Browsing by Author "Luhanga, Edith T."
Now showing 1 - 8 of 8
- Results Per Page
- Sort Options
Item Big Data Analytics Framework for Childhood Infectious Disease Surveillance and Response System using Modified MapReduce Algorithm(International Journal of Advanced Computer Science and Applications, 2021) Mwamnyange, Mdoe; Luhanga, Edith T.; Thodge, Sanket R.Tanzania, like most East African countries, faces a great burden from the spread of preventable infectious childhood diseases. Diarrhea, acute respiratory infections (ARI), pneumonia, malnutrition, hepatitis, and measles are responsible for the majority of deaths amongst children aged 0-5 years. Infectious disease surveillance and response is the foundation of public healthcare practices, and it is increasingly being undertaken using information technology. Tanzania however, due to challenges in information technology infrastructure and public health resources, still relies on paper-based disease surveillance. Thus, only traditional clinical patient data is used. Nontraditional and pre-diagnostic infectious disease report case data are excluded. In this paper, the development of the Big Data Analytics Framework for Childhood Infectious Disease Surveillance and Response System is presented. The framework was designed to guide healthcare professionals to track, monitor, and analyze infectious disease report cases from sources such as social media for prevention and control of infectious diseases affecting children. The proposed framework was validated through use-cases scenario and performance-based comparison.Item The Challenges of Adopting M-Learning Assistive Technologies for Visually Impaired Learners in Higher Learning Institution in Tanzania(International Journal of Emerging Technologies in Learning (iJET), 2020) Kamaghe, Juliana Samuel; Luhanga, Edith T.; Michael, KisangiriIn the past decades, the world has experienced major changes in the advancement of learning technologies which has enabled learners to engage in their learning activities anywhere. The penetration of mobile phone internet users in Tanzania has been increasing from 2 million in 2011 to 23mil in 2017 The adoption of mobile-based learning (M-learning) for students who are visually impaired in Tanzania has become a major bottleneck since most of the e-learning contents assume that learners have sight and thus include a lot of visualizations. This causes visually impaired students in higher learning Institutions (HLIs) to face challenges such as technical knowledge gaps. Lack of skills and inaccessibility of online contents, which then lead to drop out of the university. The aim of this study is to determine the awareness and usage levels of existing mobile assistive technologies for visual impairment, and the remaining challenges that visually impaired students face, when using such tools on smartphones to access m-learning content from HLIs. in Tanzania. The research was conducted an observational and contextual inquiry study at three major HLIs. We found that 67% of respondents did not have knowledge of m-learning assistive technologies, and their technology barriers for visually impaired students. Also, knowledge, accessibility of Assistive technology and affordability can hinder the adoption of m-learning in Higher Learning InstitutionsItem Characteristics of smallholder dairy farms by association rules mining based on apriori algorithm(International Journal of Society Systems Science (IJSSS), 2019-06-03) Nyambo, Devotha G.; Luhanga, Edith T.; Yonah, Zaipuna O.Characteristics of smallholder dairy farmers across regions are highly similar. However, introduction of improved farm management practices and extension support can be effective if specific constraints are identified for each farm typology. So far, approaches used to formulate farm types and characterise farming systems are not tailored to studying hidden patterns from farm datasets. Using the apriori association rules mining algorithm, characteristics of four smallholder dairy farm types are studied. Applying the power of the ArulesViz package, frequent items were visualised. These visuals which display some hidden attributes, solidified understanding on the key determinants for change in the studied farm types. The hidden smallholder farm characteristics were identified in addition to those given by cluster analysis in preliminary studies. Characterising smallholder farm data by using association rules mining is recommended in order to understand such systems in terms of what/how the majority practice rather than basing on cluster averages.Item Climatology-aware health management information system to enhance cholera epidemic analysis and prediction in Tanzania(International Journal of Advanced Technology and Engineering Exploration (IJATEE), 2019) Leo, Judith; Luhanga, Edith T.; Michael, KisangiriThe cholera epidemic remains a public health threat in many developing countries including Tanzania. It affects vulnerable populations living with an unreliable water supply and sub-standard sanitary conditions. Various studies have found that the occurrence of cholera has strong linkage with environmental factors such as climatology aspects and geographical location. In addition, climatology has been strongly linked to the creation of weather patterns that favor the transmission and growth of Vibrio cholerae, which causes the disease. There are several studies that have been conducted to integrate environmental factors into the existing health management information systems (HMISs) in order to enhance the analysis of cholera epidemics in Tanzania. This work explored how well climatology factors have been integrated into these existing HMISs and the potential of the systems in enhancing cholera epidemics analysis. We found that most of the existing HMISs have not explicitly integrated environmental and climatology features for effective analysis of diseases. We thus proposed the design and development of an effective Climatology-aware HMIS. Then, evaluate it with clinical and environmental data such as; geographical location, weather, conditions of the day, and date on set, of 22 medical students staying in the Mweka district in Tanzania. The results of system evaluation showed that 87% provided positive feedback on the capacity of the developed system, towards enhancing the cholera epidemic analysis and prediction linked with environmental factors particularly the climate change variables. The study recommends the review of systems and policies in the health sectors in order to adapt climatology factors.Item Developing an Algorithm for Securing the Biometric Data Template in the Database(International Journal of Advanced Computer Science and Applications, 2019) Habibu, Taban; Luhanga, Edith T.; Sam, Anael E.In the current technology advancement, biometric template provides a dependable solution to the problem of user verification in an identity control system. The template is saved in the database during the enrollment and compared with query information in the verification stage. Serious security and privacy concerns can arise, if raw, unprotected data template is saved in the database. An attacker can hack the template information in the database to gain illicit access. A novel approach of encryption-decryption algorithm utilizing a design pattern of Model View Template (MVT) is developed to secure the biometric data template. The model manages information logically, the view shows the visualization of the data, and the template addresses the data migration into pattern object. The established algorithm is based on the cryptographic module of the Fernet key instance. The Fernet keys are combined to generate a multiFernet key to produce two encrypted files (byte and text file). These files are incorporated with Twilio message and securely preserved in the database. In the event where an attacker tries to access the biometric data template in the database, the system alerts the user and stops the attacker from unauthorized access, and cross-verify the impersonator based on the validation of the ownership. Thus, helps inform the users and the authority of, how secure the individual biometric data template is, and provided a high level of the security pertaining the individual data privacyItem An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents(IEEE, 2019-09-10) Ndibwile, Jema David; Luhanga, Edith T.; Fall, Doudou; Miyamoto, Daisuke; Blanc, GregoryPhishing attacks have been persistent for more than two decades despite mitigation efforts from academia and industry. We believe that users fall victim to attacks not only because of lack of knowledge and awareness, but also because they are not attentive enough to security indicators and visual abnormalities on the webpages they visit. This is also probably why smart device users, who have more limited screen size and device capabilities compared to desktop users, are three times more likely to fall victim to phishing attacks. To assert our claim, we first investigated general phishing awareness among different groups of smartphone users. We then used smart eyeglasses (electro-oculographic) to experimentally measure the mental effort and vigilance exhibited by users while surfing a website and while playing an Android phishing game that we developed. The results showed that knowledge and awareness about phishing do not seem to have a significant impact on security behaviours, as knowledgeable participants exhibited insecure behaviours such as opening email attachments from unfamiliar senders. However, attentiveness was important as even participants with low cybersecurity knowledge could effectively identify attacks if they were reasonably attentive. Based on these results, we asserted that users are more likely to continue falling victim to phishing attacks due to insecure behaviours, unless tools to lessen the identification burden are provided. We thus recommended implementing a lightweight algorithm into a custom Android browser for detecting phishing sites deceptively without a user interaction. We used fake login credentials as validation agents and monitor the destination server HTTP responses to determine the authenticity of a webpage. We also presented initial evaluation results of this algorithm.Item Leveraging peer-to-peer farmer learning to facilitate better strategies in smallholder dairy husbandry(SAGE journal, 2020-12-02) Nyambo, Devotha G.; Luhanga, Edith T.; Yonah, Zaipuna O.; Mujibi, Fidalis D. N; Clemen, ThomasPeer-to-peer learning paradigm is seldom used in studying how farmers can increase yield. In this article, agent-based modelling has been applied to study the chances of dairy farmers increasing annual milk yield by learning better farming strategies from each other. Two sets of strategies were considered; in one set (S), each farmer agent would possess a number of farming strategies based on their knowledge, and in a second set (S'), farmer agents would possess farming strategies that they have adopted from their peers. Regression models were used to determine litres of milk that could be produced whenever new strategies were applied. By using data from Ethiopia and Tanzania, 28 and 25 determinants for increase in milk yield were fitted for the two countries, respectively. There was a significant increase in average milk yield as the farmer agents interacted and updated their S'– from baseline data, average milk yield of 12.7 ± 4.89 and 13.62 ± 4.47 to simulated milk yield average of 17.57 ± 0.72 and 20.34 ± 1.16 for Tanzania and Ethiopia, respectively. The peer-to-peer learning approach details an inexpensive method manageable by the farmers themselves. Its implementation could range from physical farmer groups to online interactions.Item A study of users’ compliance and satisfied utilization of biometric application system(Taylor & Francis Online, 2020-08-25) Habibu, Taban; Luhanga, Edith T.; Sam, Anael E.Currently, the adoption rate of biometric technology has speedily grown in all applications. The technology is considered as an effective measure for the protection against crime. However, there is a concern that it violates the privacy and rights of the individuals. For instance, the possibility of fraud, identity theft, civil liberty violations, and inaccuracy of data. As a result, create the conflicts between service provider and public as they may be accused of a crime or become a victim of discrimination. This study constitutes exploratory research and is restricted to the usage of the biometric application system within the passport. It aims at discovering the substantial acceptance of users in implementing the biometric application for the East African passport (Uganda). Factor influencing users’ opinions regarding the acceptance of the biometric application, User willingness, trust and techniques for securing the biometric information are presented. Strategies aimed at regulating the protection of biometric data on the usage of the application are explained. The findings suggested encryption techniques as the most favorable tactic of protecting the biometric data application. Therefore, best practices such as individual desirability, practical accurateness, and eagerness are required.