Search
Now showing items 81-90 of 121
Towards a persuasive technology for electricity theft reduction in Uganda
(Springer LNICST 250, 2017)
Technology for changing attitude and behaviour, known as persuasive
technology, has been applied to solve many challenges, ranging from
personal health and finance, to environmental sustainability. In this paper, ...
Integrating of traceability of quality attributes into an automated software architecture design
(Makerere University, 2018-06-30)
This research looked at reducing the traceability problem by developing and testing a model for, and a plugin named QA-Tracer. The QA-Tracer automates the traceability of quality attributes during the Architecture design ...
Enhancing subject access to local publications in selected university libraries in East Africa
(Makerere University, 2015-09)
Access to information is a fundamental right that all humans should enjoy and a core function for libraries. In this study, the thesis was access to research is greatly hampered by the subject terms that librarians assign ...
Users’ awareness, perceptions and usage of Makerere library services in the main and selected branch libraries
(ISAST, 2014)
Academic libraries have a mandate of enhancing teaching and research missions of their parent institutions through provision of library services. This paper shares findings of a study which investigated users‟ awareness, ...
A sensitivity test for network Intrusion detection based on Bayesian Network using a wrapper approach
(Makerere University, 2019-11)
Anomalous traffic detection on internet is a major issue of security as per the growth of smart devices and this technology. Several attacks are affecting the systems and deteriorate its computing performance. Intrusion ...
Tree farming expert system: a case of eucalyptus & pine species
(Makerere University, 2019-11-18)
There is an increasing investment in tree farming business in Uganda by both Ugandan nationals and foreign investors, commonly grown tree species among others include; Prunus Africana , Eucalyptus, Tick Tree, however, due ...
Enhancing the DCFM node isolation attack mechanism for OLSR protocol in Android MANETs
(Makerere University, 2017-11-23)
Mobile Ad hoc Networks (MANETs) have recently gained wide adoption by their ability for
communication amongst users without infrastructure for instance Wireless Mesh Community
Networks that are setup not to rely on ...
Cooperative relay for preemptive transmission in underlay cognitive radio networks
(Makerere University, 2018)
Transmission in underlay cognitive radio networks under the interference power constraint to primary receiver nodes have previously been analyzed under non preemptive cooperation, with SUs having non preemptive cooperation ...
Developing a low interaction honeypot detection system in a networked environment using live environment and network analysis.
(Makerere University, 2018-12-07)
As the technological change leads to the use of information systems to store and process data, the need to protect the systems becomes very important as it can cause to data leakage, disruption in processing among other ...
The development of a power switching mechanism over the internet infrastructure
(Makerere University, 2014-07)
The advancement of technology has lead to an escalating demand and reliance. This has inevitably lead to an alarming rate of depletion of the natural resources utilized to fuel the technology. Electrical energy is one of ...