58 research outputs found

    On analytic functions and characterization of Schwarz Norms in Banach spaces

    Get PDF
    In this paper, we characterize Schwarz norms in Banach spaces. We give new results on the s-norms in B(H)

    Forecasting Wheat Output and Profits from Cropping Systems Using Simulation Models in Uasin Gishu, Kenya

    Get PDF
    Simulation models have been used successfully to forecast productivity of cropping systems under various weather, management and policy scenarios. These models have helped farmers make efficient resource allocation decisions. However, in Kenya simulation models have not been used extensively and more specifically in modeling large scale cropping systems. The study aimed at forecasting productivity and profitability of wheat cropping systems in Uasin Gishu district, Kenya. Both primary and secondary data were used. Both time series and cross-sectional data for variables of interest were collected and complemented by a survey of 20 wheat farmers who were systematically selected to verify information obtained from secondary sources. Cropping Systems simulation model and Monte Carlo simulation were used to determine wheat output and profits under alternative price scenarios. Even though, simulated yields overestimated actual field wheat yield both at the district and across the four agro-ecological zones, the deviation from the actual field yield was marginal. It is recommended that Cropsyst and Monte Carlo models be included among a bundle of tools for decision making. Further research is also required to test the two models under different locations, diverse soil types, varied management styles and different scales of production.Wheat, cropping system, simulation, forecasting, productivity, profits, Crop Production/Industries,

    Assessing the Current Status of Information Security Policies Among Saccos in Kenya

    Get PDF
    In 2013, Communication Authority of Kenya (CAK) recorded cyber-attacks amounting to Sh5.4 million loses. In April 2016, Bandari Savings and Credit Cooperative Society lost Sh5 million through fraudulent ATM withdrawals (Nation Newspapers, April 8, 2016). These examples demonstrate weaknesses that may exist from security breaches and incidents caused by people, processes, and technology. Ministry of ICT and CAK are lacking specific Information Security Models tailored towards SACCOS in Kenya. The study therefore sought to assess the current status of information security policies among SACCOS in Kenya. The study adopted descriptive research design. The unit of observation was 135 SACCOS registered with SACCO Societies Regulatory Authority (SASRA) while the unit of analysis was 270 ICT personnel working in the 135 targeted SACCOS. The study targeted the SACCOS heads of IT department. The study used Nassiuma (2000) formula to get a sample of 85 respondents. Purposive sampling was further used in selecting study participants in every SACCOS who were considered to be knowledgeable of the variables under study. The study utilized questionnaire as the survey instrument to collect both quantitative and qualitative data. The study adopted descriptive statistics. Descriptive data was presented by use of frequency tables. The study established that in all the SACCOS studied, information security policy is used. However, there are still challenges on how information security breaches and incidents can be contained based on the results of the study and therefore calls for further research in academic research. The findings of the study indicate that SACCOS were able to validate that the enhanced information security model using an integrated approach worked as planned and reported to auditors, managers and executives that incident response programs are robust and reliable. If security controls didn’t work as planned, they will need to fix them. The actions and resources needed should be included in in the report to executives in the SACCOS sector in KenyaKeywords: SACCOS, Management controls, Information Security Policies, Risk assessmentDOI: 10.7176/EJBM/11-27-09 Publication date:September 30th 201

    Generalizations on contractive mappings in metric spaces

    Get PDF
    We present new results on generalizations on metric spaces. New results are given on contractions in metric spaces and their fuzzy sets

    Role of ICT and usability of Honeypots in Kenet member institutions in Western Kenya as proactive detection tools for monitoring cyber related incidences

    Get PDF
    With the advent of the ever changing technology and the intense sophistication in methods and means of committing illegal activities, crime is no longer narrowly defined vies-a-vie the law but there is need to be able to handle technologically oriented crimes commonly referred to as Cybercrimes. Cybercrimes are crimes that involve the use of computers to undertake illegal. Collection of statistics associated with cybercrimes can be quite tricky and daunting, since their collection and tabulation can only be done when aggrieved parties report them. Some of these illegal activities that constitute cybercrimes include, but not limited to, creation of counterfeit currency or official documents using computer scanners and graphics programs, embezzlement of funds using computers to skim very small sums of money from a large number of accounts, distribution of child pornography on the Internet, and theft of digital property. Other crimes that can also be committed include fraud, hate crimes, stalking, gambling, hacking; spread of malware, phishing, spamming, Botnet attacks, DDoS attacks, espionage and money laundering. In this paper we present results on usability of HoneyPots in KENET member institutions in western Kenya as proactive detection tools for monitoring cyber related incidences.Â

    Deployment of honeypots as proactive detection tools for monitoring cyber related incidences and their applications to information technology

    Get PDF
    The Kenya government is striving to roll out its Vision 2030 programme where ICT plays a major role in achieving the components of the Pillars associated with it. The purpose of this study was to find out the extent to which deployment of HoneyPots as early warning detection tools for monitoring cyber related incidents had been embraced within KENET member institutions in Western Kenya, how they are aiding the institutions in knowing and understanding their adversaries; and allowing them to implement solutions that work in defending the critical internet and network infrastructures they manage. The study was guided by a descriptive study design with a study population of 117 staff members working in various institutions in western Kenya. Using simple random sampling technique, a sample size of 80 respondents were picked and administered with questionnaires, 70 questionnaires were returned for data entry and analysis using Statistical Package for social Sciences version 20. This implies that 87.5% of the respondents turned up for the study. According to the major findings, the study established that most of the KENET member institutions in western Kenyan, despite experiencing cyber security related incidents, had not setup CIRT teams nor deployed Honeypots to help them study cyber security incidents and take appropriate action to defend their constituencies. As a recommendation, the Government, being one of the economic stakeholders, and KENET, should come up with intervention measures through the Ministry of ICT making it mandatory for setup CIRTs. All CIRTs should then be required to direct part of their traffic to the national CERT which ideally should be based at Communication Authority of Kenya to form a Honey Net, which can further be linked with other internationally recognized Honey Net projects.Â

    Micro-Field Assessment of Soil Erosion and Surface Runoff Using Mini Rainfall Simulator In Upper River Njoro Watershed in Kenya

    Get PDF
    Soil erosion and surface runoff are consequences of integration of several factors and processes within a catchment. The use of a rainfall simulator and run off plots provides a valuable research tool and are often used in soil erosion and surface runoff studies. Cheruiyot (1984) used this approach to study infiltration rates and sediment yield in Kiboko, Kenya. The present study used the same method but with a mini-rainfall simulator (Kamphorst, 1987) to study the effects of different land use treatments on soil loss and surface runoff

    On Compactness of similarity orbits of norm-attainable, Operators

    Get PDF
    Paper presented at the 5th Strathmore International Mathematics Conference (SIMC 2019), 12 - 16 August 2019, Strathmore University, Nairobi, KenyaThe notion of compactness plays an important role in analysis. It has been extensively discussed on both metric and topological spaces. Various properties of compactness have been proved under the underlying spaces. However, if we consider these sets to be from similarity orbits of norm-attainable operators, little has been done to investigate their compactness. In this paper, we introduce the concept of compactness of similarity orbits of norm-attainable operators in respect to invariant topological spaces and investigate their properties.Jaramogi Oginga Odinga University of Science and Technology, Kenya
    • …
    corecore