Browsing by Author "Cheruiyot W. Kipruto"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
Item Analysis of MS Power Saving Scheme to BS with Finite Buffer in IEEE 802.16e networks(IEEE, 2011) Felix Musau; Cheruiyot W. Kipruto; Joseph Cosmas Mushi; Guan-Zheng TanThis paper analyzes effects of power saving of mobile station (MS) to Base Station with finite buffer in IEEE802.16e class type I network. IEEE802.16e standard accept MS to switch to sleep-mode to minimize power when MS processing load is reduced. However, when packets destined to MS appear into BS buffer, they should be stored until end of MS sleep window. Although the sleep-mode designed in effort to conserve environment but it risks loss of packets once BS buffer overloaded with accumulated packets. This paper designs numerical analytic model to measure risk of packet drop. Through asymptotic analysis the effect of packets destined to sleeping MS into BS finite buffer is measured and analysed.Item Genetic Algorithm-Enhanced Retrieval Process for Multimedia Data(International Journal of Advancements in Computing Technology, 2011-04) Felix Musau; Joseph Cosmas Mushi; Guan-Zheng Tan; Cheruiyot W. KiprutoThe explosive growth of digital media content from various domains has given rise to the need for efficient techniques for retrieval of relevant information is getting more and more attention, especially in the large-scale Multimedia Digital Database (MDD) applications. It is for this reason that there has been an increased interest in the query reformulation for use in Multimedia Information Retrieval (MIR) using a combination of various techniques. In this paper, we propose a retrieval method that is formalized as an optimized similarity search process that combines Singular Value Decomposition (SVD), Query Quality Refinement (QQR) using Histogram Equalization and Genetic Algorithm (GA) enhancement. Experimental results show that the approach significantly narrows the search process by retrieving similar images satisfying the needs of the user.Item Modeling M-SaaS Delivery Model for Threshold-based Credit Recharging Using Mbanking(IEEE, 2011) Felix Musau; Joseph Cosmas Mushi; Guan-Zheng Tan; Cheruiyot W. KiprutoThe emerging of cloud computing has brought about new hope for efficient adoption and use of computer based information system. Software as a Service (SaaS) allows online customers to use applications on the Internet on a payas- you-go basis without investing in new infrastructure or software license. However, current SaaS delivery model bring challenge to online customers in community with poor financial services like online bank-transaction or credit cards. This study proposes Mobile-SaaS delivery model to facilitate online charging and credit-recharging mechanisms for SaaS application. The model use mobile-phone monetary services (M-banking) to support online charging, and adopts threshold-based credit recharge technique to support credit recharging.Item Performance Analysis of Recharging Scheme of M-SaaS through M-banking(Journal of Convergence Information Technology (JICT)., 2011-07) Felix Musau; Joseph Cosmas Mushi; Guan-Zheng Tan; Cheruiyot W. KiprutoMobile SaaS (M-SaaS) is SaaS delivery model designed to use mobile network infrastructure for reserving and recharging credits of SaaS usage in pay-as-you-go manner for areas with poor financial services. The model integrates M-banking monetary feature into delivery process of SaaS so that potential customers in areas with poor access to financial services, such as online banking and credit cards, participate in SaaS delivery in real-time payment manner. In this paper, we present numerical analysis of M-SaaS recharging process, which together with M-SaaS credit-reservation scheme make M-SaaS model. The analysis shows that utilization and throughput of components involved in the scheme are healthy to avoid interruption of their involvement in other mobile network activities. However, load distribution at equilibrium leads to great imbalance, which needs further study for usefulness of M-SaaS model to revel.Item Principals of trust in internet security and websecure environment(IEEE, 2011) Felix Musau; Cheruiyot W. Kipruto; Joseph Cosmas Mushi; Juma ModieTrust and security are key enablers of the information society. Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy. It addresses issues on who is authorised to perform actions as well as the techniques needed to manage and implement security in the applications. Trust relates to belief in honesty, truthfulness, competence, and reliability. The significance of incorporating trust in distributed systems is that trust is an enabling surety of good transaction. Its inclusion will enable Internet commerce and seamless, secure agent based applications. This paper investigates trust in relation to security in internet transactions; it specifically deals with different authentication schemes, Encryption, Trust in the websecure environment.Item Trust and its challenges facing E-Government programs in Kenya(IEEE, 2011) Felix Musau; Cheruiyot W. Kipruto; Joseph Cosmas MushiKenya’s public sector is at a crossroads today in facing the challenges of institutional change and the impact of new technologies. The public sector can, and will play a much stronger role in implementing all the government plans. The emerging ICT technology can create solid improvement in offering better services to all nations. This can enable the citizens of the countries to access e-services from the governments based on their trust to the systems. In Kenya things have not been as planned as majority of the people don’t trust e-government services. There are many challenges facing its implementation which now remains as a dream, despite the government efforts. The paper raises a lot of concern especially on the trust of the citizens to e-government services being offered and the ICT awareness of the citizens too. The work highlights what the government has done to address the issue. The proposed solutions will help as e-government, and ICT investment has consumed a huge part of the national budget in recent years. The paper addresses how trust influences the change of attitude towards government by employees and the citizens.Item Using Genetic Algorithms to Optimize Web Caching in MultimediaIntegrated e-Learning Content(International Journal of Digital Content Technology and its Applications, 2011-08) Felix Musau; Joseph C.Mushi; Guan-Zheng Tan; Cheruiyot W. KiprutoThe evolution of e-learning as a new information technology built around the use of internet has originated new possibilities to develop pedagogical methodologies that provide the necessary knowledge and skills in the higher education environment. This has in effect given rise to a large number of learners who desire to access the educational resources provided by the new technology. But for many institutions of higher learning, the users often experiences poor performance when they try to access contents or download e-learning files. The main reasons for such are often performance problems concerning network infrastructure and the fact that many people tend to access the same piece of information repetitively. This paper uses web caching scheme and genetic algorithm optimization to effectively lessen this service bottleneck, diminish the user access latency and reduce the network traffic.