Search
Now showing items 101-110 of 142
Security Perspectives for USSD versus SMS in conducting mobile transactions: A case study of Tanzania
(IJTEEE, 2013)
Performing transactions using mobile devices is increasing rapidly in developing countries, Tanzania inclusive. USSD and SMS are among the technologies widely used in conducting mobile transactions. These two technologies ...
Framework for Data Mining In Healthcare Information System in Developing Countries: A Case of Tanzania
(IJTEEE, 2013-10)
Reporting the incidents to authorities in developing countries that can take actions has been a chaotic and slow process. This paper proposes an algorithm for a system that automatically reports events that compromise ...
Available Bandwidth Estimation Techniques (ABETS) For An Efficient Telemedicine Content Transport Network
(IJERT, 2013-07)
The ability to measure end-to-end Available Bandwidth (unused capacity) in the network path is useful for route selection in overlay networks, QoS verification, network management, traffic engineering and real-time resource ...
Bandwidth Aware FEC Algorithms for Wireless Communication Systems
(IISTE, 2013)
Forward Error Correction (FEC) codes used by receivers to correct transmission errors without retransmission
add a considerable amount of redundant bits to data bits. The addition of redundant bits lowers the overall
network ...
Overview applications of data mining in health care: The case study of Arusha region
(IJCER, 2013-08)
Data mining as one of many constituents of health care has been used intensively and
extensively in many organizations around the globe as an efficient technique of finding correlations or
patterns among dozens of fields ...
Analysis of Quality of Service for WCDMA Network in Mwanza, Tanzania
(College of Business Education, 2015)
This paper presents an analysis and evaluation of WCDMA network in both rural and urban areas of Mwanza, Tanzania. The analysis of data starts by collecting data through a drive test measurements by using ...
Development of an Access Point Positioning Algorithm under the Changing in Environment and Users’ density Estimation
(Asian Journal of Computer and Information Systems, 2014-06)
In many wireless networks a single hop is all that is needed or in fact tolerable. The physical region where network is available is known as a coverage area. Generally, a transmitter and a receiver may exchange data by ...
Fuel Adulteration in Tanzania and its Consequencies: An Overview
(Rjeas, 2013)
Adulteration of petrol and diesel fuel with kerosene is very common in Tanzania. It increases the tailpipe
emissions of harmful pollutants from vehicles. These leads to this study, which tends to show the rate of
emission ...
Optimization Design of Patch Antenna by Introduction of Capacitive Patch
(IEEE, 2018)
An efficient method for integrating genetic algorithm (GA) with method of moments for capacitive patch antenna design has been presented. The movement of capacitive patch within the antenna model and its length are controlled ...
Usability test for cloud-based m-learning assistive technology for visually impaired learners in Tanzania’s higher learning institutions
(International Journal of Advanced Technology and Engineering Exploration, 2019-08)
The advancement of learning technologies has paved the way for learners to learn at their own pace. For visually impaired learners have been relying on other learners to get information through their smart devices. The ...