Abstract Radio frequency spectrum scarcity has become a high priority research area over the past few years. The huge increase of network subscribers with multimedia applications coupled with underutilization of radio frequency spectrum motivates the search for other measures to address the scarcity of radio frequency spectrum. This work investigates on a price based spectrum sharing scheme for connection-oriented traffic in wireless cellular networks as a solution to address the scarcity of ...
ABSTRACT Theses and dissertations are among the most important sources of valid detailed information on a particular subject on which researchers conduct widespread research work. This study aimed at developing and evaluating an online electronic theses and dissertations system. The University of Dodoma was used as a case study for this dissertation. A mixed approach data collection method was used effectively in this study. Several literatures were reviewed so as to identify challenges that ...
ABSTRACT This research investigated the impact of network topologies on the performance of OpenFlow protocol. OpenFlow Protocol is a southbound protocol over Secure Socket Layer (SSL) in Software Defined Networking (SDN). SDN architecture separates the intelligence (decision making) part (control plane) of network devices from forwarding capability (data plane). OpenFlow protocol is the communication protocol for exchanging control messages between control plane and data plane. The research i...
ABSTRACT Software-Defined Network (SDN) is a new and booming network paradigm that promises to improve network performance. This is achieved by the separation of the control plane and the data plane. The traditional network faced a lot of challenges particularly on how to improve network performance, manual configurations of the network devices, and many more others. SDN overcome all these challenges by introducing the SDN controller that controls the entire network. This research work studie...
ABSTRACT The aim of the study was to evaluate the service performance of Fund Management Information System (FuMIS) of Zanzibar Social Security Fund (ZSSF). The data were collected by using questionnaires, interviews, technical documentary reviews and system analysis when the system users interacted with the system. The study examined the level of users‟ satisfaction on data accessibility from the system, response time, usability of computer applications and the system interfaces, as well a...
ABSTRACT With the increasing complexity of networks, Software Defined Networks have been developed to logically control all networking devices such as switches and bridges centrally through the use of software defined network controllers. Controllers include beacon, opendaylight, floodlight, pox, ryu and many more. Ryu SDN controller is one of the most popular python developed controller. Just as many other controllers’ Ryu may become a bottleneck since all other network controller controls...
ABSTRACT The focus of this dissertation was Improving Authentication Security Mechanism in Web Based Applications: A Case Study of Court Case Management System in Zanzibar. The study focused on two objectives. The first objective was to analyze the weaknesses of authentication security mechanism on the existing web based CMS. The second one was to devise the secured web based CMS prototype. Three techniques were used in collecting data. These are document review, penetration tests and observa...
ABSTRACT Cyber threats are becoming more sophisticated with the blending of one distinct type of attack on more damaging forms. Increased variety and volume of attacks are inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information. Following this alarming situation, this dissertation informs about a framework for cyber security risks for mobile money which was designed through the study that was conducted in Dodoma City to propos...
ABSTRACT Sign language has been used by Speech impaired people for communication purposes. Despite being an effective form of communication for speech impaired people, still there is a challenge for people who are unaware of sign language especially those with no such impairment to communicate with speech impaired people. Since Sign Language is a visual based language, several machine learning techniques have been used in sign language translation for better performance results. However, sign...
ABSTRACT Financial institutions play a vital role to enhance the socio-economic development of any country. Despite being a key player in socio-economic development, large group of people is still isolated in accessing formal financial services. Saving and Credit Cooperative Societies (SACCOS) are type of Microfinance Financial Institutions (MFIs) that came to solve the problem of isolating many people in attaining financial services. Loan default is a big challenge that causes weak performan...
ABSTRACT This study delved on the Implementation and Performance Evaluation of the Dual Stack Transition Mechanism at the UDOM LAN. The implementation phase involved simulating the network in the GNS3 simulator in which a number of hops were varied between 1 and 6. In addition, RIPv2 and RIPng were used as the dynamic routing protocols. The protocols were configured on each router interface to enable communication between the connected routers. After the implementation and configuration, the ...
ABSTRACT Number Recognition (NR), is a modern technique that uses optical character recognition on images to obtain desired characters. The technique involves four steps Image acquisition, pre-processing, character segmentation, and character recognition. This technique has been used in activities like license plate detection as Automatic Number Plate Recognition (ANPR). The manual revenue collection process currently operating at the Dodoma Municipal minibus terminals have deprived the Loca...
ABSTRACT The increase of technology in business processes, Tanzania has lead to a class of crimes known as cybercrimes. Towards the mitigation of the occurrence of the crime, Tanzania enacted the cyber law which helps in ensuring all necessary security measures maintained. However, with the growth of science and technology in the investigation process, the high court of Tanzania with the help of forensic professionals is in practice digital legislation whereby the analyzed digital evidence d...
ABSTRACT Network Vulnerabilities are weaknesses that allow attackers to bypass communication systems or network security. This grants the attackers access to crucial information on victim’s computer systems. So, analysis of network vulnerabilities is highly recommended as it helps to identify them in order to ensure a secured network. The experiments for this study were carried out on three networking environments. The first one was the CIVE LAN (as the main target), the second one was the...
ABSTRACT The growth in demand of multimedia applications such as file transfer, audio, video and Voice over Internet Protocol (VoIP) traffics have introduced the high need of good Quality of Services (QoS) through network devices like routers which led to the effect on Quality of Experience (QoE) to end-users. The QoS and QoE of the video streaming, file application and VoIP calls services on the low-cost Virtual Software Router (VSR) such as Vyatta and high-cost Hardware Router (HR) such as...