Information Technology Research Papers/Topics

Framework For Improved Security On Usage Of Mobile Money Application Based On Iris Biometric Authentication Method In Tanzania

ABSTRACT The usage of personal identification number (PIN) as an authentication method in accessing mobile money services (MMSs) conveys many security flaws as it is easy to be forged, not being hidden when entered, and easy to be shared among users, all of these may cause unauthorized access to MMSs. This study focused on proposing a framework to improve security on the usage of MMS by using two-factor authentication (2FA) of PIN and iris biometric authentication method in Tanzania. With th...

Implementation Of A Data Cleaning Tool In Lapf Pensions Fund

ABSTRACT The purpose of this study was to design and test a data cleaning prototype for use in data processing at LAPF Pensions Fund. The specific objectives were: (1) to analyse the root causes of data errors and identify the existing data errors in LAPF database (2) design, implement and test a data cleaning prototype to correct errors identified and (3) test the features of a data cleaning tool prototype in LAPF database. The judgemental sampling approach was used to select 19 respondents...

The Forward And Reverse Engineering Of Information Technology In An Emerging Economic System

ABSTRACT Africa is generally believed to be the mother of mankind supported both by archaeological findings [ Davidson, 1974]; and biblical evidences [ Munroe, 2001]. The contribution of Africa to early civilization is a clear testimony and reinforcement to this claim. Some advancements in science and technology were first made in Africa long before they were known in Europe. For example, in Egypt the great engineering ingenuity of constructing the pyramid of 250 meter by 250 meter base, the ...

Fingerprint Image Quality Analysis And Enhancement Using Fuzzy Logic Technique

The quality of fingerprint image greatly affects the performance of minutiae extraction and the process of matching in fingerprint identification system. In order to improve the performance of the fingerprint identification system, a fuzzy techniques used for bothfingerprint image quality analysis and enhancement. First, the quality analysis performed by extracting four features from a fingerprint image which are the local clarity score (LCS), global clarity score (GCS), ridge_valley thi...

Namibian Ect Bill & Computer Breaches

Abstract This mini-thesis examines the impact and effectiveness of the Namibian ECT Bill, which is still to be passed in the Namibian parliament. The Namibia ECT Bill in its current format, will it be effective in an attempt to combat cybercrimes and computer breaches? Internet has taken over and plays a role in everybody‟s daily lives. People are connected to the internet from everywhere. They connect to cyberspace where there is access to the internet i.e. at their home, at their office, ...

Towards Appropriate User Interface Design Preserving Rural African Communication Practices: Listeners’ Roles In Face-Toface Communication

Abstract This mini-thesis examines different socio-cultural norms and communication behaviours of indigenous communities. In spite of existing Information Communication Technology (ICT) infrastructural challenges, the software solutions that have been designed for rural communities have been a major concern. In this thesis, qualitative methodologies were used with deliberate sampling of two village populations to investigate verbal and non verbal behaviour. In order to design appropriate inte...

Harare City Council Vehicle Licensing And Impounding System

ABSTRACT This document outlines the author’s practical experiences in a real-life, working environment, within the operational structures of Harare Municipality. It gives a brief background of the organization’s history, core business, current operations and future business activities of the City of Harare. The report then outlines the problem definition, research instruments, and significance of the study and justification. The document further details the planning, design and implementa...

Data Integrity Risk Assessment Of Local Government Revenue Collection Information System In Tanzania

ABSTRACT This study grounded at assessing the data integrity risks of local government revenue collection information system (LGRCIS). It was observed through the CAG report that the LGRCIS had weaknesses which were causing data mismatch. Thus, the main purpose of this study was to assess the risks of LGRCIS typically concentrating on data integrity challenges that cause those data mismatch between the LGRCIS and POS machine. To address the problem the researcher went through covering three ...

The Design Of Wireless Sensor Network For Smart Honey Bee Farming Monitoring

ABSTRACT Honey bee farming has been one of the earliest cultural and economic activity practiced by human being, dating back 15000 years ago in north of Africa in the times of the pharaohs. Honey is one of the most important natural products in the world which is produced by bees. However for decades honey bee farming monitoring in developing countries like Tanzania have depended much on cultural and traditional method of monitoring which cost time, money, and resources. Furthermore, efficie...

Testing The Patient Appointments Queuing Model By Using Computer Simulation: A Case Study Of Iringa Referral Hospital

ABSTRACT This study tests the patient appointments waiting time by using computer simulation which was carried out at the Iringa Referral Hospital (IRH). The study is triggered by the fact that in most Tanzania public hospitals like IRH, patients queue for a long time to get services. Basically, such situation leads to poor quality of service that leaves many patients unsatisfied. The study analyzed four experiments and critically evaluated appointments queuing model. Three models used to fo...

Cloud Computing Framework For Resource Sharing Among Tanzanian Higher Learning Institutions

ABSTRACT Higher Learning Institutions worldwide have been depending highly on Information Technology for their business requirements and service delivery. They need substantial investment for procuring and maintaining software as well as hardware. Due to the growing needs and financial crisis, universities are facing challenges in acquiring high-performance computing facilities to support not only advanced analysis but also scientific researches. This study intended to develop a cloud comput...

Public Sector Data Centre Consolidation (Psedcc): Enhancing The Management Of Information Communication Technology Infrastructure In Namibia

ABSTRACT Inconsistencies in the design, security, storage, disaster controls, performance, management, budget allocations, and electricity consumption were some of the challenges faced by the Namibian Public Sector Data Centres. In addition, the above challenges had led many organizations to rationalize the way they design and manage their ICT infrastructure resources. In this study, the above challenges have led to the introduction of Public Sector Data Centre Consolidation (PSEDCC) architec...

Determination Of Factors Affecting Security And Operation Performance Intomanagement Of Land Information System: A Case Of Dar Es Salaam

ABSTRACT The aim of this study was to determine factors that affect the security and operation performance into the Management of Land Information System (MOLIS) at the Ministry of Land, Housing and Human Settlement Development (MLHHSD). The researcher used the case study design; whereby both qualitative and quantitative approaches were used for gathering data for this study. The study investigated on the potential security issues and operation details of the network, hosts/servers, and appli...

A Price Based Spectrum Sharing Scheme in Wireless Cellular Networks

Abstract Radio frequency spectrum scarcity has become a high priority research area over the past few years. The huge increase of network subscribers with multimedia applications coupled with underutilization of radio frequency spectrum motivates the search for other measures to address the scarcity of radio frequency spectrum. This work investigates on a price based spectrum sharing scheme for connection-oriented traffic in wireless cellular networks as a solution to address the scarcity of ...

Developing And Evaluating An Online Electronic Theses And Dissertations System: A Case Of The University Of Dodoma

ABSTRACT Theses and dissertations are among the most important sources of valid detailed information on a particular subject on which researchers conduct widespread research work. This study aimed at developing and evaluating an online electronic theses and dissertations system. The University of Dodoma was used as a case study for this dissertation. A mixed approach data collection method was used effectively in this study. Several literatures were reviewed so as to identify challenges that ...


46 - 60 Of 108 Results