School of Computing and Informatics Technology (CIT) Collection: Recent submissions
Now showing items 21-40 of 516
-
Spatial-Temporal Model for Emerging Disease Surveillance: Case Study of Nodding Syndrome
(Makerere University, 2022-10-10)Nodding syndrome is an illness that has eluded surveillance models in Africa for over six decades, since its identification in the 1960s in South Sudan, Southern Tanzania and later Uganda. The purpose of the study was to ... -
A web-based system for reporting and creating awareness about social media threats and crime in Uganda
(Makerere University, 2023-01-06)ABSTRACT The Internet is increasingly becoming a significant tool for social, economic, and human rights development in Uganda and Africa at large. Average citizens, human rights activists, civil society organizations, ... -
A Decision Support Framework for monitoring drought in Uganda
(Makerere University, 2021-05-19)Drought is one of the most dangerous natural hazards that has affected most of the world’s regions and large populations. In this study, both quantitative and qualitative approaches for monitoring drought based on ... -
Guidelines for web server overload management for e-learning systems. Case of higher institution of learning in Uganda
(Makerere University, 2023-01-12)Globally, e-learning has been adopted as an alternative learning method due to the outbreak of the COVID-19 pandemic in a bid to curb the spread of the virus. In Uganda, the Ministry of Education and Sports (MoES) together ... -
Topic classification for radio monitoring using deep neural networks
(Makerere University, 2023)In rural communities in Uganda, radio is the main medium of public communication and information exchange. Radio is characterised by talk shows and phone-ins in which people at the grassroots level voice their opinions. ... -
A framework to integrate GIS in human resource management for organizational efficiency: A case study of Mildmay Uganda
(Makerere university, 2023-01-06)Parallel to the understanding that human resources are vital for an organization, human resource management function is also going up in organizational hierarchy (Aoin, 2017). Human resource management aims to ensure that ... -
A blockchain-based ecosystem framework for data sharing in the Airport Operations Domain
(Makerere University, 2022-12)Modern organisations use software systems to automate their business processes. However, these organisations co-exist with others in their respective business ecosys- tem which may exist in a particular domain. In a business ... -
A Link Fabrication Attack Mitigation Approach (LiFAMA) for Software Defined Networks
(Makerere University, 2022-11)In software defined networks (SDN), the controller is a critical resource yet it is a potential target for attacks once compromised. The conventional Open Flow Discovery Protocol (OFPD) used in building the topology view ... -
Cooperative relay for preemptive transmission in underlay cognitive radio networks
(Makerere University, 2018)Transmission in underlay cognitive radio networks under the interference power constraint to primary receiver nodes have previously been analyzed under non preemptive cooperation, with SUs having non preemptive cooperation ... -
A model for quality assessment of e-services in resource constrained environments
(Makerere University, 2022-08)Uganda continues to experience high failure rates of e-services especially in the sectors of health, education and agriculture. The failures have been attributed to poor quality of currently available e-services. Increasing ... -
Ethernet loop avoidance protocol with Multi-Path and Traffic Engineering
(Makerere University, 2022-11-24)Multiple protocols have been developed to prevent Ethernet loops. These include; Spanning Tree Protocol, Media Redundancy Protocol, Parallel Redundancy Protocol, Transparent Interconnection of Lots of Links and Shortest ... -
Developing a low interaction honeypot detection system in a networked environment using live environment and network analysis.
(Makerere University, 2018-12-07)As the technological change leads to the use of information systems to store and process data, the need to protect the systems becomes very important as it can cause to data leakage, disruption in processing among other ... -
A deep learning approach for breast cancer diagnosis in ultrasound images
(Makerere University, 2022-09-20)Breast cancer is a leading cause of morbidity and mortality among women in Sub-Saharan Africa. However, the most popular breast lesion screening modality, ultrasound, yields noisy images prone to subjective radiological ... -
Scope complexity management when planning public sector software projects: adaptive framework with deep neural network science
(2022-07-28)“Scope Complexity Management in Planning Public Sector Software Projects: Adaptive Framework with Deep Neural_Network Science” Planning for public software projects is a daunting task, and various challenges come along ... -
Reliability of predictions using hybrid Algorithms and its application to dimensionality reduction
(2022-07-25)The reliability of predictions emanating from independent data mining techniques is a complex problem. This could be attributed to cross-cutting weaknesses of individual techniques such as collinearity due to high ... -
An integrated water resource management information and communication model: a case of Lake Victoria Basin
(Makerere University, 2022-08-08)The study addressed the challenges of poor water resource management in LVB which arose as a result of inadequate stakeholders' participation, inadequate accountability, poor financial and budgetary management and lack of ... -
A framework for implementing IT governance for Uganda's higher institutions of learning
(Makerere University, 2022-06)Several public sector organizations rely on Information Technology (IT) for their daily operations to improve effectiveness and efficiency in public service delivery. Although IT is crucial in the public sector organizations, ... -
A detection model for user-to-root attacks using the AdaBoost classifier
(Makerere University, 2021-10-06)Intrusion detection in enterprise networks is a key area of interest in computer security today because of its importance and vast application, such as detection of attacks by legal users. Current attack ... -
Form-based data security in mobile health data collection systems in low-resource settings
(Makerere University, 2021-12)Mobile Health Data Collection Systems (MHDCS) enable extension of health services to the community through use of mobile devices. Health data is collected using electronic forms in lieu of paper forms by community health ... -
Modeling differentiated pricing schemes for heterogeneous cloud computing environments
(Makerere University, 2021)Background and Objective: Pricing in cloud computing environments assumes the same type of users and this constrains the performance and utilization of computing systems since requests are processed upon arrival even if ...