This Report describes the Design and Implementation of a I)atabase Management System (DBMS) for Kim Town Council — a Local Government found in Wakiso I)istrict. Uganda The System was developed to reduce the problems associated with the traditional file based management system in the ‘town Council . using Microsoft Access and Visual ... Continue Reading
This project is entitled A Secure Distribution Customer Relationship Database Management System For a Real Estate Agency covering Records computerization of Royal Palm estates data. A database is designed to store Estates information for easy access, retrieval and use of estates information in serving the clients. The user interface is... Continue Reading
ABSTRACT ‘Ibis project proposes the do’ elopment of school fee payment management system for a public secondar) school in kericho district. Ken>a. This secondary school is called Stafford high school. The proposed system will be desktop application. The system will help in keeping track of fee payments records and storage ofthese records. The... Continue Reading
ABSTRACT Following The landing of the fiber optic cable in East Africa and its going live businesses, institutions and organizations have been on rush to improve their services and maximize their profits. This has made e-commerce and e-learning a reality in east Africa. Due to this progress there has been an enormous competition in the use of... Continue Reading
Accurate meter readings, timely and correct bills have become an important aspect of water metering systems. Additionally, anomalies such as leakage and bursts in water pipelines have significant consequences to the environment and lead to financial constraints to the water companies. Since monitoring leakages and bursts in the water distribution... Continue Reading
ABSTRACT In an academic setting, it is important for students to be well informed about their academic status and progress regularly. All first year students are provided with school catalogs which hold information about their majors and the courses required by them to pass for them to obtain their particular degrees. Students are given these... Continue Reading
Mobile banking technology has been widely adopted amongst all the commercial banks in Kenya. Currently Kenyan banks lose millions of shillings by means of online theft through mobile banking and other platforms. This study therefore intended to address the issues associated with mobile banking and was directed by the following objectives: to... Continue Reading
Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. Nairobi city residents encounter a myriad of... Continue Reading
Knowledge management is a field with a lot of potential that can benefit individuals as well as different types of organizations. Despite this fact, most organizations in Kenya have focused on knowledge storage, but have not adopted sharing of the stored knowledge. This study examined the adoption of mobile technology for knowledge... Continue Reading
ABSTRACT Customer service is the most important aspect of every business that builds its processes on the basis of customers going through the queue before receiving any service from the organization. These businesses become ineffective and inefficient if the queues are not moving well or the queues are not fluid. This research was inspired by the... Continue Reading
ABSTRACT In our present society today, it is clearly seen that garbage cans are being placed in open environments because it needs to be accessed by the public. It can be observed that those garbage cans usually get filled up and overflow and litter the environment. Patil (2015) claims that this uncontrolled littering can lead to a gradual... Continue Reading
The main goal of healthcare sector worldwide is to provide quality and efficient health services to citizens. As the threat landscape on healthcare continues to escalate, many hospitals still lag behind in terms of protecting its critical infrastructure and electronic protected health information (ePHI).This research provided solution by ... Continue Reading
The use of and reliance on information systems for business has been on the rise especially in recent years. This has had a serious impact on the security of business information. Previous studies have identified two areas that must be considered when creating a secure information system: technology and human compliance to policies. Many... Continue Reading
Security problems have become a major concern in most urban settlements across the globe. The use of technology can be incorporated into the security systems to enhance operational measures that have been deployed. The aim of this study was to examine the challenges stakeholders face in crime reporting and develop a mobile-based system that... Continue Reading
Smart phones are powerful minicomputers characterized by high performance, large memory capacity and enhanced applications that enable various ways of communication. They are widely used for other purposes besides making phone calls, for instance browsing the internet, reading and responding to emails, road navigation, editing documents,... Continue Reading
The purpose of this study was to investigate the factors influencing adoption of secure cryptographic QR application by focusing on alcohol vendors who engage in the business of selling alcoholic beverages in Nairobi and its environs. This research was based on four specific objectives which were: to study the influence of cryptographic... Continue Reading
The purpose of this research was to develop a low cost system for identifying logon anomalies based on the time a user provides login credentials and also the physical location of the workstation on the LAN. The specific objectives of the project were (i) to evaluate how logon anomalies based on physical locations have been addressed in the... Continue Reading
Information technology evolution and the spread of internet connectivity have enabled globalization which allows communication and transaction of businesses across different countries. To ensure information infrastructure protection, understanding how the organizational, individual and technical aspects all together affect the outcome in... Continue Reading
With the growth of the Internet and the increase in number of online devices, IPv4 address space approaches exhaustion. This has led to the deployment of IPv6. However, IPv6 has not been widely adopted, particularly in Kenya. According to Akamai (2016) IPv6 has an adoption rate of 0.02% in Kenya despite recent studies showing that adoption... Continue Reading
The aim of the study was to investigate the influence of data visualization techniques on the overall adoption of data visualizations in humanitarian organizations with reference to Danish Refugee Council, UNOCHA, IOM, IFRC, and DDG. The study established the influence of data visualization techniques, user’s requirements as well as the... Continue Reading
The objective of this study was to establish the factors influencing successful implementation of core banking system. The specific objectives for the study were: To find out the processes involved in implementation of a Core Banking Systems (CBS), to identify the factors influencing the successful implementation of CBS and to design a ... Continue Reading
Word processors are one of the most widely used software applications in our time and have greatly contributed to the shift of paperless office. It has brought drastic changes in the way business documents are created, edited and stored. However word processors have over the years proven to be susceptible and have been successfully exploited... Continue Reading
E-learning has enhanced the way students think and learn over time. Different studies show that students appreciate facilities offered through the e-learning process. It has also proven to be a very useful tool by bringing education closer to the learner, hence, learner-centred. A point to note about e-learning is the ability to offer a wide... Continue Reading
The proliferation of Android smartphones has propagated negative societal issues that resulted in successful arrests of the culprits, forensic examination and prosecution. Other such cases have collapsed due to alteration of forensic evidence as a result of inadequate forensic sound frameworks. The purpose of this study was to develop and... Continue Reading
ABSTRACT Assistive Technology for Children with Learning Disabilities (ATCLD) was developed in response to the language and arithmetic challenges faced by learners with dyslexia of Eros Girls School (EGS). This development followed from requirement elicitation and is intended for grades 5 - 7. Having discussed the above, Assistive Technology (AT)... Continue Reading