KIU Institutional Repository
Research and publications for Kampala International University Community
Communities in DSpace
Select a community to browse its collections.
Recent Submissions
Item
UTILIZATION OF BLOCKCHAIN TECHNOLOGY BY UPDF FOR SUPPLY CHAIN TRANSPARENCY AND TRACEABILITY
(Journal of Applied Sciences, Information and Computing (JASIC), 2023-11) Sulle Tabu Ale & V. S. Manjula
To sustain ethical sourcing practices, prevent the sale of counterfeit goods, and increase consumer confidence,
organizations must provide transparency and traceability in their supply chains. This case study focuses on the
Uganda People's Defense Forces (UPDF) and examines the creation and implementation of a blockchain-based
application for improving supply chain transparency and traceability. The main goal is to look into how a
blockchain application may enhance supply chain management, decrease corruption, and increase
accountability in the UPDF's logistics and procurement procedures. In order to provide transparency,
immutability, and decentralized control, the app will use blockchain technology to record and verify each stage
of the supply chain, from purchase through delivery. The investigation will take into account whether the
UPDF has access to the infrastructure and training required to use blockchain technology. A mixed-methods
approach will be used to combine quantitative data from transaction logs and supply chain records with
qualitative data from stakeholder interviews and observations. The study will evaluate the app's effects on
supply chain efficiency, transparency, and traceability as well as any risks and rewards of integrating
blockchain technology into the UPDF's supply chain ecosystem. Finally, this technique seeks to advance
knowledge of how blockchain technology might enhance supply chain management in governmental and
military contexts by examining the adoption of a blockchain-based app within the UPDF's supply chain. The
results will advise policymakers, procurement officers, and R researchers on the applicability of block chain based apps for boosting supply chain transparency. They will offer insights into the viability, effectiveness,
and potential barriers of using blockchain solutions
Item
ICT-ENABLED SOLUTIONS TO FARMERS INCREASE CROP YIELDS WHILE REDUCINGTHEIRUSE OFENERGY
(2023-07) Dr. V. S. Manjula , Fatou Marega , Robert Ssali Balagadde
This book chapter explores the role of Information and Communication Technology (ICT)-enabled solutions
in agriculture to increase crop yields while simultaneously reducing energy consumption. It discusses
various ICT tools and technologies, including precision agriculture, data analytics, remote sensing, and
smart irrigation systems, and their applications in optimizing resource allocation,improving decision-making
processes, and promoting sustainable practices. The chapter highlights the benefits, challenges, and future
prospects of implementing these ICT-enabled solutions in agricultural systems.
Item
IMPACT OF DIGITIZATION OF SUSTAINABLE AGRICULTURE IN UGANDA: A CASE STUDY
(Journal of Applied Sciences, Information and Computing (JASIC), 2023-07) Nabulongo Ali, V. S. Manjula and Fatou Marega
Uganda has made outstanding progress in agricultural output, which is crucial for preserving the
safety of the country's food supply. The role of technology and digitization in promoting
sustainable agriculture practices in Uganda. The case study will focus on various innovative
initiatives and solutions that have been implemented in the country to enhance agricultural
productivity, reduce environmental impact, and improve livelihoods. By examining the current
state of technology adoption in Ugandan agriculture, analyzing successful case studies, and
identifying challenges and opportunities, this research will provide valuable insights into the
potential of technology and digitization to drive sustainable agricultural development in Uganda."
Item
IDENTIFICATION AND MITIGATION OF THE VULNERABILITY OF WEB APPLICATIONS IN INSTITUTIONS OF HIGHER EDUCATION
(Journal of Applied Sciences, Information and Computing, 2023-07) Sabo Muhammed, Muwanga Zake, V.S. Manjula and Auwal Saleh
The security of information technology, specifically web applications, has become an area of concern
today. Computer cybercrime is now a significant problem that affects more than just businesses and
organizations. Higher education institutions also began to experience computer threats that revealed their
information assets. Universities, polytechnics, colleges of education, research centers, and other
postsecondary institutions are probably the most vulnerable because they house sensitive data on their
faculty, staff, and students, as well as academic records of scientific and technological advancements and
research. The first step in an information system security strategy is risk analysis management It helps in
assessing the risk of information assets to know their security level or status, and assist in define a security
control measures and implementation of technical plan to avoid threats that exploit some vulnerability that
could cause severe damage to an asset or infrastructure of institutions higher education (IHEs). This article
presents some recommendations to perform a risk analysis management in IHEs to accessed threats and
vulnerability that helps to lower the risk of their information assets. This article presents existing
educational threat and vulnerability on their web applications. Ensuring security is a goal of every
organization regardless of its size or purpose and also proposed a risk management model. With the
information technology, an organization may be considered secure when it ensures the confidentiality,
integrity, and availability of information and IT assets. Confidentiality may be broken due to theft of
sensitive information such as trade secrets, clients’ personal information.
Item
A REVIEW OF CLUSTER UNDER-SAMPLING IN UNBALANCED DATASET AS A METHODS FOR IMPROVING SOFTWARE DEFECT PREDICTION
(Journal of Applied Sciences, Information and Computing (JASIC), 2023) Abdulhamid Sani, V. S. Manjula and Musa Ahmed Zayyad
In many real-world machine learning applications, including software defect prediction, detecting fraud,
detection of network intrusion and penetration, managing risk, and medical dataset, class imbalance is an
inherent issue. It happens when there aren't many instances of a certain class mostly the class the procedure
is meant to identify because the occurrence the class reflects is rare. The considerable priority placed on
correctly classifying the relatively minority instances—which incur a higher cost if incorrectly categorized
than the majority instances—is a major driving force for class imbalance learning. Supervised models are
often designed to maximize the overall classification accuracy; however, because minority examples are
rare in the training data, they typically misclassify minority instances. Training a model is facilitated by
balancing the dataset since it keeps the model from becoming biased in favor of one class. Put another way,
just because the model has more data, it won't automatically favor the majority class. One method of
reducing the issue of class imbalance before training classification models is data sampling; however, the
majority of the methods now in use introduce additional issues during the sampling process and frequently
overlook other concerns related to the quality of the data. Therefore, the goal of this work is to create an
effective sampling algorithm that, by employing a straightforward logical framework, enhances the
performance of classification algorithms. By providing a thorough literature on class imbalance while
developing and putting into practice a novel Cluster Under Sampling Technique (CUST), this research
advances both academia and industry. It has been demonstrated that CUST greatly enhances the
performance of popular classification techniques like C 4.5 decision tree and One Rule when learning from
imbalance datasets.