<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>PHD.Theses and Dissertations</title>
<link href="http://hdl.handle.net/123456789/390" rel="alternate"/>
<subtitle/>
<id>http://hdl.handle.net/123456789/390</id>
<updated>2026-04-04T00:49:38Z</updated>
<dc:date>2026-04-04T00:49:38Z</dc:date>
<entry>
<title>A Framework For Institutionalizing Indigenous Knowledge Systems In Dispute Resolution Mechanism Among The Maasai Community In Kajiado County, Kenya</title>
<link href="http://hdl.handle.net/123456789/1242" rel="alternate"/>
<author>
<name>Guto, R</name>
</author>
<id>http://hdl.handle.net/123456789/1242</id>
<updated>2026-01-27T10:45:11Z</updated>
<published>2025-09-16T00:00:00Z</published>
<summary type="text">A Framework For Institutionalizing Indigenous Knowledge Systems In Dispute Resolution Mechanism Among The Maasai Community In Kajiado County, Kenya
Guto, R
Disputes and conflicts are ubiquitous occurrences with both negative and positive effects&#13;
on the social and economic development of societies. A huge number of cases are&#13;
outstanding in the formal court systems despite the provision of alternate dispute&#13;
resolution mechanisms. Owing to the presence of renowned indigenous dispute resolution&#13;
mechanisms, there is a dearth in studies seeking to evaluate the positive contribution of&#13;
the IDR mechanisms in dispute resolution among communities in Kenya. Therefore this&#13;
study documented the indigenous dispute resolution mechanisms among the Maasai&#13;
community and developed a framework in which IDR may be institutionalized and&#13;
integrated into the formal dispute resolution mechanisms in Kajiado County, Kenya. The&#13;
study had five–fold objectives: To investigate the existing utilization of indigenous&#13;
knowledge in dispute resolution mechanisms among the Maasai community in Kajiado&#13;
County, Kenya, evaluate the effectiveness of indigenous dispute resolution in relation to&#13;
formal judicial mechanism in dispute resolution, analyse the role of non-state actors in&#13;
influencing the use of IDR in dispute resolution mechanism, develop a framework for&#13;
institutionalizing indigenous knowledge system in dispute resolution mechanisms and&#13;
lastly to validate the developed framework. The study was anchored by three theories:&#13;
The worldview theory, the frustration – aggression theory and the instrumentality theory.&#13;
The study employed a mixed–method research design and the location of study was in&#13;
Kajiado County, Kenya. The target population was 5,202 individuals who are 75 years&#13;
and above including 171 NGAO leaders from four Sub-Counties in Kajiado County,&#13;
Kenya. The sample size for the study was 371 individuals who were sampled using&#13;
multi–stage sampling criteria and calculated using Yamane,(1967) formula. Data&#13;
collection was done using the focus group discussion and questionnaires. The instruments&#13;
were validated by piloting and reviewed by a panel of experts. Qualitative data was&#13;
collected and analysed through thematic and narrative analysis while quantitative data&#13;
was analysed descriptively. The study established that there is need to institutionalize a&#13;
framework for indigenous dispute resolution into the formal dispute resolution&#13;
mechanisms which should observe three main attributes: Legal recognition, capacity&#13;
building and systematic documentation to enhance legitimacy, efficiency and&#13;
sustainability.Therefore justice in plural societies is best shown through advanced&#13;
hybridized frameworks that integrate cultural legitimacy from indigenous dispute&#13;
resolutions with established enforceability from formal judicial mechanisms.The study&#13;
recommended: There is need for legal recognition of IDRs, enhanced capa
</summary>
<dc:date>2025-09-16T00:00:00Z</dc:date>
</entry>
<entry>
<title>Strategic Human Resource Management Practices And External Labour Mobility in Public Level Five Hospitals  In Kenya</title>
<link href="http://hdl.handle.net/123456789/1235" rel="alternate"/>
<author>
<name>Kamau, J</name>
</author>
<id>http://hdl.handle.net/123456789/1235</id>
<updated>2026-01-27T07:22:35Z</updated>
<published>2025-06-05T00:00:00Z</published>
<summary type="text">Strategic Human Resource Management Practices And External Labour Mobility in Public Level Five Hospitals  In Kenya
Kamau, J
External labour mobility of medical officers and nurses in Kenya has affected quality&#13;
of health service delivery due to high number of exits and brain drain of human&#13;
&#13;
16&#13;
&#13;
resources for health and this has affected the image and the economic potential of the&#13;
country. The specific objectives under this study were; strategic work-life balance&#13;
practice, strategic human capital practice, strategic health and safety practice, and&#13;
strategic career advancement opportunities practice. The moderating variable in this&#13;
study was perceived organizational support. Ability Motivation Opportunity theory,&#13;
Heinrichs Domino theory, Spillover Theory of work-life balance, Human Capital&#13;
Theory and Psychological Contract Theory were used to explain the relationship&#13;
between the variables under study. Mixed research design method was used in this&#13;
research and it involved a variety of analytical methods. The target population of this&#13;
study was 4,388 medical officers and nurses in the fourteen (14) public level five&#13;
hospitals in Kenya, from which a sample of 353 respondents was selected using&#13;
stratified random sampling method while purposive sampling technique was used to&#13;
select the eight (8) public level five hospitals representing the former provinces in&#13;
Kenya. Quantitative data was analyzed using both descriptive and inferential&#13;
methods. The descriptive statistical tools include the frequencies, percentages, mean&#13;
and standard deviation. Inferential statistical models included correlation coefficient&#13;
and regression analysis to determine the relationship between the variables through&#13;
SPSS version 22-computer program. The findings indicated that strategic health and&#13;
safety was not a significant predictor of external labour mobility. The study&#13;
recommended that the Public Service Commission, Ministry of Health and the&#13;
County Public Service Boards (CPSB) should integrate and implement strategic&#13;
human resource management practices into the organizations business strategy; The&#13;
County Executive Committee Members in the department of health to develop a&#13;
policy framework to ensure that there are flexi-work programs in place, childcare&#13;
policies/facilities and holding rooms (nap pods) in the health care facilities;&#13;
development of an employee assistance program; speedy approval of employees&#13;
leave in a timely manner as per the prevailing regulatory frameworks; development&#13;
of a training need assessment/analysis in the health facilities, sponsorship programs&#13;
to the human resources for health; provision of personal protective equipment/gear&#13;
and adequate working conditions to protect themselves against occupational diseases&#13;
and loss of life; formation of health and safety committees in the health facilities;&#13;
establishment of a clear succession management plan and career mentorship&#13;
programs in the health facilities, promotion of socially interactive environments&#13;
(interactional justice) and sharing of pertinent information to the staff members;&#13;
provision of organizational rewards such as career advancement opportunities based&#13;
on merit, paid holiday trips, recognition awards and certificates to the best&#13;
performing medical officers and nurses and adoption of an amicable leadership style.&#13;
Future researchers should focus on other strategic human resource management&#13;
practices influencing external labour mobility especially on generational groups&#13;
(Baby boomers, generational X, millennials, generation Z &amp;amp; Alpha) such as&#13;
recruitment and selection, orientation/induction programs, voice, strategic&#13;
involvement and participation, employee relations, human resource planning and&#13;
reward management practice.
</summary>
<dc:date>2025-06-05T00:00:00Z</dc:date>
</entry>
<entry>
<title>Study Of Some Curvature Tensors On Lorentzian Para-Kenmotsu Manifolds</title>
<link href="http://hdl.handle.net/123456789/1186" rel="alternate"/>
<author>
<name>Mburu, F</name>
</author>
<id>http://hdl.handle.net/123456789/1186</id>
<updated>2025-11-10T11:48:58Z</updated>
<published>2025-09-24T00:00:00Z</published>
<summary type="text">Study Of Some Curvature Tensors On Lorentzian Para-Kenmotsu Manifolds
Mburu, F
A comprehensive analysis of curvature tensors on Lorentzian Para Kenmotsu manifolds focusing on W3, W5 and W9 curvature tensors was done. The properties of these curvature tensors under various conditions on these manifolds were explored and examined as well as their geometric implications. The study also included investigations of W3-flat, W5 -flat and W9-flat Lorentzian Para Kenmotsu manifolds and their connections to η-Einstein, Einstein and special η-Einstein properties. Additionally, analysis of the Ricci operator’s behaviors on Lorentzian Para Kenmotsu manifolds under the conditions W3 · Q = 0, W5 · Q = 0, W9 · Q = 0 was conducted. Expressions for these curvature tensors while considering the condition Wi (ξX) · Wi = 0, where i=3, 5, 9 were derived. Proves to determine whether these manifolds are flat were provided. The findings of these studies enhance our understanding of the geometric properties of Lorentzian Para Kenmotsu manifolds in relation to Wi-curvature tensors.
</summary>
<dc:date>2025-09-24T00:00:00Z</dc:date>
</entry>
<entry>
<title>A Machine Learning-Based Packet Sniffer for Detection and Classification of the Denial of Service Attack Packets at The Network Layer</title>
<link href="http://hdl.handle.net/123456789/1149" rel="alternate"/>
<author>
<name>Kipkorir P</name>
</author>
<id>http://hdl.handle.net/123456789/1149</id>
<updated>2025-06-25T08:59:33Z</updated>
<published>2025-01-01T00:00:00Z</published>
<summary type="text">A Machine Learning-Based Packet Sniffer for Detection and Classification of the Denial of Service Attack Packets at The Network Layer
Kipkorir P
The research study was on modelling a packet sniffer utilizing machine learning techniques to&#13;
identify denial of service (DOS) attack packets at the network layer of the OSI model. Cyber&#13;
threats and attacks have continued to evolve in complexity and sophistication, posing significant&#13;
risks to the network infrastructure and sensitive data's availability, confidentiality, and integrity.&#13;
The necessity for sophisticated methods to improve network security is highlighted by the fact that&#13;
conventional methods frequently fail to identify and mitigate these attacks. The overall purpose of&#13;
the research study was to capture and interpret packets transmitted over a local area network to&#13;
detect and capture the DOS threats within the Open Systems Interconnection Model (OSI) network&#13;
layer. This layer is prone to several attacks for instance, denial-of-service, routing protocol attacks,&#13;
Port scanning and enumeration, and fragmentation-based attacks. However, in this study, we&#13;
delved into detecting and capturing the denial of service threats at the third layer of the OSI model&#13;
in a local area network. Some examples of DOS attacks are UDP flood which sends a significant&#13;
quantity UDP (User Datagram Protocol) packets to the targeted systems and thereby exhausting&#13;
network resources, ICMP flood which transmits a significant quantity of Internet Control Message&#13;
Protocol (ICMP) packets to overwhelm network devices, SYN flood which takes advantage of the&#13;
TCP three-way hand-shake procedure by sending a lot of SYN requests without carrying out the&#13;
necessary handshake, using server resources and blocking valid connections. Essential&#13;
components extracted from Ethernet frames comprise TCP segments, ICMP packets, IPv4 packets,&#13;
and associated flags. IPv4, a crucial protocol in Internet communication, enables routing and&#13;
logical addressing, forming the Internet's backbone. The Internet Control Message Protocol (ICMP)&#13;
facilitates error reporting and the interchange of operational information inside the Internet&#13;
Protocol suite. There are header and data sections in a packet. Data bytes are sent plus a header&#13;
that TCP added to the data to make up a TCP segment. Even though internet-based data&#13;
transmission protocols have expanded, traditional network security measures are frequently&#13;
insufficient to combat the dynamic environment of cyber threats that target networks used for data&#13;
transfer. This deficiency emphasizes the need for innovative technologies to improve network&#13;
security. Although antivirus programs, intrusion detection systems, and firewalls are crucial&#13;
barriers against malicious attacks, they frequently fall short in detecting and halting more crafty&#13;
attacks that evade their protection. The study sought to bridge this gap by providing an automated&#13;
machine learning-based packet sniffer that can identify and categorize network risks. To address&#13;
the research objectives thoroughly, experimental research methodology was used. This study&#13;
employed the CICIDS2018 dataset. The LightGBM model was successfully trained and&#13;
implemented for the task of detecting DoS attacks. We used the CICIDS2018 dataset, which&#13;
provided labeled network traffic data containing both normal and attack (DoS) instances. The&#13;
model was trained to classify traffic as either normal or a DoS attack based on various network&#13;
features. The model's performance was evaluated using several metrics to demonstrate its ability&#13;
to accurately detect threats at the network layer in a local area network including sensitivity,&#13;
specificity, and accuracy. The AUC (Area Under the Curve) was particularly high, which indicated&#13;
that the model was able to effectively differentiate between normal traffic and DoS attacks.&#13;
Additionally, the F1-score, precision, and recall were balanced, suggesting that the model was&#13;
capable of identifying attacks while minimizing false positives and false negatives. The model was&#13;
successful in meeting its primary objective of detecting DoS attacks from network traffic. The&#13;
performance metrics indicate that LightGBM is a strong candidate for the task, achieving a high&#13;
AUC and a well-balanced F1-score. This suggested the model achieved good generalization&#13;
ii&#13;
capabilities, and it can effectively distinguish between normal traffic and DoS attack traffic in most&#13;
cases. The main contribution of this work is the development of a LightGBM-based machine&#13;
learning model for detecting DoS attacks using the CICIDS2018 dataset. The model’s ability to&#13;
classify network traffic as normal or malicious will aid in enhancing network security by&#13;
automating the detection of such attacks in LANs. The model will henceforth serve as a&#13;
foundational step for building more advanced intrusion detection systems, especially for&#13;
environments where DoS attacks are prevalent
</summary>
<dc:date>2025-01-01T00:00:00Z</dc:date>
</entry>
</feed>
