Browsing School of Computing and Informatics Technology (CIT) Collection by Type
Now showing items 1-20 of 69
-
Adoption of e-tax services in Uganda : the perspective of the technology acceptance model
(2012)The diverse benefits of e-government services are linked to its adoption and usage. E-government adoption rates in economically transiting countries remain low and so its benefits are not fully realized. This is partly ... -
Analysis of free haven anonymous storage and publication system
(Fountain publishers, Kampala, 2007)In this paper we evaluate the design of a distributed anonymous storage and publication system that is meant to resist even attacks of most powerful adversaries like the government. We present a discussion of whether the ... -
Assessing appropriate ICT with ARIS case in Mozambique
(Fountain Publishers, Kampala, 2009)ICT projects in developing countries need to integrate requirements of the local context in order to be successful. Appropriate Technology (AT) has been applied in many domains to deliver technological solutions that are ... -
Assessing implementation of blended learning in constrained low bandwidth environment
(Fountain Publishers, Kampala, 2008)In order to meet the exponentially growing demand of higher education, implementation of e-learning is an ideal choice for the universities. And the introduction of the concept of blended learning model is a natural start ... -
Bootstrapping Machine Translation for the Language Pair English – Kiswahili
(Fountain Publishers Kampala, 2008)In recent years, research in Machine Translation has greatly benefited from the increasing availability of parallel corpora. Processing the same text in two different languages yields useful information on how words and ... -
Collaborative Filtering: A Comparison of Graph-Based Semi-Supervised Learning Methods and Memory-Based Methods
(Fountain Publishers Kampala, 2008)Collaborative filtering is a method of making predictions about the interests of a user based on interest similarity to other users and consequently recommending the predicted items. There is a widespread use of collaborative ... -
A Comparison of Service Oriented Architecture with other advances in Software Architectures
(Fountain Publishers Kampala, 2007)Service Oriented Architecture (SOA) allows software systems to possess desirable architecture attributes such as loose coupling, platform independence, inter-operability, reusability, agility and so on. Despite its wide ... -
Computational analysis of Kinyarwanda morphology : the morphological alternations.
(Fountain Publishers kampala, 2007)For more than 30 years, there have been renewed interests in computational morphology resulting in numerous morphological tools. However the interest has always been on the politically and economically interesting languages ... -
Computational Identification of Transposable Elements in the Mouse Genome
(Fountain Publisher Kampala, 2007)Repeat sequences cover about 39 percent of the mouse genome and completion of sequencing of the mouse genome [1] has enabled extensive research on the role of repeat sequences in mammalian genomics. This research covers ... -
Computational resource optimization in Ugandan tertiary institutions
(Fountain Publishers Kampala, 2007)Insufficient computational power, caused by limited budgets is a big challenge to high quality research and education in developing countries. Some institutions suffer severe shortages while others enjoy comparatively ... -
Conceptual ICT tool for Sustainable development :The Community development Index (CDI)
(Fountain Publishers Kampala, 2007)As part of the shift from society to the community as the object of rule, disembodiment of expertise knowledge especially into ICT tools is crucial in empowering people to manage their lives. It also enables people to adopt ... -
Data security lapses in developed societies: public and private sector cases
(Fountain Publishers Kampala, 2008)The loss of twenty five million (25) child-benefit records was disclosed on 20th November 2007 to the House of Commons. The scale of the security lapse at the Treasury’s tax agency, affected almost half the British population. ... -
Decision support in the operating theatre – usability aspects
(Fountain Publishers Kampala, 2009)Anesthesiology deals with such a complex social system that it can spawn over an infinite number of states. Diagnesia, a prototype built to offer decision support to anesthetists continuously estimates the likelihood and ... -
Decision support systems
(Fountain Publishers Kampala, 2007)Commercial-Off-The-Shelf (COTS)-Based Software Development (CBSD) has the potential to reduce time and resources required to develop software. However, In order to realize the benefits, which COTS bring to software ... -
Delay-optimized path in peer-to-peer networks
(Fountain Publishers kampala, 2008)Peer-to-Peer (P2P) networks are popular in sharing multimedia resources such as video, audio and images. Its popularity has attracted very many users thus increasing data streaming along a congested path. The increased ... -
The Deployment of an e-commerce platform and related rrojects in a rural area in South Africa
(Fountain Publishers Kampala, 2007)In our paper we describe the development and deployment of an eCommerce platform in Dwesa, a rural area in the former homeland of Transkei in South Africa. The system is designed to promote tourism and advertise local ... -
Design space exploration of network on chip:a system level approach
(Fountain Publishers Kampala, 2007)In this paper, we have proposed a model for design space exploration of a mesh based Network on Chip architecture at system level. The main aim of the paper is, to find the topological mapping of intellectual properties ... -
Developing a set of requirements for algorithm animation systems
(Fountain Publishers Kampala, 2009)The learning and analysis of algorithms and algorithm concepts are challenging to students due to the abstract and conceptual nature of algorithms. Research conducted at the Nelson Mandela Metropolitan University in Port ... -
The diminishing private network security perimeter defense
(Fountain publishers kampala, 2007)It is difficult to believe that just a few years ago, no one would worry about the security of a computer or a computer network for that matter. Computer security literally meant protecting your computer from thieves. Then ... -
Dynamic Resource Allocation: A Comparison of First Price Sealed Bid and Vickrey Auctions
(Fountain Publishers Kampala, 2008)Resource allocation involves assigning the resources to the resource users. Where the resources and the resource users do not change with time, the resource allocation problem can be solved as a scheduling problem. Where ...