International Journal of Computing and ICT Research

Displaying 1-18 of 18 results

  • White Papers // Dec 2012

    Filling the Digital Divide in Rural Connectivity: Case for Last Mile Mobile Broadband Subscription

    Access to Information and Communication Technologies (ICTs) has been found to have a correlation with socio-economic development and gross domestic product. Despite efforts by governments across Africa to revamp the telecommunications sector e.g. the establishment of submarine cables, there is a widening gap between citizens with easy access to ICTs...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2012

    The Role of Mobile Phones and Public perceptions for Community Policing in Tanzania

    Information and Communication Technology (ICT) has been reported to increase the efficiency and effectiveness of various sectors and industries. This goes along with the aims of community policing is to enhance efficiency and service delivery in providing security in a society. ICT can also increase the effectiveness of community policing...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2012

    An Energy-Efficient Dynamic Source Routing Protocol for Mobile Ad Hoc Networks

    The Dynamic Source Routing Protocol (DSR) is one of the most reliable and effective protocols in the Mobile Ad-hoc Networks (MANETs). It is also one of the few MANET protocols whose routing scheme can easily be optimized. But the routing overhead generated by its routing algorithm still leaves substantial amounts...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Jun 2012

    Mobile Phones as Mobile Banks and Credit Outlets: The Experience of Farming Households in Rural Southwest Nigeria

    There is no gainsaying the fact that the increasing awareness and penetration of Information and Communication Technologies (ICTs) into the developing world has transformed the economy of these countries. In fact, the banking sector in many of these countries is not spared. In Nigeria for instance, there has been a...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2011

    Discovery of Services Based on WSDL Tag Level Combination of Distance Measures

    During discovery of services, a service request is compared with available services. A similarity measure is one of the techniques which can be used to quantify the comparison and to rank existing services according to their suitability to satisfy a given request. Similarity measures have varying strengths and are applied...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2011

    Component-Based Development of Software Language Engineering Tools

    In this paper, the authors outline how Software Language Engineering (SLE) could benefit from Component-Based Software Development (CBSD) techniques and present an architecture aimed at developing a coherent set of lightweight SLE components, fitting into a general-purpose component framework. In order to give an impression on their development style, in...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2011

    Building a Case for a Dynamic Requirements Process Improvement Model

    Software requirements management is a volatile and dynamic process that requires continuous requirements process improvement in order to arrive at adequate requirements. However, there is interdependence amongst the processes themselves that leads to requirements managers' inability to achieve satisfied requirements for the intended software system. As a result, several software...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2011

    Characterizing the Maximum Queuing Delay of a Packet Switch

    The queuing delay which is suffered by a packet that is transiting a packet switch has the most adverse effect on the delay performance of the switch. Being able to estimate the maximum queuing delay which any packet may suffer in a packet switch will make it possible to design...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2011

    Biometrics Verification: A Literature Survey

    Biometric verification refers to an automatic verification of a person based on some specific biometric features derived from his/her physiological and/or behavioral characteristics. A biometric verification system has more capability to reliably distinguish between an authorized person and an imposter than the traditional systems that use a card or a...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Jun 2011

    Africa Can Greatly Benefit From Cloud Computing and Data Center Technologies - Part 1

    Africa has made tremendous progress in the technology catch-up game in the last ten years. As the author has been saying in his editorials in the last few issues of this journal, Africa was a late comer on the technological scene that has swept the rest of the world. However,...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Oct 2010

    Mobile Learning Objects Deployment and Utilization in Developing Countries

    The increasing ability to access Internet via mobile devices means that learning objects can be deployed and utilized on those devices. Increasing research attention has been accorded to the design and development of reusable learning objects for tethered and mobile based learning management systems. Little research has been undertaken in...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Oct 2010

    Using Context-Awareness to Support Adaptive Multimodal Mobile Notification

    Multimodal mobile notification can enable natural and implicit notification in a mobile context by adapting the output modality according to the user's context. There are several existing models for adaptive mobile notification using context awareness. A comparison of two of these models identified several shortcomings. The IBM INS model was...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Oct 2010

    Using Subgraph Isomorphism as a Zero Knowledge Proof Authentication in Timed Wireless Mobile Networks

    In networks with sensitive resources and time critical missions, user identification and authentication is essential and critical for all secure access communications originating from outside into the networks. However, there are networks and times when entity identification is not required and indeed in some networks, for the security of the...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Oct 2010

    An Integrated Victim-Based Approach Against IP Packet Flooding Denial of Service

    In this paper, the authors designed a detection technique from a combination of three existing anomaly detection algorithms to detect attacks at the victim machine. The technique is a combination the CUmulative SUM algorithm (CUSUM), the Source IP Monitoring algorithm (SIM), and the adaptive threshold algorithm. It is made up...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Jun 2010

    Improving Load Balance and Query Throughput of Distributed IR Systems

    As the number of queries grows over time it becomes necessary that Information Retrieval (IR) system provides high query processing rate i.e. high query throughput. In IR systems, there are three types of data partitioning, namely term-based, document-based, and hybrid partitioning. In document-based and hybrid partitioning, query is sent to...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Jun 2010

    Experiments for Accelerating IEEE 802.11i on Cyclone II FPGA

    This paper presents hardware solutions for accelerating IEEE 802.11i. Several experiments were applied on the low-cost Cyclone II FPGA by using various architectures with different number of threads. The FPGA offloads the process of AES encryption from the master CPU. In addition, it offers the possibility of using several threads...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2009

    Utilizing Semantic Web as Communication Protocol in Faded Information Field (FIF) Architecture for Information Retrieval and Dissemination

    The semantic web has been evolving and brings the powerful AI concept in contact with web infrastructure. It is the presentation of machine-processable semantics of data on the web. It is a collaborative effort led by W3C Consortium with participation of a large number of researchers and industrial partners. This...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Jun 2009

    The Coverage Problem in Wireless Sensor Networks by Holonic Multi-Agent Approach

    A wireless sensor network will collaborate for a common application such as environmental monitoring. One fundamental issue in sensor networks is the coverage problem. The authors present in this paper a Holonic Multi-agent approach that solves the coverage problem when using wireless sensor networks. Complex systems are characterized by large...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Jun 2010

    Improving Load Balance and Query Throughput of Distributed IR Systems

    As the number of queries grows over time it becomes necessary that Information Retrieval (IR) system provides high query processing rate i.e. high query throughput. In IR systems, there are three types of data partitioning, namely term-based, document-based, and hybrid partitioning. In document-based and hybrid partitioning, query is sent to...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Jun 2010

    Experiments for Accelerating IEEE 802.11i on Cyclone II FPGA

    This paper presents hardware solutions for accelerating IEEE 802.11i. Several experiments were applied on the low-cost Cyclone II FPGA by using various architectures with different number of threads. The FPGA offloads the process of AES encryption from the master CPU. In addition, it offers the possibility of using several threads...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Jun 2009

    The Coverage Problem in Wireless Sensor Networks by Holonic Multi-Agent Approach

    A wireless sensor network will collaborate for a common application such as environmental monitoring. One fundamental issue in sensor networks is the coverage problem. The authors present in this paper a Holonic Multi-agent approach that solves the coverage problem when using wireless sensor networks. Complex systems are characterized by large...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Jun 2011

    Africa Can Greatly Benefit From Cloud Computing and Data Center Technologies - Part 1

    Africa has made tremendous progress in the technology catch-up game in the last ten years. As the author has been saying in his editorials in the last few issues of this journal, Africa was a late comer on the technological scene that has swept the rest of the world. However,...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2012

    Filling the Digital Divide in Rural Connectivity: Case for Last Mile Mobile Broadband Subscription

    Access to Information and Communication Technologies (ICTs) has been found to have a correlation with socio-economic development and gross domestic product. Despite efforts by governments across Africa to revamp the telecommunications sector e.g. the establishment of submarine cables, there is a widening gap between citizens with easy access to ICTs...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2012

    The Role of Mobile Phones and Public perceptions for Community Policing in Tanzania

    Information and Communication Technology (ICT) has been reported to increase the efficiency and effectiveness of various sectors and industries. This goes along with the aims of community policing is to enhance efficiency and service delivery in providing security in a society. ICT can also increase the effectiveness of community policing...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2012

    An Energy-Efficient Dynamic Source Routing Protocol for Mobile Ad Hoc Networks

    The Dynamic Source Routing Protocol (DSR) is one of the most reliable and effective protocols in the Mobile Ad-hoc Networks (MANETs). It is also one of the few MANET protocols whose routing scheme can easily be optimized. But the routing overhead generated by its routing algorithm still leaves substantial amounts...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Jun 2012

    Mobile Phones as Mobile Banks and Credit Outlets: The Experience of Farming Households in Rural Southwest Nigeria

    There is no gainsaying the fact that the increasing awareness and penetration of Information and Communication Technologies (ICTs) into the developing world has transformed the economy of these countries. In fact, the banking sector in many of these countries is not spared. In Nigeria for instance, there has been a...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Oct 2010

    Mobile Learning Objects Deployment and Utilization in Developing Countries

    The increasing ability to access Internet via mobile devices means that learning objects can be deployed and utilized on those devices. Increasing research attention has been accorded to the design and development of reusable learning objects for tethered and mobile based learning management systems. Little research has been undertaken in...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2009

    Utilizing Semantic Web as Communication Protocol in Faded Information Field (FIF) Architecture for Information Retrieval and Dissemination

    The semantic web has been evolving and brings the powerful AI concept in contact with web infrastructure. It is the presentation of machine-processable semantics of data on the web. It is a collaborative effort led by W3C Consortium with participation of a large number of researchers and industrial partners. This...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2011

    Discovery of Services Based on WSDL Tag Level Combination of Distance Measures

    During discovery of services, a service request is compared with available services. A similarity measure is one of the techniques which can be used to quantify the comparison and to rank existing services according to their suitability to satisfy a given request. Similarity measures have varying strengths and are applied...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2011

    Component-Based Development of Software Language Engineering Tools

    In this paper, the authors outline how Software Language Engineering (SLE) could benefit from Component-Based Software Development (CBSD) techniques and present an architecture aimed at developing a coherent set of lightweight SLE components, fitting into a general-purpose component framework. In order to give an impression on their development style, in...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2011

    Building a Case for a Dynamic Requirements Process Improvement Model

    Software requirements management is a volatile and dynamic process that requires continuous requirements process improvement in order to arrive at adequate requirements. However, there is interdependence amongst the processes themselves that leads to requirements managers' inability to achieve satisfied requirements for the intended software system. As a result, several software...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2011

    Characterizing the Maximum Queuing Delay of a Packet Switch

    The queuing delay which is suffered by a packet that is transiting a packet switch has the most adverse effect on the delay performance of the switch. Being able to estimate the maximum queuing delay which any packet may suffer in a packet switch will make it possible to design...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Dec 2011

    Biometrics Verification: A Literature Survey

    Biometric verification refers to an automatic verification of a person based on some specific biometric features derived from his/her physiological and/or behavioral characteristics. A biometric verification system has more capability to reliably distinguish between an authorized person and an imposter than the traditional systems that use a card or a...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Oct 2010

    Using Context-Awareness to Support Adaptive Multimodal Mobile Notification

    Multimodal mobile notification can enable natural and implicit notification in a mobile context by adapting the output modality according to the user's context. There are several existing models for adaptive mobile notification using context awareness. A comparison of two of these models identified several shortcomings. The IBM INS model was...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Oct 2010

    Using Subgraph Isomorphism as a Zero Knowledge Proof Authentication in Timed Wireless Mobile Networks

    In networks with sensitive resources and time critical missions, user identification and authentication is essential and critical for all secure access communications originating from outside into the networks. However, there are networks and times when entity identification is not required and indeed in some networks, for the security of the...

    Provided By International Journal of Computing and ICT Research

  • White Papers // Oct 2010

    An Integrated Victim-Based Approach Against IP Packet Flooding Denial of Service

    In this paper, the authors designed a detection technique from a combination of three existing anomaly detection algorithms to detect attacks at the victim machine. The technique is a combination the CUmulative SUM algorithm (CUSUM), the Source IP Monitoring algorithm (SIM), and the adaptive threshold algorithm. It is made up...

    Provided By International Journal of Computing and ICT Research