ENVIRONMENTAL IMPLICATIONS OF CELL PHONES PENETRATION AND DISPOSAL IN KENYA
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 7
Abstract
Kenya has over six million active mobile subscribers who may at some point want to replace or  get rid of old mobile phones. A big number of the mobile phones were recently switched off for not being genuine without a prober mechanism being put in place for the disposal. If every affected individual or otherwise disposed off phones by throwing it away then there could a serious ecological disaster in waiting. Cell phones are hazardous materials because of electromagnetic radiation and electronic composition. They have substances such as antimony, arsenic, beryllium, cadmium, copper, lead, nickel and zinc which belong to a class of chemicals known as persistent toxins. These toxins pollute and remain in the environment for long periods. There are ill-effects of wireless and telecommunication devices on the environment are disastrous. The increased use of high resolution LCD screens leads to a potentially devastating environmental challenge. There is no clear policy frame work on e-waste management with a special focus on used mobile phones in the country. A proper disposal mechanism of wireless and telecommunication devices is a necessity in Kenya.
Authors and Affiliations
Dr. Franklin Wabwoba, Prof. Thomas Sakwa, Dr. Samuel Mbugua, Mr. Humphrey Juma Kilwake
Chaos Baker-based Image Encryption in Operation Modes
This research paper study the application of chaos baker map for digital image encryption in different operation modes. The employed modes include the electronic code book (ECB), cipher block chai...
CRYPTOGRAPHY
To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting in...
ANALYSIS OF HUMAN FACE RECOGNITION ALGORITHM USING PCA+FDIT IN IMAGE DATABASE FOR CRIME INVESTIGATION
In general, the field of face recognition has lots of research that have put interest in order to detect the face and to identify it and also to track it. Many researchers have concentrated on the face identification and...
Robust Estimators in Fuzzy Logic Cellular-Automata Salt and Pepper Noise Filtering
In order to increase the performance of computational algorithms in terms of efficiency of estimators, we tested new nonparametric estimators in fuzzy and cellular automata models. In particular, image de-noising algor...
HYBRID MODEL OF RSA, AES AND BLOWFISH TO ENHANCE CLOUD SECURITY
Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the s...