Research Papers/Topics in Computer Science

The Viability Of Using Online Social Networks As E-Learning Platforms In Tanzanian Universities

ABSTRACT The purpose of this study was to investigate the viability of using Online Social Networks (OSNs) as e-learning platforms in Tanzanian Universities. The population of this study was students of the University of Dodoma. Observation and questionnaires were used as a research instruments to collect data from 390 respondents which were proportionally selected. Quantitative data was analyzed using SPSS to obtain the breadth to which the observed behavior and practices are distributed wi...

Development Of Student Information Management System (A Case Study Of Computer Science Department, Fuoye)

ABSTRACT Student Information Management System (SIMS) provides a simple interface for maintenance of student information. It can be used by educational institutes or colleges to maintain the records of students easily. A number of problems associated with student academic record management include improper course registration, late release of students' results, inaccuracy due to manual and tedious calculation and retrieval difficulties/inefficiency. In most cases the data generated by ac...

Development Of Mobile Payment System: An Implementation Of Cashless Economy

ABSTRACT Cashless economy has ushered in the cashless banking framework across different countries of the world and this is made possible by the advances in information technology. Electronic cash is a term becoming more acceptable as the world makes a shift towards a cashless society. This research work presents the development of a mobile payment system which implements cashless economy. The main aim of this development is to reduce some cash-related crimes in our society such as: robberie...

The Impact Of Risks To Customers’ Trust On Using Mobile Money Transfer Services In Tanzania: A Case Study Of M-Pesa In Dodoma Municipal

ABSTRACT This dissertation examines the impact of risks to customers’ trust on using mobile money transfer services in Tanzania, with a special focus on risk including the facets of perceived risks which are performance risk, security/privacy risk, time risk, social risk and financial risk. These aspects are covered through a critical review of existing literature, secondary data and a survey targeting mobile phone users with M-Pesa accounts and M-Pesa agents living in Dodoma Municipal. Th...

Vehicle To Infrastructure Communication For Adaptive Traffic Management

Abstract Congestion problem is increased in a dramatically way due to increased Population and travel means in Khartoum. The associated consequences for this problem made it extremely bothering. Since the expansion of the traffic network is no longer a socially attainable solution, the existing control systems have to be used in a more intelligent way in order to increase the traffic throughput and decrease total travel times Intelligent transportation systems ITS had been developed to overc...

EEG-Based Detection Of Human Emotions

ABSTRACT EEG (Electroencephalography) allows eliciting the mental state of the user, which in turn reveals the user emotion, which is an important factor in HMI (Human Machine Interaction). Researchers across the globe are developing new techniques to increase the EEG accuracy by using different signal processing, statistics, and machine learning techniques. In this work we discuss the most common techniques that can yield better results, along with discussing the common experiment steps to ...

A Design Of Smart Hajj Guide System For Piligrim Identifaction And Location Services

Abstract This dissertation investigates the issues of guidance for pilgrims and how to make it more suitable for groups of pilgrims who navigate in unfamiliar areas. The dissertation will explore how to provide aid to pilgrims in crowded places by developing a pilgrim tracking and identification system using mobile phones that use NFC technology. The proposed system will provide education to pilgrims to guide them throw the Hajj journey. The proposed system will provide instructions regardin...

Voice Encrption In Gsm Network Using Rc4 Algorithm

Abstract Mobile telecommunications such as Global System for Mobile Communication ( GSM ) are now well established globally and users rely heavily on the convenient communications it provides. The level of security provided by GSM is superior to its predecessors and is more than adequate for the majority of users. However, some users in the areas of government, defense or business require more security over and above that provided by the GSM standards and by standard GSM equipment. In a GSM n...

Assessing The Impact Of Lack Of Network Documentation In Higher Learning Institutions: Case Of University Of Dodoma

ABSTRACT  Network complexity continues to grow as enterprises add and remove different communication technologies. Software tools that identify network elements, provide logical and physical network views, track network changes, and provide accurate documentation for all network components which are needed and should be employed in the organizations. It has been observed that most of the Higher Learning Institutions (HLIs) in Tanzania facing serious problems in monitoring and managing networ...

Using Computer Assisted Instruction In Improving Mathematics Learning In Tanzania Secondary Schools

ABSTRACT This study focuses on examining the use of computer assisted instruction model in improving learning of mathematics in Tanzania secondary schools. In particular the study assessed the capacity and the efficiency of using computer assisted instruction in learning of mathematics. Two secondary schools were used in this study namely:- St. Anthonys‟ Secondary School and Kibasila Secondary School. Both of these schools are in Temeke District, Dar es salaam. The study comprised 40 stude...

Exploring Application Of Radio Frequency Identification In Log Tracking And Monitoring Systems: A Case Of Sao Hill Forest Plantation

ABSTRACT Various methods throughout history have been used to identify objects. It was not until the Second World War that Radio Frequency use in identifying items was embraced. In 2008 European foresters (Germany and Finland) Korten and Kaul researched on the prospects of RFID in forest industry. Countries like Malaysia, Sweden and Canada have used RFID in their forest supply chain management. This study aims to explore how RFID can be used in Tanzania log tracking and monitoring system, ca...

3D model reconstruction using photo consistency

Abstract rviodel reconstruction using photoconsistency refers to a method that creates a photohull, an approximate computer model, using multiple calibrated camera views of an object. The term photoconsistency refers to the concept that is used to calculate the photohull from the camera views. A computer model surface is considered photoconsistent if the appearance of that surface agrees with the appearance of the surface of the real world object from all camera viewpoints. This thesis pres...

Multivariable Control of a Rougher Flotation Cell

Abstract This project focussed on the investigation, development and evaluation of a closed loop control system on a rougher flotation cell that could improve PGM flotation performance. A PGM rougher flotation cell equipped with Online Stream Analysis (OSA) and machine vision system (SmartFroth) was used during the investigation. Online measurements included bubble velocity, average bubble area, bubble colour; Pt, Ni and Cu concentrate grade and concentrate flow rate and density. Air additio...

Security And Integrity Of Result Computations In Cloud Computing Environment.

ABSTRACT There is a growing trend of using cloud environments for ever growing storage and data processing needs. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of servicing consumers. The focus of this research is on the development of a proof-ofconcept system for security and integrity of result computations in a cloud computing environment by implementing a four level cloud based application security gateway methodology for ...

Office Information System

ABSTRACT. This topic was informed by the fact that the current approach to office information system in our educational institutions left much to be desired. The amount of paper records being used is extremely bulky with the resultant problems of storage and retrieval. In the University of Nigeria, in the last eighteen months, four staff audits have been conducted. These audits panel revealed sordid mal-practice arising from poor and slow inter-office communication. For example, from these a...


46 - 60 Of 164 Results