Search
Now showing items 1-10 of 12
Assessment of How Users Perceive the Usage of Biometric Technology Applications
(IntechOpen Journal, 2022-07-27)
Biometrics applications are progressively widespread as a means of authenticating end-users owing to the extensive range of benefits over traditional authentication (token-base-authentication). However, the transaction ...
Development and Testing of Road Signs Alert System Using a Smart Mobile Phone
(Hindawi, 2022-04-21)
Road traffic accident is a major problem worldwide resulting in significant morbidity and mortality. Advanced driver assistance systems are one of the salient features of intelligent systems in transportation. They improve ...
Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures
(MDPI, 2020-09-24)
The proliferation of digital financial innovations like mobile money has led to the rise
in mobile subscriptions and transactions. It has also increased the security challenges associated
with the current two-factor ...
Evaluation of Key Security Issues Associated with Mobile Money Systems in Uganda
(MDPI, 2020-06-08)
Smartphone technology has improved access to mobile money services (MMS) and
successful mobile money deployment has brought massive benefits to the unbanked population
in both rural and urban areas of Uganda. Despite its ...
Brix and Alcohol Content Monitoring using Wireless Sensor Network
(International Journal of Advances in Scientific Research and Engineering, 2021-07)
Fermentation process plays an important role in the production of wine and beer, as these ferments convert Brix (sugar) into alcohol. Thus fermentation plays a key role in beer production hence ...
A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications
(MDPI, 2021-11-25)
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement ...
Performance Comparison of Ensemble Learning and Supervised Algorithms in Classifying Multi-label Network Traffic Flow
(Engineering, Technology & Applied Science Research, 2022-06)
Network traffic classification is of significant importance. It helps identify network anomalies and assists in taking measures to avoid them. However, classifying network traffic correctly is a challenging task. This study ...
Development of IoT based Security System for Fire Monitoring and Prevention in Tanzanian Industries
(International Journal of Advances in Scientific Research and Engineering (ijasre), 2021-12)
Over the past years, there have been great advances in ICTs which have led to the development of fire monitoring and prevention systems. Despite the existence of these solutions, fire incidents especially in Tanzanian have ...
Performance Evaluation LoRa-GPRS Integrated Electricity usage Monitoring System for Decentralized Mini-Grids
(Science and Information (SAI) Organization Limited, 2020)
The emerging Internet of Things (IoT) technologiesNsuch as Long-Range (LoRa), combined with traditional cellular
communications technologies such as General Packet Radio Service (GPRS) offers decentralized mini-grid ...
Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System
(IJCSNS, 2022-03)
Health information systems (HIS) are facing security challenges on data privacy and confidentiality. These challenges are based on centralized system architecture creating a target for malicious attacks. Blockchain technology ...