Browsing FIT Projects, Theses and Dissertations by Title
Now showing items 378-397 of 454
-
A Sandboxing based security model to contain malicious traffic in smart homes
(Strathmore University, 2017)The Internet of Things (lOT) is a developing Next Generation Network (NGN) paradigm that aims to have more devices connected to the Internet and the possibility of these devices to autonomously communicate with each other. ... -
A Scheme for improving data confidentiality in the cloud computing environment
(Strathmore University, 2017)Cloud computing has ushered in an era whereby small and medium sized companies enjoy computing power which was usually a preserve for big corporations. Despite these benefits, the present cloud data confidentiality techniques ... -
School exam results information management system.
(Strathmore University, 2021)The proposed system will monitor student academic progress by automating results processing and analysis of exams while maintaining a database of student scores. Currently, schools use multiple software to achieve the basic ... -
A Secure and verifiable internet voting system using homomorphic scheme.
(Strathmore University, 2009)Institutions are changed with the actions of ensuring the rights of its members to participate in a democratic election, this is surpassing all the limitations of the traditional voting system, and the development of an ... -
A Secure electronic document management system using public key encryption: a case of Strathmore University
(Strathmore University, 2018)The need to safeguard and ensure the authenticity of academic records is paramount for any reputable educational institution. As institutions are moving into the digital era, more and more documents are being stored in ... -
A Secure end to end verifiable e-voting system using cryptography: a case of Independent Electoral and Boundaries Commission of Kenya
(Strathmore University, 2019)Elections that are run purely on manual voting system have presented a plethora of challenges that have often affected the credibility of elections done entirely using the traditional manual voting system. Countries round ... -
A secure hybrid IoT architecture using blockchain and decentralized VPN: a use case of smart farming
(Strathmore University, 2020)The Internet of Things (IoT) technology has brought a revolution to every sector of man's life by making it interactive, insightful, and smart. IoT refers to a network of objects that make up a network that configures ... -
A Secure M-payment for M-commerce in Kenya
(Strathmore University, 2008)There has been a tremendous growth in mobile communications in Kenya over the last decade that has totally transformed how people communicate. This has presented opportunities for business to change how they operate, which ... -
Secure plugin for automated software updates using Public Key Infrastructure for embedded systems
(Strathmore University, 2018)Embedded systems are the driving force for technological development in many domains such as automotive, healthcare, and industrial control in the emerging post-PC era. As more and more computational and networked devices ... -
Secured web service model for public service interoperability : case of Kenya’s e-government
(Strathmore University, 2014)A major challenge in E-government application developments for better service delivery is inadequate security features in e-government. This results in untrustworthy websites with stunted growth so that most e-government ... -
Securing a "Bring Your Own Application" cloud environment using digital forensics
(Strathmore University, 2018)The use of cloud applications introduces new challenges to information systems Security. The idea of applications accessible from multiple devices and hosted or provided by third party organizations brings new complications ... -
Security framework for electronic mail systems
(Strathmore University, 2013-06)E-mail communication is widely used in today's world and government institutions are no exceptions. In most organizations, e-mail is recognised as the primary mode of communication and hence its immense value to organizations. ... -
Security risks mitigation in session initiation protocol based VoIP networks implementation using MPLS
(Strathmore University, 2016)VoIP is described as, “transfer of voice (and associated services) in digital form in discrete data packets using Internet Protocol (IP) over some or the entire communication route”. SIP on the other hand is a signaling ... -
Sentiment analysis for hate speech detection on social media: TF-IDF weighted N-Grams based approach
(Strathmore University, 2017)Hate speech on social media has unfortunately become a common occurrence in the Kenyan online community largely due to advances in mobile computing and the internet. Incidents of hate speech on social media have the potential ... -
Sentiment analysis for TV show popularity prediction: case of Nation Media Group’s NTV
(Strathmore University, 2019)Media-houses play a vital role in informing the masses on the issues that matter. They are also a source of entertainment for many households. In Kenya, the public depends on media largely for entertainment and educational ... -
Server virtualization framework: case of selected government ministries, Kenya
(Strathmore University, 2013)The very rapid development in chip technology has brought huge increases in processing capacity. Most current computer hardware is so powerful that in most cases only a small part of it, about 10 to 15 percent, is actually ... -
A service improvement model for the information technology infrastructure library based on lean it
(Strathmore University, 2013-06)This thesis proposes a service improvement model for the Information Technology Infrastructure Library (ITIL) based on Lean IT. It highlights service improvement from a service management platform by highlighting the common ... -
Simulation of a smart security system: a case of Strathmore University
(Strathmore University, 2014)The concept of human beings providing physical security to protect their valuables from threats is as old as mankind. In the past human beings protected their crops against destruction by wild animals and bird by building ... -
Smart fertilizer recommendation through NPK analysis using Artificial Neural Networks
(Strathmore University, 2019)Agricultural practices, tools and technologies have taken a new paradigm. Precision agriculture is essential to ensure that site-specific crop management is implemented, which includes soil nutrient remedies per crop ... -
A smart phone based dodel for tracing beef products in Kenya
(Strathmore University, 2014)Food traceability has been faced with challenges like lack of records, paper work challenges and lack of rapid response to trace back. Most food safety outbreaks are traceable to the processing or slaughter house but ...