ABSTRACT In this project, we shall implement the hierarchical clustering algorithm and apply it to various data sets such as the weather data set, the student data set, and the patient data set. We shall then reduce these datasets using the following dimensionality reduction approaches: Random Projections (RP), Principal Component Analysis (PCA), Variance (Var), the New Random Approach (NRA), the Combined Approach (CA) and the Direct Approach (DA). The rand index and ARI will be implemented ...
ABSTRACT Network complexity continues to grow as enterprises add and remove different communication technologies. Software tools that identify network elements, provide logical and physical network views, track network changes, and provide accurate documentation for all network components which are needed and should be employed in the organizations. It has been observed that most of the Higher Learning Institutions (HLIs) in Tanzania facing serious problems in monitoring and managing networ...
ABSTRACT This study focuses on examining the use of computer assisted instruction model in improving learning of mathematics in Tanzania secondary schools. In particular the study assessed the capacity and the efficiency of using computer assisted instruction in learning of mathematics. Two secondary schools were used in this study namely:- St. Anthonys‟ Secondary School and Kibasila Secondary School. Both of these schools are in Temeke District, Dar es salaam. The study comprised 40 stude...
ABSTRACT Various methods throughout history have been used to identify objects. It was not until the Second World War that Radio Frequency use in identifying items was embraced. In 2008 European foresters (Germany and Finland) Korten and Kaul researched on the prospects of RFID in forest industry. Countries like Malaysia, Sweden and Canada have used RFID in their forest supply chain management. This study aims to explore how RFID can be used in Tanzania log tracking and monitoring system, ca...
ABSTRACT Assistive Technology (ATs) provide means through which persons with visual impairment are empowered with adaptive devices and methods for accessing multimedia information. However, the degree of sensitivity and specificity values for access to electronic resources by visual impaired persons varies. Existing ATs were designed as “one model fits all” (static calibration requirements), thereby limiting the usability by vision impaired users in an e-learning environment. The stu...
ABSTRACT In this paper, faces were employed as the only control means of right of entrance and usage of information on the super–highway. Principal Component Analysis (PCA) and Discrete Cosine Transform (DCT) algorithms were employed as our basis of comparison. An assessment of both algorithms was considered, it was discovered that PCA proved to be a better algorithm for access control and recognition system because of its very high average percentage of rightly classified faces (90.43%) a...
Abstract rviodel reconstruction using photoconsistency refers to a method that creates a photohull, an approximate computer model, using multiple calibrated camera views of an object. The term photoconsistency refers to the concept that is used to calculate the photohull from the camera views. A computer model surface is considered photoconsistent if the appearance of that surface agrees with the appearance of the surface of the real world object from all camera viewpoints. This thesis pres...
Abstract This project focussed on the investigation, development and evaluation of a closed loop control system on a rougher flotation cell that could improve PGM flotation performance. A PGM rougher flotation cell equipped with Online Stream Analysis (OSA) and machine vision system (SmartFroth) was used during the investigation. Online measurements included bubble velocity, average bubble area, bubble colour; Pt, Ni and Cu concentrate grade and concentrate flow rate and density. Air additio...
ABSTRACT There is a growing trend of using cloud environments for ever growing storage and data processing needs. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of servicing consumers. The focus of this research is on the development of a proof-ofconcept system for security and integrity of result computations in a cloud computing environment by implementing a four level cloud based application security gateway methodology for ...
Abstract A new approach for image processing, dubbed SOM-QE, that exploits the quantization error (QE) from self-organizing maps (SOM) is proposed in this thesis. SOM produce low-dimensional discrete representations of high-dimensional input data. QE is determined from the results of the unsupervised learning process of SOM and the input data. SOM-QE from a time-series of images can be used as an indicator of changes in the time series. To set-up SOM, a map size, the neighbourhood distance, ...
ABSTRACT Disparate enterprises can pool together their core competencies to form a temporary organization in order to exploit a market opportunity. This inter-organizational collaboration of enterprises is commonly referred to as a virtual enterprise (VE). The success of any VE is dependent on the partner members’ performance and influence of the partner attributes on its performance. These members and their attributes need to be carefully evaluated. The competitive advantage of any VE is ...
Abstract Over the years, we have had complaints of people copying someone else’s project directly as his/her own. Therefore, this project is aimed at solving the problem of copyright as identified during seminar presentations, project defense etc in schools. To solve the above mentioned problem, this application is developed to capture relevant information of all project works undertaken and completed in the department. The application is an off-line tracking system; it will be installed o...
ABSTRACT. This topic was informed by the fact that the current approach to office information system in our educational institutions left much to be desired. The amount of paper records being used is extremely bulky with the resultant problems of storage and retrieval. In the University of Nigeria, in the last eighteen months, four staff audits have been conducted. These audits panel revealed sordid mal-practice arising from poor and slow inter-office communication. For example, from these a...
The emerging Broadband Integrated Services Digital Networks |||(B-ISDN) will become the core of the future telecommunication infrastructure based on the Asynchronous Transfer Mode (ATM) technology and will provide a wide range of services such as video conferencing, video mail, image transfer high definition television, video on demand and video telephony. An aspect of Broadband ATM networks is the multiplexing of the multiple terminals (TEs) and diverse traffic types at the Customer premises...
ABSTRACT Using multiple enrollment can improve recognition performance in fingerprint recognition systems; but there are several technical and operational challenges to implementing multiple enrollment based fingerprint recognition systems. Multiple enrollment based fingerprint recognition systems still have low recognition accuracies, poor matching speeds, and consume a lot of memory making it difficult to implement them in real world scenarios. Also, most of multiple enrollment based finge...