Research Articles [CoCSE]: Recent submissions
Now showing items 21-40 of 310
-
A Blockchain-based Conceptual Model to Address Educational Certificate Verification Challenges in Tanzania
(Engineering, Technology & Applied Science Research (ETASR), 2023-08-08)The proliferation of counterfeit educational certificates is an ongoing issue around the world, including Tanzania. The effect of this malpractice is detrimental to the credibility of education. Traditional strategies ... -
A Practical Approach to Available Bandwidth Estimation Techniques (ABETs) for an Efficient Telemedicine Content Transport Network
(nternational Journal of Scientific & Engineering Research, 2013-09)The ability to measure end-to-end Available Bandwidth (unused capacity) in the network path is useful for route selection in overlay networks, QoS verification, network management, traffic engineering and real-time resource ... -
Safety Zone Determination For Wireless Cellular Tower-A Case Study From Tanzania
(IJRET, 2013-09)Safety zone determination for wireless cellular towers has attracted attention from many researchers in the last decade. This is caused by the rapid growth of the wireless cellular industry which has led to the installation ... -
Pathload for available bandwidth esti-mation techniques (ABETs) for an efficient telemedicine content transport network
(ResearchGate, 2013-08)The ability to measure end-to-end Available Bandwidth (unused capacity) in the network path is useful for route selection in overlay networks, for QoS verification, network management and traffic engineering. This ... -
Enhanced security model for mobile banking systems in Tanzania
(IJTEEE, 2013)In mobile banking schemes; financial services are availed and banking services are provided using mobile devices. GSM services are greatly utilized for data transmission by the technologies used in conducting mobile ... -
Security Perspectives for USSD versus SMS in conducting mobile transactions: A case study of Tanzania
(IJTEEE, 2013)Performing transactions using mobile devices is increasing rapidly in developing countries, Tanzania inclusive. USSD and SMS are among the technologies widely used in conducting mobile transactions. These two technologies ... -
Overview applications of data mining in health care: The case study of Arusha region
(IJCER, 2013-08)Data mining as one of many constituents of health care has been used intensively and extensively in many organizations around the globe as an efficient technique of finding correlations or patterns among dozens of fields ... -
Available Bandwidth Estimation Techniques (ABETS) For An Efficient Telemedicine Content Transport Network
(IJERT, 2013-07)The ability to measure end-to-end Available Bandwidth (unused capacity) in the network path is useful for route selection in overlay networks, QoS verification, network management, traffic engineering and real-time resource ... -
Framework for Data Mining In Healthcare Information System in Developing Countries: A Case of Tanzania
(IJTEEE, 2013-10)Reporting the incidents to authorities in developing countries that can take actions has been a chaotic and slow process. This paper proposes an algorithm for a system that automatically reports events that compromise ... -
A Survey on Dynamic Spectrum Access (DSA) and Management in Vehicular Environment: The Case Study in Tanzania
(ResearchGate, 2013)This paper describes the survey approach to building a high-quality of dynamic Spectrum access (DSA) and management in vehicular environment networks in Tanzania as one of the ways of mitigating the shortage of access. ... -
Fuel Adulteration in Tanzania and its Consequencies: An Overview
(Rjeas, 2013)Adulteration of petrol and diesel fuel with kerosene is very common in Tanzania. It increases the tailpipe emissions of harmful pollutants from vehicles. These leads to this study, which tends to show the rate of emission ... -
Bandwidth Aware FEC Algorithms for Wireless Communication Systems
(IISTE, 2013)Forward Error Correction (FEC) codes used by receivers to correct transmission errors without retransmission add a considerable amount of redundant bits to data bits. The addition of redundant bits lowers the overall network ... -
Analysis of Quality of Service for WCDMA Network in Mwanza, Tanzania
(College of Business Education, 2015)This paper presents an analysis and evaluation of WCDMA network in both rural and urban areas of Mwanza, Tanzania. The analysis of data starts by collecting data through a drive test measurements by using ... -
Assessment of non transmittable codewords enhancement to Viterbi Algorithm Decoding
(LJS Publishing, 2014-09)Researchers have shown that practical mobile communication channels introduce errors that are concentrated in a certain locality rather than random errors. These are burst errors caused by deep fading of the wireless channel ... -
Analysis of ICT application in mitigating land conflicts: case study oftanzania
(LJS Publishing, 2015-11)Land conflicts are common phenomena in Tanzania. They can be understood in the context of history, social relations and the process of commoditization of natural resources such as land and land resources. One of the factors ... -
An overview of existing frameworks for integrating fragmented information systems
(International Journal of Information Sciences and Techniques (IJIST, 2016-11)Literatures show that there are several structured integration frameworks which emerged with the aim of facilitating application integration. But weakness and strength of these frameworks are not known. This paper aimed ... -
Performance Evaluation LoRa-GPRS Integrated Electricity usage Monitoring System for Decentralized Mini-Grids
(Science and Information (SAI) Organization Limited, 2020)The emerging Internet of Things (IoT) technologiesNsuch as Long-Range (LoRa), combined with traditional cellular communications technologies such as General Packet Radio Service (GPRS) offers decentralized mini-grid ... -
Early fire detection system in tanzania markets
(MDPI, 2020-11-14)Application of wireless sensor networks (WSN) and Internet of Things (IoT) used to provide real-time monitoring of fire outbreak in markets. The system integrates three subsystems namely; sensing subsystem which uses ... -
Development of IoT based Security System for Fire Monitoring and Prevention in Tanzanian Industries
(International Journal of Advances in Scientific Research and Engineering (ijasre), 2021-12)Over the past years, there have been great advances in ICTs which have led to the development of fire monitoring and prevention systems. Despite the existence of these solutions, fire incidents especially in Tanzanian have ... -
Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System
(IJCSNS, 2022-03)Health information systems (HIS) are facing security challenges on data privacy and confidentiality. These challenges are based on centralized system architecture creating a target for malicious attacks. Blockchain technology ...