Browsing by Author "Sam, Anael E."
Now showing 1 - 9 of 9
- Results Per Page
- Sort Options
Item Assessment of vulnerabilities of the biometric template protection mechanism(International Journal of Advanced Technology and Engineering Exploration, 2018) Habibu, Taban; Sam, Anael E.In the ever-changing world of global data transmission, the security of data and individual privacy are the growing fears in today’s human life worldwide. The major concerns are the protection of the biometric templates in the biometric identification and authentication process. Storage of the biometric template in the database raises the chance of compromising it, hence lead to serious threats and abuse of the person’s identity. When an individual’s registered biometric data is disclosed, their security and privacy can be compromised. Therefore, public acceptance of biometrics will depend on the system designer’s ability to demonstrate that the systems are robust, with low error rates, and tamper proof. If someone’s biometric template inside the database is compromised, that consequently might imply identification robbery of that individual. In the recent past, a considerable number of methods for biometric template protection have been published. This article explains, a thorough valuation on numerous attacks and threats associated with the biometric system alongside the biometric template protection, elucidating the measures anticipated to address the threats, to the performance gap and establish the status quo of the current biometric template protection for public acceptance.Item Blockchain Technology in Sub-Saharan Africa: Where does it fit in Healthcare Systems: A case of Tanzania(Journal of Health Informatics in Developing Countries, 2019-09) Kombe, Cleverence; Sam, Anael E.; Ally, Mussa; Finne, AuvoBackground: Blockchain technology is a distributed electronic ledger containing digital records, transactions or events that are protected with advanced encryptions, extremely hard to tamper, and updateable through a consensus algorithm agreeable to all connected network nodes. In Sub-Sahara Africa, the technology has started to be adopted in real estate, supply chain, agriculture, and financial sector. Unfortunately, there is a lack of effort in introducing this technology in the healthcare sector. Therefore, this study aims to explore the issues facing electronic healthcare systems in Sub-Sahara Africa taking Tanzania as a case study and introduce blockchain-based solutions for the discovered issues. Methods: The study used qualitative methods for data collection and analysis. Data were collected through interviews, observation and documentary analysis. Interviews were done with the sample size of 50 participants who were selected from groups of healthcare facility leaders, ICT experts, government representatives, doctors, nurses, laboratory technicians, pharmacists, accountants, and receptionists. Direct observation and participatory observation were used to assess different electronic healthcare records systems’ functions. Moreover, researchers used document analysis to collect data from public records (like policy manuals), personal documents (like incident reports), and physical evidence (like training materials and handbooks). NVivo 11 software was applied in managing and organizing data analysis. Results: Out of 710 healthcare facilities involved in this study, 34.5% fully implemented electronic healthcare records systems and 78% installed Mfumo wa Taarifa za Uendeshaji Huduma za Afya (MTUHA) also known as (District Health Information Software (DHIS) II). The findings showed that the issues facing electronic healthcare records are; difficulties in taking care of the patients’ private information, problems in safely sharing medical information between healthcare facilities, bandwidth issues, and improper handling of data integrity.Item Developing an Algorithm for Securing the Biometric Data Template in the Database(International Journal of Advanced Computer Science and Applications, 2019) Habibu, Taban; Luhanga, Edith T.; Sam, Anael E.In the current technology advancement, biometric template provides a dependable solution to the problem of user verification in an identity control system. The template is saved in the database during the enrollment and compared with query information in the verification stage. Serious security and privacy concerns can arise, if raw, unprotected data template is saved in the database. An attacker can hack the template information in the database to gain illicit access. A novel approach of encryption-decryption algorithm utilizing a design pattern of Model View Template (MVT) is developed to secure the biometric data template. The model manages information logically, the view shows the visualization of the data, and the template addresses the data migration into pattern object. The established algorithm is based on the cryptographic module of the Fernet key instance. The Fernet keys are combined to generate a multiFernet key to produce two encrypted files (byte and text file). These files are incorporated with Twilio message and securely preserved in the database. In the event where an attacker tries to access the biometric data template in the database, the system alerts the user and stops the attacker from unauthorized access, and cross-verify the impersonator based on the validation of the ownership. Thus, helps inform the users and the authority of, how secure the individual biometric data template is, and provided a high level of the security pertaining the individual data privacyItem Framework for integrating fragmented information systems: Case of livestock information systems(International Journal of Computer Engineering Research, 2017-07) Ramadhani, Abswaidi; Sam, Anael E.; Kalegele, KhamisiInformation System (IS) is used for information communication. But the problem with the existing Agro- ISs is that they are not integrated. To integrate it, we need to have an integration framework. Generally, much has been done on the designing framework for IS integration. However, there are credible things which can be added to improve these frameworks. A framework can be designed in such a way that it guides users on technologies to be used, skills needed for the task, goals, outcome and output of integration. This is what this study focused to contribute. To design the framework, guiding factors were established. These factors were the one which surround farmers and in one way or another hinder or support accessibility of information from integrated ISs. The factors were discussed and presented in the mapping matrix. Under each factor, viability of technology on the ground was established and compared against the available technology. From the mapping matrix, scenarios on possible applications were established. Guides on Technologies, skills, goals, output and outcome of integration were established to form a framework for integrating applications and ISs. Then the framework was demonstrated empirically and compared with the existing frameworks. Results show that the proposed framework is more comprehensive in terms of guides it provides, than the existing frameworks.Item An Online Collaborative Discussion Platform for Bridging a Technological Reliance Gap in Higher Learning Institutions in Tanzania(Modern Education and Computer Science Press, 2018-11-08) John, Linus; Sam, Anael E.Currently, the online discussion forums have become the focal point for e-learning in many Higher Learning Institutions (HLIs); this is due to the ubiquitous of Information and Communication Technology (ICT) tools, significant rate and fast growing technology adoption and use in many fields including education. However, developing countries, such as Tanzania, are experiencing technical adoption difficulties, such as limited access to computers, problems with Internet connections as well as the technological reliance gap between tutors and learners; these affect the use of technology in Teaching and Learning (T/L). This study aims to use an Online Discussion Platform (onlineDP) to bridge the technological reliance gap between the tutors and learners in HLIs in Tanzania. In this study, the literature review and qualitative research methods were conducted to develop the prototype of the platform. The UMBC semantic similarity service was used to develop the contents filter used to reduce the number of duplicate discussion questions. The application was mainly developed using Laravel Pre-processor (PHP) framework and My Structured Query Language (MySQL) database. The result is the web-based application prototype that enhances the collaborative learning environment in HLIs in Tanzania. The technologies to be used for T/L, should consider both sides of tutors and learners as well as the theoretical framework for their implementations.Item Performance analysis of carrier aggregation for various mobile network implementations scenario based on spectrum allocated(International Journal of Wireless & Mobile Networks (IJWMN), 2017-10) Kiwoli, Liston; Sam, Anael E.; Manasseh, EmmanuelCarrier Aggregation (CA) is one of the Long Term Evolution Advanced (LTE-A) features that allow mobile network operators (MNO) to combine multiple component carriers (CCs) across the available spectrum to create a wider bandwidth channel for increasing the network data throughput and overall capacity. CA has a potential to enhance data rates and network performance in the downlink, uplink, or both, and it can support aggregation of frequency division duplexing (FDD) as well as time division duplexing (TDD). The technique enables the MNO to exploit fragmented spectrum allocations and can be utilized to aggregate licensed and unlicensed carrier spectrum as well. This paper analyzes the performance gains and complexity level that arises from the aggregation of three inter-band component carriers (3CC) as compared to the aggregation of 2CC using a Vienna LTE System Level simulator. The results show a considerable growth in the average cell throughput when 3CC aggregations are implemented over the 2CC aggregation, at the expense of reduction in the fairness index. The reduction in the fairness index implies that, the scheduler has an increased task in resource allocations due to the added component carrier. Compensating for such decrease in the fairness index could result into scheduler design complexity. The proposed scheme can be adopted in combining various component carriers, to increase the bandwidth and hence the data rates.Item A study of users’ compliance and satisfied utilization of biometric application system(Taylor & Francis Online, 2020-08-25) Habibu, Taban; Luhanga, Edith T.; Sam, Anael E.Currently, the adoption rate of biometric technology has speedily grown in all applications. The technology is considered as an effective measure for the protection against crime. However, there is a concern that it violates the privacy and rights of the individuals. For instance, the possibility of fraud, identity theft, civil liberty violations, and inaccuracy of data. As a result, create the conflicts between service provider and public as they may be accused of a crime or become a victim of discrimination. This study constitutes exploratory research and is restricted to the usage of the biometric application system within the passport. It aims at discovering the substantial acceptance of users in implementing the biometric application for the East African passport (Uganda). Factor influencing users’ opinions regarding the acceptance of the biometric application, User willingness, trust and techniques for securing the biometric information are presented. Strategies aimed at regulating the protection of biometric data on the usage of the application are explained. The findings suggested encryption techniques as the most favorable tactic of protecting the biometric data application. Therefore, best practices such as individual desirability, practical accurateness, and eagerness are required.Item Web-based Application Tool for Recommendation of Open Source Software for Higher Learning Institution in Tanzania(Modern Education and Computer Science Press, 2019-02) Okey, Ambokile; Sam, Anael E.Open Source Software (OSS) provide a number of advantages to Higher Learning Institutions (HLIs) in developing countries, such as Tanzania. This is because they are freely available, free to make copies and free to distribute. Through literature reviewed, it has been observed that OSS usage in HLIs in Tanzania is low due to lack of awareness of OSS designed for academic purposes. This paper presents a study on how to implement a reliable and effective web-based application tool for recommendation of OSS for enhancing awareness of HLIs on existing OSS designed for academic purposes. There are three recommendation algorithms that were employed for filtering the OSS in this study: the content-based, collaborative, and demographic filtering. We used various web technologies for the implementation of application functionalities. The result is the reliable and effective web-based application tool that recommends OSS to individuals in HLIs for enhancing their awareness of OSS designed for academic purposes.Item Web-Based Two-Way Electricity Monitoring System for Remote Solar Mini-Grids(Modern Education and Computer Science Press, 2019-11-08) Omary, Shaban; Sam, Anael E.Electricity usage monitoring systems play a vital role towards raising energy utilization awareness for consumers. Existing solar mini-grid infrastructure, however, lacks a user-friendly two-way platform to allow consumers to access information about electricity consumption. This paper proposes a cloud-based, two-way energy usage monitoring system that will allow both utility companies and consumers to access energy consumption data in a user-friendly way through a web platform. The system requirements were collected via questionnaires, interviews, and observations conducted at two solar mini-grids centres located at Arusha and Kilimanjaro regions in Tanzania. The system uses a Low Power Area Network (LPWAN) and the existing GPRS network to monitor electricity consumption data between smart meter units and the cloud server. Also, a virtual bill payment module and usage status feedback functionality have been integrated into the system to increase awareness of the cost-effective use of electricity and hence, achieve the sustainability of solar mini-grids. By using both white-box and black-box system testing approaches, findings show that the system will not only raise awareness among customers about the economical usage of electricity, but it can also be used by mini-grid companies as a source of data to determine current and future energy demands to minimize large investment costs.