Search
Now showing items 1-10 of 20
Evaluation of Users’ Knowledge and Concerns of Biometric Passport Systems
(MDPI, 2019-04-29)
The increase in terrorism and identity fraud has forced governments worldwide to make a
combined e ort to enhance the security of national borders. Biometric passports are the emergent
identity travel document deployed ...
A review on healthcare information systems and consensus protocols in blockchain technology
(International Journal of Advanced Technology and Engineering Exploration, 2018)
Blockchain is a distributed ledger technology whereby transactions are bundled into blocks that are chained together
cryptographically by hash pointers. Blockchain solutions add trust and privacy to the existing internet ...
Towards Data Exchange between Health Information System and Insurance Claims Management System
(Modern Education and Computer Science Press, 2019-03-08)
The advancement of technology observed today has led to the development of many Health Information Systems (HIS) which are cost-effective, reliable, scalable and flexible. Moreover, integrated Health Information System ...
A Practical Approach to Available Bandwidth Estimation Techniques (ABETs) for an Efficient Telemedicine Content Transport Network
(nternational Journal of Scientific & Engineering Research, 2013-09)
The ability to measure end-to-end Available Bandwidth (unused capacity) in the network path is useful for route selection in
overlay networks, QoS verification, network management, traffic engineering and real-time resource ...
Security Perspectives for USSD versus SMS in conducting mobile transactions: A case study of Tanzania
(IJTEEE, 2013)
Performing transactions using mobile devices is increasing rapidly in developing countries, Tanzania inclusive. USSD and SMS are among the technologies widely used in conducting mobile transactions. These two technologies ...
Framework for Data Mining In Healthcare Information System in Developing Countries: A Case of Tanzania
(IJTEEE, 2013-10)
Reporting the incidents to authorities in developing countries that can take actions has been a chaotic and slow process. This paper proposes an algorithm for a system that automatically reports events that compromise ...
Available Bandwidth Estimation Techniques (ABETS) For An Efficient Telemedicine Content Transport Network
(IJERT, 2013-07)
The ability to measure end-to-end Available Bandwidth (unused capacity) in the network path is useful for route selection in overlay networks, QoS verification, network management, traffic engineering and real-time resource ...
Bandwidth Aware FEC Algorithms for Wireless Communication Systems
(IISTE, 2013)
Forward Error Correction (FEC) codes used by receivers to correct transmission errors without retransmission
add a considerable amount of redundant bits to data bits. The addition of redundant bits lowers the overall
network ...
Overview applications of data mining in health care: The case study of Arusha region
(IJCER, 2013-08)
Data mining as one of many constituents of health care has been used intensively and
extensively in many organizations around the globe as an efficient technique of finding correlations or
patterns among dozens of fields ...
Analysis of Quality of Service for WCDMA Network in Mwanza, Tanzania
(College of Business Education, 2015)
This paper presents an analysis and evaluation of WCDMA network in both rural and urban areas of Mwanza, Tanzania. The analysis of data starts by collecting data through a drive test measurements by using ...