Masters Dissertations
Permanent URI for this collection
Browse
Recent Submissions
Item Adaptive anisotropic diffusion-driven model for denoising iris images(University of Dar es Salaam, 2021-04) Kyando, Daniel M.Biometric recognition is the automatic recognition of individuals based on their physiological or behavioral characteristics. A variety of systems require reliable personal recognition schemes to confirm or determine the identity of an person requesting access or service. IRIS recognition refers to biometric systems used to recognize individuals based on their IRIS patterns. In the absence of robust denoising method, these systems are vulnerable to the inaccurate interpretation of the patterns and granting access or service to illegitimate users. The classical Perona-Malik model has attracted wide attention of scholars for its ability to restore corrupted images while preserving useful details (edges and contours). Despite its notable achievements, this model requires manual tuning of the shape-defining diffusion coefficient to generate optimal results. Consequently, the tuning process, which suffers from inconvenience and time-ineffectiveness limits the model in time sensitive application like interpreting the IRIS patterns. Therefore, this work presents a method to adaptively update the value of the shape-defining diffusion coefficient in relation to the noise statistics in the IRIS image. Through a series of experiments, it was observed that the coefficient strongly correlates with the noise statistics in the IRIS image. Therefore, a relationship to describe the correlation was established and encapsulated into the evolutionary polynomial of order two. The polynomial was fitted from running 39 million iterations to generate two-dimensional space R^(K×σ) that contains K and σ variables. Least Absolute Residuals (LAR) is used to approximate the constants. The constants were α=0.00473,β=2.134,and γ=-0.3696 with 95% confidence boundary. The proposed diffusion function was further tested in removing noise in the IRIS images. It generated visually appealing denoized images with higher information content. It sharpens the edges and distinguishes them clearly from homogeneous image a region which is crucial in identification of texture patterns in IRIS imagesItem Investigation of factors affecting the use of mobile systems in accredited drug dispensing outlets in Mufind district, Iringa region, Tanzania(University of Dar es Salaam, 2020) Elias, AlistairThe penetration of the internet and mobile technologies have enabled different kinds of mobile applications to be deployed in the pharmacy sector with varying levels of success. One measurement criteria of success is how much users are willing to use the system. However, little research has been done in Tanzania to ascertain what would entice pharmacists to adopt these applications for everyday use. This study investigated the factors affecting the use of mobile-based systems in accredited drug dispensing outlets in Iringa, Tanzania by developing a research model from the reviewed literature and by utilizing a sequential explanatory mixed research design. A simple of 103 pharmacists out of 150 in ADDOs in Mufindi district in Iringa region was derived using convenient sampling. The data that was collected from them was tested against the research model using regression analysis in order to determine factors towards intention to use mobile- based systems. Finally, 20 users were interviewed to explore more about the determined factors. The study discovered that two factors, information quality (β =. 38) and price value (β =.22)had a significant effect on the intention of pharmacists to use mobile to use mobile –based systems in ADDOs. However, three factors, system quality, service quality and habit, were found not to have a significant effect. The users revealed through interviews that while they were impressed by the system, it needed improvements and they needed extra training. The strategies on how to increase usage of mobile based systems in ADDOs, and ultimately leading to their success have been outlined and discussed.Item Improvement of Service Broken by Incooperating results Saving Function in interactive ilab shared architecture.(University of Dar es salaam, 2020) Bilinzozi, Perpetua JohnThe iLab architecture was develop by MIT and used by several Universities across the world, including University of Dar es salaam. It is an online platform on which handling of experiments is done by service broker. The service broker could not save experiment results leading to disappearing of experiment results once the laboratory session is closed. Understanding well the academic goal of doing experiments which is results observation and analysis; this research works identifies the need to improve iLab by enabling students and instructors to be able to view and experiment results any after the laboratory session is closed. This research presents the approach taken to add new capabilities for saving experiment results into the service broker. It is a programming work done on ASP, Net platform, SQL html and LabVIEW, using Microsoft visual studio software development tools experiment results and data were captured from LabVIEW and saved into SQL database and these data were made available on the web pages. Sample experiment used was RC circuit experiment to observe the characteristics of the capacitor also the characteristics of 1N4148ph diode. The feature will increase the flexibility of the iLab shared architecture and provides the possibility to more revision time to students. Few electronic experiments were chosen since much emphasis was not placed on the complexity of the experiments rather services as a proof of concept for how data can be saved and further retrieved from the interactive iLab shared architecture and the correctness of the data saved.Item An effcient radio frequency energy harvester for iot devices in Tanzania(University of Dar es Salaam, 2020) Isingo, FredrickAn effcient radio frequency energy harvester for iot devices in Tanzania Fredrick Isingo M.Sc(Electronics Science and Communications) University of Dar es salaam,CoICT, 2020 Radio Frequency (RF) energy harvesting is gaining more popularity as an alternative source of energy for ultra-low power devices within the Internet to Things (IoT) and beyond, it is also demonstrating a promising future for energizing low power electronic devices. Currently, several kinds of research have been conducted to extract as much power as possible from the harvested RF energy in spite of its low power density, leading to low output voltages and current insufficient to be utilized directly by electronic devices. This poses a major challenge in designing and implementing such harvesters. This research was aimed at designing an efficient and effective radio frequency energy harvester, it was achieved by surveying and knowing the available and harvestable RF with their respective signal powers, designing an appropriate impedance matching network for a specific frequency allowing maximum power transfer to a first stage voltage multiplier, the later was integrating the voltage multipliers to form a hybrid voltage multiplier. The proposed design was setup and simulated using Key sight’s Advanced Design System (ADS) 2019 with real time values obtained from the RF survey. The results obtained from the RF survey show the harvestable frequency bands having a Received Signal Strength Intensity (RSSI) greater than -50dBm were 800MHz, 1800 MHz, 2100 MHz and 2400 MHz. Each band had its dedicated independent impedance topology designed to tunnel its maximum power with a pre-boost single stage voltage multiplier. The simulation results reveal that, by using narrowband impedance matching, the power transfer from source to load increases by 35% and the output power increases by a factor of (1.2 - 2) Volts. The hybrid voltage multiplier achieved outputs ranging from 3.6 to 7 Volts at -55 to -20 dBm respectively. The output generated can be used to power ultra-low-power sensors, remotes, loggers, and computer peripherals for an endlessly period hence battery less gadgets that can last longer and eliminate battery dependency and usage.Item Analysis of the impact of smartphone signaling load on call quality across radio network controller of a 3G network: a case of Airtel Tanzania(University of Dar es salaam, 2020) Lema, SalhaThis study is about analysis of the impact of smartphone signaling load on call quality across radio network controller of a 3G network. The study was conducted at Dar es Salaam region, in which Airtel Tanzania Limited was taken as a case study. The main motivation behind this study was the fact that smartphone is the recent innovative technology in the telecommunication industry and there were few researches done to analyse its impact in the existing network as well as services from different aspect especially in Tanzania or East Africa areas. The specific objectives of the study were; to estimate current Smartphone signaling utilization in the Radio Network Controller (RNC), to determine the impact of smartphone signaling load on RNC performance, to determine the impacts of RNC performance on call quality as well as to propose possible solutions that might help to improve call quality in 3G network. The methodology used involve both primarly and secondary data, were primarly data was collected via live network test and secondary data was collected by using documentary sources and case study network performance reports. The analysis of both primarly and secondary data was done using terms & ACTIX analyzer software’s provided by case study, and implementation of the study involves mathematical modal as well as analysis approach. The findings on the study were: - Smartphone signaling load has impact in call quality across the RNC of 3G network and 50.6% of the signaling available in RNC is due to smartphone’s which correspond to 72.3% of the current RNC signaling utilization threshold. The study recommends the possible solution for improving call quality in the 3G network to include features that will help RNC to enhance its capability of resource management and allocationItem Modelling of access network to the national broadband backbone using optical wireless technology(University of Dar es Salaam, 2020) Kileo, Aude NishaelGrowing demand for high bandwidth is unavoidable as the number of users increases dramatically every day. The current access networks are unable to serve many users at the same time due to bandwidth limitations. Despite the effect of government to construct the National Backbone Broadband to close the digital gap and promote sustainable socio-economic development, National Information and Communication Technology Broadband Backbone is underutilized due to access network bandwidth limitations problems. The rapid development of the mobile Internet and the predominance of smart devices, such as smartphones, tablet computers, and wearable communication devices have come with high demand on the bandwidth of the transmission medium; there is an exponentially increasing demand for data transmission in networks in recent years. In this study, Optical Wireless Technology is introduced where the atmospheric attenuation as the main wireless impairment is calculated. The mathematical channel modeling effort discussed in this study is the first real attempt towards the availability and reliability prediction of terrestrial Optical Wireless links through simulation in Dar es Salaam. User's requirements were established by comparing the existing access network performance metrics and the practical achievable metrics performance required by network end-user. The atmospheric attenuation for different weather conditions calculated and the results was used to measure the performance of different network metrics. Simulation results showed optical wireless technology bandwidth restrictions is not an issue as the system can provide up to 94.3% throughput, the signal delay of 0.81915 us and cost of installations is 0.25% of the existing access technologies. Most of the access technologies are limited to bandwidth while optical technology is bandwidth unlimited. Optical Wireless Technology has some challenges that are weather-based conditions, in this study simulation done to know the challenges that are faced due to the weather conditions of Dar-es-Salaam as a study area.Item Low cost acquisition of power consumption data in electrical secondary distribution network(University of Dar es Salaam, 2020) Yahya, Salim MohamedIn modernizing the grid (towards smart grid), especially in distribution network, power consumption data acquisition is of paramount importance, the old installed systems cannot remotely deliver required information and currently available solutions involve mainly smart meters which are usually too costly to be adopted in developing countries. Also, due to installation location, by passing the meter. Affordable data acquisition systems are hence a key requirement to wards realization of the modern grid referred to as smart grid. The study involve stakeholder of electrical power system through Challenge Driven Education (CDE) approach in identifying the problem and requirement gathering. System design, simulation and testing with the help of Proteus and Arduino software for electronic circuit designs and Omnet ++ for identification of suitable wireless sensor network (WSN). Mathematical models for system deployment costs were developed and Matlab software was used in evaluation phase where costs between the proposed data acquisition system was designed, simulate and then successfully implemented and tested for performance. The study found out that the system could be deployed to acquire power consumption data at 50% lower equipment acquisition costs and 75% lower installation costs than that of smart meter hence balancing the functional tradeoffs between the two solutions while fulfilling the utility’s data acquisitions.Item Multiframe super-resolution algorithm for improved performance of human palm vein recognition system(University of Dar es Salaam, 2018) Venance, LillanPalm vein recognition (PVR) is an upcoming biometric technology of recognizing individuals based on the geometrical arrangement of the palm veins. The PVR system consists of four fundamental stages: image acquisition, image pre-processing, feature extraction, and matching. The perfection of image acquisition and pre- processing stages determine the overall accuracy of the system. Focusing on the pre-processing stage, classical methods fail to generate more informative vein patterns by suppressing noises and blur, and by restoring useful image features (edges, lines, and contours) from the acquired image. This weakness calls for expensive commercial PVR systems that attempt to neutralize the impacts of the pre-processing stage. This research introduces Multiframe Super-Resolution (MRS) algorithm that can improve the pre-processing stage of the classical PVR systems. This approach suppresses noise and enhances spatial resolution of an image, and ensures protection of the critical features of the image. The proposed PVR system was tested using CASIA Multi-Spectral Palm-print Image Database, which contains 600 palm vein images captured at 850nm from 100 different people. Results show that the PVR system integrated with the MSR algorithm outperforms, giving false acceptance rate (FAR) and false rejection rate (FRR) of 0.67% and 1.00%, respectively, whereas the classical PVR system generated FAR of 2.00% and 4.33%, respectively. The results provides insights on the possibility of augmenting the available PVR systems with an inexpensive image acquisition scanner by embedding MSR algorithm that allows low quality images to be captured w ithout degrading system's performance.Item Enhancing parental involvement in children academic life using digital diary(University of Dar es Salaam, 2018) Jeremiah, Sekione RewardA good relationship between teachers and parents enable children to have better academic performances, fewer behavioral problems, better language skills and social competence. Many parents have not been able to participate in their child's academic life due to work commitments, schedules, distance, and lack of time. Many schools tend to send letters and paper-based diaries to engage parents in their child's academic life. However, letters and paper-based diaries rarely reach parents on time and information may not reach parents if they are not at home. The study examined the use of digital diary as a tool for enhancing parental involvement in children's academic life. The development of the digital diary followed extreme Programming agile method where 87 parents and 6 teachers from St. Florence academy were involved. Parents and teachers were given three months to use the tool before testing for its usefulness and effectiveness. Data were obtained from seven teachers and 82 parents through semi-structured interviews and questionnaires respectively as well as from system generated reports. The study found that the majority of respondents (84.4% of parents and 96.7% of teachers) indicated that digital diary was a useful tool as it enabled parents to receive timely updates to track a child's progress via their smartphones. Moreover, computer-generated reports showed that messages to/from parents were delivered with approximately 90% success rate. This research argues for schools to adopt and use digital diaries for easy, engaging, and effective home-school communications for better parental involvement.Item Integrating Electronic Medical Records Data Into National Health Reporting System To Enhance Data Reporting At The Facility Level A Case Of E Hms And Dhis2 in Tanzania(2019) Kikoba, Bigten RamadhanA well organized and coordinated health reporting system is critical for improved health system and health care services delivery. In Tanzania, health data is collected at health facilities and managed by Health Management Information System (HMIS) unit through District Health Information System (dhis2). However, data collection and reporting at facility level is error prone and task demanding due to the manual processes of collecting, aggregating, reviewing and sharing data. This study utilizes the opportunity on growing number of hospitals adopting and using Electronic Medical Records (EMR) to integrate EMR data into the national health reporting system (DHIS2) so as to improve facility health data reporting. The study adopted an exploratory case study design, where by qualitative data collection was done to study the existing reporting processes through interview, documentation reviews, observation and system reviews from hospitals, district health data managers and the ministry of health .The preliminary results informed the design and development of an integration prototype of EMR-DHIS2 using out-patient (OPD) and in-patient ( IPD) data set forms. Finally, quantitative data analysis was done to evaluate the effectiveness of integration prototype using HMIS reports. The findings show that, hospitals are using EMR in clinical operations but data aggregation and reporting are done manually using reporting books like registers, tally sheets and summary forms. This process has found to be error prone. After integration, the evaluation results show that data sent electronically from EMR at the health facility to DHIS2 improves data completeness, eliminates delays and transcribing errors in reporting and also reduces reporting burgen on health workers. However, data quality of the reported data sets in affected in correctness and accuracy parameter due to ineffective use of EMR to capture key data sets during clinical.Item An assessment of Halotel Tanzania promotional strategies in increasing customer base(University of Dar es salaam, 2019) Solla, Eliafile LucasThis study assessed the promotional strategies employed by Halotel Tanzania to create a customer base in an already saturated telecoms market. Specifically, the study intended to examine what promotional strategies Halotel Tanzania deployed to create a customer base in an already competitive business, assess the effectiveness of the promotional strategies Halotel deployed in relation to company performance and find out what made these promotional strategies unique and their implication for marketing telecoms products and services. The study used mixed methods in a case study. Also a survey was employed to support and facilitate data collection from fifty Halotel customers, advertising and promotion agents in Kinondoni Municipality and ten Halotel members of staff. These respondents were selected using convenience and purpose sampling techniques and a questionnaire survey with closed ended questions. The questionnaires were distributed to them and then later on followed unstructured interviews with Halotel members of staff. The data from unstructured interview were subjected to thematic content analysis whereby common themes from interview were identified and interpreted. The IBM Statistical Package for Services Solution (SPSS) version 21 on the other hand, was used to analyse data obtained from closed-ended questionnaires. The study found that, Halotel Tanzania was willing to lower prices, willing to risk and follow new customers to where other MNOs had not yet reached or were not willing to risk. Also, the study found that the firm was resilient in countering and competing with other MNOs that were well-established. Furthermore, the study found that Halotel Tanzania targeted people normally ignored in rural population and Halotel strategically invested their services which resulted in creating a fast growing customer base.Item Security modeling for protecting electronic patients’ consent(University of Dar es Salaam, 2018) Damas, EmmanuelThe adoption of health information system (HIS) in the health sector has emerged as a significant element in the healthcare domain. Electronic patient records (EPR), which are part of HIS, represent patients’ medical records electronically. Patients’ consent to EPR access is crucial for patients’ privacy to be achieved. Research studies were done on consent management system (CMS) adoption and integration with HIS as the way to manage EPR access in HIS. However, majority of them provides inadequate security mechanism to protect the patients’ consent. This study has developed a model to protect patients’ consent. The model development process involved identification of HIS and CMS as assets. Then, identification of threats on CMS was performed to determine the types of threats that may affect patients’ consent. This was performed together with attack trees analysis and risk assessment. Then, the model was design by applying cryptography techniques to ensure CMS security requirements are achieved. Simulated and collected data from the university of Dar Es Salaam Medical Center were used to test the developed model. Develop model enforced CMS to process requests from trusted and registered sources only. It also provides assurance of consent integrity and confidentiality without depending on third party technologies such as Secure Socket Layer (SSL) .In addition, audit trails, authorization and reliable availability of consent are provided by the developed model. Therefore, the develop model has improved patients’ security significantly compared to other studies in the reviewed literature.Item IoT Middleware adaptation in Developing Interoperable smart meter Architecture(University of Dar es Salaam, 2019) Luambano, Merina MarcelinoThe increased number of Internet of Things (IoT) enabled appliances from vendors having different standards, makes interoperation difficult across advance metering infrastructure, hence resulting to vendor lock-in situation, and difficulty to develop new applications. Interoperability is the new and important requirement in developing IoT-based smart meter system for ease integrations of devices and applications. This study developed an architecture that adapts IoT middleware layer to a metering system for the aim of bringing in interoperation capability. IoT smart meter requirements were gathered and appropriate Kaa middleware technology was selected for adaptation. Prototype of the proposed architecture was implemented in laboratory as a proof of concept. Three real home-appliances were used in testing scenarios. Furthermore, system data accuracy and power consumption were evaluated to insure the good performance of the developed system. Successfully implementation of the proposed architecture designed in this study ensured that any deployment of this smart meter to a real system will provide interoperation across the Advanced Metering Infrastructure (AMI). Laboratory results showed that, the system consumes 35% more power due to extra execution of newly adapted middleware application embedded to it. Moreover, the data received on the middleware server from the appliances are accurate enough by 98%; and therefore they can be trusted to be used by other entities in the infrastructure, including smart meter applications.Item Dynamic channel allocation for coexistence of IEEE 802.11 WLAN and LTE-U in 5GHz unlinced spectrum(University of Dar es Salaam, 2019) Dismas, JacquelineThere has been an exponentially increasing demand for wireless data transmission in cellular networks in recent years due to the rapid development of mobile Internet and the predominance of smart devices, such as smart phones, tablet computer and wearable communication devices. This development has caused an escalating frequency spectrum scarcity in the licensed spectrum bands for cellular networks. To address this, standardization efforts have recently started to consider the possibility for cellular networks to use the unlicensed spectrum bands, including the 2.4 GHz and 5GHz bands which are currently used by other wireless systems. This study proposes a dynamic channel allocation algorithm which supports the coexistence of LTE-U and IEEE 802.11 WLAN in unlicensed band. The designed algorithm is based on the adaptive allocation of sub frames in LTE structure intended to reserve sufficient number of ABS in LTE structure which are to be accessed by WiFi in order to ensure fair access opportunity for WiFi. The ABS allocation and choice of LTE sub frames structure is based on the WiFi Optimum traffic load estimated by considering the number of users, contention window and back off stage. Results of the study indicate an improved performance in terms of throughput of both LTE and WiFi as compared to existing scheme which makes use of static ABS allocation with an explicit allocation of 3 ABS frames. The throughput improvement is by 56% for LTE and 8% WiFi. These results have been achieved by managing congestion in the network and efficient allocation of resources.Item Modelling of access network to the national broadband backbone using optical wireless technology(University of Dar es salaam, 2020) Kileo, Aude NishaelGrowing demand for high bandwidth is unavoidable as the number of users increases dramatically every day. The current access networks are unable to serve many users at the same time due to bandwidth limitations. Despite the effect of government to construct the National Backbone Broadband to close the digital gap and promote sustainable socio-economic development, National Information and Communication Technology Broadband Backbone is underutilized due to access network bandwidth limitations problems. The rapid development of the mobile Internet and the predominance of smart devices, such as smartphones, tablet computers, and wearable communication devices have come with high demand on the bandwidth of the transmission medium; there is an exponentially increasing demand for data transmission in networks in recent years. In this study, Optical Wireless Technology is introduced where the atmospheric attenuation as the main wireless impairment is calculated. The mathematical channel modeling effort discussed in this study is the first real attempt towards the availability and reliability prediction of terrestrial Optical Wireless links through simulation in Dar es Salaam. User’s requirements were established by comparing the existing access network performance metrics and the practical achievable metrics performance required by network end-user. The atmospheric attenuation for different weather conditions calculated and the results was used to measure the performance of different network metrics. Simulation results showed optical wireless technology bandwidth restrictions is not an issue as the system can provide up to 94.3% throughput, the signal delay of 0.81915 µs and cost of installations is 0.25% of the existing access technologies. Most of the access technologies are limited to bandwidth while optical technology is bandwidth unlimited. Optical Wireless Technology has some challenges that are weather-based conditions, in this study simulation done to know the challenges that are faced due to the weather conditions of Dar-es-Salaam as a study area.Item Authentication voters on mobile E-Voting technology: a case students' Election System at the University of Dar es Salaam(University of Dar es Salaam, 2015) Benedict, LogathoMobile phones are set to dominate most of the human activities such as informal and formal communications, mobile banking, business transactions and advertisement. Currently the use of mobile phones on supporting the process of voting such as vote casting has a little bit started but it is lacking security. Most of the research has been done on how to authenticate user on e-voting based on remote internet through personal computer, Laptop and other special device purposely made for e-voting Mugisha (2008). This work proposes a method on how to authenticate voter on mobile e-voting process through his/her mobile phone number supported with registration number and password. user is required to create password must first be stored in a database used for matching the correct stored and encrypted mobile phone number and registration numbers. the stored phone number is encrypted by using MD5 hash function and password is encrypted by using two fish encryption function. The two algorithms are used because are strong enough and light to be used in mobile phone applications. The issue of coercion is still not completely solved for this type of e-voting as it is possible for someone to either by force or bribery tell another person to vote in favour for some preferred candidates. Thus alleviating the problem of coercion on mobile e-voting is left as a future work.Item Developing an interactive multimedia content to enhance road safety Education for primary school pupils in Tanzania(University of Dar es salaam, 2019) Makundi, FelixPedestrian road accidents are one of the top three causes of death for people after HIV/AIDS and malaria sub-Saharan Africa. In Tanzania, SUMATRA report of 2017 indicates that the majority of victims of pedestrian road accidents were children aged 5 to 12 years. Several efforts have been made by the government of Tanzania to enhance road safety education to children, which includes road safety awareness programs via TVs, radio, and billboard advertisements. Due to the advancement of ICT in education several training. However, these content are designed and developed in alignment to other countries road safety education curriculum therefore, they cannot be generalized to Tanzania. Extreme programming practices were used in the design and development process of the interactive multimedia content. Questionnaires were used to collect data from pupils in order to evaluate effectiveness of the content in a pre-test and post-test design. Furthermore, focus group discussions were used to collect opinions from teachers and traffic police officers on the pedagogical effectiveness of the content. From the findings the content seemed to enhance road safety education whereby there was an increase of percentage of pupils who got the correct questions in the post-test such that (75% of pupils from Osterbay, 90% of pupils from Saku and 79.2% of pupils from Mlimani) in Pedestrian crossing rules, (70% of pupils from Osterbay, 65% of pupils from Saku and 82.%% of pupils from Mlimani) in Road traffic signs rules and (91.7% of pupils from Osterbay, 84.2% of pupils from Saku and 85% of pupils from Mlimani) in acceptable and proper behaviours on the roadItem Identity management for ICT services at the University of Dar es salaam(University of Dar es Salaam, 2006) Lwanda, Peter HerbertICT service is faced by several security problems. The major problem is identity theft which causes unauthorized access to resources, difficulties in resources sharing, between users. Identity management is the concept of centralizing user identities, controlling resource provisioning and managing system access by using technology combined with effective business process. This dissertation presents the findings on the current identity Management system of the University of Dar es salaam. The research was done using questionnaires, laboratory experiment and practical experience. The study showed that the University of Dar es salaam has sufficient technology to implement identity management system but it is lacking proper business process. Since the University of Dar es salaam network is a heterogeneous, comprising of window servers, Linux servers and Windows workstations. The best way of improving identity management system under this condition is creation of Enterprise directory (University wide Directory), using Fedora Directory server for Authentication purpose and Departmental directories using either active directory or OpenLDAP for resource authorization. The University should also develop ICT policy and procedures to support that technologyItem Improving Census Data Collection and Processing Through Mobile Based Application(University of Dar es Salaam, 2016) Mkea, SamwelThe most important capital a society can have is human capital these are several means used to conduct census enumeration. One of them is senses enumeration through mobile application. This approach seems to be advanced; however to some extent, it is embedded with shortcomings. One of them is that during data entry and unloads to the database, it is possible to make errors or enter incorrect data entry and upload to the database, it is possible to make errors or enter incorrect data and another is inefficiency in perfuming data collection in a network fluctuating situation. To address the shortcomings, the study developed algorithms that contain mechanisms of defecting and collecting errors, mistakes, and incorrectness which might be caused by enumerators. On the hand, the mechanisms of improving the effectiveness of the approach were well well developed to permit smooth data collection in a network fluctuating situation. The developed mechanisms eliminate delay when network is unstable. Data collection is to be conducted regardless of the network strength. Testing and evaluation of the developed prototype in comparison with the existing was done. The results showed that, with the proposed solution, some errors and mistakes which were not identified in existing solutions were detected and corrected in the proposed solution. In addition the developed prototype shows more capability, flexibility, and efficiency in data collection in network fluctuating areas compared to existing solutions.Item Implementation of proof of retrievability security scheme for cloud storage on dynamically changing data(University of Dar es Salaam, 2017) Mwasampeta, BarakaData integrity is one of the vital aspect that could make stakeholders utilize fully the benefits brought by the use of cloud computing. Users concerns, like data integrity, on utilizing cloud storage arise because the administration of their data is under control of someone else. This research proposed the approach for implanting proof of retrievability (POR) scheme for assuring data integrity on the cloud storage with dynamically changing data. This study extracted empirical data from existing documents for the subject under investigation. It uses experimental method on testing cloud environment by the use of a simulation tool. The research provides the design on implementing dynamic proof of retrievability scheme as a solution to the data integrity problem. On ensuring integrity of dynamic data re-calculation of metadata was performed every time when data were modified. SHAI and MDS were used as hashing algorithm while creating metadata on the solution given. The developed solution assures data integrity by allowing a client to challenge the sever for the integrity of his/her static or dynamic data stored in a server Thus the implemented POR scheme on cloud storage has shown that it can ensure the integrity of both static and dynamic data files. With this solution, cloud providers can benefit from the improved security by enhancing their services to the clients with assured data integrity. Once the integrity has been ensured by the implementation of proof of retrievability users will be confident on utilizing the services