ABS TRACT A Web Browser is a computer application used to access information on the World Wide Web. The browser‟s parsing capability has advanced over years since its inception. The advancements have consequently increased demand for memory as manifested by computer crawl. Contemporary browsers are anchored on reference architecture that lacks memory control mechanism that can limit maximum memory a browser can use thus posing a challenge in multiprogramming environments with less memory th...
ABSTRACT Global digitalisation has perpetuated the use of mobile devices for both personal and workrelated activities. As such, some African organisations have been allowing their employees to utilise their personally owned mobile devices to carry out work-related activities all in the name of convenience, reliability, mobility, and reduced maintenance costs. The Directorate on Corruption and Economic Offenses (DCEO), being an anti-corruption agency in Lesotho is embracing the BYOD benefits....
Abstract Indigenous Knowledge (IK) is the unique, traditional, local knowledge existing within and developed around the specific condition of women and men indigenous to a particular geographic area. Forms of expressing IK include folklores, songs, stories, festivals, outfit and proverbs. Proverbs are grounded upon years of experience and close observation of life and natural phenomena. Some research posed proverbs to be the bedrock of civilization of a society. By implication, almost all so...
Abstract In this paper we study the eects of magnetohydrodynamics (MHD) uid ow on a two dimensional boundary layer ow of a steady free convection heat and mass transfer on an inclined plate in which the angle of inclination is varied. The uid is taken as viscous, incom- pressible, electrically conducting. The mathematical formulation yields a set of governing partial dierential equations (PDEs) under a set of appropriate boundary conditions. The PDEs are transformed into ordi- nary die...
Table of Contents Chapter 1: Introduction ................................................................................................................................ 1 1.1. Background of the study .................................................................................................................... 1 1.2. Problem statement ............................................................................................................................ 4 1.3. Objectives of the stu...
ABSTRACT This study is concerned with the design and development of an annotation model that gives users the power of expressivity as required in Economic Intelligence (EI) context. Most of the existing annotation platforms lack this power of expressivity. The study also discovered a need to develop an annotation model for creating and structuring annotations that will adequately capture the intention of the users (EI actors) in decision making process. In addition, there was a need for a te...
ABSTRACT The overall goal of this research work was to develop and validate an e-Learning adoption model in Tanzanian secondary schools as literature had not revealed any comprehensive model that is specifically used in determining the adoption of e-Learning in Tanzanian secondary schools. The existence of this gap encouraged the carrying out of this research to empirically test and validate the combination of the Technology Acceptance Model (TAM), Task Technology Fit (TTF) and Technology Rea...
ABSTRACT A significant part of Inventory Management is inventory monitoring. In recent years, many inventory management systems have been created. These frameworks allow stocks of products and items put away in amasses be taken up. It is important to track the inventory and that is where control systems for inventory come in. The stock data the board frameworks and stock observing frameworks are coordinated and sent together at a fixed point at store locations in some of the current inventory...
ABSTRACT A significant part of Inventory Management is inventory monitoring. In recent years, many inventory management systems have been created. These frameworks allow stocks of products and items put away in amasses be taken up. It is important to track the inventory and that is where control systems for inventory come in. The inventory information management systems and inventory monitoring systems are coordinated and sent together at a fixed point at store locations in some of the curren...
ABSTRACT With the presence of some faults in online protocols and operating systems, any person who is connected to a network, especially in a Local Area Network (LAN) can fall victim to his information getting monitored by another person that is connected to the same network. Due to this problem at hand, an uninformed person can have his private information endangered to getting exposed to other unknown persons. Such act is called “Sniffing” and mostly occurs on networks. By sniffing the...
ABSTRACT Monsters Within is a fun 3D FPS horror survival game on the Windows platform that demands its players to have fast reflexes, quick thinking and deductive skills to survive in the game environment they have been thrust into; distorted humanoid creatures have overrun the city and continue to rapidly multiply. The player’s main objective is to circumvent this by destroying all nests in the vicinity. The quantitative research methodology was used to analyse the feasibility for the succ...
ABSTRACT The proposed thesis is designed to be an online Baze University past question archiving system. The use of technologies has become critically important in the era of the Coronavirus pandemic which has required off-campus distance learning by students of Baze university. With no access to staff and on-campus facilities, the availability of easily accessible online study material has become critical. This project aims to provide students with the necessary materials needed to aid with ...
ABSTRACT Assistive technologies to aid the visually impaired have evolved over time from screenreading software, magnification programs and daisy book readers, there are a plethora of devices to aid the visually impaired in their daily activities. Despite the established utility of such devices they face certain limitations that have hindered their widespread adoption, such as cost, stigma attached to using the product in public, and lack of continued support for the product. In this time sma...
ABSTRACT Facial recognition plays a significant role in different applications such as human computer communication, video surveillance, face tracking and face recognition. Efficient face recognition algorithm is required to accomplish such task. Face recognition is one of the most active research areas in computer vision and pattern recognition with practical applications. In present networked world, the need to conserve the security of information is becoming both increasingly significant a...