Computer Science Research Papers/Topics

The Viability Of Using Online Social Networks As E-Learning Platforms In Tanzanian Universities

ABSTRACT The purpose of this study was to investigate the viability of using Online Social Networks (OSNs) as e-learning platforms in Tanzanian Universities. The population of this study was students of the University of Dodoma. Observation and questionnaires were used as a research instruments to collect data from 390 respondents which were proportionally selected. Quantitative data was analyzed using SPSS to obtain the breadth to which the observed behavior and practices are distributed wi...

Development Of Student Information Management System (A Case Study Of Computer Science Department, Fuoye)

ABSTRACT Student Information Management System (SIMS) provides a simple interface for maintenance of student information. It can be used by educational institutes or colleges to maintain the records of students easily. A number of problems associated with student academic record management include improper course registration, late release of students' results, inaccuracy due to manual and tedious calculation and retrieval difficulties/inefficiency. In most cases the data generated by ac...

Computational Identification Of Signalling And Metabolic Pathways Of Plasmodium Falciparum

ABSTRACT Malaria is one of the world’s most common and serious diseases causing death up to about three million people each year. Its most severe occurrence is caused by the protozoan Plasmodium falciparum. Reports have shown that the resistance of the parasite to existing drugs is increasing. Therefore, there is a huge and urgent need to discover and validate new drug or vaccine targets to enable the development of new treatments for malaria. The ability to discover these drug or vaccine ...

TCP/IP Protocol-Based Model For Increasing The Efficiency Of Data Transfer In Computer Networks

ABSTRACT This chapter provides solutions for increasing the efficiency of data transfer in modern computer network applications and computing network environments based on the TCP/IP protocol suite. In this work, an imitation model and simulation was used as the basic method in the research. A simulation model was developed for designing and analyzing the computer networks based on TCP/IP protocols suite which fully allows the exact features in realizing the protocols and their impact on inc...

Age Of Teachers Vs Ict Use In Tanzanian Secondary Schools: A Case Of Dodoma Municipality

ABSTRACT The use of Information and Communication Technology (ICT) in teaching and learning has been the main target for public and private schools in Tanzania since the beginning of the 21st century. Since then, however, the achievement of using ICT on teaching and learning has been relatively unsatisfactory due to several reasons including incompetence and poor understanding of teachers on ICT. This study intends to understand ICT literacy level, use of ICT tools in delivering contents, an...

Development Of A Distance Learning System Based On Social Media Network Model

ABSTRACT This project focused on the development of a social network based distance learning (elearning) system. Various existing distance learning programmes were thoroughly investigated and inherent problems identified. A more robust and better approach is proffered using the social network model. The unification of these systems will be made feasible by integrating social network such as skype and facebook with distance learning (e-learning) protocols. A video based Learning Manageme...

Development Of Mobile Payment System: An Implementation Of Cashless Economy

ABSTRACT Cashless economy has ushered in the cashless banking framework across different countries of the world and this is made possible by the advances in information technology. Electronic cash is a term becoming more acceptable as the world makes a shift towards a cashless society. This research work presents the development of a mobile payment system which implements cashless economy. The main aim of this development is to reduce some cash-related crimes in our society such as: robberie...

A Fuzzy-Oriented Framework For Service Ranking And Selection In Cloud E-Marketplaces

ABSTRACT Despite the successes of commercial cloud service e-marketplaces, opportunities still exist to improve user experience as these e-marketplaces do not yet enable dynamic composition of atomic services to satisfy complex user requirements. More so, the platforms employ keyword-based search mechanisms that only allow the selection of atomic services. The elicitation mechanisms do not consider user’s QoS requirements, nor support the elicitation of these requirements in ways akin to s...

A Hybrid Semi Automatic Approach For The Design Of Datawarehouse Conceptual Model

ABSTRACT Organizations strive to build data warehouses (DW) to support their decision making process. The studies show that the most important task for organization‟s manager is to take the right decision in the right time. Hence, the decision-making process is considered among the main important goals to be achieved by competitor enterprises. The design process of a DW raises many problems and is considered as a complex and tedious task. DW designers follow different levels concerning the...

An Aspect-Oriented Sentiment Analysis Of Arabic Tweets Using Language Pattern and Semantic Analysis Techniques

ABSTRACT Sentiment analysis of the Arabic language has gained the attention of many researchers because of the increasing number of Arabic internet users, and the exponential growth of Arabic content online. Despite the language‟s popularity, there are limited annotated resources for sentiment analysis, including a comprehensive dataset, labelled corpora, and polarity lexica, and also reliable NLP tools. This is the source of motivation for the study - the need to develop an opinion corpus...

Color And Texture Fusion Based Method For Content Based Image Retrieval

ABSTRACT Since the last decade, Content-based Image retrieval was a hot topic research. The computational complexity and the retrieval accuracy are the main problems that CBIR system have to avoid. In this study the method was proposed to overcome these problems by using the combine of color moment and texture features. The color feature was extracted by color moment where the images will be in the HSV color space. The textures features extracted by applying Gabor function where the images w...

The Impact Of Risks To Customers’ Trust On Using Mobile Money Transfer Services In Tanzania: A Case Study Of M-Pesa In Dodoma Municipal

ABSTRACT This dissertation examines the impact of risks to customers’ trust on using mobile money transfer services in Tanzania, with a special focus on risk including the facets of perceived risks which are performance risk, security/privacy risk, time risk, social risk and financial risk. These aspects are covered through a critical review of existing literature, secondary data and a survey targeting mobile phone users with M-Pesa accounts and M-Pesa agents living in Dodoma Municipal. Th...

Vehicle To Infrastructure Communication For Adaptive Traffic Management

Abstract Congestion problem is increased in a dramatically way due to increased Population and travel means in Khartoum. The associated consequences for this problem made it extremely bothering. Since the expansion of the traffic network is no longer a socially attainable solution, the existing control systems have to be used in a more intelligent way in order to increase the traffic throughput and decrease total travel times Intelligent transportation systems ITS had been developed to overc...

Enhanced Three Dimension Playfair Algorithm For Image Encryption

Abstract In this research, a new modified version of Tree Dimension Playfair (3D-Playfair) cipher algorithm is introduce to encrypt image. The new method is create (16 X 4 X 4) matrix based on the key being entered by the user to become more secretive, and then manipulate image data the algorithm work on trigraph rather than using digraph, and to increasing complexity of the algorithm the key is used to generate a mask that is subsequently Exclusive OR (XORed) with the scrambled image after e...

Enhanced Scheme for Video Transmission over Mobile Ad hoc Networks based on Optimized Link State Routing Protocol

Abstract A Mobile Ad Hoc Network (MANET) is an infrastructure-less wireless network which allows a group of mobile devices to connect wirelessly without centralized administration. MANETs are useful when rapid deployment in infrastructure-less locations is required, or under emergency situations where communication is not available. Video conferencing over MANET is challenging due to features that characterize this type of network. This thesis proposed an enhanced scheme based on tuning, mod...


436 - 450 Of 1652 Results