Doctor of Philosophy in Information Technology
Browse by
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Recent Submissions
-
INTERFACING MICRO-CONTROLLER AND RFID TOWARDS A SECURE EMBEDDED CAR PARKING MODEL
(Kabarak University, 2023-11)This research focused on an integrated car parking solution that guides drivers on the exact parking lots at a specified period of time. In addition, it is a simplified monitoring and intelligence gathering of parking ... -
A SERIAL NUMBER BASED AUTHENTICATION MODEL FOR A COMPUTER IN A WIRELESS LOCAL AREA NETWORK
(kabarak university, 2022-11)With today’s technological evolution, wireless networks have become very common for organizations, homes and public places due to the numerous benefits that come with them, as compared with wired networks. One of the ... -
MODEL FOR IMPROVING PERFORMANCE OF NETWORK INTRUSION DETECTION BASED ON MACHINE LEARNING TECHNIQUES
(KABARAK UNIVERSITY, 2019-11)Digital crimes have increased in number and sophistication affecting the networks quality of services parameters like confidentiality, integrity and availability of resources. Network Intrusion Detection Systems (NIDS) are ... -
INTERNET OF THINGS BASED MODEL FOR PREECLAMPSIA MONITORING IN ANTENATAL CARE
(KABARAK UNIVERSITY, 2019-11)In the health sector, the health of women is a significant public health issue, which impacts the personal well-being, family reproduction, and societal development. Therefore, knowledge about the health of women has led ... -
AN SMS AND USSD MODEL FOR LOCATION-BASED MOBILE ADVERTISING IN MICROENTERPRISES
(KABARAK UNIVERSITY, 2014-09)Technological and financial limitations have hampered the effective advertisement of products and services by microenterprises thus limiting their contribution towards national economic growth. Recent advances in mobile ... -
A MODEL FOR AN INTEGRATED AND SECURE PERSONAL IDENTIFICATION SYSTEM (ISPIS)
(KABARAK UNIVERSITY, 2014-10)Personal Identification Systems are implemented to assist in identifying, authenticating and authorizing the right persons to the right entitlements. Criminals have however discovered ways of by-passing them in order to ...