Skip to main content
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from... more
    • by 
    •   18  
      Computer ScienceInformation SecurityFacial RecognitionElectronic Voting
In this paper, we base our research on biometric systems security. We begin by introducing biometrics after which we will describe how a biometric system works before we later define what a biometric template is. Thereafter, we will... more
    • by 
    •   18  
      Computer ScienceInformation SecurityFacial RecognitionICT in Education
In this study, we reviewed biometric template protection schemes in subsisting literature and established that there is no reliable, efficacious and foolproof technique that assures diversity, revocability, security and optimal... more
    • by  and +1
    •   32  
      Information SystemsComputer ScienceVoting BehaviorInformation Security
In this study, we reviewed biometric template protection schemes in subsisting literature and established that there is no reliable, efficacious and foolproof technique that assures diversity, revocability, security and optimal... more
    • by 
    •   11  
      AlgorithmsSecurityEncryptionJava
Healthcare facilities have at their disposal vast amounts of cancer patients' data. Medical practitioners require more efficient techniques to extract relevant knowledge from this data for accurate decision-making. However the challenge... more
    • by 
    • by 
Online examination (E-assessment) is an increasingly important component of online courses, and student authentication is widely seen as one of the major concerns for online examinations. Due to the inherent anonymity of being online,... more
    • by  and +1
    •   5  
      E-learningAcademic WritingAuthenticationE-Assessment
The dotcom generation has dramatically amplified the pitch of information gathering as well as dissemination. However, not all areas are experiencing the same breeze of efficacy. For instance, in this thesis we looked at the section of... more
    • by  and +1
    •   5  
      Artificial IntelligenceAcademic WritingNeural NetworksIslamic inheritance
The use of mobile phones in African has seen a formidable growth. The use of mobile phones to perform business and financial transactions seems to be on the increase as well. The rise in use of mobile phones to perform financial... more
    • by 
    •   4  
      Information SecurityAcademic WritingComputer SecurityComputer Sciencee
Mobile banking, sometimes referred to as M-Banking, Mbanking or SMS Banking, is a term used for performing balance checks, account transactions, payments, credit applications and other banking transactions through a mobile device such as... more
    • by 
    •   3  
      Information SecurityComputer SecurityComputer Sciencee
    • by 
    •   4  
      Public AdministrationStrategyRisk factorsPlans
Mobile banking, sometimes referred to as M-Banking, Mbanking or SMS Banking, is a term used for performing balance checks, account transactions, payments, credit applications and other banking transactions through a mobile device such as... more
    • by 
    •   3  
      Information SecurityComputer SecurityComputer Sciencee
In this paper, enhanced security of online banking transactions against man in the middle is presented basing on two factor authentications by use of one time password and single password. Online banking is a system allowing individuals... more
    • by 
    •   4  
      Information SecurityMobile ComputingMobile SecurityMobile Computing and Wireless Communications, Information Security and Privacy, Digital Enterprises, Digital Governments, Digital Health.
    • by 
The purpose of this study is to understand the extent of the effectiveness of intelligence-led policing on drugtrafficking prevention in Nyeri County. This endeavor resulted from realization of increased cases of drug-trafficking that... more
    • by 
Inquiry Based Learning (IBL) is a form of active learning, often used in STEM education to promote conceptual learning and to acquire scientific investigation skills. This paper reports on a study in which teachers in Kenya, Nigeria and... more
    • by 
Inquiry Based Learning (IBL) is a form of active learning, often used in STEM education to promote conceptual learning and to acquire scientific investigation skills. This paper reports on a study in which teachers in Kenya, Nigeria and... more
    • by