Technology

Technology Research Papers/Topics

Modelling the significance of feeding and mating related contact, optimal control and fractional order change on the long term dynamics of Devil Facial Tumour Disease

Abstract: Tasmanian devils are the largest living carnivorous marsupial found in the wild of Tasmania. These species are being threatened by a cancerous tumour disease, the Devil Facial Tumour Disease (DFTD). The disease affects the facial areas and has led to a considerable popula tion decline. In this thesis, mathematical models for transmission of DFTD are developed and analysed to investigate the significance of feeding and mating related contact, optimal control and fractional-order cha...

Visualizing the invisible: class excursions to ignite children’s enthusiasm for microbes

Abstract: We have recently argued that, because microbes have pervasive – often vital – influences on our lives, and that therefore their roles must be taken into account in many of the decisions we face, soci ety must become microbiology-literate, through the introduction of relevant microbiology topics in school curricula (Timmis et al. 2019. Environ Micro biol 21: 1513-1528). The current coronavirus pan demic is a stark example of why microbiology literacy is such a crucial enabler of...

Control unit for a coreless stator for use with SI engine stepping valve

Abstract: Engine efficiency could be increased if valve timing could change with engine revolutions per minute. Poppet valves are fitted with strong springs which return them to their rest positions after being pushed down by cam lobes. Overcoming the spring loaded camshaft drive train requires a lot of engine power. Valve lift, lift duration and phase cannot be adapted with cam lobes on the camshaft but electromagnetic actuators or hydraulic/pneumatic phasing mechanisms could achieve change...

Data Centric Protection against Ransomware Attacks at the Office of the Auditor General

Abstract: In attempting to answer the question of whether the Office of the Auditor General is doing enough to protect the sensitive data in its possession, I start off by stating the current information security trends. The trends highlight an upward rise in data breaches despite the numerous traditional approaches to secure data and network resources like firewalls, antiviruses, anti-malware gateways etc. In validation a study is performed at the Office of the Auditor General. Analysis of ...

Technology in Learning: Blackboard Usage & Its Impact on Academic Performance;

Abstract: The objective of this study is to engage in a practical analysis that will investigate the effects of using Blackboard Learn as a learning platform for higher education students in Lesotho using Botho University as a case study. A mixed method approach was adopted for the study. Data was collected using in-depth interviews and a questionnaire from 132 participants randomly selected for the quantitative aspect and 30 participants purposively selected for the qualitative aspect, from...

Open source ERP systems selection model: case of small and medium enterprises in Botswana

Abstract: Enterprise Resource Planning (ERP) systems are one of the technologies that many organisations, including Small and Medium Enterprises (SMEs), have adopted. However, most of commercial ERP packages are designed for large-scaled companies. More complex nature of business processes in large companies makes it difficult for SMEs to adopt commercial ERP packages. The high costs of ERP system implementation mean that SMEs need to seek for alternative solutions which are less expensive....

The Effectiveness of Virtual Labs in Higher Education Institutions of Botswana: A Case Study of Botho University

Abstract: The purpose of the study was to examine the virtual labs implemented by Botho University for Computing program for online distance learning students. This study has evaluated the lecturers’ perception on the usage of virtual labs to enrich students’ learning and experience to enhance their knowledge, skills and competencies. Quantitative research method was employed with closed-end structured questionnaire to collect the data. The SPSS version 21 was used to analyze quantitativ...

An Exploration of the Virtual Learning Environment With Reference to the Perceived Preparedness of College Student in Gaborone

Abstract: Changes in technology have a significant impact on E-learning in the communication and information systems of the present day. Botswana, like any other country, had a paradigm shift in the teaching and learning process during the Covid phase. This study aimed to determine whether or not students at a few Botswana universities were prepared to utilize the virtual learning environment. This study also aims to observe the progress in using Virtual Learning Environments considering fac...

Innovative Practices in Technology and the Improvement of Learning and Teaching in Higher Education: A Case for Private Institutions

Abstract: In the 21st Century, many Higher Education Institutions globally are undergoing dramatic changes like massification, globalisation and diversification. Another key transformer of the Higher Education environment is that of technology innovation. The aim of this study is to determine the extent of technology integration in Higher Education Institutions. The research looks at the benefits and challenges of integrating technology into Higher Education Institutions in Southern Africa. ...

The use and perception of multimedia projector for teaching and learning in higher education

Abstract: Nowadays, many teachers and students desire to use multimedia projectors in their classrooms. Through the use of a multimedia projector students will not have to crowd over a laptop or a desktop monitor to see a multimedia presentation during learning. A multimedia projector can improve teaching and learning process. When using PowerPoint presentation, it was concluded that teachers save more teaching time. They will not have wasted time taking notes on paper and writing on the cha...

Investigating the Level of Awareness on Information Security Amongst Users at Botho University.

Abstract: The growth of technology advancement has promoted a borderless environment among users, organizations, global industry and easy access to information. The use of the internet and computer systems in a teaching environment parallel increased the number of threats in today's world. Lack of information security practices is the major cause of security breaches. Information security needs to be addressed amongst users for the protection of organizational assets. Human knowledge, attit...

A Systematic Approach to Knowledge Audit: a Literature Review

Abstract: The importance of effective Knowledge Management in the 21st century knowledge economy cannot be further emphasised. The most critical step in managing knowledge effectively is an organisation’s ability to identify knowledge gaps, that is, determining what knowledge is required, where it is required, and who requires that knowledge. This is tantamount to carrying out a knowledge audit. This paper seeks to identify the views of Knowledge Management authors on what a knowledge audi...

Perspectives on Knowledge Management :a Literature Review

Abstract: Entire world is revolving towards digital space as a result of the Internet and other emerging web technologies are helping the society to reach the universe. ICT and e-learning are growing radically fast and have captured a major role in higher educational systems. To develop the coast-to-coast purposes, institutions are changing the teaching style from chalk and talk to Learning Management System (LMS), called e-learning systems. Impact of e-learning introduces various delivery m...

Attitudes of Batswana towards stem cell technology as an alternative therapy in Botswana

Abstract: Botswana is lagging behind in active participation in stem cell research. The research is yet to take off in the country. In order for stem cell research to be established in Botswana, the people of the country have to accept the research as affording a viable therapy alternative to conventional medicine. This study aimed to evaluate and analyse attitudes of the people of Botswana towards the establishment of stem cell research in Botswana. A survey study was conducted to examine p...

Detection and Avoidance of Routing Attack in Mobile Ad-hoc Network using Intelligent Node

Abstract: The routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempster-shafer theory introduced a solution for these routing attacks where it entirely works on the principle of Dempster rule with various important factors to mitigate these critical routing attacks. Previously the system contains an Intrusion detection mechanism which is used to create a message whenever the attacker attacks the network. This Intrusion detection system sends an alert m...


76 - 90 Of 1118 Results