Technology

Technology Research Papers/Topics

A Systematic Approach to Knowledge Audit: a Literature Review

Abstract: The importance of effective Knowledge Management in the 21st century knowledge economy cannot be further emphasised. The most critical step in managing knowledge effectively is an organisation’s ability to identify knowledge gaps, that is, determining what knowledge is required, where it is required, and who requires that knowledge. This is tantamount to carrying out a knowledge audit. This paper seeks to identify the views of Knowledge Management authors on what a knowledge audi...

Perspectives on Knowledge Management :a Literature Review

Abstract: Entire world is revolving towards digital space as a result of the Internet and other emerging web technologies are helping the society to reach the universe. ICT and e-learning are growing radically fast and have captured a major role in higher educational systems. To develop the coast-to-coast purposes, institutions are changing the teaching style from chalk and talk to Learning Management System (LMS), called e-learning systems. Impact of e-learning introduces various delivery m...

Attitudes of Batswana towards stem cell technology as an alternative therapy in Botswana

Abstract: Botswana is lagging behind in active participation in stem cell research. The research is yet to take off in the country. In order for stem cell research to be established in Botswana, the people of the country have to accept the research as affording a viable therapy alternative to conventional medicine. This study aimed to evaluate and analyse attitudes of the people of Botswana towards the establishment of stem cell research in Botswana. A survey study was conducted to examine p...

Detection and Avoidance of Routing Attack in Mobile Ad-hoc Network using Intelligent Node

Abstract: The routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempster-shafer theory introduced a solution for these routing attacks where it entirely works on the principle of Dempster rule with various important factors to mitigate these critical routing attacks. Previously the system contains an Intrusion detection mechanism which is used to create a message whenever the attacker attacks the network. This Intrusion detection system sends an alert m...

Volunteer Hive Computing and Virtualization in Botswana's Edification Techniques

Abstract: Finest Trail Setup Technique in Hive computing & virtualization Ambience[1] proposes a fuzzy logic based SVM approach to secure a collision free path avoiding multiple dynamic obstacles. The navigator consists of an FSVM -Based Collision Avoidance. The decisions are taken at each step for the providers & consumers to negotiate without collision. Fuzzy-SVM rule bases are built, which requires simple evaluation data based on the active participants in the Hive computing & virtualizat...

The Emergent Requirements for Visual Teaching Tools for Supporting Introductory Programming: A Case Study of Botho University, Francistown

Abstract: Despite low levels of interest in programming by learners and perceptions that programming is difficult, it should be noted that programming’s importance has not diminished and should form core curricula of undergraduate computer science in education. A current challenge for the Computer Science department is to provide effective means of reducing attrition rates and enhance the potential of the department to recruit more students at Botho University. The purpose of the present s...

Malicious Attacks Detection in Wireless Ad Hoc Networks by Using SNDP Protocol

Abstract: In this research to detect the Stealthy Attacks such as misrouting, power control, identity delegation, and colluding collision. Those kinds of attacks easily launched against Multihop wireless ad hoc networks. When every the source and destination are communicate, to appear Stealthy Attacks and dropping or interrupt the packet from reaching the destination through malicious behavior node. To overcome this problem we can present a protocol called SNDP (secure neighbor discovery pro...

Insecurity of WLAN for M-Learning Implementation in Tertiary Level by DoS

Abstract: Mobility, mobile technology and mobile computing are few buzz words in all the fields. This makes human beings life easy and goes for anywhere, anytime working conditions. In educational field Networking and mobile computing are playing major role in the shift from the traditional black board teaching to contemporary E-Learning and M-Learning environment. But the major issue with the wireless network is vulnerability, denial of service and in general security compared to the wired ...

A concealed based approach for secure transmission in advanced metering infrastructure

Abstract: The smart grid has an important subsystem known as the Advanced Metering Infrastructure (AMI), responsible for measuring customer consumption of electricity. The AMI subsystem has smart meters as one of the components and they play a vital role in enabling communication between the utility provider and consumers. Smart meters can report real-time electricity consumption readings of the consumer to the utility. Securing this communication link from attacks remain very important for ...

Lessons from Covid-19: A Silver Lining for Teaching and Learning In Selected Lesotho Institutions of Higher Learning

Abstract: There has been a myriad of negative implications on teaching and learning at tertiary level that came along with the emergence of Covid-19 pandemic. The purpose of this paper is to investigate the lessons and opportunities presented by the pandemic to the learning and teaching process in Higher Educational Institutions (HEIs). The study employed a survey design and used diary and semistructured questionnaires as key data generation tools. A sample of 80 lecturing staff was used fro...

Design and simulation of autonomous anti-rain construction site cover system

Abstract: Water distribution systems mostly involve laying of pipes with the digging of trenches to lay down water pipes as a significant activity. During rainy seasons, trenches tend to fill-up with rainwater before the said pipes could be laid. This poses a danger to workers and residents due to potential landslides. This paper presents the design and simulation of an autonomous anti-rain construction site cover system (AARCSCS), which automates the process of covering a trench or excavati...

Control of stem borers and striga in African cereals: a low input push-pull approach with rapidly expanding impact

Abstract: A system which comprises intercropping between rows of maize with plants that repel stem borers and attract natural enemies, and which also dramatically reduce the level of striga infestation, combined with a surrounding crop of plants that trap out pests, has been developed for use by resource-poor farmers in sub-Saharan Africa.The intercrop and trap crops provide forage for cattle and goats. The technology is called “push-pull”. It is knowledge-intensive and there are lessons...

Containment Studies of TransgenicMosquitoes in Disease Endemic Countries:The Broad Concept of Facilities Readiness

Abstract: Genetic strategies for large scale pest or vector control using modified insects are not yet operational in Africa,and currently rely on import of the modified strains to begin preliminary, contained studies. Early involvementof research teams from participating countries is crucial to evaluate candidate field interventions. Following therecommended phased approach for novel strategies, evaluation should begin with studies in containmentfacilities. Experiences to prepare facilities...

Mapping Exposure of Cattle to Rift Valley Fever Virus Along their Migratory Routes

Abstract: Aedes mosquito is the primary vector for Rift Valley fever virus which affects humans and animals. Virus transmission pathways in animals occurs when bitten by infected mosquito or when viremic animals relocate to new regions with competent mosquitoes. Though Rift Valley fever is a transboundary disease with serious economic consequences, movement of viremic animals in search of pasture or trade in spreading the diseases is not fully understood. This research was undertaken in orde...

Evolution and Diagnostic Potential of Major Surface Proteases from Trypanosoma Vivax, T.Brucei Brucei and T.Congolense

Abstract: Tsetse-transmitted trypanosomiasis is a disease unique to Africa, affecting both humans and animals. This disease occurs in about 10 million km2 in 37 sub-Saharan countries corresponding approximately to one-third of Africa's total land area, and threatens an estimated 50 million people and 48 million cattle. The estimated annual losses in cattle production alone are in the range of 1.0-1.2 billion dollars. The diagnosis of trypanosomiasis is notoriously difficult as there are no s...


16 - 30 Of 1047 Results