Search
Now showing items 71-80 of 93
A framework for establishing e-health information management solution in a developing country: A case of Uganda
(Makerere University, 2019)
e-health systems or solutions have several benefits, there adoption and implementation as well as maintenance in developing countries is affected by managerial and implementation deployment challenges (lack of a training ...
Integrating of traceability of quality attributes into an automated software architecture design
(Makerere University, 2018-06-30)
This research looked at reducing the traceability problem by developing and testing a model for, and a plugin named QA-Tracer. The QA-Tracer automates the traceability of quality attributes during the Architecture design ...
A sensitivity test for network Intrusion detection based on Bayesian Network using a wrapper approach
(Makerere University, 2019-11)
Anomalous traffic detection on internet is a major issue of security as per the growth of smart devices and this technology. Several attacks are affecting the systems and deteriorate its computing performance. Intrusion ...
Cooperative relay for preemptive transmission in underlay cognitive radio networks
(Makerere University, 2018)
Transmission in underlay cognitive radio networks under the interference power constraint to primary receiver nodes have previously been analyzed under non preemptive cooperation, with SUs having non preemptive cooperation ...
Developing a low interaction honeypot detection system in a networked environment using live environment and network analysis.
(Makerere University, 2018-12-07)
As the technological change leads to the use of information systems to store and process data, the need to protect the systems becomes very important as it can cause to data leakage, disruption in processing among other ...
The development of a power switching mechanism over the internet infrastructure
(Makerere University, 2014-07)
The advancement of technology has lead to an escalating demand and reliance. This has inevitably lead to an alarming rate of depletion of the natural resources utilized to fuel the technology. Electrical energy is one of ...
A Modeling Method for Computer System Security using Structure and Probability
(Makarere University, 2017-01)
Abstract
Modeling methods for computer systems currently have functional and feature limitations for secure design. This is because modeling computer systems accurately is complex and requires precision and a variety ...
Competencies required by librarians in the management of electronic resources in Ugandan university libraries
(Makerere University, 2014)
This study explored the competencies required by librarians in the management of electronic resources in Ugandan University Libraries. Competencies were assessed basing on skills and knowledge while management of electronic ...
A tool to mitigate denial of service attacks on LAN
(Makerere University, 2017-03)
Today, schools, government agencies, corporations, and even home computer users conduct most of their business on a computer network by sharing information, resources, and files. This networking can be accomplished on a ...
A framework for outsourcing IT security services in SMEs in Uganda
(Makarere University, 2014-11-05)
One of the alternatives a small and medium enterprise (SME) can use to successfully manage its IT security needs is to outsource its IT security services (Bakari et al, 2006). The need to outsource IT security services by ...