Abstract —The use of Information and Communication Technologies (ICTs) in teaching and learning has brought new teaching and learning experience to both teachers and students in many countries. Tanzania has made several efforts to achieve this but little has been done to determine the readiness of our schools and teachers in terms of ICT infrastructure and possession of other gadgets to help in the integration of ICT in education. This study aimed at looking into the readiness of Secondary ...
ABSTRACT The continuous advances in today’s digital universe and integration of computing into virtually every facet of human life are no doubt making the concept of Big Data a ubiquitous paradigm for deploying novel technologies/applications hitherto not practicable by conventional methods. Big Data, a general term for the massive amount of digital data being generated from different sources, extremely large, structured/unstructured too complex for analysis through conventional relational...
ABSTRACT Tanzania and other developing countries use a model called Workload Indicators for Staffing Need (WISN). The use of the WISN model in Health Human Resource planning and management is limited by several factors including budget, prospected retirees, and strategic priority. Also, the WISN users find the methodology, especially the implementation of its technical steps complex and laborious, thus makes the tool difficult to use. The algorithm used needs to be optimized or improved to o...
ABSTRACT The usage of personal identification number (PIN) as an authentication method in accessing mobile money services (MMSs) conveys many security flaws as it is easy to be forged, not being hidden when entered, and easy to be shared among users, all of these may cause unauthorized access to MMSs. This study focused on proposing a framework to improve security on the usage of MMS by using two-factor authentication (2FA) of PIN and iris biometric authentication method in Tanzania. With th...
ABSTRACT The purpose of this study was to design and test a data cleaning prototype for use in data processing at LAPF Pensions Fund. The specific objectives were: (1) to analyse the root causes of data errors and identify the existing data errors in LAPF database (2) design, implement and test a data cleaning prototype to correct errors identified and (3) test the features of a data cleaning tool prototype in LAPF database. The judgemental sampling approach was used to select 19 respondents...
Abstract Project Based Learning (PBL) is about giving students a real projects and asking them to come up with solutions to it as an academic task. Studies pointed out some problems associated to PBL approach, such as social loafing, that is when some students hide themselves behind active students, doing less or no works within the team and put the effort on other team members. Another problem is unfair assessment which result in giving all the students the same marks in spite of their effor...
Abstract Text mining is an important field in information retrieval; it organize a large number of text documents that available on the internet to facilitate the retrieved processing and increase efficiency. Text classification is automatically determining the category to new or unseen documents that depends on content of document itself. In text classification, text preprocessing is a fundamental step to obtained a better result. The Arabic text processing depends on stemming algorithms to ...
ABSTRACT Banks face lots of challenges associated with the bank loan, Nowadays there are many risks related to microfinance in bank sector. Every year, we face number of cases where people do not repay most of the microfinance amount to the banks which they cause huge losses. The risk associated with making decision on microfinance request approval is massive. In this study a classification model was built based on the microfinance data obtained from an agricultural bank of Sudan to predict ...
In the health sector, the health of women is a significant public health issue, which impacts the personal well-being, family reproduction, and societal development. Therefore, knowledge about the health of women has led to an emerging requirement for healthcare sectors to obtain the real-time status and data of various applications that can improve the performance and accuracy of the health production. Globally, it has been found that women die due to pregnancy and childbirth consequences. T...
Digital crimes have increased in number and sophistication affecting the networks quality of services parameters like confidentiality, integrity and availability of resources. Network Intrusion Detection Systems (NIDS) are deployed to optimize detection and provide comprehensive view of intrusion activities. However, NIDSs generates large volumes of alerts mixed with false positives, and repeated warnings for the same attack, or alert notifications from erroneous activity. This prevents ...
Investigation of social media using social network theory is a new powerful tool that will aid and ease law enforcement agencies in multi-faceted ways in this ever evolving digital landscape. It is against this backdrop that this study focused on identifying and investigating selected individuals on Facebook and Twitter social media platforms. In particular, selected respondents from University of Eldoret, Kibabii, Moi, Kisii and Rongo Universities were involved in the study. The objecti...
Accurate meter readings, timely and correct bills have become an important aspect of water metering systems. Additionally, anomalies such as leakage and bursts in water pipelines have significant consequences to the environment and lead to financial constraints to the water companies. Since monitoring leakages and bursts in the water distribution networks, capturing accurate and dependable measurements for billing, troubleshooting and analysis is a challenging task, the need to develop a reli...
Savings and Credit Cooperative Societies (SACCOs), like other financial institutions, own critical assets that must be protected against attackers even as the threat landscape continue to persist. This study provides a solution to SACCOs by determining security risk exposure index (SREI) based on ISO/ 27001 standards. The objectives of the study were to determine the critical security risks factors affecting Selected SACCOs based on ISO 27001 standards, to design a model for computing th...
ABSTRACT In an academic setting, it is important for students to be well informed about their academic status and progress regularly. All first year students are provided with school catalogs which hold information about their majors and the courses required by them to pass for them to obtain their particular degrees. Students are given these catalogs only once and many of them tend to misplace them after a few semesters. Hence, they lose information on the requirements they need to obtain a...
Mobile banking technology has been widely adopted amongst all the commercial banks in Kenya. Currently Kenyan banks lose millions of shillings by means of online theft through mobile banking and other platforms. This study therefore intended to address the issues associated with mobile banking and was directed by the following objectives: to understand the mobile banking architecture, to establish the technological risks arising for commercial banks in Kenya as a result of mobile banking, to ...