Research Articles [CoCSE]: Recent submissions
Now showing items 361-380 of 385
-
Design of soft viterbi algorithm decoder enhanced with non-transmittable codewords for storage media
(International Journal of Computer Science, Engineering and Applications (IJCSEA), 2017-02)Viterbi Algorithm Decoder Enhanced with Non-transmittable Codewords is one of the best decoding algorithm which effectively improves forward error correction performance. HoweverViterbi decoder enhanced with NTCs is not ... -
A Matlab based Graphical User Interface for Computing Optimal Diet of People Living with HIV at Asyptomatic Stage
(International Journal of Computer Applications, 2015-07)Achieving basic nutritional recommendations for people liv-ing with HIV is important at all stages as the virus affects the immune system and renders an infected person to contract other infections easily. Poor nutrition ... -
Modeling Diet Decisions for People Living with HIV in Consideration of Age, Weight, Height, and Gender Constraints
(Scientific & Academic Publishing, 2015)People living with HIV as well as AIDS patients, who do not receive proper and timely medical treatment, are open targets for all kinds of other infections owing mainly to their relatively weak immune systems. We emphasizes ... -
Gain improvement of the Yagi-Uda Antenna Using Genetic Algorithm for Application in DVB-T2 Television Signal Reception in Tanzania
(Journal of Interdisciplinary Sciences, 2017-11-02)A Yagi-Uda Antenna, commonly known simply as a Yagi antenna or Yagi, is a directional antenna system consisting of an array of dipole and additional closely coupled parasitic elements (usually a reflector and one or more ... -
Performance analysis of carrier aggregation for various mobile network implementations scenario based on spectrum allocated
(International Journal of Wireless & Mobile Networks (IJWMN), 2017-10)Carrier Aggregation (CA) is one of the Long Term Evolution Advanced (LTE-A) features that allow mobile network operators (MNO) to combine multiple component carriers (CCs) across the available spectrum to create a wider ... -
Sensitivity analysis and numerical simulations for the mathematical model of rabies in human and animal within and around Addis ababa
(Asian Journal of Mathematics and Applications, 2015)Rabies is one of the neglected tropical diseases that has persisted for centuries in Ethiopia, and it is endemic within and around Addis Ababa. For the purpose of studying the dynamics of the disease we propose a ... -
Evaluation of Users’ Knowledge and Concerns of Biometric Passport Systems
(MDPI, 2019-04-29)The increase in terrorism and identity fraud has forced governments worldwide to make a combined e ort to enhance the security of national borders. Biometric passports are the emergent identity travel document deployed ... -
Assessment of vulnerabilities of the biometric template protection mechanism
(International Journal of Advanced Technology and Engineering Exploration, 2018)In the ever-changing world of global data transmission, the security of data and individual privacy are the growing fears in today’s human life worldwide. The major concerns are the protection of the biometric templates ... -
Application of Multiple Unsupervised Models to Validate Clusters Robustness in Characterizing Smallholder Dairy Farmers
(Hindawi The Scientific World Journal, 2019-01-02)The heterogeneity of smallholder dairy production systems complicates service provision, information sharing, and dissemination of new technologies, especially those needed to maximize productivity and profitability. In ... -
Performance Evaluation of Highly Admixed Tanzanian Smallholder Dairy Cattle Using SNP Derived Kinship Matrix
(Original Research, 2019-04-26)The main purpose of this study was to understand the type of dairy cattle that can be optimally used by smallholder farmers in various production environments such that they will maximize their yields without increasing ... -
On the Identification of Required Security Controls Suitable for Converged Web and Mobile Applications
(International Journal of Computing and Digital Systems, 2016-01-01)Contemporary development of information systems for service delivery is at the present a matter of bringing together use of web and mobile applications. However, this advancement in the field of computing is happening at ... -
An Approach for Systematically Analyzing and Specifying Security Requirements for the Converged Web-Mobile Applications
(Scientific Publishing Center, 2014-09-01)As the use of web and mobile applications is becoming pervasive for service delivery and user mobility support, enterprises are now increasingly fighting against a huge number of emerging security threats which interfere ... -
Review of Security Frameworks in the Converged Web and Mobile Applications
(International Journal of Computer and Information Technology, 2014-07)As the Internet access is becoming pervasive there is an increasing number of mobile applications users. Enterprises are now reaching a diversified number of customers through the use of Web and mobile applications. However, ... -
Electrical & Electronic Engineering | Research Article Performance Of Soft Viterbi Decoder Enhanced With Non-Transmittable Codewords For Storage Media
(Cogent Engineering, 2018-01-12)The introduction of Non-Transmittable Codewords (NTCs) into Viterbi Algorithm Decoder has emerged as one of the best ways of improving performance of the Viterbi Algorithm Decoder. However, the performance has been tested ... -
Multi-agent based IoT smart waste monitoring and collection architecture
(International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), 2017-10)Solid waste management is one of the existing challenges in urban areas and it is becoming a critical issue due to rapid increase in population. Appropriate solid waste management systems are important for ... -
Development of Discharge Letter Module onto a Hospital Information System
(Journal of Health Informatics in Developing Countries, 2017-12-20)Hospital Discharge Letter (DL) is an important means to communicate the information of the patient's hospital visit, treatments and care plans to the next caregiver and, possibly also, to the patient. Timely, precise and ... -
An intelligent real-time wireless sensor network tracking system for monitoring rhinos and elephants in Tanzania national parks: A review
(International Journal of Advanced Smart Sensor Network Systems, 2017-10-04)The advancement of wireless sensor networks yields a variety of wireless sensor network for wildlife tracking. One typical application for wireless sensor networks is in animal tracking and monitoring in wildlife ... -
An Integrated Cloud-Based Wireless Sensor Network for Monitoring Industrial Wastewater Discharged into Water Sources
(Scientific Research Publishing Inc, 2017-08-21)This paper presents a prototype of an Integrated Cloud-Based Wireless Sensor Network (WSN) developed to monitor pH, conductivity and dissolved oxygen parameters from wastewater discharged into water sources. To provide ... -
Implementation of a goal programming model for solid waste management: a case study of Dar es Salaam – Tanzania
(EDP Sciences, 2017)Abstract – In this research article, the multi-objective optimization model for solid waste management problem is solved by the goal programming method. The model has three objectives: total cost minimization, minimization ... -
Wildfire Monitoring and Detection System Using Wireless Sensor Network: A Case Study of Tanzania
(Scientific Research Publishing Inc, 2017-08-18)This paper proposes a wildfire monitoring and detection system based on wireless sensor network. This system detects fire by monitoring surrounding temperature, humidity and smoke. Once fire is detected, a warning message ...