Research Papers/Topics in Computer Science

Numerical Computation Of Steady Buoyancy Driven Mhd Heat And Mass Transfer Past An Inclined In_Nite Flat Plate With Sinusoidal Surface Boundary Conditions

Abstract In this paper we study the eects of magnetohydrodynamics (MHD) uid  ow on a two dimensional boundary layer  ow of a steady free convection heat and mass transfer on an inclined plate in which the angle of inclination is varied. The  uid is taken as viscous, incom- pressible, electrically conducting. The mathematical formulation yields a set of governing partial dierential equations (PDEs) under a set of appropriate boundary conditions. The PDEs are transformed into ordi- nary die...

Designing An Algorithm That Can Influence Children’s Behaviour Online And Raise Their Cyber Security Awareness

Table of Contents Chapter 1: Introduction ................................................................................................................................ 1 1.1. Background of the study .................................................................................................................... 1 1.2. Problem statement ............................................................................................................................ 4 1.3. Objectives of the stu...

An Attribute-Value Pair (AVP) Model For Creating And Exploiting Annotations In Economic Intelligence

ABSTRACT This study is concerned with the design and development of an annotation model that gives users the power of expressivity as required in Economic Intelligence (EI) context. Most of the existing annotation platforms lack this power of expressivity. The study also discovered a need to develop an annotation model for creating and structuring annotations that will adequately capture the intention of the users (EI actors) in decision making process. In addition, there was a need for a te...

An Empirical Study On E-Learning Adoption In Tanzanian Secondary Schools

ABSTRACT The overall goal of this research work was to develop and validate an e-Learning adoption model in Tanzanian secondary schools as literature had not revealed any comprehensive model that is specifically used in determining the adoption of e-Learning in Tanzanian secondary schools. The existence of this gap encouraged the carrying out of this research to empirically test and validate the combination of the Technology Acceptance Model (TAM), Task Technology Fit (TTF) and Technology Rea...

The Design And Implementation Of An Online Inventory Monitoring System

ABSTRACT A significant part of Inventory Management is inventory monitoring. In recent years, many inventory management systems have been created. These frameworks allow stocks of products and items put away in amasses be taken up. It is important to track the inventory and that is where control systems for inventory come in. The stock data the board frameworks and stock observing frameworks are coordinated and sent together at a fixed point at store locations in some of the current inventory...

Design And Implementation Of An Online Inventory Monitoring System

ABSTRACT A significant part of Inventory Management is inventory monitoring. In recent years, many inventory management systems have been created. These frameworks allow stocks of products and items put away in amasses be taken up. It is important to track the inventory and that is where control systems for inventory come in. The inventory information management systems and inventory monitoring systems are coordinated and sent together at a fixed point at store locations in some of the curren...

Detection And Prevention Of Sniffing On Networks

ABSTRACT With the presence of some faults in online protocols and operating systems, any person who is connected to a network, especially in a Local Area Network (LAN) can fall victim to his information getting monitored by another person that is connected to the same network. Due to this problem at hand, an uninformed person can have his private information endangered to getting exposed to other unknown persons. Such act is called “Sniffing” and mostly occurs on networks. By sniffing the...

3D First Person Shooter PC Game

ABSTRACT Monsters Within is a fun 3D FPS horror survival game on the Windows platform that demands its players to have fast reflexes, quick thinking and deductive skills to survive in the game environment they have been thrust into; distorted humanoid creatures have overrun the city and continue to rapidly multiply. The player’s main objective is to circumvent this by destroying all nests in the vicinity. The quantitative research methodology was used to analyse the feasibility for the succ...

An implementation of the past question paper archive system model

ABSTRACT The proposed thesis is designed to be an online Baze University past question archiving system. The use of technologies has become critically important in the era of the Coronavirus pandemic which has required off-campus distance learning by students of Baze university. With no access to staff and on-campus facilities, the availability of easily accessible online study material has become critical. This project aims to provide students with the necessary materials needed to aid with ...

ISight: An Object Recognition Application for Visually Impaired Individuals

ABSTRACT Assistive technologies to aid the visually impaired have evolved over time from screenreading software, magnification programs and daisy book readers, there are a plethora of devices to aid the visually impaired in their daily activities. Despite the established utility of such devices they face certain limitations that have hindered their widespread adoption, such as cost, stigma attached to using the product in public, and lack of continued support for the product. In this time sma...

Face Recognition On Principal Component Analysis

ABSTRACT Facial recognition plays a significant role in different applications such as human computer communication, video surveillance, face tracking and face recognition. Efficient face recognition algorithm is required to accomplish such task. Face recognition is one of the most active research areas in computer vision and pattern recognition with practical applications. In present networked world, the need to conserve the security of information is becoming both increasingly significant a...

Community-Based Co-Design of a Crowdsourcing Task Management Application for Safeguarding Indigenous Knowledge

Teaching indigenous knowledge (IK) to African youth has become more complicated due to a variety of reasons such as urban migration, loss of interest in it, the dominance of scientific knowledge and the technological revolution. Therefore, there is a considerable movement towards using technologies to safeguard IK before it becomes obsolete. It is noteworthy that research conducted and software development perspectives being used are mainly based on Western worldviews that are inappropriate f...

Electronic Commerce In Namibia: Its Growth, Present Status And Potential

Abstract Wide varieties of trading methods are rapidly being replaced by the use of computers and communications networks the world over. This new concept of trading is known as Electronic Commerce (e-commerce). Great potentials exist for saving costs and improving services by utilizing this technology. Examples of phenomenal successes and staggering cost savings are just too many. Profits in millions of dollars are mentioned with ease, as a result of applying e-commerce. It is apparent that...

An Evaluation Of Browser-Based Clients For Asterisk

ABSTRACT Asterisk is a Private Branch Exchange (PBX) software used to connect telephony applications such as Voice over Internet Protocol (VoIP). In the Department of Computer Science at the University of Namibia (DCS-UNAM), Asterisk is currently set up to provide basic VoIP services to staff and students. However, this system currently has limited accessibility because it can only be accessed with VoIP clients such as hard and soft phones. Alternatively, Browser-based VoIP clients (BBVCs) c...


106 - 120 Of 250 Results