Browsing by Author "Kipruto, Cheruiyot W."
Now showing 1 - 8 of 8
Results Per Page
Sort Options
Item A Study of the State of Art B2B Integration Patterns, Components and Architectures(Current Journal of Applied Science and Technology., 2015-11-16) Njeru, Edwin Mwendi; Musau, Felix; Kipruto, Cheruiyot W.In modern business operations, it has become imperative that processes, systems and sometimes organizations integrate. This is for various reasons such as maximizing profits, efficiency, expansion etc. Developing a robust integration plan, architecture and process mapping are key to any B2B integration. B2B integration can be defined as the integration of applications, programs, or systems extending the walls of an organisation and it include heterogeneous infrastructures, data, application software, and business processes integration between two or more businesses. The growth and change of systems and related technology is a very rapid arena, thus requiring almost every software system to have constant modification, integration and/or configuration, to provide enhanced integrated solutions to the changing world. Simply put it is developing an approach to expanded and extended collaboration, communication, resource sharing, optimization, profitability and efficiency within and between organisations. Integration is a general term for the tools and applications that are involved to enable different systems to interoperate and communicate with each other within or beyond a business enterprise, thus allowing complete integration of services and data sources among different applications. Current integration architectures are sufficient on the basis of service or product needs. But most B2B integrations do not sufficiently consider the involved processes, which contain most if not all stakeholders concerns and quality attributes. In this study, we take a look at the art of integration architecture and patterns, the impact on business processes, services and products as well as challenges hitherto.Item Analysis of MS Power Saving Scheme to BS with Finite Buffer in IEEE 802.16e networks(IEEE, 2011) Musau, Felix; Kipruto, Cheruiyot W.; Mushi, Joseph Cosmas; Tan, Guan-ZhengThis paper analyzes effects of power saving of mobile station (MS) to Base Station with finite buffer in IEEE802.16e class type I network. IEEE802.16e standard accept MS to switch to sleep-mode to minimize power when MS processing load is reduced. However, when packets destined to MS appear into BS buffer, they should be stored until end of MS sleep window. Although the sleep-mode designed in effort to conserve environment but it risks loss of packets once BS buffer overloaded with accumulated packets. This paper designs numerical analytic model to measure risk of packet drop. Through asymptotic analysis the effect of packets destined to sleeping MS into BS finite buffer is measured and analysed.Item Genetic Algorithm-Enhanced Retrieval Process for Multimedia Data(International Journal of Advancements in Computing Technology, 2011-04) Musau, Felix; Mushi, Joseph Cosmas; Tan, Guan-Zheng; Kipruto, Cheruiyot W.The explosive growth of digital media content from various domains has given rise to the need for efficient techniques for retrieval of relevant information is getting more and more attention, especially in the large-scale Multimedia Digital Database (MDD) applications. It is for this reason that there has been an increased interest in the query reformulation for use in Multimedia Information Retrieval (MIR) using a combination of various techniques. In this paper, we propose a retrieval method that is formalized as an optimized similarity search process that combines Singular Value Decomposition (SVD), Query Quality Refinement (QQR) using Histogram Equalization and Genetic Algorithm (GA) enhancement. Experimental results show that the approach significantly narrows the search process by retrieving similar images satisfying the needs of the user.Item Modeling M-SaaS Delivery Model for Threshold-based Credit Recharging Using Mbanking(IEEE, 2011) Musau, Felix; Mushi, Joseph Cosmas; Tan, Guan-Zheng; Kipruto, Cheruiyot W.The emerging of cloud computing has brought about new hope for efficient adoption and use of computer based information system. Software as a Service (SaaS) allows online customers to use applications on the Internet on a payas- you-go basis without investing in new infrastructure or software license. However, current SaaS delivery model bring challenge to online customers in community with poor financial services like online bank-transaction or credit cards. This study proposes Mobile-SaaS delivery model to facilitate online charging and credit-recharging mechanisms for SaaS application. The model use mobile-phone monetary services (M-banking) to support online charging, and adopts threshold-based credit recharge technique to support credit recharging.Item Performance Analysis of Recharging Scheme of M-SaaS through M-banking(Journal of Convergence Information Technology (JICT)., 2011-07) Musau, Felix; Mushi, Joseph Cosmas; Tan, Guan-Zheng; Kipruto, Cheruiyot W.Mobile SaaS (M-SaaS) is SaaS delivery model designed to use mobile network infrastructure for reserving and recharging credits of SaaS usage in pay-as-you-go manner for areas with poor financial services. The model integrates M-banking monetary feature into delivery process of SaaS so that potential customers in areas with poor access to financial services, such as online banking and credit cards, participate in SaaS delivery in real-time payment manner. In this paper, we present numerical analysis of M-SaaS recharging process, which together with M-SaaS credit-reservation scheme make M-SaaS model. The analysis shows that utilization and throughput of components involved in the scheme are healthy to avoid interruption of their involvement in other mobile network activities. However, load distribution at equilibrium leads to great imbalance, which needs further study for usefulness of M-SaaS model to revel.Item Principals of trust in internet security and websecure environment(IEEE, 2011) Musau, Felix; Kipruto, Cheruiyot W.; Mushi, Joseph Cosmas; Mwamafundo, Juma ModieTrust and security are key enablers of the information society. Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy. It addresses issues on who is authorised to perform actions as well as the techniques needed to manage and implement security in the applications. Trust relates to belief in honesty, truthfulness, competence, and reliability. The significance of incorporating trust in distributed systems is that trust is an enabling surety of good transaction. Its inclusion will enable Internet commerce and seamless, secure agent based applications. This paper investigates trust in relation to security in internet transactions; it specifically deals with different authentication schemes, Encryption, Trust in the websecure environment.Item Trust and its challenges facing E-Government programs in Kenya(IEEE, 2011) Musau, Felix; Kipruto, Cheruiyot W.; Mushi, Joseph CosmasKenya’s public sector is at a crossroads today in facing the challenges of institutional change and the impact of new technologies. The public sector can, and will play a much stronger role in implementing all the government plans. The emerging ICT technology can create solid improvement in offering better services to all nations. This can enable the citizens of the countries to access e-services from the governments based on their trust to the systems. In Kenya things have not been as planned as majority of the people don’t trust e-government services. There are many challenges facing its implementation which now remains as a dream, despite the government efforts. The paper raises a lot of concern especially on the trust of the citizens to e-government services being offered and the ICT awareness of the citizens too. The work highlights what the government has done to address the issue. The proposed solutions will help as e-government, and ICT investment has consumed a huge part of the national budget in recent years. The paper addresses how trust influences the change of attitude towards government by employees and the citizens.Item Using Genetic Algorithms to Optimize Web Caching in MultimediaIntegrated e-Learning Content(International Journal of Digital Content Technology and its Applications, 2011-08) Musau, Felix; Mushi, Joseph Cosmas; Tan, Guan-Zheng; Kipruto, Cheruiyot W.The evolution of e-learning as a new information technology built around the use of internet has originated new possibilities to develop pedagogical methodologies that provide the necessary knowledge and skills in the higher education environment. This has in effect given rise to a large number of learners who desire to access the educational resources provided by the new technology. But for many institutions of higher learning, the users often experiences poor performance when they try to access contents or download e-learning files. The main reasons for such are often performance problems concerning network infrastructure and the fact that many people tend to access the same piece of information repetitively. This paper uses web caching scheme and genetic algorithm optimization to effectively lessen this service bottleneck, diminish the user access latency and reduce the network traffic.