Articles, Conference and Workshop Papers Collection
Permanent URI for this collectionhttp://10.10.97.169:4000/handle/123456789/81
Browse
Browsing Articles, Conference and Workshop Papers Collection by Issue Date
Now showing 1 - 20 of 106
- Results Per Page
- Sort Options
Item Using free and open source software for e-Learning system (FOSES) in Tanzania(2006-02) Lwoga, Tandi Edda; Sanga, Camillius; Kazwala, R.R; Mganilwa, Z.MThe implementation of e-Learning software in Tanzania’s universities as well as other developing countries is still very low even though there are plenty Free and Open Source Software (FOSS) that can cater for this purpose. Among ten universities, only the University of Dar Es Salaam (UDSM) has managed to implement the e-Learning software in Tanzania by using WEBCT and Blackboard are e-Learning proprietary software. This study therefore discusses how the Tanzania Universities can establish and implement the e-learning technology with a case study of the Sokoine University of Agriculture. Specifically, this study describes the early evaluation steps that were observed during the adoption of the e-learning platform at SUA. The extensive literature review, experience gained from other universities, and the analysis of the available open source e-learning software were used for the selection and further improvement of the e-learning platform at SUA. Challenges that are delaying the implementation of e-learning platform at SUA are also discussed, and recommendations are given upon them. It is anticipated that the findings of the study will be used by all stakeholders in planning cost-effective and efficient ICTs implementations for general improvement of education sector from national level up to district level.Item A survey on detection of Sinkhole attack in wireless sensor network(2008) Kibirige, George W.; Sanga, CamiliusWireless Sensor Network (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the wireless sensor node is their characteristics which include low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Base on those characteristics makes this network vulnerable to several attacks, such as sinkhole attack. Sinkhole attack is a type of attack were compromised node tries to attract network traffic by advertise its fake routing update. One of the impacts of sinkhole attack is that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack and drops or altered routing information. It can also used to send bogus information to base station. This paper is focus on exploring and analyzing the existing solutions which used to detect and identify sinkhole attack in wireless sensor network. The analysis is based on advantages and limitation of the proposed solutions.Item Availability and usage of ICTs and e-resources by livestock researchers in Tanzania: Challenges and ways forward(International Journal of Education and Development using Information and Communication Technology, 2010) Angello, Consolata; Wema, EvansA study was conducted to investigate the accessibility and use of e-resources in Tanzania. The methodology adopted for the study was survey in which questionnaires, interviews and observations were used in collection of the data. A total of 50 respondents participated in the study. The study revealed that livestock research institutes in Tanzania had very few e-resources for their researchers. It was concluded that most livestock researchers were not aware of most of the e-resources available hence they could not access and use them effectively in their research work. The researchers recommended for improvement of internet connectivity to enable efficient information searching from the internet.Item The awareness and use of electronic information sources among livestock researchers in Tanzania(2010-12) Angello, C.This paper is the result of a study that was conducted to investigate the accessibility and use of electronic information resources by the livestock researchers in Tanzania. One of the main objectives of the study was to assess the information literacy skills of livestock researchers. The study was conducted in three livestock research institutes in Tanzania with an overall sample size of fifty respondents consisting of livestock researchers and information professionals. Detailed questionnaires, interviews and observations were the methods used for data collection while data was analysed by Statistical Package for Social Sciences (SPSS) and content analysis. One of the findings of the study was the lack of information literacy skills among most of the researchers and this was found to be limiting their access and use of e-resources. This paper discusses the level of information literacy that livestock researchers possess and its impact on these researchers’ awareness and use of e-resources.Item Using mobile phones for teaching and learning purposes in higher learning institutions: the case of Sokoine University of Agriculture in Tanzania(Sokoine University of Agriculture, 2012) Mtega, Wulystan P.; Bernard, Ronald; Msungu, Andrew C.; Sanare, RachelThe study investigated how mobile phones have been used for teaching and learning purposes in higher learning institutions in Tanzania. Specifically the study assessed how mobile phones facilitated the teaching and learning process, identified the mobile phone applications used for teaching and learning, determined the types of learning activities facilitated through mobile phones and assessed the common limitations of m-learning in at Sokoine University of Agriculture (SUA). The study employed a survey where teaching staff and students from faculties and institutes hosting academic programmes were involved. A total of 30 teaching staff and 40 students were randomly selected and included in the study. In-depth interviews, observations and questionnaire were used for data collection. It was found that majority of the respondents used their mobile phones for teaching and learning process. It was found that most respondents reported to use traditional mobile learning applications including text messages and calls. Few respondents had smart phones with a number of m-learning applications most of them being teaching staff. These were able to create upload, download and share academic resources through their smart phones while others recorded and stored files in their phones. It was also found that among teaching staff many were not aware of the capacity of their mobile phones such that they underutilized them. Costs associated with downloading multimedia content was another constraint which limited some respondents especially students from using phones for learning purposes. More than that, users were forced to use SMART/VISA cards for buying online mobile applications of which most respondents were not aware of.Item Enhanced security model for mobile banking systems in Tanzania(International journal of technology enhancements and emerging engineering research, 2013) Nyamtiga, Baraka W; Sam, Anael; Laizer, Loserian SIn mobile banking schemes; financial services are availed and banking services are provided using mobile devices. GSM services are greatly utilized for data transmission by the technologies used in conducting mobile transactions. In their operations; these technologies send data in plaintext. Financial service providers tend to rely on the security services provided by the GSM which has been proved to be susceptible to cryptanalytic attacks. The used algorithms for crypto mechanisms are flawed leaving data carried through the network vulnerable upon interception. Operators need to take precaution by enforcing some protective measures on the information to be transmitted. This paper describes an SMS based model designed with security features to enhance data protection across mobile networks. Features for data encryption, integrity, secure entry of security details on the phone, and improved security policies in the application server are incorporated. We address issues of data confidentiality, user authentication and message integrity in order to provide end-to-end security of data carried on GSM networks.Item Can e-learning promote participation of female students in STEM disciplines in higher learning institutions of Tanzania?(International Journal of Education and Development using Information and Communication Technology, 2013) Sanga, C; Magesa, M.M; Chingonikaya, E; Kayunze, K.AThe recent development of ICTs has brought many changes in different sectors. In Higher Learning Institutions, there are a number of positive changes. ICTs have brought efficiency, effectiveness and efficacy in the provision of the core functions namely: teaching, outreach, research and consultancy. Previous studies showed that even though there is improvement in teaching and learning through e-learning but few studies researched e-learning as tool for promoting female students to participate in science, technology and mathematics disciplines. This study was done to evaluate if the e-learning can promote the participation of female students in science, technology and mathematics subjects in different Higher Learning Institutions of Tanzania. The mixed research methodology was used in this study. The results showed that the potential benefits of e-learning as tool for promoting students uptake for science, technology and mathematics subjects was not fully exploited in Tanzania. Thus, this calls different stakeholders to fully implement and mainstream e-learning in Higher Learning value chain to make it a reality and not myth in promoting female students participation is science, technology and engineering.Item Security perspectives for ussd versus sms in conducting mobile transactions: a case study of Tanzania(International journal of technology enhancements and emerging engineering research, 2013) Nyamtiga, Baraka W; Sam, Anael; Laizer, Loserian SPerforming transactions using mobile devices is increasing rapidly in developing countries, Tanzania inclusive. USSD and SMS are among the technologies widely used in conducting mobile transactions. These two technologies have their strengths and weaknesses from perspectives of security of systems. They both utilize GSM Services and GSM Security is known to have inherent flaws in its encryption and au thentication algorithms. A description for these platforms is given in this paper of what they are, their modes of operations, and an evaluation of thei r security as related to mobile banking systems. From the evaluations made; this paper suggests a method that is more secure for use in mobile banking systems. As a solution we propose some security features being added to the existing systems in order to improve data confidentiality, message integrit y and user authenticity. The suggestions are based on the capabilities for the technology to accommodate these additional features to protect data that will supplement the protection offered by the GSM.Item In ovo antiviral activity of Synadenium glaucescens (pax) crude extracts on Newcastle disease virus(2013-04-10) Mabiki, F.P; Mdegela, R. H.; Mosha, R.D; Magadula, J.JInvestigation on the effect of root bark and wood, stem bark and wood, leaves and sap of Synadenium glaucescens extracts against Newcastle disease (ND) virus was done using an in ovo assay. Viable 9 days embryonated chicken eggs were arranged into 25 treatment groups (n = 5). Groups 1 to 21 were challenged with a 13C/SUA virulent strain of ND virus treated with extract at concentration of 0.2 mg/ml. Un-inoculated group saved as negative control and groups inoculated with virus and diluent saved as positive controls. Haemagglutination test was used to quantify the amount for ND virus units. Embryo survival and embryo weight were significantly higher (P ≤ 0.05) in groups treated with S. glaucescens extracts than the positive control. The root bark demonstrated significantly higher antiviral activities (P ≤ 0.05). Furthermore, treatments with ethanolic extract SE1 resulted into 100% embryo survival, 91.2% mean embryo weight and reduced viral load by 99.2%. The minimum dose of SE1 with the highest efficacy was 0.2 mg/ml. The percent mean embryo weight and haemagglutination test demonstrated negative correlation (R2 = 0.94). These findings validate the ethnoveterinary potential of S. glaucescens and the feasibility of its use for treatment and control of ND.Item Web-based examination results release information system for cost effective strategies in academic institutions(2014) Fue, Kadeghe G.; Mahenge, Michael P.J.; Busagala, Lazaro S.P.In past eras, a variety of results release approaches and systems have been proposed. And as technology keeps improving every day and night, numerous of them have been transformed from traditional paper to computerized and web-based format in recent years. Higher learning institutions with large number of students like Sokoine university of Agriculture face challenges in handling and releasing examination results leading to high cost and delay accessibility by students. Sokoine University of Agriculture and many other universities in East Africa particularly Tanzania have been using the computerized format of processing exams using Microsoft Excel which in turn leads to many complications and mostly notably excel formulas which are unknown to most of them. This paper proposes the web-based examination results release information system for cost effective strategies in East African academic institutions. It is urgent to come up with a solution that will cater short term demands of institutions like SUA and many others. Though, the proposed system involves only results releasing module but it’s urgent for the institutions that have a significant financial constraints. The proposed system is able to display results for each student and is able to accept the results from the examination officers. The system is intended to make sure that each student gets his/her results on-line without any hassle. Since, the system is proposed for financial constraints institution; hence it is not suitable for long term solution. Instead, this is recommended to be used for temporary services only.Item Blockchain-based secure storage management with edge computing for IoT(MDPI, 2014) Nyamtiga, Baraka William; Sicato, Jose Costa Sapalo; Rathore, Shailendra; Sung, Yunsick; Park, Jong HyukAs a core technology to manage decentralized systems, blockchain is gaining much popularity to deploy such applications as smart grid and healthcare systems. However, its utilization in resource-constrained mobile devices is limited due to high demands of resources and poor scalability with frequent-intensive transactions. Edge computing can be integrated to facilitate mobile devices in offloading their mining tasks to cloud resources. This integration ensures reliable access, distributed computation and untampered storage for scalable and secure transactions. It is imperative therefore that crucial issues of security, scalability and resources management be addressed to achieve successful integration. Studies have been conducted to explore suitable architectural requirements, and some researchers have applied the integration to deploy some specific applications. Despite these efforts, however, issues of anonymity, adaptability and integrity still need to be investigated further to attain a practical, secure decentralized data storage. We based our study on peer-to-peer and blockchain to achieve an Internet of Things (IoT) design supported by edge computing to acquire security and scalability levels needed for the integration. We investigated existing blockchain and associated technologies to discover solutions that address anonymity, integrity and adaptability issues for successful integration of blockchain in IoT systems. The discovered solutions were then incorporated in our conceptual design of the decentralized application prototype presented for secure storage of IoT data and transactions.Item The rapid growth of cybercrimes affecting information systems in the global: is this a myth or reality in Tanzania?(2014) Nfuka, E. N.; Sanga, C.; Mshangi, M.The main objective of this study was to determine whether the rapid growth of cybercrimes affecting information systems in the global: is a myth or reality in Tanzania. The study was undertaken using a mixed research methods. The research findings reveal that 12.8 % of users are victims of cybercrimes due to visiting unhealthy websites in cyberspace, more than 90.89% of users have been denied access to torrents/p2p applications (with malicious codes); and more than 63.29% of e-mails received by users are spam. It has been noted that Internet users has risen to 5.63 million users in 2012 out of 46.9 million of population in Tanzania; and is increasing at the rate of 416.98% per year thus expectation of 7.34 million users of Internet by December 2015. The increase in the number of Internet users has direct implication to the increase in cybercrimes affecting information systems. The Government of Tanzania has declared that “about 320 people were apprehended between July and December 2011of which over 1bn/- , Euro 8,897 and USD 551,777 reported to have been stolen through cyber”. The study concluded that there is a need for a holistic approach in addressing cybercrimes in a developing country like Tanzania.Item The context of education initiatives, importance and inhibitors of ICTs towards improving teaching and learning in Tanzania: a critical literature review(International Institute for Science, Technology and Education, 2014) Barakabitze, Alcardo AlexThis paper provides a comprehensive review of articles related to initiatives towards integrating Information and Communication Technologies (ICTs) in Tanzanian education. The review summarizes the relevant research on the use of ICT in education, importance and inhibitors or challenges encountered towards improving teaching and learning from primary to higher education in the country. By having a deep understanding of the opportunities available and inhibitors of ICT towards improving learning and teaching, will be of great importance in improving the integration and utilization of ICT in the educational system in Tanzania. This review will be useful for educators, ICT policymakers and other decision makers who are directly involved in introducing ICT into education in Tanzania. In addition, the review also provides the directions for future research studies in addressing the gap between ICT and education in Tanzania.Item Mobile phone based payment authentication system: an intervention for customers’ bank account fraud in Tanzania(International Journal of Information and Communication Technology Research, 2014) Kitindi, Edvin J.; Alex, Alcardo; Sanga, Camilius; Shabani, Ayubu; Kibirige, George; Phillip, Joseph; Oketchi, JuliusThrough the rapid development of ICTs in Tanzania, banking industry has experienced rapid change in the ways of service delivery to their customers. The society has experienced a rapid development in communication sector particularly on the use of mobile phones for banking. The commercial banks in Tanzania have also revolved their ways of operating and serving their customers. The central bank of Tanzania (BoT) is responsible in defining all the payment systems in Tanzania and control all the transaction being done by the commercial banks operating in the land of Tanzania. Currently, Tanzania has many payment instruments as defined by the BoT which divided into two main group Cash and Non-Cash payments instruments. The latter includes: payment orders, bills of exchange, promissory notes, cheques and the electronic payment systems. In this paper, the security threats of these payment instruments have been discussed in detail. Some reported cases where organizations have been fleeced of their financial resources through dubious activities in Tanzania have been reviewed to verify the existing of the problem in discussion. In this paper, a Mobile phone based payment authentication system model to reduce the threats associated with non-cash payment implemented in Tanzania is proposed. Using this model, account holders are required to provide a final authentication of transaction through their registered mobile phone. This method if adopted will take care for any non-cash payment instruments. Also, some of the threats being discussed in this paper can be addressed by the proposed model.Item A survey on naming, name resolution and data routing in Information Centric Networking (ICN)(International Journal of Advanced Research in Computer and Communication Engineering, 2014-10) Barakabitze, Alcardo Alex; Xiaoheng, Tan; Tan, GuoInformation-Centric Networking (ICN) is set to replace the current internet architecture which is based on end-to-end communication between hosts. The ICN approach to the network of the future has recently been and is being explored by a number of research projects from Asia, Europe and America. This paper provides a review on three Information Centric Networking (ICN) architectures based on objects/contents naming, name resolution and data routing. The review highlights and briefly describes the naming structures, operation of name resolution and data routing processes of DONA, NetInf and PURSUIT. A summary in tabular form and a comparative study of these three architectures is also given in the paper.Item Caching and data routing in Information Centric Networking (ICN): the future internet perspective(International Journal of Advanced Research in Computer Science and Software Engineering, 2014-11-11) Barakabitze, Alcardo Alex; Xiaoheng, TanInformation Centric Networking (ICN) is becoming an important direction of the future internet architecture research. Different ICN architectures like PSIRP, NetInf, PURSUIT, CCN, DONA, and NDN have been proposed with the aim of moving from the current host-to-host communication model to a content-centric communication model. Caching and data routing are among the most significant properties of ICN features which improves network efficiency and content distribution performance by satisfying user requests with cached content. New characteristics of ICN caching include the Internet to be transparent to applications, ubiquitous in-network caching (caching contents in routers in a granularity based-level different from the current Internet architecture which cache contents in file-level. This paper describes in-depth, the concepts of caching and data routing in ICN by providing a comprehensive survey of a number of cache decision and data routing policies in ICN. The paper provides also the caching and data routing mechanisms in the Named Data Networking (NDN) which is the promising ICN design for the future Internet architecture. In general, by modelling the in-network caching and data routing which will be based on more efficient cache decision and routing schemes, it will have more practical significance in ICN designs for the future Internet architecture.Item Mobile-based system for cost-effective e-learning contents delivery in resource and bandwidth constrained learning environments(Knowledge Management & E-Learning an International Journal, 2014-12) Mahenge, Michael P. J.; Mwangoka, Joseph W.The advancement in Information and Communication Technologies (ICTs) has brought opportunities for the development of Smart Cities. The Smart City uses ICT to enhance performance and wellbeing, to reduce costs and resource consumption, and to engage more effectively and actively with its citizens. In particular, the education sector is adopting new ways of learning in Higher Education Institutions (HEIs) through e-learning systems. While these opportunities exist, e-learning content delivery and accessibility in third world countries like Tanzania is still a challenge due to resource and network constrained environments. The challenges include: high cost of bandwidth connection and usage; high dependency on the Internet; limited mobility and portability features; inaccessibility during the offline period and shortage of ICT facilities. In this paper, we investigate the use of mobile technology to sustainably support education and skills development particularly in developing countries. Specifically, we propose a Cost-effective Mobile Based Learning Content Delivery system for resource and network constrained environments. This system can be applied to cost-effectively broaden and support education in many cities around the world, which are approaching the 'Smart City' concept in their own way, even with less available technology infrastructure. Therefore, the proposed solution has the potential to reduce the cost of the bandwidth usage, and cut down the server workload and the Internet usage overhead by synchronizing learning contents from some remote server to a local database in the user’s device for offline use. It will also improve the quality of experience and participation of learners as well as facilitate mobility and portability in learning activities, which also supports the all-compassing learning experience in a Smart City.Item Using soft systems methodology and activity theory to exploit security of web applications against heartbleed vulnerability(International Journal of Computing and ICT Research,, 2015) Mshangi, Maduhu; Nfuka, Edephonce Ngemera; Sanga, CamiliusThe number of security incidents exploiting security holes in the web applications is increasing. One of the recently identified vulnerability in the web applications is the Heartbleed bug. The Heartbleed bug is a weakness found in OpenSSL, open source cryptographic software. In this study, both quantitative and qualitative research methodologies were employed. Case study and content/documentary analysis research methods were used to collect data for probing the web applications which are vulnerable to the bug. Due to the complexity of the problem, Soft Systems Methodology was adopted for the management of the analysis of data. The evaluation of security of web applications involved 64 selected websites of higher education institutions in Africa. SSM was supported by a theory called Activity Theory. The collected data was analysed using “R statistical computing package”. The study found that 89% of the universities web applications in Africa were vulnerable to the Heartbleed attack; and 11% of the universities web applications in Africa were not vulnerable to Heartbleed on the public announcement of the bug. But about two months later after the public announcement of the bug, 16% of the most universities web applications which were vulnerable were patched for the Heartbleed bug. The study seeks to contribute in application of Soft Systems Methodology and Activity Theory in the body of knowledge of information systems security (ISS).Item Forest and forest change mapping with C- and L-Band Sar in Liwale, Tanzania(The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences,, 2015) Haarpaintner, J.; Davids, C.; Hindberg, H.; Zahabu, E.; Malimbwi, R. E.As part of a Tanzanian-Norwegian cooperation project on Monitoring Reporting and Verification (MRV) for REDD+, 2007-2011 Cand L-band synthetic aperture radar (SAR) backscatter data from Envisat ASAR and ALOS Palsar, respectively, have been processed, analysed and used for forest and forest change mapping over a study side in Liwale District in Lindi Region, Tanzania. Land cover observations from forest inventory plots of the National Forestry Resources Monitoring and Assessment (NAFORMA) project have been used for training Gaussian Mixture Models and k-means classifier that have been combined in order to map the study region into forest, woodland and non-forest areas. Maximum forest and woodland extension masks have been extracted by classifying maximum backscatter mosaics in HH and HV polarizations from the 2007-2011 ALOS Palsar coverage and could be used to map efficiently inter-annual forest change by filtering out changes in non-forest areas. Envisat ASAR APS (alternate polarization mode) have also been analysed with the aim to improve the forest/woodland/non-forest classification based on ALOS Palsar. Clearly, the combination of C-band SAR and L-band SAR provides useful information in order to smooth the classification and especially increase the woodland class, but an overall improvement for the wall-to-wall land type classification has yet to be confirmed. The quality assessment and validation of the results is done with very high resolution optical data from WorldView, Ikonos and RapidEye, and NAFORMA field observations.Item New technologies for disseminating and communicating agriculture knowledge and information:challenges for agricultural research institutes in Tanzania(2015) Barakabitze, A. A.; Kitindi, E. J.; Ssnga, C.; Shabani, A.; Kibirige, G; Sanga, C.; Philipo, J.; Kibirige, C.This paper explores how a wide range of Information and Communication Technologies (ICTs) available in Agricultural Research Institutes (ARIs) if used effectively by agriculture researchers can improve agriculture productivity in Tanzania. A structured questionnaire and telephonic interviews were used to collect data from a randomly selected sample of 64 respondents made up of agricultural researchers, agriculture managers and other agricultural stakeholders in the selected institutes. Data were analyzed using statistical tools. The results indicate that ICTs tools are available in ARIs for the day to day research activities. However, utilization of agriculture journals is very limited due to unreliability and poor connectivity of the Internet and frequent power cuts. Results also show that the uses of specialized ICT devices have not taken a great recognition in agriculture activities which is attributed by low investment of ICTs that can be used for teaching and learning modern agriculture productivity techniques in institutes under this study. Among the challenges hindering the use of ICTs in ARIs includes: inadequate computers and the supporting technological infrastructure, lack of electricity needed to operate computers, unreliable Internet connectivity and lack of systematic ICTs investment; low coordination of agriculture stakeholders due to institutional diversity and department fragmentation. This study recommends that the Government of Tanzania (GoT) should formulate and implement ICT for Agriculture (ICT4A) projects based on a researched conceptual framework related to ICT4A use and Information and Communication Management (ICM) in ARIs in Tanzania.