10 research outputs found

    Web-based Application Tool for Recommendation of Open Source Software for Higher Learning Institution in Tanzania

    Get PDF
    This research article published by Modern Education and Computer Science Press, 2019Open Source Software (OSS) provide a number of advantages to Higher Learning Institutions (HLIs) in developing countries, such as Tanzania. This is because they are freely available, free to make copies and free to distribute. Through literature reviewed, it has been observed that OSS usage in HLIs in Tanzania is low due to lack of awareness of OSS designed for academic purposes. This paper presents a study on how to implement a reliable and effective web-based application tool for recommendation of OSS for enhancing awareness of HLIs on existing OSS designed for academic purposes. There are three recommendation algorithms that were employed for filtering the OSS in this study: the content-based, collaborative, and demographic filtering. We used various web technologies for the implementation of application functionalities. The result is the reliable and effective web-based application tool that recommends OSS to individuals in HLIs for enhancing their awareness of OSS designed for academic purposes

    An Online Collaborative Discussion Platform for Bridging a Technological Reliance Gap in Higher Learning Institutions in Tanzania

    Get PDF
    This research article published by Modern Education and Computer Science Press, 2018Currently, the online discussion forums have become the focal point for e-learning in many Higher Learning Institutions (HLIs); this is due to the ubiquitous of Information and Communication Technology (ICT) tools, significant rate and fast growing technology adoption and use in many fields including education. However, developing countries, such as Tanzania, are experiencing technical adoption difficulties, such as limited access to computers, problems with Internet connections as well as the technological reliance gap between tutors and learners; these affect the use of technology in Teaching and Learning (T/L). This study aims to use an Online Discussion Platform (onlineDP) to bridge the technological reliance gap between the tutors and learners in HLIs in Tanzania. In this study, the literature review and qualitative research methods were conducted to develop the prototype of the platform. The UMBC semantic similarity service was used to develop the contents filter used to reduce the number of duplicate discussion questions. The application was mainly developed using Laravel Pre-processor (PHP) framework and My Structured Query Language (MySQL) database. The result is the web-based application prototype that enhances the collaborative learning environment in HLIs in Tanzania. The technologies to be used for T/L, should consider both sides of tutors and learners as well as the theoretical framework for their implementations

    Web-Based Two-Way Electricity Monitoring System for Remote Solar Mini-Grids

    Get PDF
    This research article published by Modern Education and Computer Science Press, 2019Electricity usage monitoring systems play a vital role towards raising energy utilization awareness for consumers. Existing solar mini-grid infrastructure, however, lacks a user-friendly two-way platform to allow consumers to access information about electricity consumption. This paper proposes a cloud-based, two-way energy usage monitoring system that will allow both utility companies and consumers to access energy consumption data in a user-friendly way through a web platform. The system requirements were collected via questionnaires, interviews, and observations conducted at two solar mini-grids centres located at Arusha and Kilimanjaro regions in Tanzania. The system uses a Low Power Area Network (LPWAN) and the existing GPRS network to monitor electricity consumption data between smart meter units and the cloud server. Also, a virtual bill payment module and usage status feedback functionality have been integrated into the system to increase awareness of the cost-effective use of electricity and hence, achieve the sustainability of solar mini-grids. By using both white-box and black-box system testing approaches, findings show that the system will not only raise awareness among customers about the economical usage of electricity, but it can also be used by mini-grid companies as a source of data to determine current and future energy demands to minimize large investment costs

    Developing an Algorithm for Securing the Biometric Data Template in the Database

    Get PDF
    This research article published by the International Journal of Advanced Computer Science and Applications, Vol. 10, No. 10, 2019In the current technology advancement, biometric template provides a dependable solution to the problem of user verification in an identity control system. The template is saved in the database during the enrollment and compared with query information in the verification stage. Serious security and privacy concerns can arise, if raw, unprotected data template is saved in the database. An attacker can hack the template information in the database to gain illicit access. A novel approach of encryption-decryption algorithm utilizing a design pattern of Model View Template (MVT) is developed to secure the biometric data template. The model manages information logically, the view shows the visualization of the data, and the template addresses the data migration into pattern object. The established algorithm is based on the cryptographic module of the Fernet key instance. The Fernet keys are combined to generate a multiFernet key to produce two encrypted files (byte and text file). These files are incorporated with Twilio message and securely preserved in the database. In the event where an attacker tries to access the biometric data template in the database, the system alerts the user and stops the attacker from unauthorized access, and cross-verify the impersonator based on the validation of the ownership. Thus, helps inform the users and the authority of, how secure the individual biometric data template is, and provided a high level of the security pertaining the individual data privac

    A study of users’ compliance and satisfied utilization of biometric application system

    Get PDF
    This research article published by Taylor & Francis Online, 2020Currently, the adoption rate of biometric technology has speedily grown in all applications. The technology is considered as an effective measure for the protection against crime. However, there is a concern that it violates the privacy and rights of the individuals. For instance, the possibility of fraud, identity theft, civil liberty violations, and inaccuracy of data. As a result, create the conflicts between service provider and public as they may be accused of a crime or become a victim of discrimination. This study constitutes exploratory research and is restricted to the usage of the biometric application system within the passport. It aims at discovering the substantial acceptance of users in implementing the biometric application for the East African passport (Uganda). Factor influencing users’ opinions regarding the acceptance of the biometric application, User willingness, trust and techniques for securing the biometric information are presented. Strategies aimed at regulating the protection of biometric data on the usage of the application are explained. The findings suggested encryption techniques as the most favorable tactic of protecting the biometric data application. Therefore, best practices such as individual desirability, practical accurateness, and eagerness are required

    Assessment of vulnerabilities of the biometric template protection mechanism

    No full text
    Research Article published by International Journal of Advanced Technology and Engineering Exploration, Vol 5(45)In the ever-changing world of global data transmission, the security of data and individual privacy are the growing fears in today’s human life worldwide. The major concerns are the protection of the biometric templates in the biometric identification and authentication process. Storage of the biometric template in the database raises the chance of compromising it, hence lead to serious threats and abuse of the person’s identity. When an individual’s registered biometric data is disclosed, their security and privacy can be compromised. Therefore, public acceptance of biometrics will depend on the system designer’s ability to demonstrate that the systems are robust, with low error rates, and tamper proof. If someone’s biometric template inside the database is compromised, that consequently might imply identification robbery of that individual. In the recent past, a considerable number of methods for biometric template protection have been published. This article explains, a thorough valuation on numerous attacks and threats associated with the biometric system alongside the biometric template protection, elucidating the measures anticipated to address the threats, to the performance gap and establish the status quo of the current biometric template protection for public acceptance

    Framework for integrating fragmented information systems: Case of livestock information systems

    No full text
    Research Article published by International Journal of Computer Engineering Research Vol. 7(1), July 2017Information System (IS) is used for information communication. But the problem with the existing Agro- ISs is that they are not integrated. To integrate it, we need to have an integration framework. Generally, much has been done on the designing framework for IS integration. However, there are credible things which can be added to improve these frameworks. A framework can be designed in such a way that it guides users on technologies to be used, skills needed for the task, goals, outcome and output of integration. This is what this study focused to contribute. To design the framework, guiding factors were established. These factors were the one which surround farmers and in one way or another hinder or support accessibility of information from integrated ISs. The factors were discussed and presented in the mapping matrix. Under each factor, viability of technology on the ground was established and compared against the available technology. From the mapping matrix, scenarios on possible applications were established. Guides on Technologies, skills, goals, output and outcome of integration were established to form a framework for integrating applications and ISs. Then the framework was demonstrated empirically and compared with the existing frameworks. Results show that the proposed framework is more comprehensive in terms of guides it provides, than the existing frameworks

    Blockchain Technology in Sub-Saharan Africa: Where does it fit in Healthcare Systems: A case of Tanzania

    No full text
    This research article published by the Journal of Health Informatics in Developing Countries, 2019Background: Blockchain technology is a distributed electronic ledger containing digital records, transactions or events that are protected with advanced encryptions, extremely hard to tamper, and updateable through a consensus algorithm agreeable to all connected network nodes. In Sub-Sahara Africa, the technology has started to be adopted in real estate, supply chain, agriculture, and financial sector. Unfortunately, there is a lack of effort in introducing this technology in the healthcare sector. Therefore, this study aims to explore the issues facing electronic healthcare systems in Sub-Sahara Africa taking Tanzania as a case study and introduce blockchain-based solutions for the discovered issues. Methods: The study used qualitative methods for data collection and analysis. Data were collected through interviews, observation and documentary analysis. Interviews were done with the sample size of 50 participants who were selected from groups of healthcare facility leaders, ICT experts, government representatives, doctors, nurses, laboratory technicians, pharmacists, accountants, and receptionists. Direct observation and participatory observation were used to assess different electronic healthcare records systems’ functions. Moreover, researchers used document analysis to collect data from public records (like policy manuals), personal documents (like incident reports), and physical evidence (like training materials and handbooks). NVivo 11 software was applied in managing and organizing data analysis. Results: Out of 710 healthcare facilities involved in this study, 34.5% fully implemented electronic healthcare records systems and 78% installed Mfumo wa Taarifa za Uendeshaji Huduma za Afya (MTUHA) also known as (District Health Information Software (DHIS) II). The findings showed that the issues facing electronic healthcare records are; difficulties in taking care of the patients’ private information, problems in safely sharing medical information between healthcare facilities, bandwidth issues, and improper handling of data integrity

    Search for intermediate-mass black hole binaries in the third observing run of Advanced LIGO and Advanced Virgo

    No full text
    International audienceIntermediate-mass black holes (IMBHs) span the approximate mass range 100−105 M⊙, between black holes (BHs) that formed by stellar collapse and the supermassive BHs at the centers of galaxies. Mergers of IMBH binaries are the most energetic gravitational-wave sources accessible by the terrestrial detector network. Searches of the first two observing runs of Advanced LIGO and Advanced Virgo did not yield any significant IMBH binary signals. In the third observing run (O3), the increased network sensitivity enabled the detection of GW190521, a signal consistent with a binary merger of mass ∌150 M⊙ providing direct evidence of IMBH formation. Here, we report on a dedicated search of O3 data for further IMBH binary mergers, combining both modeled (matched filter) and model-independent search methods. We find some marginal candidates, but none are sufficiently significant to indicate detection of further IMBH mergers. We quantify the sensitivity of the individual search methods and of the combined search using a suite of IMBH binary signals obtained via numerical relativity, including the effects of spins misaligned with the binary orbital axis, and present the resulting upper limits on astrophysical merger rates. Our most stringent limit is for equal mass and aligned spin BH binary of total mass 200 M⊙ and effective aligned spin 0.8 at 0.056 Gpc−3 yr−1 (90% confidence), a factor of 3.5 more constraining than previous LIGO-Virgo limits. We also update the estimated rate of mergers similar to GW190521 to 0.08 Gpc−3 yr−1.Key words: gravitational waves / stars: black holes / black hole physicsCorresponding author: W. Del Pozzo, e-mail: [email protected]† Deceased, August 2020
    corecore