Search
Now showing items 41-50 of 115
Computational analysis of Kinyarwanda morphology : the morphological alternations.
(Fountain Publishers kampala, 2007)
For more than 30 years, there have been renewed interests in computational morphology resulting in numerous morphological tools. However the interest has always been on the politically and economically interesting languages ...
Management information system for human resource allocation
(2007-11)
A Management Information System for Human Resource Allocation has been designed to provide objectivity in employee - job allocation in indigenous audit and accountancy firms in Uganda. The system in place, of employee - ...
The effect of user interface design on software development
(2007-02)
The purpose of this study was to show that the improvement of the user interface of any software application can greatly affect the application’s performance and marketing. This would effectively change its software ...
A one-stop multimedia ecommerce website for marketing Ugandan art and crafts
(Makerere University, 2007-06)
This study was about creating an e-commerce website with multimedia capabilities to market handicrafts made by Ugandans on the international market. There are too many handicraft artists in Uganda, whose ability has been ...
Knowledge management technologies and organizational business processes: integration for business delivery performance in Sub Saharan Africa
(Fountain Publishers, Kampala., 2007)
To remain competitive, organizations must efficiently and effectively create, locate, capture, and share their organization’s knowledge and expertise. This increasingly requires making the organization’s knowledge explicit ...
A Prosecutions Management Information System (PMIS): a case of the Uganda's Directorate of Public Prosecutions (DPP)
(2007-05)
As population and criminal cases increase, the data required to properly administer the prosecutions becomes more complex as well. These complexities have overwhelmed the ability of the present manual systems and rudimentary ...
An authentication algorithm for wireless local area networks
(2007-11)
The study focused on the authentication of wireless local area network which permits a secure communication between the wireless client and the access point. Investigation on the current authentication algorithms was done ...
An online sales management system
(2007-06)
The sales management process at Proctor and Allan is done manually and with the increasing work it becomes considerably slow and gives results with many errors. These errors are noted at different stages of the sales ...
Tracing to the source of a denial of service attack with an improved IP packet marking algorithm
(2007-08)
Disruptive DOS attacks have been on the increase since 2000, and tracing the source of an attack remains the most effective remedy, since litigation, policy and other measures can then be effected. Many tracing algorithms ...
A system dynamics model for supply chain management in a resource constrained setting
(2007-04)
A case study approach at a media company (New Vision) in Uganda was used, where data was collected and analyzed to give a better understanding of the problem under discussion. The key research issue is to develop a system ...