School of Computing and Information Technology
Permanent URI for this community
Browse
Browsing School of Computing and Information Technology by Title
Now showing 1 - 20 of 404
Results Per Page
Sort Options
- ItemA Review of Cluster Under-Sampling In Unbalanced Dataset As A Methods For Improving Software Defect Prediction(Journal of Applied Sciences, Information and Computing (JASIC), 2023) Abdulhamid Sani, V. S. Manjula and Musa Ahmed ZayyadIn many real-world machine learning applications, including software defect prediction, detecting fraud, detection of network intrusion and penetration, managing risk, and medical dataset, class imbalance is an inherent issue. It happens when there aren't many instances of a certain class mostly the class the procedure is meant to identify because the occurrence the class reflects is rare. The considerable priority placed on correctly classifying the relatively minority instances—which incur a higher cost if incorrectly categorized than the majority instances—is a major driving force for class imbalance learning. Supervised models are often designed to maximize the overall classification accuracy; however, because minority examples are rare in the training data, they typically misclassify minority instances. Training a model is facilitated by balancing the dataset since it keeps the model from becoming biased in favor of one class. Put another way, just because the model has more data, it won't automatically favor the majority class. One method of reducing the issue of class imbalance before training classification models is data sampling; however, the majority of the methods now in use introduce additional issues during the sampling process and frequently overlook other concerns related to the quality of the data. Therefore, the goal of this work is to create an effective sampling algorithm that, by employing a straightforward logical framework, enhances the performance of classification algorithms. By providing a thorough literature on class imbalance while developing and putting into practice a novel Cluster under Sampling Technique (CUST), this research advances both academia and industry. It has been demonstrated that CUST greatly enhances the performance of popular classification techniques like C 4.5 decision tree and One Rule when learning from imbalance datasets.
- ItemAnalysis and design of a website for organic products; a case of national organic agricultural movement of Uganda(Kampala international international: School of computing and Information technology, 2010-06) Andersen, Kirsten MarianneThis project has the purpose of making a website as a tool for advertising for NOGAMU, a shop that sells organic products. First the researcher contacted the manager of the establishment and asked permission to interview staff and customers alike and use NOGAMU as a case study. They were very cooperative and discussed at length the system they are using at present and how it works, A mail sent to prospective customers every week and it contains information about the products that are there at the particular time. They have the option of getting goods delivered if they want to save themselves the journey to Kabalagala and the heavy traffic on Ggaba Road. The customers and staff also expressed what they felt was relevant to include in the website. From the research it was established that although the current system is working well and the number of customers have been increasing, the advertising could be improved by a website. It will reach a wider audience and many people that did not know about NOGAMU will be able to get information about the products and services of the shop. The website has been designed with clear information about the shop, where it is located and what products are to be found in the shop. It also has some information about organic products in general and there is a link to a page that tells more about the background of the shop and about the organization of NOGAMU. The website combined with the mail and delivery service that is already being used by NOGAMU will be able to reach many more with information about the possibility of getting organic products from NOGAMU.
- ItemAnalysis and evaluation of network intrusion detection methods; a case of anomaly detection and signature detection approaches(Kampala International University, College of Computing, 2010-06) Kaweesa, JamesMany Network administrators and network analysts in organizations do not know which intrusion detection system to use. This is partly due to the fact that there is no clear comparison between the different intrusion detection systems. Therefore. organizations need concrete comparisons between different tools in order to choose which best suite for their needs is. This research aims at comparing anomaly with signature detection methods in order to establish which is best suited to guard organization. such as data theft. The difference between anomaly and signature-based detection is that an anomaly Intrusion Detection System needs to be trained and generate many alerts, the majority of which being false alarms: hence another aim is to establish the in influence of the training period length of an anomaly Intrusion Detection system on its dctcction rate. I lence. this research presents a Network-based Intrusion Detection System evaluation testbed setup. and it shows the setup for two of these using the signature detector (Snort) and the anomaly detector Statistical Packet Anomaly Detection Engine (SPADE). Thc evaluation test bed is then used to create a data theft scenario that includes the following stages: reconnaissance: gaining unauthorized access: and finally data theft. Therefore. it offers the opportunity to compare both detection methods with regards to that threat. this research acts as documentation for setting up a network Intrusion Detection System evaluation test bed. SPADE. lack a centralized documentation and no research paper could be identified that clearly documents the configuration of an evaluation test bed for Intrusion Detection System. Standards for evaluating Intrusion Detection System could not identified, and thus this required the creation of a bespoke evaluation test bed which. in tum~ limited the time dedicated to evaluating the threat scenario itself. Along with this. results show that configuration. testing and verification of the anomaly detection s> stem is highly error-prone.
- ItemAn analysis of computer forensic activities in data network(Kampala International University, School of Computing and Information Technology, 2010-06) Liz Mutiioni, Miciiuki; Olowo Charles, ObadiThe report summarizes that in this Information Technology age, the needs of law enforcement are changing. Some traditional crimes, especially those concerning finance and commerce, continue to be upgraded technologically. Paper trails have become electronic trails. Crimes associated with the theft and manipulations of data are detected daily. According to the website w~~v.cyber crime.com~ an attack is defined as any kind of malicious activity targeted against computer system resources. including, but not limited to, a break-in (any unauthorized access), virus infestation, data or destruction, or distributed denial of service attacks. In addition, some suggest attackers are likely to strike in the midst of confusion that people expect with the arrival of the Year 2000 computer problem. Tribe and Trinoo also may be more powerful than previous programs of the same kind. The duo, which started appearing in recent months. are steps above what has happened before, according to Dave Dittrich, a computer security technician at the university of Washington who wrote analyses of the programs. When installed onto hundreds or thousands of computers, the programs simultaneously bombard a select point on the Internet. If the information from the attackers comes fast enough, the target computer freezer up. Flooding attacks such as Tribe and Trinco are examples of so-called denial of-service attacks. a method that’s been around as long as there have been networks to inundate. There is a critical need in the law enforcement community to ensure the reliability of computer forensic tools. The goal of the Computer Forensic Tool Testing (CFTT) project at the National Institute of Standards and Technology (NIST) is to establish a methodology for testing computer forensic software tools by development of general tool specifications, test procedures, test criteria, test sets. and test hardware. The results provide the information necessary for toolmakers to improve tools. for users to make informed choices about acquiring and using computer forensics tools. and (hr interested parties to understand the tools capabilities. A capability is required to ensure that forensic software tools consistently produce accurate and objective test results. Our approach for testing computer forensic tools is based on well-recognized international methodologies for conformance testing and quality testing. The researcher used interview, questionnaire~ observation and internet and reading materials in order to analyze, collect, and to gather evidence of criminal activity which is admissible in a court of law
- ItemAn analysis of computer forensic activities in data network(Kampala International University, School of Computing and Information Technology, 2010-06) Olowo, Charles ObadiThe report summarizes that in this Information ‘i’echnology age, the needs of law enforcement are changing. Some traditional crimes, especially those concerning finance and commerce, continue to be upgraded teehnological1~. Paper trails have become electronic trails. Crimes associated v~. ith the the 11 and manipulations of data are detected daily. According to the website www.cyber crime.com, an attack is defined as any kind of malicious activity targetted against computer s~ stem resources. including,but not limited to. a break—in (any unathourised access), virus infestation, data or destruction, or distributed denial of service attacks. In addition, some sLiggest attackers are likely to strike in the midst of confusion that people expect with the arrival of the Year 2000 computer problem. ‘l’ribe and Trinoo also may be more powerful than previous programs of the same kind. The duo, which started appearing in recent months, are steps above ~~hat has happened before, according to Dave Dittrich, a computer security technician at the University of Washington who wrote analyses of the programs. When installed onto hundreds or thousands 01’ computers. the programs simultaneously bombard a select point on the Internet. If’ the information from the attackers comes fast enough, the target computel’ freezes up. Flooding attacks such as ‘l’ribe and ‘l’rinoo are examples of so-called denial of-service attacks, a method that’s been around as long as there have been networks to inundate. ‘[here is a critical need in the la~\ enfireement community to ensure the reliability of computer forensic tools. I he goal of’ the Computer l”orensic l’ool ‘l’esting (CJFTT) project at the National institute of Standards and ‘l’echnology (NISI’) is to establish a methodology for testing computer forensic software tools by development of general tool specifications, test procedures, test criteria, test sets. and test hardware. [‘he results provide the information necessary for toolmakers to improve tools, for users to make informed choices about acquiring and using computer forensics tools, and [or interested parties to understand the tools capabilities. A capability is required to ensure that forensic sof ~ are tools consistently produce accurate and objective test results. Our approach for testing computer forensic tools is based on well-recognized international methodologies for conformance testing and quality testing. The researcher used intervie~\. questionnaire. observation and internet and reading materials in order to analyze,collect, and to gather e~ idence of criminal activity which is admissible in a court of law
- ItemAn analysis of computing software performance in microfinance companies for the development of small scale enterprises in Uganda. :case study micro-finance institute (Kabalagala)(Kampala International University, College of Computing and Information Technology, 2008-11) Hafla, Hillary Kenneth; Tumwebaze, slyviaStudy was carried out in Kampala based on micro-finance bank in Uganda, to analyze how Is compute their systems by implementing the loan performer software to improve on the performance of the small scale Enterprises in Uganda. Thus according to the (highway Africa new agency) Uganda has louched government project to fight poverty which is also I n relation to MFIs activities, The project is known as “Bonna bagaggawale” which means “lets all be rich” an d to boost this rural financial scheme, government has introduced software known as “loan performer” to ease the rural accounting system (Hans Verkoijen the executive director of crystal clear software 1998) to improve on SSEs performance in Uganda
- ItemAnalysis, design implementation of a database website: a case study Roofing’s Limited Company(Kampala International University, School of Computing and Information Technology, 2009-07) Muyanja, WilliamToday many people prefer staying home or at their place of work and do their shopping through the internet, the system is able to show the products of the company and has a provision of buying goods online as well as storing the company records and retrieving them when required with ease. This system will be able to increase people’s awareness of the Roofing’s Limited products and therefore widening on the market to all around Uganda and the rest of the world; it will also reduce on the congestion/jam in the company thus saving time
- ItemAn android application for the provision of agricultural information to farmers and community: A case of lweru parish in Buikwe district(School of Computing and Information Technology, 2013-09) Hussein, Azizi; Rugandura, ArnoldThe generation of this is intended to show whatever that was covered in the field of research that took place between the months of December 2012 and January 2013. It shows the different areas in which skills were acquired. It also seeks to show how the acquisition of these skills benefited a person who took research, the challenges that were met and solutions used. In our research we covered mobile development platform, deployment of android application This still comprises of Microsoft.NET compact framework of the development environment
- ItemApplication of mobile computing to enhance treatment information communication to HIV / AIDS patients(Kampala International University, College of Computing and Information Technology, 2012-06) Kihangire, John Paul; Muhura, Dedan NjorogeMany HTV!All)S support organizations have laboured to provide HP/-infected people with the life prolonging drugs such as ART. However in a nut cell many people mostly in the resource limited settings still lack enough information on how to effectively use them leading to high death rates of patients. Since many people own mobile phones( 67.4% (Uganda bureau of statistics, 2010) there was a need to come up with mechanisms to utilize a mobile phone for monitoring patient’s timely intake of drugs, restocldng from nearby health centres, timely reporting of adverse effects. A system prototype has been developed with the above mentioned functionalities. This can be adopted by ART service providers in Uganda. It was implemented using MySQL, PHP, python application logic script and XML) and hosted to an online web server. However further research should be done to ensure adherence in paediatrics (children) and people who cannot use mobile phones, Securing! encrypting adherence informationl messages to patients and monitoring patients with other diseases apart from HIV!AIDS. It is recommended that Ministry of health should work with telecomnmnication companies to enable registered patients in rural settings send free messages to health centres.
- ItemAssessment of effects of inventory control management on the performance of a business firm :(a case study of Orange Kenya)(Kampala International University, School of Computing and Information Technology, 2011-12) Kemboi, Kennedy; KipkoechThe study was carried out at Orange Kenya Nairobi region as a case study in an attempt to assess the effects of inventory control management in the performance of a business firm. In this study inventory control management is the measure of business firm efforts to improve its perfomance. The objective of the study was to investigate the relationship inventory control rr,anagement and the performance of a business firm. To examine advantages of adopting good inventory control management, to establish challenges faced when implementing these policies towards positive or negative performance of a business firm and finally to propose possible ways to overcome the challenges faced in implementing inventory control management in the performance of a business firm. The study aGopted both qualitative and quantitative approach in capturing the correct perception and news of the respond"!nts for the success of the study. The researcher also used questionnaires and interview as survey research technique in gathering data relevant to the study. This design based on a descriptive and explanatory research design with the aim of identifying the inventory control management employed, establishing the positive or negative performance of a business firm levels and the relationships between inventory control management and the performance of a business firm. Results of the study indicated that inventory control management levels are still low in Orange K2nya in comparison to other companies in the same line. The results from the study have clearly indicated that provision of information communication technology,effective material handling, personnel competency, and training of employees would go along way in enhancing effective business performance. The recommendations of the study are that the existing inventory control management are to be revised to increase the performance of a business firm and in this study Orange Kenya.
- ItemAssessment of Internet Agent Security on Data Networks(Kampala International University, bachelor's degree of computer science, 2010-06) Ismail Mukasa, ApuriThe whole project deals with Network disruptions, unauthorized users, software failures, hardware failures, natural disasters, employee errors and terrorist attacks can prevent information systems from running properly or running at all. Computer systems play such a critical role in business, government, and daily life that firms need to make security and control a top priority. When a computer connects to a network and begins communicating with other computers, it is essentially taking a risk. Internet security involves the protection of a compute?s internet account and files from intrusion of an unknown user. Basic security measures involve protection by well selected passwords, change of file permissions and backup of computerts data. It also presents any thing that deal with the Internet Security of the Internet and all things that may help the Internet to work very well without any problem and this can be referred to as risk in Information technology and its mitigations. The references were collected from Internet, books, publication, and magazines. The researcher collected data from two sources included the primary and secondary sources. Primary sources were included in the questionnaires that were designed to collect data from respondents. This data was used to draw conclusion about the problem under study. Secondary source included the text books, journals, research reports, internet, news papers and other publication from which data was obtained. In most organizations, the network itself continually be expanded and updated, its components changed, and its software applications replaced or updated with newer versions. In addition, personnel changes will occur and security policies are likely to change over time. These changes mean that new risks surface and risks previously mitigated have again become a concern. Thus, the risk management process is ongoing and evolving.
- ItemAn authenticated inventory management system for Sosumo Industry in Bujumbura Central Market (Burundi)(Kampala International University, School of Computing and Information Technology, 2012-09) Baragondoza Marcel, GhislainThis study focused at An Authenticated Inventory Management System for SOSUMO Sugar Industry in Bujumbura Central Market (Burundi) which will handle effectively and efficiently the management of inventory information. The system was able to address the following problems; many inventory management systems are operated manually by group of people. In such situations many people involved in the process of managing the industry such a way that to keep records regarding the books of accounts (borrowers), check the books manually, keep records on issued books etc. all these have to be carried out manually and manual record keeping was also not a reliable method as people tend to forget things. On the borrower’s point overview, in manual system borrowers can’t find a book exactly at once as they are not ordered well. The researchers used the following techniques and approaches in order to achieve the objectives of the study. It covers the requirements elicitation process, system analysis and design, implementation, testing and validation. The system design used two-tier client server architecture whereby the database was implemented using MS Acccess whereas the interface was implemented using VB 6.0. The significance of the study is to make the Inventory Management, Process and Storage much simpler. And also improve on the speed with which the inventory processes is done.
- ItemAn authenticated inventory management system for Sosumo industry in Bujumbura central market (Burundi)(Kampala International University, College of Computing and Information Technology, 2012-09) Baragondoza, Marcel GhislainThis study focused at An Authenticated Inventory Management System for SOSUMO Sugar Industry in Bujumbura Central Market (Burundi) which will handle effectively and efficiently the management of inventory information. The system was able to address the following problems; many inventory management systems are operated manually by group of people. In such situations many people involved in the process of managing the industry such a way that to keep records regarding the books of accounts (borrowers), check the books manually, keep records on issued books etc. all these have to be carried out manually and manual record keeping was also not a reliable method as people tend to forget things. On the borrower’s point of view, in manual system borrower can’t find a book exactly at once as they are not ordered well. The researchers used the following techniques and approaches in order to achieve the objectives of the study. It covers the requirements elicitation process, system analysis and design, implementation, testing and validation. The system design used two-tier client server architecture whereby the database was implemented using MS.Acccess whereas the interface was implemented using VB 6.0. The significance of the study is to make the Inventory Management, Process and Storage much simpler. And also improve on the speed with which the inventory processes is done.
- ItemAuto Mobile Inventory Model and Transaction Management: A Case Study of Jacar Ltd-Ndeeba(School of Computing and Information Technology, 2012-09) Achiro, Harriet Norah; Luvima, RehemabThe main objective of the study was to design an information system and an inventory model and transaction management that can monitor and track information about the products, customers’ information and suppliers’ details. This can monitor the stock levels and automatic updating of the database in James car dealers. The specific objectives were; to study the auto mobile inventory methods, to build and test the system to ensure that the system architecture meet the original requirement and work properly and to analyze requirements for developing an information system…
- ItemAn automated employee profile management system: A case study green field fisheries Industry(Kampala International University, School of Computing and Information Technology, 2014-08) John, Mwesigye; Moses, LubegaThe manual system that was used by the fisheries industry was so inefficient, data retrieval was tedious and a lot of misplacement within the records. Updates and correction of records were very time consuming, there was wear and tear of the different files and papers kept raising researcher’s attention to identify a basic integrated computer-based information system to solve the above problems and avoid misunderstanding and complaints from the stakeholders. The system included proposing a data flow diagram to show how information should flow within the store and an integrated database was needed to help proper storage of the information within the store
- ItemAutomated examiner allocation system for Kenya National Examination Council(Kampala International University. School of Computing and Information Science, 2011-04) Charles, M.; Nyagah; Taruru, L; SaigutThis study about examiner allocation system was conducted at Kenya Examiuation council in Nairobi. It was clearly observed that the current allocation system is time and resource consuming and also not convenient due to repetition of examiner to the same centre they were allocated last season, thus creating the need for a system that will automatically allocate examiners. An administrator receives exams from different centers and forwards them to examiners for marking and then they forward the results to administrators. Data collection was achieved by use of interviews, observation, reading and questionnaires. Implementation was done by use of PHP, MySQL, CSS and HTML. The system can automatically allocate examiners to centers without repeating or sending an examiner to the same center he/she marked the previous year. Also an examiner can’t mark more than one subject. Authentication is also put into consideration whereby the system validates the inputs where the administrator the only one responsible for adding, editing and allocating examiners and centers
- ItemAutomated Financial Management Information Systems (AFMIS):(Kampala International University, School of Computing and Information Technology, 2010-06) Owole, PaulThis project is made purposely as a report of an automated Financial Information Management System. A project undertaken by the researcher as partial fulfillment for the attainment of a Degree in Business Computing in Kampala International University, and it has been made in Speed-IT Ltd as the case study and most of its functionality is thus based on the needs of these specific system users. All government organization, institution of higher learning, small and medium Enterprises use financial information management system. This is basically for proper management of financial information like the sales record, purchases, invoices, bank statement so that information is kept available and the integrity whenever needed. The broad objective of this project was to develop an automated financial information management system that overcomes the challenges of financial information management system currently in use at Speed-IT Ltd like duplication of data, confusion of staffs, and insecurity of information resulting into inefficiencies. The data was collected using interview and observation methods where by feasibility study was carried out and I found out that there was a lot of losses due to use of manual records and they were not kept well. These findings enticed me to design automated financial management information with the help of data flow diagrams, logical and physical design like creation of tables and tools like visual basic and Access and implemented the system by replacing the existing one.
- ItemAn automated library management system a case study of Kashenyi vocational senior secondary school(Kampala international international: School of computing and Information technology, 2013-09) Daphine, AmusiriFor many years, institutions such as secondary schools and colleges have used file based I manual system to manage library use. Whereas this was quite efficient for some time, due to the expansion of the library and increase in the number of the library users such as students, the system wastes a lot of time especially when searching for a particular book or resource. In response to this problem, more librarians have been added (employed). and this has escalated the cost of managing the library. This inefficiency, led to the study that was aimed at automating the book keeping function of the library. A study was carried out at Kashenyi Vocational Senior Secondary School and it was discovered that the manual system had inefficiencies ranging from time wastage, high cost of operation in terms of human resources, long search time, and data redundancy among others. A computer based library management system was developed using visual studio 2005. The new system allows the user to add books into the system, search for books from the system database. Track member information, manage borrowing among others. By automating library operations, the school will enjoy the advantages of using databases and transaction processing systems.
- ItemAn automated monopoly gaming system: case study African Golden Hotel and Casino, Mbale(2011-10) Pekke, Phyllis; Obegi, K. C.We estimate the probability that the game of monopoly between two players playing very simple strategies never ends. Four different estimators, based respectively on straightforward simulation, a brownian motion approximation, asymptotic formarkov chains, and importance sampling all yield an estimate of approximately twelve percent.
- ItemAn automated orphanage records information system : a case study of Tumaini Center Dar Es Salaam Tanzania(Kampala International University, School of Computing and Information Technology, 2011-05) Ramadhani, HassanTumaini center is located in Ukonga a suburb of the town center 8 kilometers from the city of Dar es salaam. This center is still using paper based file system to collect and store data, the paper based file system has been faced with many problems in daily working such as losing of some document, lack of security, data duplication, updating files, Therefore a computerized system should be introduced to alleviate the mentioned problems.