Computer Science Research Papers/Topics

A Proposed Usability Evaluation Checklist And Threshold For Interactive Systems

Abstract Designing for maximum usability is the goal of interactive systems design, since users want interactive products to be easy to learn, effective, efficient, safe, memorable and over all; satisfying to use. Achieving this requires the product to be evaluated, but the process of evaluation can be difficult, because different evaluation methodologies require some restriction ―e.g. experienced evaluators‖ and can be more time-consuming. In addition, developers will not be able to kno...

Extending Lifetime And Optimizing Energy Of Wireless Sensor Network Using Hybrid Clustering Algorithms

Abstract The Wireless Sensor Network (WSN) is becoming increasingly popular as it enables sensor nodes to measure the surrounding environment, communicate and process measured data. WSN has been directed from military applications to various civil applications, especially in hostile areas. Medical, industrial and smart energy applications is still in need for extensive research due to various challenges encountered. Energy consumption is one of the vital challenges that face WSNs research. T...

Performance Evaluation Of NoSQL Databases On Streaming Data

ABSTRACT The main purpose of this dissertation was to evaluate the performance of Cassandra and HBase NoSQL Databases, that present at Column-oriented category on handling streaming data. The data set used for this evaluation were constructed with the help of the Twitter Streaming API. The environment which used to evaluate the performance of Cassandra and HBase on Streaming Data was Apache Spark with its ability to plot streaming data from source using Spark-R. Several studies have been con...

Towards Big data Governance in Cybersecurity

Abstract Big data refers to large complex structured or unstructured data sets. Big data technologies enable organisations to generate, collect, manage, analyse, and visualise big data sets, and provide insights to inform diagnosis, prediction, or other decision-making tasks. One of the critical concerns in handling big data is the adoption of appropriate big data governance frameworks to (1) curate big data in a required manner to support quality data access for effective machine learning a...

Study On The Application And Admission Process To Sudanese Universities Using Data Mining Techniques

Abstract This study aims to use modern Data Mining techniques to analyze admission data of Sudanese universities. The current methodology contains two data warehouse structures; a star and a snowflake. A star data warehouse structure was used to develop several Association Rules Mining models. The snowflake data warehouse structure was used to create a smart user interface based on OLAP (On Line Analytical Processing) technique as the first system for OLAP in Sudan. However the Association R...

An Infrastructure For The Exchange Of Healthcare Information Among Public Hospitals

Abstract Healthcare Information Infrastructures for Public Hospitals, in the Republic of Sudan, especially Khartoum State, and Healthcare Information Exchange, are essential steps for civilizing Healthcare in Sudan. Better health is what we seek for our people, families, children, neighbours, friends and for everyone over the world. With the total number of Sudanese citizens which is approximately more than thirty-three million people, beneficiaries from the Sudanese public hospitals' facilit...

A Model For Prediction Of Financial Distress In Sudanese Banking System Using A Newly Built Data Set.

Abstract Bank failures threaten the economic system as a whole. Therefore, predicting bank financial failures is crucial to prevent and/or lessen its negative effects on the economic system. Financial crises, affecting both emerging markets and advanced countries over the centuries, have severe economic consequences, but they can be hard to prevent and predict. This is originally a classification problem to categorize banks as healthy or non-healthy ones in order to design the required measu...

An Automatic Question Answering System For The Arabic Quran

Abstract This thesis investigates Question answering system in general and then applying it in a specific domain: Arabic language and Holy Quran. A corpus of questions and answers from Albagarah and Alfatihah chapters was built, using three types of files: excel worksheet, texts and database table. This corpus was collected from many resources and validated by Islamic scholars from Gabrah college. The thesis contains six chapters: Chapter one defines the problem statement, objectives and mot...

The Challenges Facing Adoption Of Mobile Banking In Tanzania: A Case Of Nmb Chake-Chake Pemba

ABSTRACT The aim of the study was to investigate the challenges which face the adoption of Mobile Banking services (MBs) that cause customers of NMB Bank not interested to use this service as expected. The result of this study will assist NMB Bank in managing and improving the services which mobile banking provide and optimize the usage of service to customers and the society at large. The study identifies the factors which could lead to improve the usability of services to customers. Quanti...

Voice Recognition By Using Machine Learning A Case Study Of Some Rules Of Tajweed

ABSTRACT Voice recognition is considered as one of the most important aspects of machine learning domain. But it still has limited and modest applications in Arabic language. The Holy Quran is the largest container of Arabic language grammar in terms of speaking and utterance as it is considered as a message for all humanity. However, we present within this study a classification model for four different altajweed rules like the Allah name(mofakham, morakaq) and moon and sun L(لام,(as we ...

Social Engineering Tactics Used In Mobile Money Theft In Tanzania

ABSTRACT Social engineering is one of the most common attacking vectors in mobile money transactions. With the increasing rate of mobile money use, it has directly increased the number of social engineering incidents in mobile money services. It is therefore important to evolve a framework for detecting malicious and phishing messages. This could help to reduce threats posed by mobile phone criminals. As of now, some customers and agents have already lost thousands of shillings due to social...

The Use Of Ict In Criminal Investigation Processes In Tanzania: A Case Study Of Dodoma Region

ABSTRACT Usage of Information and Communication Technology (ICT) in criminal investigation processes plays a critical role in management of crime cases, storage and retrieval of complainants‟ as well as offenders‟ information. Such technology helps criminal investigation officers to follow up case status and keep track of information concerning crime cases. Furthermore, ICT facilitates quickly decision making on cases, transparency, cross-referencing and efficient operations of criminal ...

Road Traffic Offence Information Management System

ABSTRACT This work is concerned with road traffic offence information management in Nigeria. It focused on trends in road traffic offences information and carried out a critical review of current information and communication and technology compliance state of FRSC with a view to identifying its defects in road traffic offence information management. A system to correct road traffic offence information management failure as identified in the existing system was then proposed. Road traffic of...

Finding the Best Location for New Restaurant Using GIS Technologies

Abstract Abbreviation Definition GIS Geographic Information System AHP Analytic Hierarchy Process MCA Multi Criteria Analysis MCDA Multi Criteria Decision Analysis SDSS Spatial Decision Support System DSS Decision Support System Restaurants has become one of the most important facilities that generates a huge amount of revenues in community that helps in economic growth of the country ,it’s not just a place for serving food and drinks but it’s also one of the important tourism places that...

Analyzing Signal Area Valleys Using Geuoeraphic Information Systems Case Study Elwady Elseed Village River Nile State

Abstract The usage of telecom services is now creating a new vista in the societal applications. Increasing expectation of cell phone users and the usage of Information and Communication Technology (ICT) enabled services via cell phones in the entire world. These have driven demands to service providers to expand their network coverage to all the places including rural areas like Elwady Elseed Village River Nile State. The strategic location of telecom towers can ensure efficient provision o...


406 - 420 Of 1652 Results