Computer Science Research Papers/Topics

Study On The Application And Admission Process To Sudanese Universities Using Data Mining Techniques

Abstract This study aims to use modern Data Mining techniques to analyze admission data of Sudanese universities. The current methodology contains two data warehouse structures; a star and a snowflake. A star data warehouse structure was used to develop several Association Rules Mining models. The snowflake data warehouse structure was used to create a smart user interface based on OLAP (On Line Analytical Processing) technique as the first system for OLAP in Sudan. However the Association R...

The Challenges Facing Adoption Of Mobile Banking In Tanzania: A Case Of Nmb Chake-Chake Pemba

ABSTRACT The aim of the study was to investigate the challenges which face the adoption of Mobile Banking services (MBs) that cause customers of NMB Bank not interested to use this service as expected. The result of this study will assist NMB Bank in managing and improving the services which mobile banking provide and optimize the usage of service to customers and the society at large. The study identifies the factors which could lead to improve the usability of services to customers. Quanti...

The Use Of Ict In Criminal Investigation Processes In Tanzania: A Case Study Of Dodoma Region

ABSTRACT Usage of Information and Communication Technology (ICT) in criminal investigation processes plays a critical role in management of crime cases, storage and retrieval of complainants‟ as well as offenders‟ information. Such technology helps criminal investigation officers to follow up case status and keep track of information concerning crime cases. Furthermore, ICT facilitates quickly decision making on cases, transparency, cross-referencing and efficient operations of criminal ...

Optimizing Gateway Placement In Wireless Mesh Network Using Genetic Algorithm And Simulated Annealing

ABSTRACT Recently, Wireless Mesh Network (WMN) has gained important roles in current communication technologies. It has been used in several applications and most of them are critical applications such as surveillance, transportation systems and rescue systems. Hence, the WMN attracts a lot of attention from many researchers. WMN consists mainly of mesh clients MCs and mesh routers MRs, some of the latter are supplied by additional functions to serve as Internet gateways (IGs). Thus, most of...

The Viability Of Using Online Social Networks As E-Learning Platforms In Tanzanian Universities

ABSTRACT The purpose of this study was to investigate the viability of using Online Social Networks (OSNs) as e-learning platforms in Tanzanian Universities. The population of this study was students of the University of Dodoma. Observation and questionnaires were used as a research instruments to collect data from 390 respondents which were proportionally selected. Quantitative data was analyzed using SPSS to obtain the breadth to which the observed behavior and practices are distributed wi...

Development Of Student Information Management System (A Case Study Of Computer Science Department, Fuoye)

ABSTRACT Student Information Management System (SIMS) provides a simple interface for maintenance of student information. It can be used by educational institutes or colleges to maintain the records of students easily. A number of problems associated with student academic record management include improper course registration, late release of students' results, inaccuracy due to manual and tedious calculation and retrieval difficulties/inefficiency. In most cases the data generated by ac...

Development Of Mobile Payment System: An Implementation Of Cashless Economy

ABSTRACT Cashless economy has ushered in the cashless banking framework across different countries of the world and this is made possible by the advances in information technology. Electronic cash is a term becoming more acceptable as the world makes a shift towards a cashless society. This research work presents the development of a mobile payment system which implements cashless economy. The main aim of this development is to reduce some cash-related crimes in our society such as: robberie...

The Impact Of Risks To Customers’ Trust On Using Mobile Money Transfer Services In Tanzania: A Case Study Of M-Pesa In Dodoma Municipal

ABSTRACT This dissertation examines the impact of risks to customers’ trust on using mobile money transfer services in Tanzania, with a special focus on risk including the facets of perceived risks which are performance risk, security/privacy risk, time risk, social risk and financial risk. These aspects are covered through a critical review of existing literature, secondary data and a survey targeting mobile phone users with M-Pesa accounts and M-Pesa agents living in Dodoma Municipal. Th...

Vehicle To Infrastructure Communication For Adaptive Traffic Management

Abstract Congestion problem is increased in a dramatically way due to increased Population and travel means in Khartoum. The associated consequences for this problem made it extremely bothering. Since the expansion of the traffic network is no longer a socially attainable solution, the existing control systems have to be used in a more intelligent way in order to increase the traffic throughput and decrease total travel times Intelligent transportation systems ITS had been developed to overc...

EEG-Based Detection Of Human Emotions

ABSTRACT EEG (Electroencephalography) allows eliciting the mental state of the user, which in turn reveals the user emotion, which is an important factor in HMI (Human Machine Interaction). Researchers across the globe are developing new techniques to increase the EEG accuracy by using different signal processing, statistics, and machine learning techniques. In this work we discuss the most common techniques that can yield better results, along with discussing the common experiment steps to ...

A Design Of Smart Hajj Guide System For Piligrim Identifaction And Location Services

Abstract This dissertation investigates the issues of guidance for pilgrims and how to make it more suitable for groups of pilgrims who navigate in unfamiliar areas. The dissertation will explore how to provide aid to pilgrims in crowded places by developing a pilgrim tracking and identification system using mobile phones that use NFC technology. The proposed system will provide education to pilgrims to guide them throw the Hajj journey. The proposed system will provide instructions regardin...

Voice Encrption In Gsm Network Using Rc4 Algorithm

Abstract Mobile telecommunications such as Global System for Mobile Communication ( GSM ) are now well established globally and users rely heavily on the convenient communications it provides. The level of security provided by GSM is superior to its predecessors and is more than adequate for the majority of users. However, some users in the areas of government, defense or business require more security over and above that provided by the GSM standards and by standard GSM equipment. In a GSM n...

Assessing The Impact Of Lack Of Network Documentation In Higher Learning Institutions: Case Of University Of Dodoma

ABSTRACT  Network complexity continues to grow as enterprises add and remove different communication technologies. Software tools that identify network elements, provide logical and physical network views, track network changes, and provide accurate documentation for all network components which are needed and should be employed in the organizations. It has been observed that most of the Higher Learning Institutions (HLIs) in Tanzania facing serious problems in monitoring and managing networ...

Using Computer Assisted Instruction In Improving Mathematics Learning In Tanzania Secondary Schools

ABSTRACT This study focuses on examining the use of computer assisted instruction model in improving learning of mathematics in Tanzania secondary schools. In particular the study assessed the capacity and the efficiency of using computer assisted instruction in learning of mathematics. Two secondary schools were used in this study namely:- St. Anthonys‟ Secondary School and Kibasila Secondary School. Both of these schools are in Temeke District, Dar es salaam. The study comprised 40 stude...

Exploring Application Of Radio Frequency Identification In Log Tracking And Monitoring Systems: A Case Of Sao Hill Forest Plantation

ABSTRACT Various methods throughout history have been used to identify objects. It was not until the Second World War that Radio Frequency use in identifying items was embraced. In 2008 European foresters (Germany and Finland) Korten and Kaul researched on the prospects of RFID in forest industry. Countries like Malaysia, Sweden and Canada have used RFID in their forest supply chain management. This study aims to explore how RFID can be used in Tanzania log tracking and monitoring system, ca...


46 - 60 Of 168 Results