survey method where questionnaires were used. The data was analyzed using descriptive statistics. The results from the analyzed data were used as an indicator to the content requirements of an assessment e-portfolio in public secondary schools.
- ItemA framework for the adoption of Information and Communication Technology in faith-based organizations in Kenya : a case of Comboni Missions(Strathmore University, 2016) Gacengechi, HaronThis research covers the adoption of ICT in Comboni missions, a faith-based organization with operations in Kenya among other global countries. Comboni missions focus on less developed Kenya counties, and in economically challenged areas such as slums in Mathare, Korogocho, Kariobangi in Nairobi. Regarding ICT adoption in Comboni missions and other faith-based organizations in Kenya, there is little empirical data available. The reasons are neglect by organization and information theorists who have focused on for-profit organizations and the unique nature of most faith-based organizations in general. Comboni missions are unique in terms of organizational culture and values, in their economies and in focus. They are faith-based and mostly voluntary in nature and seek no profits. Their economies are donor-dependent. They focus on accountability of received funds rather seek to attain competitive advantage. Donor funds allowing, ICT adoption may be adopted in a mission. This adoption is in isolation and without policy guidelines. The problem is haphazard adoption leading to poor adoption and low quality systems. To solve this problem, this study proposes a framework of how Comboni missions should adopt ICT; the unified theory of acceptance and use of technology, (UTAUT).The framework proposes that Comboni missions device a policy to govern ICT adoption; involve stakeholders in the adoption, besides lending support in ICT infrastructure development where needed. The framework was validated and tested for accuracy through the inferential statistics (regression analysis model) at 5% level of confidence. The significance of the study is that by adopting ICT, Comboni missions will bridge the organizational divide; or attain the capacity and competence to adapt business and technological capacities of private and public organizations to be digitally competent. The Comboni missions would also bridge the digital divide currently plaguing the underdeveloped areas and the slums where Comboni missions offer services. The study findings are that policy, user behaviour, ICT infrastructure and community determine ICT adoption in Comboni missions and similar faith-based organizations.
- ItemInformation quality assessment framework: case of the national safety net program single registry system(Strathmore University, 2016) Mwangi, Evelyn WambuiThe primary goal for IS applications is to deliver information which is accurate, timely, and relevant information to managers. Information quality is viewed as an essential element in measuring information system success. Assessing information quality and understanding areas of improvement is important to ensure that information systems are performing optimally. This research seeks to identify a means to assess information quality for the National Safety Net Program Single Registry System with the aim of improving the information it generated. This research proposed a three-phase framework that is iterative – information quality assessment, improvement, and proactive information quality management. This framework is anchored on the fact that continuous improvement is vital when ensuring in quality information. Nonetheless, assessment is the essentially the first phase to establish the status of information quality within an organization. For organizations that have already established this status, identifying the areas for improvement is the place to start this iterative process. Otherwise the c framework for proactive management of information quality is a fundamental and a strategic guide for all organizations to consider. This research took an exploratory approach to understanding the factors that influence information quality. A sample size of 46 was identified from the target population of 84 users of the single registry. A survey was undertaken coupled with key informant interview and desk review to ensure collect data for this research. The results showed that the information on the single registry was of good reputation and users perceived it to be objective. It is evident that there is need to assess these information quality dimensions from time to time to ensure that the quality is maintained and the goal of the information system is achieved.
- ItemMobile based expert system model for animal health monitoring : cows disease monitoring in Kenya(Strathmore University, 2016) Muriu, PeterA host of diseases affect livestock in Kenya. These diseases as well as pests cause heavy losses to livestock farmers through deaths, reduced productivity and loss of markets for products. The research aimed at gaining deeper insights into the challenges faced by livestock farmers in Kenya, to understand the methods used for animal health monitoring and disease prediction and to establish the data and information requirements for animal health management at a farm. This study further proposed a mobile based expert system model for animal health monitoring. Mobile uptake in Kenya coupled with significant strides made in mobile telecommunication infrastructure bring new potential to animal health management. The ubiquitous nature and pervasiveness of mobiles enable the use of information and communication technology everywhere, by everyone, and at all times. Using mobile technology, the model automates the process of managing animal health at a farm including recording farm, farmers’ and animal details, predicting animal disease and monitoring of animal health right at the farms. It provides a collaborative platform between a farmer and a veterinary expert. The health of the affected cow is then monitored to recovery. The model was tested through simulation of various modules. Of the 29 participants that took part in this exercise, 69 percent were satisfied that the model fulfilled the intended functions of animal health monitoring. 76 percent of the respondents also found the model easy to use. The model was therefore successful in management of farm, farmers and animal records as well as continuous monitoring of animal health.
- ItemNear-Field Communication based-model for health information portability(Strathmore University, 2016) Onyancha, Paul MorumbwaHealth Information Portability is an important concept in the healthcare sector because of the patient’s ability to carry their medical data when visiting a health care center. Data that can be stored in hitherto time-honored systems such as Health Information Systems and Electronic Medical Record (EMR) systems is diverse and hence a need for a focused approach on the data to be stored and retrieved securely when needed. Empirical evidence shows a lack of clear technological solution for Health Information Portability in the era of efficiency of mobile devices accessing stored EMRs. Near Field Communication (NFC) technology presents a new dimension for enterprises such that with NFC tags, any object can be turned into a digital data point that can transfer information to NFC-enabled mobile devices using short range radio waves. In this research, agile development methodology was used and different systems, models and prototypes incorporating NFC tags, NFC readers, mobile application, encryption and decryption studied and their beneficial aspects borrowed to create a novel application that runs on the doctor’s NFC-enabled phone that can read and write into a patient’s NFC-enabled medical card. Security features such as password, decryption and encryption of data on the NFC card and the vital EMR data necessary as per doctor’s recommendations, which included patient’s name, allergies and blood group, were incorporated. A model developed showing communication from a host PC and a mobile phone client demonstrated the machine-to-machine communication NFC concept. Authentication, data capture and deploy, data view and edit, mobile to host PC connection were tested and all showed a pass. This system will help reduce incidences of duplication of medical tests leading to reduction in medical costs for patients, assist doctors in making quick clinical decisions and also form the basis for future research on NFC in healthcare.
- ItemA prototype for information capture using natural language processing : a case of Nation online news(Strathmore University, 2016) Mbuthia, Samuel K.Natural Language Processing is a crucial component in the study of artificial intelligence. The Internet contains an abundance of information from a multitude of sources and a lot of this information is in human language which is not easily interpretable by computers. This is especially the case with unstructured data. Newswire sources, which include news websites and other forms of digital news reporting, provide easily accessible sources of information. This information is reliable because in many cases it is provided by journalists who are governed by professional codes of conduct. Years of reporting news on the Internet has resulted in a lot of information that is free and readily available. However, this information cannot be utilized effectively as it is too much to be processed by usual data mining techniques. This is where Natural Language Processing comes in as an essential tool in mining and processing the plethora of newswire content. This research took an applied approach to try and address the problem of inefficient utilization of newswire content. The research went through several stages each trying to address a specific area of the problem. While the problem being addressed was a global one, a focus on Kenyan news made the tasks manageable and specific but at the same time scalable to a larger setting. The research delved into the creation of a novel prototype that addressed the gaps in currently existing systems and improved on how information processed by Natural Language Processing techniques could be presented and reported. The application of graphical representations by using a number of advanced graphical libraries and application program interfaces as well as the application of machine learning models and algorithms were an integral part of the research. Various tests were undertaken to determine the viability of the prototype and key among them were performance test that monitored the performance of the applied machine learning algorithms. The results of the tests were duly tabulated and reported. While the research was largely successful, it was concluded that a lot more remains to be done to comprehensively address the gaps that exists in the area of research. As such, this research acts as a platform for further research that can gradually fill all the gaps identified as well as those that may be identified in the future.
- ItemA prototype for locating and choosing office space as a service: a case of Nairobi City(Strathmore University, 2016) Mwenda, Protasio KithinjiTraditional work arrangements were relatively static with all the staff having a physical fixed office. This is where at some point of the day they reported to meet their supervisors, colleagues or clients. In the todays’ knowledge and collaborative economy, mobile and flexible work arrangements are the norm. That means that a good number of the staff can and indeed work from other places apart from the fixed central office. These alternative work arrangements are enabled by information and communications technology implemented in a variety of quasi-office setups with their attendant benefits and challenges. Among options available, commercial implementation of Office Space as a Service (OSaaS) has the best potential of meeting real business’ need. Unlike many other remote working arrangements, Office Space as a Service offer for hire, a formal office setup complete with required furniture, fast and secure internet connectivity, formality and privacy close to the traditional fixed office. But choosing a suitable office location, whether to hire as a service or not has been a challenge for many entrepreneurs. The choice needs to be informed by the fundamental factors that can be enablers or inhibiters of business in such a location. These include issues such as localized security and demography of the area and the actual hire/lease costs of the offices among others. Disparate information sets about OSaaS facilities has been one of the major challenges for individuals/organizations seeking to utilize these new, flexible and cost efficient office space arrangements. This research seeks to come up with an application for mapping out Office Space as a Service facilities in a given city/neighbourhood mapped against applicable localized business factors into a geo-spatial database. The application will offer an easy, quick and intuitive platform for locating and selecting available OSaaS facilities that meet a given criteria as defined by the user and a two-way communication channel between potential clients and the providers of the facilities.
- ItemSecurity risks mitigation in session initiation protocol based VoIP networks implementation using MPLS(Strathmore University, 2016) Kamuti, Farida GakiiVoIP is described as, “transfer of voice (and associated services) in digital form in discrete data packets using Internet Protocol (IP) over some or the entire communication route”. SIP on the other hand is a signaling protocol used to initiate interactive communication between end users. SIP-based VoIP therefore is the use of SIP as the signaling protocol during VoIP implementation. SIP has become the predominant protocol used in the implementation of VoIP services in organization; however the protocol has no inbuilt security measures in place. It is therefore very important to come up with a proper security solution that can ensure that SIP-based VoIP networks are fully secured from exiting security risks so as organizations information security (confidentiality, integrity and availability) is achieved at all times. The purpose of this research was to analyze security risks that face organizations using SIP-based VoIP, analyze existing security models used and evaluate how MPLS can be effectively used in securing Sip-based VoIP networks. Through analyzing existing architectures used in securing SIP-based VoIP networks and collection of data, a security model was proposed with the aim of ensuring an all rounded security approach is taken during implementation of a secure SIP-based VoIP network. The research used an applied research method as it aimed at mitigating security risks faced on the SIP-based VoIP network. To come up with an all rounded solution, online questionnaires were used with structured questions which aimed at getting a deeper insight on the current state of SIP-based VoIP networks and the organizations’ security. This greatly influenced in the development of the proposed SIP-based VoIP security model. Research results showed that organizations have greatly neglected the security aspect when it comes to implementation of a SIP-based VoIP network. It also showed that through use of the proposed security model, organizations can better plan and secure their voice network not only on the technology aspect but also on the user aspect. Through the proposed security model, this research sets a platform on which future research can fully incorporate quality of service in proposed security model. In addition further research is highly recommended as security is an ongoing process as new security risks continually emerge.