School of Computing and Informatics Technology (CIT) Collection
Permanent URI for this collection
Browse
Browsing School of Computing and Informatics Technology (CIT) Collection by Title
Results Per Page
Sort Options
-
ItemAddressing the challenges of the information and knowledge societies : the case for optimum curriculum in the SCECSAL Region(SCECSAL, 2004) Kigongo-Bukenya, I. M. N.The paper rotates on the question whether Information Management (IM) curriculum is equally appropriate for Knowledge Management (KM). Using the Conceptual Framework of Knowledge Management Processes (CFKMP), the concepts "Information Management" and "Knowledge Management" are explained and related in the context of optimum curriculum. The processes/activities of information management and knowledge management are examined to identify similarities or differences and to establish the base of knowledge and competencies/skills required. Based on Coral (2005) and comparative analysis of other literature, it is estimated that both IM and KM professionals require similar knowledge and skills competencies. It is deduced therefore that the same curricula would be appropriate for both. The paper further suggests that two strategies could be adapted in teaching of such curricula. The first would be the core-elective approach, whereby IM and KM are taught as electives along the core required by the information profession. The second would be the specialization strategy approach by which IM and KM are taught as different programmes.
-
ItemAn adherence monitoring system in antiretroviral therapy( 2007-05) Otine, Charles DanielThis study investigated the use of a Multi-dimensional system to improve adherence monitoring in antiretroviral therapy (ART). The high adherence levels required during patient therapy and the consequences of adherence failures (virus mutation to drug resistant strains, treatment failure, fatality) necessitated this study, with the hope that the development of a system would provide a basis for deployment of similar systems in other ART providing centers. An ART providing health centre (Mbuya reach out) was selected as a case study, with data collected from the centre used as a basis for the system design, development, testing and validation. Data was gathered through interviews, content analysis and direct observation; the rational unified process (RUP) of system development was then used to develop the system. Unified modeling Language (UML) was used to document the system development process, producing artifacts such as use case models, domain models, collaboration diagrams and System sequence diagrams. The final system was entirely implemented in open source (MySQL and PHP) and hosted to an online web server with the findings revealing that adherence monitoring can indeed be improved by using the system, but there is still need for further research in protecting the data and the tweaking of the system to enable monitoring not only for adults but for children as well. It is recommended that leading ART providing centers in conjunction with Ministry of health champion the use of the system by training users to exploit the functionality of the system, and encourage use of the system with a goal of developing a comprehensive information base for future studies on adherence.
-
ItemAn adjustable usable security approach for a continuous user authentication scheme(Makerere University, 2019-11) Kaburu, DennisThe advent of the internet and associated technologies have revolutionized the way we live and work. Today, organizations both public and private rely heavily on computer-human interaction systems to deliver services. The quality and reliability of services delivered by these systems depends on controlled access to these systems. Within this realm, security issues of interactive systems are gaining more than ever the attention not only from a technical and security perspective but also from the user's point of view. The security community has come to understand the critical importance of usable security, which is primarily focused on designing secure systems that people can use. In mission, critical systems like online examination and military intelligence, there is need to verify constantly the identity of the user throughout the session of interaction (referred to as “continuous user authentication”). Design and development of continuous user authentication schemes represents a cross-roads priority problem, between security and usability, which emerge from contradictory requirements posed by different stakeholders, inherent to the function and purpose of each security mechanism. Information security experts and information security researchers’ goal is to ensure a high security continuous user authentication scheme while at the same time user experience design experts and researchers (UX) envisage an adaptable, user-friendly solution. This makes the service providers of continuous authentication schemes find a viable balance among security and usability attributes. Accordingly, researchers have proposed a number of approaches to address the issues of continuous user authentication. However, these approaches require user collaboration, which affects user performance on the core tasks in the business processes because of user task interruptions. Thus, the approaches have usability challenges. Henceforth, this work attempts to revisit the definition of usable security by advocating for an alternative approach that enhances the alignment of security and usability attributes to achieve a better synergetic relationship in continuous user authentication schemes. The main focus is to improve usability of user interactions in continuous user authentication schemes according to a user perceived trust obtained from a user dynamic behavior and cognitive-centered technique that reduces disruption of a user during re-authentication. The high level objectives of this thesis are (i) to develop an adjustable threshold approach for a continuous user authentication scheme that enhances synergetic relationship between usability and security attributes; (ii) to develop a low disruptive re-authentication technique that applies when the trustworthiness of a user is below the adjustable threshold; (iii) to validate the re-authentication technique.
-
ItemAn adoption model to support citizens' participation in eGovernance(Makerere University, 2020-12) Nakawuka, JosephineAs a solution to the low citizen engagement, it is important to increase the number of citizens who participate in policy-making and governance. To fully enjoy the benefits of eGovernance, the citizens should be able to participate in it fully through offering their views, contributions, and ideas in order to build general development of their societies and country at large. Despite the countless benefits of citizen participation in eGovernance, it is still low in the governance space. The aim of this study was to identify the factors affecting citizen participation, design a model to support citizen participation in eGovernance, and also evaluate this model to understand its contribution to eGovernance. The study employed the Participatory Action Research methodology because it clearly mapped out our objectives and its cycle was the most relevant for our results achievement. With the use of purposive sampling, convenience sampling, snowball sampling, and data analysis software, relevant data for the research was collected, analyzed, and used to fulfill the objectives of this study. This research provided a solution to the ailing number of citizens participating in eGovernance in the country through the development of an eGovernance adoption model for citizens to support their participation in eGovernance. The study entailed the detailed description of eGovernance in society, citizen participation in eGovernance, the role of Web 2.0 technologies in eGovernance citizen participation, and their contribution to the fulfillment of the study objectives. This study also suggested areas of future research to strengthen eGovernance as a whole and also the overall participation of citizens in eGovernance.
-
ItemAdoption of e-tax services in Uganda : the perspective of the technology acceptance model( 2012) Maiga, Gilbert ; Asianzu, ElizabethThe diverse benefits of e-government services are linked to its adoption and usage. E-government adoption rates in economically transiting countries remain low and so its benefits are not fully realized. This is partly because-governments have focused largely on the technical supply-side factors with little emphasis on the demand or consumers’ perspective of e-government adoption. The result has been a gap between what is offered and what is consumed. This paper presents the results of a study that develops a model for e-tax service adoption as an attempt to bridge the gap for this segment of e-government. Requirements for the model elicited in a field study are used to extend the Technology Acceptance Model which emphasizes consumer-based factors for e-tax adoption. The extended model has dimensions of adoption benefits, trust, attitudes, education, compatibility, awareness, accessibility, training, user support and local language use. It is generic and reusable for other countries in similar context.
-
ItemAgricultural information system development for land use planning( 2007-12) Batte, RichardAgriculture and land use planning problems are multifaceted in nature and require information and data incorporation from different sources and disciplines. This dissertation gives an account for the development and implementation of an Agricultural Information System for Land use Planning in Kumi district of eastern Uganda. Stakeholder Analysis (SA) as an approach to gaining understanding of a system by means of identifying key stakeholders and assessing their respective interests has been explored. Structured System Development Methodology (SSDM) was used to elicit the data requirements, data availability, integration and model information processes and data for land use and resource planning. A prototype information system for land use planning and a relational database were designed towards the provision of land use and resource data required for land use and resource planning in Kumi. A user interface was designed for stakeholders to access and update the database. Hyper text Preprocessor (PHP) was used to design the front end of the system with MySQL at the back end. Three perception based variables (perceived ease of use, perceived usefulness and intension to use) were subjected for measurement and the experimental results of one t-test on the value of each construct found the values of all dependent variables significantly positive. This suggested that the system has a high likelihood of adoption in practice. Internet Explorer 4/7 can be used to browse the information. Users have rights to update the database information but the Database Administrator has rights to modify the database by adding or removing users.
-
ItemAgro-meteorological knowledge management system for small scale farmers(Fountain Publishers, Kampala, 2008) Lwande, Omondi ; Lawrence, MuchemiA lot has been done in the use of Information and Communication Technology (ICT) in business yet very little in solving agricultural problems in developing countries. The problem addressed in this paper is the integration of widely available knowledge, processing and providing effective delivery for countries with low ICT infrastructure. Data was collected from small-scale farmers, meteorologists, agricultural extension officers and a research station and analyzed. From this, a suitable knowledge based model was developed. In order to evaluate the model, a prototype was developed and used in tests with sample data. The results reveal that the best way of disseminating agro-meteorological information to small scale farmers is using an integrated knowledge management system and mobile phone technology.
-
ItemAirtime to cash : unlocking the potential of Africa's mobile phones for banking the unbanked(International Information Management Corporation, 2009) Comninos, Alex ; Esselaar, Steve ; Ndiwalana, Ali ; Stork, ChristophThis paper discusses how mobile phones may be used to extend banking services to the ‘unbanked’. Generally, many more people possess mobile phones than bank accounts across Africa. Mobile banking services are already offered as an addition to existing bank accounts. Instead of adding a mobile phone as a complementary channel, why not add a bank account to an existing mobile phone number? This would narrow the access gap considerably, allowing mobile phones to be used to provide financial services to those without bank accounts. Two models are discussed that may help narrow the access gap: first—airtime cash convertibility, already a defacto practice in many parts of Africa, and second—the mobile wallet, which would allow full banking services to be performed on the basis of a virtual wallet linked to a SIM card. Results from Research ICT Africa’s 2007/8 e-Access & Usage household Survey are used to investigate the current usage of airtime as a means of payment as well as the potential demand for m- banking. Regulatory challenges to the adoption of m-banking as well as potential business models and possible models of cooperation between banks and mobile operators are also explored.
-
ItemAnalysis of free haven anonymous storage and publication system(Fountain publishers, Kampala, 2007) Mirembe, Drake Patrick ; Otto, FrancisIn this paper we evaluate the design of a distributed anonymous storage and publication system that is meant to resist even attacks of most powerful adversaries like the government. We present a discussion of whether the assumptions held in the design of Free Haven System (FHS) are achievable in the real world and the potential implementation handles. We point out the different possible attacks and voice our opinions on the suggested solutions. We end with recommendations on how to improve the FHS design and offer direction for future research efforts in distributed anonymous storage services.
-
ItemAnalysis of spectrum sensing in cognitive Internet-of-Vehicles with Mobile PUs and Mobile SUs(Makerere University, 2022-04) Muwumuza, JustusExisting spectrum sensing algorithms in cognitive radio enabled Internet of Vehicles (IoV) consider primary and/or secondary vehicular user to be stationary. This assumption is unrealistic given that in many situations vehicular users are not stationary. This study developed an analytical model that incorporates the joint effect of the mobility of both Secondary User (SU) and Primary User (PU) where each vehicle is assumed to be mobile and equipped with a wireless device capable of communication and spectrum sensing. The study formally investigates the performance of the proposed approach for cognitive IoV using mathematical analysis. The effect of the SU sensing range, the relative velocity of the mobile SU and PU, the initial separation of the SU and PU on the probability of successfully sensing the PU and on the expected overlap time are investigated. The numerical results obtained from the derived models show that the probability of successfully sensing the PU increases with increase in the SU sensing range. It is further observed that the probability that the SU successfully senses the PU is lower when both SU and PU are mobile compared to the cases where the PU is fixed and the SU is mobile, and where both SU and PU are fixed. It is also noted that the probability that the SU successfully senses the PU decreases with increase in the relative velocity of the mobile SU and PU. The expected overlap time is observed to be higher when both SU and PU are mobile. The expected overlap time is further observed to increase with increase in the relative velocity of considers both mobile SU and mobile PU, it is limited to a situation where there is only one PU and one SU.
-
ItemAn analysis of transactions in service-centric systems( 2010-12-13) Tuheirwe, DoreenTraditional transaction semantics (usually expressed in terms of ACID properties) and protocols (like two-phase commit) are inappropriate for most B2B (Business-to-Business) applications in SOAs (Service Oriented Architectures). This is because B2B applications may execute over long periods, involve loosely coupled partners, pose multiple points of failure and do not necessarily share business and technical characteristics. Also, B2B transactions span over different administrative domains (companies) with discrepancies in data definitions, service and transaction management. Such transactions require commitments and failure behavior to be "negotiated" rather than to rely on the traditional ACID properties. Since ACID properties cannot be achieved in B2B transactions in case of failures, compensating actions must be used to turn back the system to a state as close to (but not identical with) the initial state. This thesis categorizes the types of compensating actions for various application domains such as distributed production, distribution of goods, booking of services for a common purpose and web shops, to mention a few. To achieve this, use cases are developed for the application domains and from these use cases the typical failures points derived, leading to the detailing of the related compensating actions and then, finally, to the categorization. The same type of compensation may be applicable for, or extended to other different domains that have not been stated in this report. In addition, a demonstrator showing the different compensating actions (by showing transaction progress from the user point-of-view) for one scenario chosen from one application domain was built.
-
ItemAnomaly intrusion detection using deep learning(Makerere University, 2022-02) Nabukeera, LydiaAs computer networks grow due to massive usage, also network attackers are exploring sophisticated ways to exploit the networks hence causing huge damages and loses. Efforts to eradicate network intrusions are always in gear and lately deep learning methods have been used for intrusion detection. However, there still exists a challenge of inadequate real live network based datasets to train deep learning model as most existing datasets are snapshots of real live network environments and others are not publicly available due to privacy rights. Therefore, this study proposed an LSTM model trained and tested with the new dataset that has been developed on a real live network that contains both normal and attack traffic. The LSTM model achieved a training accuracy of 99.92% and a testing accuracy of 99.96%. The proposed model has been validated using Simple RNN model and the hybrid model where both of them performed well which is a clear indicator that deep learning is the ideal method for modelling an intrusion classification model. One existing real network-based dataset has been used for performance evaluation of the three deep learning-based models in this study. The study has two major contributions; A labelled network traffic dataset used for classification of network intrusion threat and hybrid deep learning model composed of LSTM and simple RNN for the classification of intrusion detection threats.
-
ItemAnti-denial of service algorithm for cognitive radio networks(Makerere University, 2019-10) Nabireeba, James FredrickIn the last 10 to 15 years, wireless technologies has gone through a number of developments resulting into many innovations. The developments in wireless technologies is largely driven by unique consumer service models of; anywhere, anytime and any platform. Accordingly, these innovations are increasing demand for fixed spectrum causing a big challenge of spectrum management. These challenges, raised the need to development of new models of spectrum management to improve the efficient utilization of the scarce spectrum resource. Accordingly, approaches such Dynamic Spectrum Allocation and Cognitive Radio Networks have been developed to address the spectrum sharing challenge. Accordingly this, project focus on detecting and preventing denial of services amidst cognitive radio network users. This has observed as a key challenge in the adoption of cognitive radio network. This was achieved through the development of Anti-denial of service algorithm using reputation management scheme. The results of our scheme evaluation indicate that the scheme can improve the detection of malicious user behavior and prevent such users to access the transmission channel. In conclusion our Anti-Denial of Service Algorithm (ADSA) screens out selfish CRN users and PUE attackers to enable resource fair accessibility of the channel by legitimate users.
-
ItemAnticipated user experience (Aux) framework for implementing electronic participation in a developing country context(Makerere University, 2018) Eilu, EmmanuelAlthough citizen participation in decision-making has emerged as one of the fundamental pillars of good governance, there is seemly a low level of citizen participation in the governance processes in many developing countries. Yet, it is difficult to envisage lasting solutions if the citizens directly affected do not take part in the decision process. Citizen participation is, therefore, a pressing requirement, enabling countries to determine for and by themselves ways to overcome their biggest challenges. In the quest for more effective and efficient government service delivery, a number of citizen participation mechanism have been fronted. The use of ICTs to engage government is one of the major approaches suggested, always referred to as Eparticipation. However, whereas E-participation would improve citizen participation, studies show that the major challenges of implementing E-participation in developing countries are the negative perceptions and responses towards E-participation, which is largely influenced by four major factors namely; Political, Social, Economic and Technological related challenges. Perceptions and responses towards the use of a computing product are referred to as User Experience (UX), a field in Human-Computer Interaction. ISO defines UX as the perceptions and responses that arise during the use of a product or service, or/and perceptions and responses that arise before a product or service is used (referred to as Anticipated UX or AUX). UX has been under extensive study over the last decade, generating a number of UX models and frameworks. Ideally, any UX model or framework could be used to influence positive perceptions and responses towards the use of mobile phones for voting. However, the existing UX models and frameworks provide very little on how experience before use (AUX) can be achieved. Many of the models and frameworks majorly focus on how user experience during use of a product or service can be achieved. There was a need to develop an Anticipated User Experience framework for influencing positive perceptions and responses towards Eparticipation in a developing country context We used literature review to establish requirements for influencing positive perceptions and responses towards E-participation in a developing country context. Using mobile phone voting as a case for E-participation, the requirements were validated using a survey study. The validation results from the survey study show that the requirements can influence positive perceptions and responses towards E-participation to a considerable extent. We used design science to extend Yogasara AUX framework. The new AUX framework contributes to theory in that the AUX gap in UX was identified and largely narrowed. The new AUX framework also demonstrates how an established Theory in Psychology like Cognitive Psychology Theory can be used to explain in practical terms- how AUX occurs, an approach that had not been used before. The AUX framework further contributes to practice by providing more practical guidance on how to achieve AUX at a product/service level.
-
ItemApplication of business process modeling to improve accountability in Local Governments( 2006-02) Kizito, GodfreyThe general objective of this study was to improve accountability in Local Governments using a Business Process Model that will simulate project funding, project expenditure, implementation, monitoring and auditing (all within the budget specifications). It further aimed at implementation of a Business Process Model for accountability of Local Government’s activities and decision. The rationale for this study mainly focused on the utilization of dynamic process-based tools specifically addressing Local Government projects. The Business Process Modeling tool for accountability of Projects that has been developed is based on the processes and variables in projects carried out in local governments. The processes include procurement, tendering, implementation, monitoring and evaluation. The variables include among others raw materials, machinery, deliverables, Labor, incomes, quality and quantity of outputs. The System Dynamic Modeling methodology was used to develop a Business Process simulation tool. Graphs and tables are used to tell the effect of various variables and processes in improving accountability in Local Governments. The resulting Business Process Model (BPM) tool, with necessary enhancements, is capable of producing reasonable results or outcomes in a project environment of organizations. The results or outcomes of this research model are; that Better accountability in local government can be achieved through improved tender evaluation, Budget quality, better monitoring, auditing and supervision which can lead to proper procurement measures and better service delivery to citizens in the decentralized system of governance.
-
ItemApplication of grid computing for on line learning resources(Fountain Publishers, Kampala, 2009) Shaikh, Sadeque ImamThere is a big difference in education sector between first world and developing world. This difference is based on digital learning resources and computing power. Unfortunately, all of these resources are geographically distributed all over the world. There is no doubt that ICT is playing a big role for introducing E-learning around the world. But if we really want to overcome these differences, we need a revolutionary approach that support mutual use of geographically distributed computing and learning resources as an aggregated environment that will create new ways of flexibility, interoperability and extensibility. According to IBM there are millions of distributed computers on the web and most of the computing powers of those PCs are under-utilized. Fortunately, Grid is the technologies that can integrate all of these resources of knowledge’s and produce super-computing power from those geographically distributed computers to access those knowledge’s without sacrificing local autonomy. In this paper we will describe the ICT infrastructure for on line collaborative learning and then we will design service-oriented Grid technology that will be able to support ICT infrastructure by generating supper computing power from distributed resources for sharing learning resources. We will also analyze the challenges related with technology, standard, security and performance of grid Technology for resource share and management based on literature review and cutting-edge technologies of available industry standard software and toolkits. Finally, we will propose recommendations for successful implementation of Grid technology with ICT for collaborative leaning revolution in the world. Methodology of this paper is based on study, analysis and literature review as well as empirical as we will do few experiments using grid tools to taste feasibility of this technology.
-
ItemApplication of information & communication technologies (ICTS) in knowledge management (KM) : case studies of the Center for Basic Research Library and the Privatisation Unit Library in Uganda(SCECSAL, 2004) Kaddu, SarahThe paper examines the concept "Knowledge Management (KM)". It examines how Information and Communication Technologies (ICTs) could be effectively applied in knowledge management. In this context, ICTs advantages and disadvantages are analyzed along with challenges and strategies towards effective ICT application in KM. Further, the paper is based on content analysis of numerous documents and electronic sources in KM. It was also based on a mini survey and follow up interview of the Centre for Busic Research (CBR) and Privatization Unit Libraries (PU) in view of establishing what the staff and users in these libraries understand by the term KM,process of KM and how ICT is applied in KM.
-
ItemApplication of information and communication technology (ICT) in health information access and dissemination in Uganda(Sage Publications, 2006) Omona, Walter ; Ikoja-Odongo, J. RobertThis paper reports on a study, which assessed the application of information and communication technologies (ICT) in health information access and dissemination in Uganda. The project focused not only on information obtainable through libraries for research, teaching, learning and practice, but also on ICT applications concerned with the administration and planning of health services in Uganda. A thematic analysis highlighted the current state of ICT applications, the extent of applications, the roles played and problems faced. The paper further explores areas where it is used most, cost of accessing information, user profile, ICT literacy, quality of services and telemedicine in the country. It concludes that a number challenges must be addressed if the full benefit of the use and application of ICT in health information access and dissemination is to be realized in Uganda, and draws the attention of all the stakeholders in the health sector to the need to support and promote ICT as the most effective tool for health information access and dissemination.
-
ItemAn application of system dynamics modeling to changes in construction projects( 2006-09) Mugeni, Bernard Balyejusa
-
ItemAn application of system dynamics modeling to immunisation policy analysis( 2008-10) Semwanga, Rwashana AgnesSimulation modeling is increasingly being used for strategy implementation, policy analysis and design in many application areas including health care management. Preventable childhood diseases and premature deaths still occur particularly in the developing countries due to low immunisation coverage. Although, various approaches have been applied to understand immunisation coverage problems, there are still acknowledged deficiencies in these approaches. While the immunisation system like other healthcare systems is very complex and difficult to manage, the System Dynamics modeling approach is applied to improve the understanding of acknowledged problems and to support improved decision making. To determine the full range of activities, inputs and challenges associated with immunisation coverage, field studies were carried out. Problems influencing immunisation coverage included inadequate provision of healthcare service, low levels of immunisation awareness, economic factors and poor vaccine management. The research presents the overall architecture of the immunisation system which constitutes agents, key processes, activities and information flow. Causal loop diagrams and a simulation model (stock and flow) were used to capture the complex and dynamic nature of the immunisation process while a case study on the Ugandan healthcare system was used to test its effectiveness. National immunisation service providers validated the model and rated it as a useful communication and decision making tool. The above provide a deeper understanding of the immunisation system thus facilitating the development of health information systems that are appropriate. Results of the study show that, the population, healthcare and vaccine management policies have overwhelming influence on immunisation coverage and form the foundations on which the success of immunisation policy is based. The study reaffirms the need to determine the current capacity of the health system and strengthen it to cater for the growing population. The designed application demonstrates the dynamics arising from complexity, delays and non‐linearity which characterise the immunisation system and tests different policies towards the improvement of immunisation coverage. Based on the results of simulation experiments, suggested intervention strategies that could provide substantial effect on immunisation coverage include: strengthening of the healthcare system, design of relevant health information systems, adoption of ICTs innovations to improve operational efficiency, improvement of the livelihood of the population and increasing literacy levels. The developed model and causal loop diagrams constitute significant knowledge in terms of structure and the understanding of immunisation coverage. The model captures requisite information requirements, key processes of the immunisation system which provide support for process improvement, operational management and training. The model provides tools that test different policies thus making it useful for strategic planning and policy debate.