Browsing by Author "Cheruiyot, Wilson"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
Item Analysis of MS Power Saving Scheme to BS with Finite Buffer in IEEE 802.16e Network(IEEE, 2011) Mushi, Joseph C.; Tan, Guan Z.; Cheruiyot, Wilson; Musau, FelixThis paper analyzes effects of power saving of mobile station (MS) to Base Station with finite buffer in IEEE802.16e class type I network. IEEE802.16e standard accept MS to switch to sleep-mode to minimize power when MS processing load is reduced. However, when packets destined to MS appear into BS buffer, they should be stored until end of MS sleep window. Although the sleep-mode designed in effort to conserve environment but it risks loss of packets once BS buffer overloaded with accumulated packets. This paper designs numerical analytic model to measure risk of packet drop. Through asymptotic analysis the effect of packets destined to sleeping MS into BS finite buffer is measured and analysed.Item Enhanced Model for SaaS Delivery in Developing Economy(2011) Mushi, Joseph C.; Tan, Guan Z.; Cheruiyot, WilsonThe emerging of cloud computing has brought about new hope for adoption and use of computer-based information system. Software as a Service (SaaS) allows online customers to use applications on the Internet on a pay-as-you-go basis without investing in new infrastructure or software license. However, the current SaaS pay-as-you-go phenomenon brings challenge to online customers in developing economy where financial services are poor to support online payments. This paper studies data and monetary service aspects of mobile network operator and use the concepts to propose a model which facilitate pay-as-you-go phenomenon through mobile monetary service (M-banking).Item Genetic Algorithm-Enhanced Retrieval Process for Multimedia Data(2011) Cheruiyot, Wilson; Tan, Guan Z.; Mushi, Joseph C.; Musau, FelixThe explosive growth of digital media content from various domains has given rise to the need for efficient techniques for retrieval of relevant information is getting more and more attention, especially in the large-scale Multimedia Digital Database (MDD) applications. It is for this reason that there has been an increased interest in the query reformulation for use in Multimedia Information Retrieval (MIR) using a combination of various techniques. In this paper, we propose a retrieval method that is formalized as an optimized similarity search process that combines Singular Value Decomposition (SVD), Query Quality Refinement (QQR) using Histogram Equalization and Genetic Algorithm (GA) enhancement. Experimental results show that the approach significantly narrows the search process by retrieving similar images satisfying the needs of the user.Item Modeling M-SaaS delivery model for threshold-based credit recharging using M-banking(IEEE, 2011) Mushi, Joseph C.; Tan, Guan Z.; Musau, Felix; Cheruiyot, WilsonThe emerging of cloud computing has brought about new hope for efficient adoption and use of computer- based information system. Software as a Service (SaaS) allows online customers to use applications on the Internet on a pay- as-you-go basis without investing in new infrastructure or software license. However, current SaaS delivery model bring challenge to online customers in community with poor financial services like online bank-transaction or credit cards. This study proposes Mobile-SaaS delivery model to facilitate online charging and credit-recharging mechanisms for SaaS application. The model use mobile-phone monetary services (M-banking) to support online charging, and adopts threshold-based credit recharge technique to support credit recharging. Keywords-software as a service (SaaS), mobile network, M- banking, online recharging.Item Principals of Trust in Internet Security and Websecure Environment(IEEE, 2011) Musau, Felix; Cheruiyot, Wilson; Mushi, Joseph C.; Modie, JumaTrust and security are key enablers of the information society. Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy. It addresses issues on who is authorised to perform actions as well as the techniques needed to manage and implement security in the applications. Trust relates to belief in honesty, truthfulness, competence, and reliability. The significance of incorporating trust in distributed systems is that trust is an enabling surety of good transaction. Its inclusion will enable Internet commerce and seamless, secure agent based applications. This paper investigates trust in relation to security in internet transactions; it specifically deals with different authentication schemes, Encryption, Trust in the websecure environment.Item Query Quality Refinement in Singular Value Decomposition to Improve Genetic Algorithms for Multimedia Data Retrieval(Springer, 2011-11) Cheruiyot, Wilson; Tan, Guanzheng; Musau, Felix; Mushi, Joseph C.With the development of internet and availability of multimedia data capturing devices, the size of Multimedia Digital Database (MDD) collection is increasing rapidly. The complex data presented by such systems do not have the total ordering property presented by the traditional data handled by Database Management Systems (DBMSs). The quality of the search experience in such systems is also normally a big challenge since users from various domains require efficient data searching, browsing and retrieval tools. This has triggered an important research topic in Multimedia information retrieval concerning effi- cient and effective image similarity search. Modern search algorithms are fast and effective on a wide range of problems, but on MDD with a large number of parameters and observations, manipulations of large matrices, storage and retrieval of large amounts of information may render an otherwise useful method slow or inoperable. The focus of this work is the application of image enhancement technique, using histogram equalization, to the images retrieved using singular value decomposition (SVD). SVD is a linear algebra technique used for discovering correlations within data. The approach, herein referred to as query quality refinement (QQR) technique, improves the image similarity search result, and when incorporated with genetic algorithms further optimizes the search. These beneficial applications can be extended to other different types of multimedia data in various areas such as the P2P and WiMAX networks.Item Trust and Its Challenges Facing E-Government Programs in Kenya(IEEE, 2011) Musau, Felix; Cheruiyot, Wilson; Mushi, Joseph C.Kenya's public sector is at a crossroads today in facing the challenges of institutional change and the impact of new technologies. The public sector can, and will play a much stronger role in implementing all the government plans. The emerging ICT technology can create solid improvement in offering better services to all nations. This can enable the citizens of the countries to access e-services from the governments based on their trust to the systems. In Kenya things have not been as planned as majority of the people don't trust e-government services. There are many challenges facing its implementation which now remains as a dream, despite the government efforts. The paper raises a lot of concern especially on the trust of the citizens to e-government services being offered and the ICT awareness of the citizens too. The work highlights what the government has done to address the issue. The proposed solutions will help as e-government, and ICT investment has consumed a huge part of the national budget in recent years. The paper addresses how trust influences the change of attitude towards government by employees and the citizens.