Abstract: Botswana is lagging behind in active participation in stem cell research. The research is yet to take off in the country. In order for stem cell research to be established in Botswana, the people of the country have to accept the research as affording a viable therapy alternative to conventional medicine. This study aimed to evaluate and analyse attitudes of the people of Botswana towards the establishment of stem cell research in Botswana. A survey study was conducted to examine p...
Abstract: The routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempster-shafer theory introduced a solution for these routing attacks where it entirely works on the principle of Dempster rule with various important factors to mitigate these critical routing attacks. Previously the system contains an Intrusion detection mechanism which is used to create a message whenever the attacker attacks the network. This Intrusion detection system sends an alert m...
Abstract: Finest Trail Setup Technique in Hive computing & virtualization Ambience[1] proposes a fuzzy logic based SVM approach to secure a collision free path avoiding multiple dynamic obstacles. The navigator consists of an FSVM -Based Collision Avoidance. The decisions are taken at each step for the providers & consumers to negotiate without collision. Fuzzy-SVM rule bases are built, which requires simple evaluation data based on the active participants in the Hive computing & virtualizat...
Abstract: Despite low levels of interest in programming by learners and perceptions that programming is difficult, it should be noted that programming’s importance has not diminished and should form core curricula of undergraduate computer science in education. A current challenge for the Computer Science department is to provide effective means of reducing attrition rates and enhance the potential of the department to recruit more students at Botho University. The purpose of the present s...
Abstract: In this research to detect the Stealthy Attacks such as misrouting, power control, identity delegation, and colluding collision. Those kinds of attacks easily launched against Multihop wireless ad hoc networks. When every the source and destination are communicate, to appear Stealthy Attacks and dropping or interrupt the packet from reaching the destination through malicious behavior node. To overcome this problem we can present a protocol called SNDP (secure neighbor discovery pro...
Abstract: Mobility, mobile technology and mobile computing are few buzz words in all the fields. This makes human beings life easy and goes for anywhere, anytime working conditions. In educational field Networking and mobile computing are playing major role in the shift from the traditional black board teaching to contemporary E-Learning and M-Learning environment. But the major issue with the wireless network is vulnerability, denial of service and in general security compared to the wired ...
Abstract: The smart grid has an important subsystem known as the Advanced Metering Infrastructure (AMI), responsible for measuring customer consumption of electricity. The AMI subsystem has smart meters as one of the components and they play a vital role in enabling communication between the utility provider and consumers. Smart meters can report real-time electricity consumption readings of the consumer to the utility. Securing this communication link from attacks remain very important for ...
Abstract: There has been a myriad of negative implications on teaching and learning at tertiary level that came along with the emergence of Covid-19 pandemic. The purpose of this paper is to investigate the lessons and opportunities presented by the pandemic to the learning and teaching process in Higher Educational Institutions (HEIs). The study employed a survey design and used diary and semistructured questionnaires as key data generation tools. A sample of 80 lecturing staff was used fro...
Abstract: Water distribution systems mostly involve laying of pipes with the digging of trenches to lay down water pipes as a significant activity. During rainy seasons, trenches tend to fill-up with rainwater before the said pipes could be laid. This poses a danger to workers and residents due to potential landslides. This paper presents the design and simulation of an autonomous anti-rain construction site cover system (AARCSCS), which automates the process of covering a trench or excavati...
Abstract: A system which comprises intercropping between rows of maize with plants that repel stem borers and attract natural enemies, and which also dramatically reduce the level of striga infestation, combined with a surrounding crop of plants that trap out pests, has been developed for use by resource-poor farmers in sub-Saharan Africa.The intercrop and trap crops provide forage for cattle and goats. The technology is called “push-pull”. It is knowledge-intensive and there are lessons...
Abstract: Genetic strategies for large scale pest or vector control using modified insects are not yet operational in Africa,and currently rely on import of the modified strains to begin preliminary, contained studies. Early involvementof research teams from participating countries is crucial to evaluate candidate field interventions. Following therecommended phased approach for novel strategies, evaluation should begin with studies in containmentfacilities. Experiences to prepare facilities...
Abstract: Aedes mosquito is the primary vector for Rift Valley fever virus which affects humans and animals. Virus transmission pathways in animals occurs when bitten by infected mosquito or when viremic animals relocate to new regions with competent mosquitoes. Though Rift Valley fever is a transboundary disease with serious economic consequences, movement of viremic animals in search of pasture or trade in spreading the diseases is not fully understood. This research was undertaken in orde...
Abstract: Tsetse-transmitted trypanosomiasis is a disease unique to Africa, affecting both humans and animals. This disease occurs in about 10 million km2 in 37 sub-Saharan countries corresponding approximately to one-third of Africa's total land area, and threatens an estimated 50 million people and 48 million cattle. The estimated annual losses in cattle production alone are in the range of 1.0-1.2 billion dollars. The diagnosis of trypanosomiasis is notoriously difficult as there are no s...
Abstract: Vector-borne diseases (VBDs) are a devastating global health problem. Mosquitoes are amongst the most important vectors of human VBDs. Several measures have been put in place to manage and eliminate these vectors, however they have all faced a variety of setbacks and raising the need to develop other methods of control. The use of bacterial endosymbionts is a highly promising new method to explore for this purpose. This study aimed to identify and characterize Spiroplasma, a matern...
Abstract: Mosquitoes are the primary vectors of arboviral infections. As there are no vaccines or effective therapeutic treatments for these diseases, vector control is an important approach for curbing their circulation or transmission. These vectors spend the first three of their four life stages in aquatic habitats where fitness and efficiency of adult mosquitoes to transmit arboviral infections is greatly influenced. Understanding ecology of mosquitoes in their aquatic habitats is theref...