Technology

Research Papers/Topics Technology

Attitudes of Batswana towards stem cell technology as an alternative therapy in Botswana

Abstract: Botswana is lagging behind in active participation in stem cell research. The research is yet to take off in the country. In order for stem cell research to be established in Botswana, the people of the country have to accept the research as affording a viable therapy alternative to conventional medicine. This study aimed to evaluate and analyse attitudes of the people of Botswana towards the establishment of stem cell research in Botswana. A survey study was conducted to examine p...

Detection and Avoidance of Routing Attack in Mobile Ad-hoc Network using Intelligent Node

Abstract: The routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempster-shafer theory introduced a solution for these routing attacks where it entirely works on the principle of Dempster rule with various important factors to mitigate these critical routing attacks. Previously the system contains an Intrusion detection mechanism which is used to create a message whenever the attacker attacks the network. This Intrusion detection system sends an alert m...

Volunteer Hive Computing and Virtualization in Botswana's Edification Techniques

Abstract: Finest Trail Setup Technique in Hive computing & virtualization Ambience[1] proposes a fuzzy logic based SVM approach to secure a collision free path avoiding multiple dynamic obstacles. The navigator consists of an FSVM -Based Collision Avoidance. The decisions are taken at each step for the providers & consumers to negotiate without collision. Fuzzy-SVM rule bases are built, which requires simple evaluation data based on the active participants in the Hive computing & virtualizat...

The Emergent Requirements for Visual Teaching Tools for Supporting Introductory Programming: A Case Study of Botho University, Francistown

Abstract: Despite low levels of interest in programming by learners and perceptions that programming is difficult, it should be noted that programming’s importance has not diminished and should form core curricula of undergraduate computer science in education. A current challenge for the Computer Science department is to provide effective means of reducing attrition rates and enhance the potential of the department to recruit more students at Botho University. The purpose of the present s...

Malicious Attacks Detection in Wireless Ad Hoc Networks by Using SNDP Protocol

Abstract: In this research to detect the Stealthy Attacks such as misrouting, power control, identity delegation, and colluding collision. Those kinds of attacks easily launched against Multihop wireless ad hoc networks. When every the source and destination are communicate, to appear Stealthy Attacks and dropping or interrupt the packet from reaching the destination through malicious behavior node. To overcome this problem we can present a protocol called SNDP (secure neighbor discovery pro...

Insecurity of WLAN for M-Learning Implementation in Tertiary Level by DoS

Abstract: Mobility, mobile technology and mobile computing are few buzz words in all the fields. This makes human beings life easy and goes for anywhere, anytime working conditions. In educational field Networking and mobile computing are playing major role in the shift from the traditional black board teaching to contemporary E-Learning and M-Learning environment. But the major issue with the wireless network is vulnerability, denial of service and in general security compared to the wired ...

A concealed based approach for secure transmission in advanced metering infrastructure

Abstract: The smart grid has an important subsystem known as the Advanced Metering Infrastructure (AMI), responsible for measuring customer consumption of electricity. The AMI subsystem has smart meters as one of the components and they play a vital role in enabling communication between the utility provider and consumers. Smart meters can report real-time electricity consumption readings of the consumer to the utility. Securing this communication link from attacks remain very important for ...

Lessons from Covid-19: A Silver Lining for Teaching and Learning In Selected Lesotho Institutions of Higher Learning

Abstract: There has been a myriad of negative implications on teaching and learning at tertiary level that came along with the emergence of Covid-19 pandemic. The purpose of this paper is to investigate the lessons and opportunities presented by the pandemic to the learning and teaching process in Higher Educational Institutions (HEIs). The study employed a survey design and used diary and semistructured questionnaires as key data generation tools. A sample of 80 lecturing staff was used fro...

Design and simulation of autonomous anti-rain construction site cover system

Abstract: Water distribution systems mostly involve laying of pipes with the digging of trenches to lay down water pipes as a significant activity. During rainy seasons, trenches tend to fill-up with rainwater before the said pipes could be laid. This poses a danger to workers and residents due to potential landslides. This paper presents the design and simulation of an autonomous anti-rain construction site cover system (AARCSCS), which automates the process of covering a trench or excavati...

Control of stem borers and striga in African cereals: a low input push-pull approach with rapidly expanding impact

Abstract: A system which comprises intercropping between rows of maize with plants that repel stem borers and attract natural enemies, and which also dramatically reduce the level of striga infestation, combined with a surrounding crop of plants that trap out pests, has been developed for use by resource-poor farmers in sub-Saharan Africa.The intercrop and trap crops provide forage for cattle and goats. The technology is called “push-pull”. It is knowledge-intensive and there are lessons...

Containment Studies of TransgenicMosquitoes in Disease Endemic Countries:The Broad Concept of Facilities Readiness

Abstract: Genetic strategies for large scale pest or vector control using modified insects are not yet operational in Africa,and currently rely on import of the modified strains to begin preliminary, contained studies. Early involvementof research teams from participating countries is crucial to evaluate candidate field interventions. Following therecommended phased approach for novel strategies, evaluation should begin with studies in containmentfacilities. Experiences to prepare facilities...

Mapping Exposure of Cattle to Rift Valley Fever Virus Along their Migratory Routes

Abstract: Aedes mosquito is the primary vector for Rift Valley fever virus which affects humans and animals. Virus transmission pathways in animals occurs when bitten by infected mosquito or when viremic animals relocate to new regions with competent mosquitoes. Though Rift Valley fever is a transboundary disease with serious economic consequences, movement of viremic animals in search of pasture or trade in spreading the diseases is not fully understood. This research was undertaken in orde...

Evolution and Diagnostic Potential of Major Surface Proteases from Trypanosoma Vivax, T.Brucei Brucei and T.Congolense

Abstract: Tsetse-transmitted trypanosomiasis is a disease unique to Africa, affecting both humans and animals. This disease occurs in about 10 million km2 in 37 sub-Saharan countries corresponding approximately to one-third of Africa's total land area, and threatens an estimated 50 million people and 48 million cattle. The estimated annual losses in cattle production alone are in the range of 1.0-1.2 billion dollars. The diagnosis of trypanosomiasis is notoriously difficult as there are no s...

Molecular Identification and Characterization of Spiroplasma in Anopheles Arabiensis from Kenya

Abstract: Vector-borne diseases (VBDs) are a devastating global health problem. Mosquitoes are amongst the most important vectors of human VBDs. Several measures have been put in place to manage and eliminate these vectors, however they have all faced a variety of setbacks and raising the need to develop other methods of control. The use of bacterial endosymbionts is a highly promising new method to explore for this purpose. This study aimed to identify and characterize Spiroplasma, a matern...

Characterization of Microhabitats of Arboviral Mosquito Vector Larvae on Three Islands of Lake Victoria, Kenya

Abstract: Mosquitoes are the primary vectors of arboviral infections. As there are no vaccines or effective therapeutic treatments for these diseases, vector control is an important approach for curbing their circulation or transmission. These vectors spend the first three of their four life stages in aquatic habitats where fitness and efficiency of adult mosquitoes to transmit arboviral infections is greatly influenced. Understanding ecology of mosquitoes in their aquatic habitats is theref...


91 - 105 Of 1120 Results
@