Information Technology Research Papers/Topics

Investigating The Impact Of Network Topologies On The Performance Of Openflow Protocol

ABSTRACT This research investigated the impact of network topologies on the performance of OpenFlow protocol. OpenFlow Protocol is a southbound protocol over Secure Socket Layer (SSL) in Software Defined Networking (SDN). SDN architecture separates the intelligence (decision making) part (control plane) of network devices from forwarding capability (data plane). OpenFlow protocol is the communication protocol for exchanging control messages between control plane and data plane. The research i...

A Study On The Impact Of Network Topologies On The Performance Of Openflow Controller

ABSTRACT Software-Defined Network (SDN) is a new and booming network paradigm that promises to improve network performance. This is achieved by the separation of the control plane and the data plane. The traditional network faced a lot of challenges particularly on how to improve network performance, manual configurations of the network devices, and many more others. SDN overcome all these challenges by introducing the SDN controller that controls the entire network. This research work studie...

Evaluating The Service Performance Of Fund Management Information System Of Zanzibar Social Security Fund

ABSTRACT The aim of the study was to evaluate the service performance of Fund Management Information System (FuMIS) of Zanzibar Social Security Fund (ZSSF). The data were collected by using questionnaires, interviews, technical documentary reviews and system analysis when the system users interacted with the system. The study examined the level of users‟ satisfaction on data accessibility from the system, response time, usability of computer applications and the system interfaces, as well a...

Investigatingthe Performance Of Ryu Software Defined Network Controller On Different Network Topologies

ABSTRACT With the increasing complexity of networks, Software Defined Networks have been developed to logically control all networking devices such as switches and bridges centrally through the use of software defined network controllers. Controllers include beacon, opendaylight, floodlight, pox, ryu and many more. Ryu SDN controller is one of the most popular python developed controller. Just as many other controllers’ Ryu may become a bottleneck since all other network controller controls...

Improving Authentication Security In Php Web Based Applications: A Case Study Of Court Case Management System In Zanzibar

ABSTRACT The focus of this dissertation was Improving Authentication Security Mechanism in Web Based Applications: A Case Study of Court Case Management System in Zanzibar. The study focused on two objectives. The first objective was to analyze the weaknesses of authentication security mechanism on the existing web based CMS. The second one was to devise the secured web based CMS prototype. Three techniques were used in collecting data. These are document review, penetration tests and observa...

A Framework Of Cybersecurity Risks On Mobile Money Users In Tanzania: A Case Study Of Dodoma City

ABSTRACT Cyber threats are becoming more sophisticated with the blending of one distinct type of attack on more damaging forms. Increased variety and volume of attacks are inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information. Following this alarming situation, this dissertation informs about a framework for cyber security risks for mobile money which was designed through the study that was conducted in Dodoma City to propos...

A Comparative Study On Performance Of Support Vector Machine And Convolution Neural Network On Tanzania Sign Language Translation Using Image Recognition

ABSTRACT Sign language has been used by Speech impaired people for communication purposes. Despite being an effective form of communication for speech impaired people, still there is a challenge for people who are unaware of sign language especially those with no such impairment to communicate with speech impaired people. Since Sign Language is a visual based language, several machine learning techniques have been used in sign language translation for better performance results. However, sign...

Saccos Credit Rating Prediction In Tanzania By Using Machine Learning Approach: A Case Of Kkkt Arusha Road Saccos Ltd.

ABSTRACT Financial institutions play a vital role to enhance the socio-economic development of any country. Despite being a key player in socio-economic development, large group of people is still isolated in accessing formal financial services. Saving and Credit Cooperative Societies (SACCOS) are type of Microfinance Financial Institutions (MFIs) that came to solve the problem of isolating many people in attaining financial services. Loan default is a big challenge that causes weak performan...

Implementation And Performance Evaluation Of The Dual Stack Transition Mechanism At The Udom Lan

ABSTRACT This study delved on the Implementation and Performance Evaluation of the Dual Stack Transition Mechanism at the UDOM LAN. The implementation phase involved simulating the network in the GNS3 simulator in which a number of hops were varied between 1 and 6. In addition, RIPv2 and RIPng were used as the dynamic routing protocols. The protocols were configured on each router interface to enable communication between the connected routers. After the implementation and configuration, the ...

Using Number Recognition Techniques To Automate The Revenue Collection At Mini Bus Terminals A Case Of Dodoma Municipal

ABSTRACT Number Recognition (NR), is a modern technique that uses optical character recognition on images to obtain desired characters. The technique involves four steps Image acquisition, pre-processing, character segmentation, and character recognition. This technique has been used in activities like license plate detection as Automatic Number Plate Recognition (ANPR). The manual revenue collection process currently operating at the Dodoma Municipal minibus terminals have deprived the Loca...

Proposing An Open Standard For Reporting Digital Audio Evidence Analysed By Open Source Tools

ABSTRACT The increase of technology in business processes, Tanzania has lead to a class of crimes known as cybercrimes. Towards the mitigation of the occurrence of the crime, Tanzania enacted the cyber law which helps in ensuring all necessary security measures maintained. However, with the growth of science and technology in the investigation process, the high court of Tanzania with the help of forensic professionals is in practice digital legislation whereby the analyzed digital evidence d...

Network Vulnerabilities Analysis: A Case Study Of The College Of Informatics And Virtual Education (Cive).

ABSTRACT Network Vulnerabilities are weaknesses that allow attackers to bypass communication systems or network security. This grants the attackers access to crucial information on victim’s computer systems. So, analysis of network vulnerabilities is highly recommended as it helps to identify them in order to ensure a secured network. The experiments for this study were carried out on three networking environments. The first one was the CIVE LAN (as the main target), the second one was the...

Evaluation Of Quality Of Service And Quality Of Experience On Hardware And Virtual Software Router

ABSTRACT The growth in demand of multimedia applications such as file transfer, audio, video and Voice over Internet Protocol (VoIP) traffics have introduced the high need of good Quality of Services (QoS) through network devices like routers which led to the effect on Quality of Experience (QoE) to end-users. The QoS and QoE of the video streaming, file application and VoIP calls services on the low-cost Virtual Software Router (VSR) such as Vyatta and high-cost Hardware Router (HR) such as...

Evaluating And Proposing Mechanisms To Secure Relational Databases Against Security Vulnerabilities. A Case Of Postgresql And Microsoft Sql Server

ABSTRACT This study sought to evaluate and propose mechanisms to secure relational databases against security vulnerabilities. The study was influenced by the fact that recently, there have been many data breach incidences reported across the world. These haveresulted from vulnerabilities found in database management systems. When these vulnerabilities are exploited, the outcome is the data breach incidences that lead to loss of customer trust for businesses and imparement of national securi...

A Comparison Of The Performance Of Namibia-Specific Conservation And Conventional Tillage Technologies As Used For Pearl Millet Production In Northern Namibia

ABSTRACT Studies were conducted over a period of three years (2011 to 2013) at the Ogongo Campus of the University of Namibia (UNAM), to compare the differences between tractors and animaldrawn implements both using conventional and Namibia Specific Conservation Tillage (NSCT) technologies. Two conventional tillage (CV) treatments (i.e. tractor-drawn disc harrow (TDH) and animal-drawn mouldboard plough (AMP) were compared to two NSCT treatments (tractor-drawn ripper furrower (TRF) and animal...


61 - 75 Of 108 Results