Browsing by Author "Sam, Anael"
Now showing 1 - 20 of 39
- Results Per Page
- Sort Options
Item Analysis of factors influencing information access among rural communities in Tanzania(Journal of Agricultural Extension and Rural Development, 2017-09) Ramadhani, Abswaidi; Sam, Anael; Kalegele, KhamisiInformation access in rural communities of Tanzania is very important as it keeps its members aware of what happened and what happening in the world. This importance can not be undermined since it helps farmers and other members of the rural community to make the right decision about their activities. Rural community areas are surrounded by many factors which in one way or another influence or hinder accessibility of information. Several works have been done on analysis of these factors; however most of them were conducted a number of years back. This study focused on providing the current survey on analysis of these factors. Specifically, the study analysed the following factors: source of power, penetration of mobile phones, subscription to networks, languages used and level of education, policy, government support, government administration and farming system. Mwanga District was used as a study area where descriptive research design was applied. Primary data were collected from farmers by using questionnaires while secondary data were collected from village reports and other research reports. The collected data were analysed by using Statistical Package for Social Science (SPSS). Findings show that in rural areas, there are unreliable source of power, higher penetrations of feature phones, high subscription to Vodacom network and high uses of Swahili language for communication, good government support and policy which favour farmer’s development. Generally, we recommend that the existing sources of information like information systems and other applications should be integrated to form one stop centre where all information can be accessed.Item Analysis of ICT application in mitigating land conflicts: case study oftanzania(LJS Publishing, 2015-11) Thambikeni, Micky; Sam, AnaelLand conflicts are common phenomena in Tanzania. They can be understood in the context of history, social relations and the process of commoditization of natural resources such as land and land resources. One of the factors causing land conflicts is the poor land use planning and management. Tanzania has about 44.0 million hectares of arable land in Tanzania, but only 23% (about 10.5 million hectares) is being utilized, In this study literature review is done to understand the context of land information management, then take a look at how land use plan is being practiced at district level and how ICT is applied in land use plan towards land conflicts mitigation. The study aims to analyze ICT potential role by identifying factors causing land conflicts that can be solved by ICT and establishing ways of mitigating the conflicts. This can be accomplished by integrating ICT in land use planning and management for easier inventory and allocation of land resource. The study conclude that, implications of ICT for the land use management at district level have impact towards land conflicts mitigation, because ICT can enhance land administration through modern ways of keeping land information and can help policy and decision makers in reaching good decision makingItem Analysis of Quality of Service for WCDMA Network in Mwanza, Tanzania(College of Business Education, 2015) Sam, AnaelThis paper presents an analysis and evaluation of WCDMA network in both rural and urban areas of Mwanza, Tanzania. The analysis of data starts by collecting data through a drive test measurements by using TEMS Investigation tool. The parameters which are analyzed in this paper are such are Received Signal Code Power (RSCP), Transmitted Power (TX), Speech Quality Index (SQI) and the ration of received power to noise (Ec/N0). The data collected shows that only 24.02% of the region has got the good coverage, 23.24% has poor coverage and the 52.74% has a fair coverage. Also by using the basic Key Performance Indicators (KPI’s) we analyzed the data for the quality of service (QoS) of the area which shows only 27.61% of the region has good QoS, while the poor value recorded with 2.76% of the region. We can use the analysis done in this work as a platform and benchmark to aid in the system optimization for telecoms services providers improved performance in the region.Item Assessment of How Users Perceive the Usage of Biometric Technology Applications(IntechOpen Journal, 2022-07-27) Habibu, Taban; Luhanga, Edith; Sam, AnaelBiometrics applications are progressively widespread as a means of authenticating end-users owing to the extensive range of benefits over traditional authentication (token-base-authentication). However, the transaction involves taking into account the perceptions and responses of end-users. If end-users are fearful, hesitant about these biometric technology-applications, misuse and implementation-complications can surely overshadow. The goal of this study is to sightsee the user’s-motivation, understanding, consciousness and acceptance towards utilization of biometric technology-applications. A 300-person survey was conducted to evaluate public-opinion on the use and adoption of biometrics. Stratified sample technique was used to administer the surveys. The results presented that perceived ease-of-use, user-motivation and attitude are more important-factors when deciding whether to accept new technology-applications. Although many end-users have become more familiar with biometric technology-applications (e.g., Fingerprints or facial-recognition), many individuals still have a negative-perception of the technology. Concerns regarding confidentiality and security i.e., storing and protecting personal-identification data, the fear of intruding into a person’s daily-life and disclosing personal-information remain a major problem. Some end-users claim that despite the potential resilience to biometrics, designers must mentally and psychologically prepare the general public for the new use of biometric technology. This will make it possible to transform negative user-perceptions into a positive-experience. Thus, this study can help end-users and companies understand and make the right decisions to promote the use of biometric-applications and services. The study is expected to be an important research-discovery that will greatly contribute to Uganda’s digital-economy.Item Assessment of non transmittable codewords enhancement to Viterbi Algorithm Decoding(LJS Publishing, 2014-09) Mrutu, Salehe; Sam, Anael; Mvungi, NereyResearchers have shown that practical mobile communication channels introduce errors that are concentrated in a certain locality rather than random errors. These are burst errors caused by deep fading of the wireless channel or a lightning strike. The existing Viterbi Algorithm (VA) capable of correcting random errors is inefficient in correcting burst errors and therefore resulting in unacceptable amount of residual errors. This paper presents an assessment of Non- Transmittable Codewords (NTCs) enhancement technique to VA in decoding the received signals subjected to burst errors that may occur in poor channels. A hard decision, 1/2 rate and constraint length K is equal to 3 Viterbi Algorithm decoding technique, Binary Phase- Shift Keying (BPSK) and Additional White Gaussian Noise (AWGN) are components used in MATLAB software based simulation when assessing the proposed technique. Applying 6NTCs to VA decoder enables the decoder to reduce 83.7 percent of its residual errors. However, the technique reduces the encoder’s data transmission rate from 1/2 to 1/6Item Available Bandwidth Estimation Techniques (ABETS) For An Efficient Telemedicine Content Transport Network(IJERT, 2013-07) Kayange, Daniel; Sinde, Ramadhani; Sam, AnaelThe ability to measure end-to-end Available Bandwidth (unused capacity) in the network path is useful for route selection in overlay networks, QoS verification, network management, traffic engineering and real-time resource provisioning, control flow and congestion, construction of overlay - routing infrastructure, topology building in peer to peer networks, and call admission control, dynamic encoding rate modification in streaming applications, capacity planning, intelligent routing systems, and design of transport layer protocols. This paper investigates at applying techniques and measurement of Available Bandwidth (AB) in the congestion control for the transmission of an efficient telemedicine content transport network by using an important ABETs tool like Pathload, IGI, and Pathchirp. This paper discusses measurement and simulation results of wired and wireless networks for the unused capacity in the network. The results can assist an organization or country in estimating the network bandwidth requirements depending on the ability of exchange multimedia data of an organization or country. The logistics could cater implementation of low cost telemedicine applications. The telemedicine systems could include wireless and wired medical interface and communication infrastructure. A simulation has been done to investigate the network quality of service.Item Bandwidth Aware FEC Algorithms for Wireless Communication Systems(IISTE, 2013) Mrutu, Salehe; Kalolo, Sadath; Byanyuma, Mastidia; Nyakyi, Christina; Sam, AnaelForward Error Correction (FEC) codes used by receivers to correct transmission errors without retransmission add a considerable amount of redundant bits to data bits. The addition of redundant bits lowers the overall network throughput, thus increasing the demand for more required bandwidth. In this paper we investigate and discuss various techniques used in FEC and show their effects to data communication in terms of bandwidth utilization. Additionally we propose improvement of (2, 1, 2) Convolutional encoder to (3, 2, 3) encoder. The proposed improvements increase the code rate from 1/2 to 2/3 hence reducing error control information and increasing bit rate. The received codeword can be decoded by Soft-Output Viterbi AlgorithmItem Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System(IJCSNS, 2022-03) Mnyawi, Richard; Kombe, Cleverence; Sam, Anael; Nyambo, DevothaHealth information systems (HIS) are facing security challenges on data privacy and confidentiality. These challenges are based on centralized system architecture creating a target for malicious attacks. Blockchain technology has emerged as a trending technology with the potential to improve data security. Despite the effectiveness of this technology, still HIS are suffering from a lack of data privacy and confidentiality. This paper presents a blockchain-based data storage security architecture integrated with an e-Health care system to improve its security. The study employed a qualitative research method where data were collected using interviews and document analysis. Execute-order-validate Fabric’s storage security architecture was implemented through private data collection, which is the combination of the actual private data stored in a private state, and a hash of that private data to guarantee data privacy. The key findings of this research show that data privacy and confidentiality are attained through a private data policy. Network peers are decentralized with blockchain only for hash storage to avoid storage challenges. Cost-effectiveness is achieved through data storage within a database of a Hyperledger Fabric. The overall performance of Fabric is higher than Ethereum. Ethereum’s low performance is due to its execute-validate architecture which has high computation power with transaction inconsistencies. E-Health care system administrators should be trained and engaged with blockchain architectural designs for health data storage security. Health policymakers should be aware of blockchain technology and make use of the findings. The scientific contribution of this study is based on; cost-effectiveness of secured data storage, the use of hashes of network data stored in each node, and low energy consumption of Fabric leading to high performanceItem Brix and Alcohol Content Monitoring using Wireless Sensor Network(International Journal of Advances in Scientific Research and Engineering, 2021-07) Willa, Victor; Nyambo, Devotha; Sam, AnaelFermentation process plays an important role in the production of wine and beer, as these ferments convert Brix (sugar) into alcohol. Thus fermentation plays a key role in beer production hence monitoring entire activities is essential to breweries. As such, this project aimed to monitor the by-products of fermentation processes which are Brix (Sugar concentration) and Alcohol in order to improve the Quality of alcohol. Different stages of fermentation produce different Brix and alcohol percentages by volume. A system using wireless communication protocol is proposed where sensor node readings are transferred to a centralized station for monitoring and visualization. The sampling technique used was Non-probability purposive due to the fact that information gathered was important to contribute to better understand the problem by gathering information from the right personnel in the field of study. Through this approach, it is a perfect application of IoT and Wireless Sensor Network solution which has been achieved and provides advantages to the brewery industry. Moreover, the transfer of real-world processes to a digital world has been made possible which allows optimizing these processes.Through the project study, a simple and automated method with good accuracy was developed for estimating Brix and alcohol content during the fermentation process.Item Characterizing Water Users through Frequent Patterns and Association Rules by Using Apriori Algorithm: A Case of Pangani Basin Tanzania(IJST, 2024-12-07) Lyuba, Matimbila; Nyambo, Devotha; Sam, Anael; Tilahun, SeifuObjectives: To identify the hidden patterns in the K-means clustered dataset for the Pangani Basin using the Apriori algorithm through frequent patterns and association rules to enrich cluster characteristics. Methods: Frequent patterns and association rule mining were used to discover the hidden attributes in the K-means clustered dataset. Measures of minimum support ranging from 0.5% to 5% and minimum confidence ranging from 50% to 100% were used to generate a manageable number of rules which were then filtered for redundancy. Lift value >1.0 was used to determine the rule’s interestingness while Arules and ArulesViz in R were used to visualize generated rules. Findings: Clusters one to four generated 25, 31, 47, and 49 rules respectively at a minimum confidence of 50% and minimum support of 2% in the first two clusters and 1% in other clusters. Furthermore, water users in cluster one were observed to abstract more water than the three clusters, while their water use fee also reflected on the amount they abstracted. In clusters two and three, water users identified the same amount of water source capacity but differed in the amount requested and water use fee. Water users in cluster four were identified with less water source capacity and fewer amounts abstracted than other clusters. However, their water use fee identified was higher than those in cluster three, with high water source capacity and high amount requested. Such a difference is attributed to the type of water use for cluster three users being domestically supplied through community water supply entities to help villagers access water. In contrast, the water use for users in cluster four is domestic and commercial. Novelty: When aggregated with the clustering observations, the identified association rules mining results provide a broad understanding of water users’ characteristics for better water allocation and rationing.Item Database Privacy: Design of User Privacy Preserving Central Bank Digital Currency: A Case of Tanzania(Indian Society for Education and Environment (iSee), 2024-03-04) Minja, Godbless; Nyambo, Devotha; Sam, AnaelObjectives: This work aims to contribute towards Tanzanian Central Bank Digital Currency (CBDC) users’ privacy preservation. It proposes the design of a privacy preserving CBDC which might be issued by Tanzania’s Central Bank (CB), the Bank of Tanzania (BoT), which is currently in CBDC research phase. The work also aims to contribute to literature, the CBDC research being done by BoT, other CBs and CBDC stakeholders around the world. Methods: By using the Design Science Research (DSR) methodology, a privacy preserving CBDC design suitable for Tanzania was proposed, demonstrated and evaluated. This is the result of existing literature showing that different countries have different CBDC designs due to their differences in contexts and purposes for CBDC issuance. This consequently emphasized the fact that a CBDC design should not be treated as a one-size fits all solution. Findings: As opposed to the existing general and other country specific CBDC designs, we proposed a privacy preserving CBDC design suitable for Tanzania by consulting literature and taking into consideration the Tanzanian context. The design appears to be promising Tanzanian CBDC users’ privacy preservation though further work needs to be done. The work should not only be on practical evaluation of the proposed design but also on other factors impacting the success of CBDC projects. This will consequently further increase the success probability of CBDC projects, hence the potential for practical realization of CBDC project benefits. Novelty: Existing literature has shown that, considering the countries’ differences in context and CBDC issuance purposes, CBDC design should not be treated as a generic solution thereby obliging the need for country- specific CBDC designs. Consequently, the privacy preserving CBDC design suitable specifically for Tanzania consists of and provides an outline of privacy preserving interactions among the identified key Tanzanian CBDC participants or actors. The actors are the BoT, the intermediaries (i.e., other banks and payment service providers), Tanzania’s National Identification Authority (NIDA), financial transactions violation detection engine, and the expected CBDC users.Item Development and Testing of Road Signs Alert System Using a Smart Mobile Phone(Hindawi, 2022-04-21) Masatu, Eric; Sinde, Ramadhani; Sam, AnaelRoad traffic accident is a major problem worldwide resulting in significant morbidity and mortality. Advanced driver assistance systems are one of the salient features of intelligent systems in transportation. They improve vehicle safety by providing real-time traffic information to the driver. Road signs play an important role in road safety. To be effective, road signs must be visible at a distance that enables drivers to take the necessary actions. However, static road signs are often seen too late for a driver to respond accordingly. In this study, a system for alerting drivers about road signs has been developed and tested using a smart mobile phone. The study was carried out in Tanzania along an 80 km highway stretch from Arusha to Moshi town. The Haversine formula was used to measure and estimate the distance between two pairs of coordinates using the smartphone-based navigation application, Google Map. The application provides a voice alert to a needed action that enhances driver’s attention. We propose an alternative method that identifies and modifies a specific class of energy inefficiencies. According to the experimental results, the proposed methodology has the benefits of high accuracy within a user radius of 10 meters, minimum bandwidth, and low-cost application. Furthermore, the system application was secured by limiting access to the application program interface key to avoid unauthorized access to sensitive information.Item Development of Innovative Secured Remote Sensor Water Quality Monitoring & Management System: Case of Pangani Water Basin(Modern Education and Computer Science Press, 2019-01-08) Mwemezi, Kaizilege; Sam, AnaelWireless sensor networks (WSN), when applied to the field of water quality monitoring and management, has the potential to bring numerous benefits as compared to traditional methods since it is accurate, reliable in remote areas and in the tough condition such as during rainy seasons, and less costly. With the ever-growing application of Internet of Things (IoT) and technology in general, sensor devices have become less expensive and widely used in many applications that require remote monitoring. In this work, we present an innovative and secure water monitoring and management system using remote sensor prototype, which has been developed to monitor physiochemical parameters including pH, Turbidity, Temperature, and Dissolved Oxygen. Qualitative research methods were used for gathering system requirements through questionnaires and interviews conducted in Pangani water basin authority, in the United Republic of Tanzania. Documents were also reviewed to provide secondary knowledge. Furthermore, the system was developed using Dynamic System Development Methodology (DSDM). Firstly, the proposed system prototype is able to provide real-time measurements accurately. Secondly, the proposed system uses Advanced Encryption Standards to provide a secure transmission and storage of data transmitted from remote sensor nodes to a central database system. Thirdly, the web application was developed for data visualization using tabular and graphical formats. Lastly, the system prototype provides decisions support on quality of water present in Pangani river basin by evaluating sensor measurements and sends SMS alerts once the measured value is above the recommended standard values.Item Development of IoT based Security System for Fire Monitoring and Prevention in Tanzanian Industries(International Journal of Advances in Scientific Research and Engineering (ijasre), 2021-12) Irakomeye, Jesus; Nshimiye, Abel; Ng’ondya, Kisakyake; Sumari, Elibariki; Leo, Judith; Sam, AnaelOver the past years, there have been great advances in ICTs which have led to the development of fire monitoring and prevention systems. Despite the existence of these solutions, fire incidents especially in Tanzanian have been a major problem in industries which leads to the destruction of materials and loss of lives. With the help of wireless sensor networks (WSN) and the internet of things (IoT), the monitoring and prevention of fire outbreaks become easy and reliable. The present work explores the existing fire monitoring and prevention systems and then, designs and develops an innovative security system for early fire monitoring andprevention in Tanzanian industries through the use of emerging technologies such as WSN and IoT. The results of the system evaluation shows that 88% of users were satisfied with its functionalities. This is because the system works in real-time and through the use of different sensors such as DHT sensor, MQ2 sensor, and Flame sensor to monitor humidity, temperature, smoke, flammable gasses, and fire outbreak in the different work areas. The use of the mobile application and cloud subsystem, the developed system can timely alert the users via their mobile phones on the status of the fire and different parameter.Item Early fire detection system in tanzania markets(MDPI, 2020-11-14) Hilary, Rambo; Rotich, Philemon; Geofrey, Anna; Sam, AnaelApplication of wireless sensor networks (WSN) and Internet of Things (IoT) used to provide real-time monitoring of fire outbreak in markets. The system integrates three subsystems namely; sensing subsystem which uses multiple sensors for detecting fire outbreaks. Data processing subsystem which collects data from the sensing subsystem through Xbee, analyses, and uploads data to the cloud. If values exceed the sensor threshold, an alarm is triggered and notification is sent to stakeholders via mobile application subsystem. The integration between sensing, data processing, and mobile application subsystems pave a new way for the mitigation of fire outbreaks at its early stage.Item The Effect of Hyperparameter Optimization on the Estimation of Performance Metrics in Network Traffic Prediction using the Gradient Boosting Machine Model(Engineering, Technology & Applied Science Research (ETASR), 2023-06) Mbelwa, Jimmy; Agbinya, Johnson; Mwita, Machoke; Sam, AnaelInformation and Communication Technology (ICT) has changed the way we communicate and access information, resulting in the high generation of heterogeneous data. The amount of network traffic generated constantly increases in velocity, veracity, and volume as we enter the era of big data. Network traffic classification and intrusion detection are very important for the early detection and identification of unnecessary network traffic. The Machine Learning (ML) approach has recently entered the center stage in network traffic accurate classification. However, in most cases, it does not apply model hyperparameter optimization. In this study, gradient boosting machine prediction was used with different hyperparameter optimization configurations, such as interaction depth, tree number, learning rate, and sampling. Data were collected through an experimental setup by using the Sophos firewall and Cisco router data loggers. Data analysis was conducted with R software version 4.2.0 with Rstudio Integrated Development Environment. The dataset was split into two partitions, where 70% was used for training the model and 30% for testing. At a learning rate of 0.1, interaction depth of 14, and tree number of 2500, the model estimated the highest performance metrics with an accuracy of 0.93 and R of 0.87 compared to 0.90 and 0.85 before model optimization. The same configuration attained the minimum classification error of 0.07 than 0.10 before model optimization. After model tweaking, a method was developed for achieving improved accuracy, R square, mean decrease in Gini coefficients for more than 8 features, lower classification error, root mean square error, logarithmic loss, and mean square error in the model.Item Enhanced security model for mobile banking systems in Tanzania(IJTEEE, 2013) Nyamtiga, Baraka; Sam, Anael; Laizer, LoserianIn mobile banking schemes; financial services are availed and banking services are provided using mobile devices. GSM services are greatly utilized for data transmission by the technologies used in conducting mobile transactions. In their operations; these technologies send data in plaintext. Financial service providers tend to rely on the security services provided by the GSM which has been proved to be susceptible to cryptanalytic attacks. The used algorithms for crypto mechanisms are flawed leaving data carried through the network vulnerable upon interception. Operators need to take precaution by enforcing some protective measures on the information to be transmitted. This paper describes an SMS based model designed with security features to enhance data protection across mobile networks. Features for data encryption, integrity, secure entry of security details on the phone, and improved security policies in the application server are incorporated. We address issues of data confidentiality, user authentication and message integrity in order to provide end-to-end security of data carried on GSM networks.Item Evaluation of Key Security Issues Associated with Mobile Money Systems in Uganda(MDPI, 2020-06-08) Ali, Guma; Dida, Mussa; Sam, AnaelSmartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the usage and acceptance of mobile money has mostly been low due to security issues and challenges associated with the system. As a result, there is a need to carry out a survey to evaluate the key security issues associated with mobile money systems in Uganda. The study employed a descriptive research design, and stratified random sampling technique to group the population. Krejcie and Morgan’s formula was used to determine the sample size for the study. The collection of data was through the administration of structured questionnaires, where 741 were filled by registered mobile money (MM) users, 447 registered MM agents, and 52 mobile network operators’ (MNOs) IT officers of the mobile money service providers (MMSPs) in Uganda. The collected data were analyzed using RStudio software. Statistical techniques like descriptive analysis and Pearson Chi-Square test was used in data analysis and mean (M) > 3.0 and p-value < 0.05 were considered statistically significant. The findings revealed that the key security issues are identity theft, authentication attack, phishing attack, vishing attack, SMiShing attack, personal identification number (PIN) sharing, and agent-driven fraud. Based on these findings, the use of better access controls, customer awareness campaigns, agent training on acceptable practices, strict measures against fraudsters, high-value transaction monitoring by the service providers, developing a comprehensive legal document to run mobile money service, were some of the proposed mitigation measures. This study, therefore, provides a baseline survey to help MNO and the government that would wish to implement secure mobile money systems.Item Evaluation of Users’ Knowledge and Concerns of Biometric Passport Systems(MDPI, 2019-04-29) Habibu, Taban; Luhanga, Edith; Sam, AnaelThe increase in terrorism and identity fraud has forced governments worldwide to make a combined e ort to enhance the security of national borders. Biometric passports are the emergent identity travel document deployed in guaranteeing the safekeeping of the entry point of the border and limiting the usage of counterfeit documents. This study analyzes users’ concerns and threats to the biometric passport delivery system in Uganda, where the first biometric passports are planned for rollout in 2019. We used a mixed approach to compute and articulate the results. Factors impacting fear of technology like disclosure of personal data, improper data transmission, and data abuse were determined. Relevance knowledge of preferred technology such as the personal experience of the technology, data privacy awareness and perceived usefulness was confirmed. Threats and attacks on the technology such as counterfeit and brute-force were identified. It is important for policymakers and security expertise to understand that biometric technologies evoke fears of privacy and public liberties infringements. Therefore, end user’s acceptance of biometric passports will be dependent on the degree of trust in the technology itself and in those operating the applications.Item Framework for Data Mining In Healthcare Information System in Developing Countries: A Case of Tanzania(IJTEEE, 2013-10) Diwani, Salim; Sam, AnaelReporting the incidents to authorities in developing countries that can take actions has been a chaotic and slow process. This paper proposes an algorithm for a system that automatically reports events that compromise passengers’ safety to respective authorities by using spherical cosine rule. When an incident such as an accident, over speeding or overloading of passengers occurs the system identifies the closest police station. It does so by calculating the shortest distance between latitudes and longitudes of the place where the event occurred and those of the closest police station. Then it identifies the next police station which the bus will encounter and where the event can be reported and immediate action carried out. The public buses will be equipped with GPS which will generate coordinates and there will be a database which contains the coordinates for the police stations along the main roads