Computer Science Research Papers/Topics

Using Computer Assisted Instruction In Improving Mathematics Learning In Tanzania Secondary Schools

ABSTRACT This study focuses on examining the use of computer assisted instruction model in improving learning of mathematics in Tanzania secondary schools. In particular the study assessed the capacity and the efficiency of using computer assisted instruction in learning of mathematics. Two secondary schools were used in this study namely:- St. Anthonys‟ Secondary School and Kibasila Secondary School. Both of these schools are in Temeke District, Dar es salaam. The study comprised 40 stude...

Exploring Application Of Radio Frequency Identification In Log Tracking And Monitoring Systems: A Case Of Sao Hill Forest Plantation

ABSTRACT Various methods throughout history have been used to identify objects. It was not until the Second World War that Radio Frequency use in identifying items was embraced. In 2008 European foresters (Germany and Finland) Korten and Kaul researched on the prospects of RFID in forest industry. Countries like Malaysia, Sweden and Canada have used RFID in their forest supply chain management. This study aims to explore how RFID can be used in Tanzania log tracking and monitoring system, ca...

Improving Vision Impaired Users Access To Electronic Resources In E-Learning Environment With Modified Artificial Neural Network

ABSTRACT Assistive Technology (ATs) provide means through which persons with visual impairment are empowered with adaptive devices and methods for accessing multimedia information. However, the degree of sensitivity and specificity values for access to electronic resources by visual impaired persons varies.  Existing ATs were designed as “one model fits all” (static calibration requirements), thereby limiting the usability by vision impaired users in an e-learning environment.  The stu...

Assessment of an Access Control System Using Principal Component Analysis and Discrete Cosine Transform

ABSTRACT In this paper, faces were employed as the only control means of right of entrance and usage of information on the super–highway. Principal Component Analysis (PCA) and Discrete Cosine Transform (DCT) algorithms were employed as our basis of comparison. An assessment of both algorithms was considered, it was discovered that PCA proved to be a better algorithm for access control and recognition system because of its very high average percentage of rightly classified faces (90.43%) a...

3D model reconstruction using photo consistency

Abstract rviodel reconstruction using photoconsistency refers to a method that creates a photohull, an approximate computer model, using multiple calibrated camera views of an object. The term photoconsistency refers to the concept that is used to calculate the photohull from the camera views. A computer model surface is considered photoconsistent if the appearance of that surface agrees with the appearance of the surface of the real world object from all camera viewpoints. This thesis pres...

Multivariable Control of a Rougher Flotation Cell

Abstract This project focussed on the investigation, development and evaluation of a closed loop control system on a rougher flotation cell that could improve PGM flotation performance. A PGM rougher flotation cell equipped with Online Stream Analysis (OSA) and machine vision system (SmartFroth) was used during the investigation. Online measurements included bubble velocity, average bubble area, bubble colour; Pt, Ni and Cu concentrate grade and concentrate flow rate and density. Air additio...

Security And Integrity Of Result Computations In Cloud Computing Environment.

ABSTRACT There is a growing trend of using cloud environments for ever growing storage and data processing needs. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of servicing consumers. The focus of this research is on the development of a proof-ofconcept system for security and integrity of result computations in a cloud computing environment by implementing a four level cloud based application security gateway methodology for ...

Self-Organizing Map Quantization Error Approach For Detecting Temporal Variations In Image Sets

Abstract A new approach for image processing, dubbed SOM-QE, that exploits the quantization error (QE) from self-organizing maps (SOM) is proposed in this thesis. SOM produce low-dimensional discrete representations of high-dimensional input data. QE is determined from the results of the unsupervised learning process of SOM and the input data. SOM-QE from a time-series of images can be used as an indicator of changes in the time series. To set-up SOM, a map size, the neighbourhood distance, ...

Modelling Virtual Enterprises Using A Multiagent Systems Approach: Case Of Construction Industry In Kenya

ABSTRACT Disparate enterprises can pool together their core competencies to form a temporary organization in order to exploit a market opportunity. This inter-organizational collaboration of enterprises is commonly referred to as a virtual enterprise (VE). The success of any VE is dependent on the partner members’ performance and influence of the partner attributes on its performance. These members and their attributes need to be carefully evaluated. The competitive advantage of any VE is ...

University Student Project Tracker (USPT)

Abstract Over the years, we have had complaints of people copying someone else’s project directly as his/her own. Therefore, this project is aimed at solving the problem of copyright as identified during seminar presentations, project defense etc in schools. To solve the above mentioned problem, this application is developed to capture relevant information of all project works undertaken and completed in the department. The application is an off-line tracking system; it will be installed o...

Office Information System

ABSTRACT. This topic was informed by the fact that the current approach to office information system in our educational institutions left much to be desired. The amount of paper records being used is extremely bulky with the resultant problems of storage and retrieval. In the University of Nigeria, in the last eighteen months, four staff audits have been conducted. These audits panel revealed sordid mal-practice arising from poor and slow inter-office communication. For example, from these a...

An Adaptive Multi-Service Generic Flow Control Protocol

The emerging Broadband Integrated Services Digital Networks |||(B-ISDN) will become the core of the future telecommunication infrastructure based on the Asynchronous Transfer Mode (ATM) technology and will provide a wide range of services such as video conferencing, video mail, image transfer high definition television, video on demand and video telephony. An aspect of Broadband ATM networks is the multiplexing of the multiple terminals (TEs) and diverse traffic types at the Customer premises...

Design Of Multiple Enrollment Based Fingerprint Recognition Systems

ABSTRACT Using multiple enrollment can improve recognition performance in fingerprint recognition systems; but there are several technical and operational challenges to implementing multiple enrollment based fingerprint recognition systems. Multiple enrollment based fingerprint recognition systems still have low recognition accuracies, poor matching speeds, and consume a lot of memory making it difficult to implement them in real world scenarios. Also, most of multiple enrollment based finge...

Evaluation of Code Quality in Web Pages using Software Testing Tools

Continuous improvement is a key factor for survival in today’s turbulent business environment. Correspondingly, in today’s business world, software is everywhere. In the whole process of software development, testing is a phase that is often forgotten. Everybody assumes that once the software is developed, it will work flawlessly. However, it often happens not to be so. Moreover, when it does not, we are all unsatisfied and frustrated. Problems with software are a frequent occurrence...

Development Of An Interactive E-Learning Management System (E-LMS) For Tanzanian Secondary Schools

ABSTRACT e-learning, as defined to be the use of information and communications technology (ICT) for supporting the educational processes, has motivated Tanzania to apply ICT in its education system. Tanzania secondary schools in rural areas are geographically and socially isolated. Rural Tanzania secondary schools face a number of problems including ways in getting learning materials, as well as inadequacy in qualified teachers. The impact of these problems is poor performance in National E...


466 - 480 Of 1652 Results