10 research outputs found
Web-based Application Tool for Recommendation of Open Source Software for Higher Learning Institution in Tanzania
This research article published by Modern Education and Computer Science Press, 2019Open Source Software (OSS) provide a number of advantages to Higher Learning Institutions (HLIs) in developing countries, such as Tanzania. This is because they are freely available, free to make copies and free to distribute. Through literature reviewed, it has been observed that OSS usage in HLIs in Tanzania is low due to lack of awareness of OSS designed for academic purposes. This paper presents a study on how to implement a reliable and effective web-based application tool for recommendation of OSS for enhancing awareness of HLIs on existing OSS designed for academic purposes. There are three recommendation algorithms that were employed for filtering the OSS in this study: the content-based, collaborative, and demographic filtering. We used various web technologies for the implementation of application functionalities. The result is the reliable and effective web-based application tool that recommends OSS to individuals in HLIs for enhancing their awareness of OSS designed for academic purposes
An Online Collaborative Discussion Platform for Bridging a Technological Reliance Gap in Higher Learning Institutions in Tanzania
This research article published by Modern Education and Computer Science Press, 2018Currently, the online discussion forums have
become the focal point for e-learning in many Higher
Learning Institutions (HLIs); this is due to the ubiquitous
of Information and Communication Technology (ICT)
tools, significant rate and fast growing technology
adoption and use in many fields including education.
However, developing countries, such as Tanzania, are
experiencing technical adoption difficulties, such as
limited access to computers, problems with Internet
connections as well as the technological reliance gap
between tutors and learners; these affect the use of
technology in Teaching and Learning (T/L). This study
aims to use an Online Discussion Platform (onlineDP) to
bridge the technological reliance gap between the tutors
and learners in HLIs in Tanzania. In this study, the
literature review and qualitative research methods were
conducted to develop the prototype of the platform. The
UMBC semantic similarity service was used to develop
the contents filter used to reduce the number of duplicate
discussion questions. The application was mainly
developed using Laravel Pre-processor (PHP) framework
and My Structured Query Language (MySQL) database.
The result is the web-based application prototype that
enhances the collaborative learning environment in HLIs
in Tanzania. The technologies to be used for T/L, should
consider both sides of tutors and learners as well as the
theoretical framework for their implementations
Web-Based Two-Way Electricity Monitoring System for Remote Solar Mini-Grids
This research article published by Modern Education and Computer Science Press, 2019Electricity usage monitoring systems play a vital role towards raising energy utilization awareness for
consumers. Existing solar mini-grid infrastructure, however, lacks a user-friendly two-way platform to allow
consumers to access information about electricity consumption. This paper proposes a cloud-based, two-way
energy usage monitoring system that will allow both utility companies and consumers to access energy
consumption data in a user-friendly way through a web platform. The system requirements were collected
via questionnaires, interviews, and observations conducted at two solar mini-grids centres located at Arusha
and Kilimanjaro regions in Tanzania. The system uses a Low Power Area Network (LPWAN) and the
existing GPRS network to monitor electricity consumption data between smart meter units and the cloud
server. Also, a virtual bill payment module and usage status feedback functionality have been integrated into
the system to increase awareness of the cost-effective use of electricity and hence, achieve the sustainability
of solar mini-grids. By using both white-box and black-box system testing approaches, findings show that the
system will not only raise awareness among customers about the economical usage of electricity, but it can
also be used by mini-grid companies as a source of data to determine current and future energy demands to
minimize large investment costs
Developing an Algorithm for Securing the Biometric Data Template in the Database
This research article published by the International Journal of Advanced Computer Science and Applications, Vol. 10, No. 10, 2019In the current technology advancement, biometric
template provides a dependable solution to the problem of user
verification in an identity control system. The template is saved
in the database during the enrollment and compared with query
information in the verification stage. Serious security and
privacy concerns can arise, if raw, unprotected data template is
saved in the database. An attacker can hack the template
information in the database to gain illicit access. A novel
approach of encryption-decryption algorithm utilizing a design
pattern of Model View Template (MVT) is developed to secure
the biometric data template. The model manages information
logically, the view shows the visualization of the data, and the
template addresses the data migration into pattern object. The
established algorithm is based on the cryptographic module of
the Fernet key instance. The Fernet keys are combined to
generate a multiFernet key to produce two encrypted files (byte
and text file). These files are incorporated with Twilio message
and securely preserved in the database. In the event where an
attacker tries to access the biometric data template in the
database, the system alerts the user and stops the attacker from
unauthorized access, and cross-verify the impersonator based on
the validation of the ownership. Thus, helps inform the users and
the authority of, how secure the individual biometric data
template is, and provided a high level of the security pertaining
the individual data privac
A study of usersâ compliance and satisfied utilization of biometric application system
This research article published by Taylor & Francis Online, 2020Currently, the adoption rate of biometric technology has speedily grown in all applications. The technology is considered as an effective measure for the protection against crime. However, there is a concern that it violates the privacy and rights of the individuals. For instance, the possibility of fraud, identity theft, civil liberty violations, and inaccuracy of data. As a result, create the conflicts between service provider and public as they may be accused of a crime or become a victim of discrimination. This study constitutes exploratory research and is restricted to the usage of the biometric application system within the passport. It aims at discovering the substantial acceptance of users in implementing the biometric application for the East African passport (Uganda). Factor influencing usersâ opinions regarding the acceptance of the biometric application, User willingness, trust and techniques for securing the biometric information are presented. Strategies aimed at regulating the protection of biometric data on the usage of the application are explained. The findings suggested encryption techniques as the most favorable tactic of protecting the biometric data application. Therefore, best practices such as individual desirability, practical accurateness, and eagerness are required
Assessment of vulnerabilities of the biometric template protection mechanism
Research Article published by International Journal of Advanced Technology and Engineering Exploration, Vol 5(45)In the ever-changing world of global data transmission, the security of data and individual privacy are the growing fears in todayâs human life worldwide. The major concerns are the protection of the biometric templates in the biometric identification and authentication process. Storage of the biometric template in the database raises the chance of compromising it, hence lead to serious threats and abuse of the personâs identity. When an individualâs registered biometric data is disclosed, their security and privacy can be compromised. Therefore, public acceptance of biometrics will depend on the system designerâs ability to demonstrate that the systems are robust, with low error rates, and tamper proof. If someoneâs biometric template inside the database is compromised, that consequently might imply identification robbery of that individual. In the recent past, a considerable number of methods for biometric template protection have been published. This article explains, a thorough valuation on numerous attacks and threats associated with the biometric system alongside the biometric template protection, elucidating the measures anticipated to address the threats, to the performance gap and establish the status quo of the current biometric template protection for public acceptance
Framework for integrating fragmented information systems: Case of livestock information systems
Research Article published by International Journal of Computer Engineering Research Vol. 7(1), July 2017Information System (IS) is used for information communication. But the problem with the existing Agro-
ISs is that they are not integrated. To integrate it, we need to have an integration framework. Generally,
much has been done on the designing framework for IS integration. However, there are credible things
which can be added to improve these frameworks. A framework can be designed in such a way that it
guides users on technologies to be used, skills needed for the task, goals, outcome and output of
integration. This is what this study focused to contribute. To design the framework, guiding factors
were established. These factors were the one which surround farmers and in one way or another hinder
or support accessibility of information from integrated ISs. The factors were discussed and presented
in the mapping matrix. Under each factor, viability of technology on the ground was established and
compared against the available technology. From the mapping matrix, scenarios on possible
applications were established. Guides on Technologies, skills, goals, output and outcome of integration
were established to form a framework for integrating applications and ISs. Then the framework was
demonstrated empirically and compared with the existing frameworks. Results show that the proposed
framework is more comprehensive in terms of guides it provides, than the existing frameworks
Blockchain Technology in Sub-Saharan Africa: Where does it fit in Healthcare Systems: A case of Tanzania
This research article published by the Journal of Health Informatics in Developing Countries, 2019Background: Blockchain technology is a distributed electronic ledger containing digital records,
transactions or events that are protected with advanced encryptions, extremely hard to tamper, and
updateable through a consensus algorithm agreeable to all connected network nodes. In Sub-Sahara Africa,
the technology has started to be adopted in real estate, supply chain, agriculture, and financial sector.
Unfortunately, there is a lack of effort in introducing this technology in the healthcare sector. Therefore,
this study aims to explore the issues facing electronic healthcare systems in Sub-Sahara Africa taking
Tanzania as a case study and introduce blockchain-based solutions for the discovered issues.
Methods: The study used qualitative methods for data collection and analysis. Data were collected through
interviews, observation and documentary analysis. Interviews were done with the sample size of 50
participants who were selected from groups of healthcare facility leaders, ICT experts, government
representatives, doctors, nurses, laboratory technicians, pharmacists, accountants, and receptionists. Direct
observation and participatory observation were used to assess different electronic healthcare records
systemsâ functions. Moreover, researchers used document analysis to collect data from public records (like
policy manuals), personal documents (like incident reports), and physical evidence (like training materials
and handbooks). NVivo 11 software was applied in managing and organizing data analysis.
Results: Out of 710 healthcare facilities involved in this study, 34.5% fully implemented electronic
healthcare records systems and 78% installed Mfumo wa Taarifa za Uendeshaji Huduma za Afya
(MTUHA) also known as (District Health Information Software (DHIS) II). The findings showed that the
issues facing electronic healthcare records are; difficulties in taking care of the patientsâ private information,
problems in safely sharing medical information between healthcare facilities, bandwidth issues, and
improper handling of data integrity
Search for intermediate-mass black hole binaries in the third observing run of Advanced LIGO and Advanced Virgo
International audienceIntermediate-mass black holes (IMBHs) span the approximate mass range 100â105âMâ, between black holes (BHs) that formed by stellar collapse and the supermassive BHs at the centers of galaxies. Mergers of IMBH binaries are the most energetic gravitational-wave sources accessible by the terrestrial detector network. Searches of the first two observing runs of Advanced LIGO and Advanced Virgo did not yield any significant IMBH binary signals. In the third observing run (O3), the increased network sensitivity enabled the detection of GW190521, a signal consistent with a binary merger of mass âŒ150âMâ providing direct evidence of IMBH formation. Here, we report on a dedicated search of O3 data for further IMBH binary mergers, combining both modeled (matched filter) and model-independent search methods. We find some marginal candidates, but none are sufficiently significant to indicate detection of further IMBH mergers. We quantify the sensitivity of the individual search methods and of the combined search using a suite of IMBH binary signals obtained via numerical relativity, including the effects of spins misaligned with the binary orbital axis, and present the resulting upper limits on astrophysical merger rates. Our most stringent limit is for equal mass and aligned spin BH binary of total mass 200âMâ and effective aligned spin 0.8 at 0.056 Gpcâ3 yrâ1 (90% confidence), a factor of 3.5 more constraining than previous LIGO-Virgo limits. We also update the estimated rate of mergers similar to GW190521 to 0.08 Gpcâ3 yrâ1.Key words: gravitational waves / stars: black holes / black hole physicsCorresponding author: W. Del Pozzo, e-mail: [email protected]â Deceased, August 2020