Browsing Research articles by Title
Now showing items 1-20 of 65
-
Algorithms for the Generation of an Electronic Customized Answer Booklet for Universities
(Indonesian Journal of Innovation and Applied Sciences (IJIAS), 2023)Academic institutions in Uganda are accustomed to using pen-on-paper exams where students are given an answer booklet at the time of the exam. Universities frequently use customized answer booklets which help to lower the ... -
Analyzing Energy Consumption Patterns at Mbarara University of Science and Technology: A Case Study of the Academic Calendar Influence
(International Journal of Innovative Research in Engineering and Management (IJIREM), 2023)This research paper presents a concise and factual analysis of energy consumption patterns at Mbarara University of Science and Technology (MUST) based on historical data from the calendar year 2019. The study focused on ... -
An Approach for Agent-Based Modeling Using AiC+
(International Journal of Computing and ICT Research., 2011-12)In this paper, we present AiC+, an extension of the AiC framework designed for the explanation of human actions especially in the environmental field. We use first order logics to describe the semantics used to explain the ... -
Behavioral Predictors of Intention to Use a Text Messaging Reminder System Among People Living With HIV in Rural Uganda: Survey Study
(JMIR Human Factors, 2023)Background: The expansion of cellular phones in sub-Saharan Africa spurred the development of SMS text message–based mobile health (mHealth) technology. Numerous SMS text message–based interventions have attempted to ... -
Can We Find Stable Alternatives For Unstable Eclipse Interfaces?
(In 2016 IEEE 24th international conference on program comprehension (ICPC), 2016)The Eclipse framework is a popular and widely adopted framework that has been evolving for over a decade. Like many other evolving software systems, the Eclipse framework provides both stable and supported interfaces (APIs) ... -
Candidate Base Stations a Security Solution For Compromised Base Stations In Wireless Sensor Networks
(College of Computer and Communication, Hunan University, P. R. China, 2013)Wireless sensor networks heavily rely on base stations for data processing and routing within the network itself and the outside world. Considerably less attention has been put on the security of base stations in comparison ... -
Code Authorship and Fault-proneness of Open-Source Android Applications : An Empirical Study
(International Conference on Predictive Models and Data Analytics in Software Engineering, 2020-08-28)Context: In recent years, many research studies have shown how human factors play a significant role in the quality of software components. Code authorship metrics have been introduced to establish a chain of responsibility ... -
Combined Feature Level and Score Level Fusion Gabor Filter-Based Multiple Enrollment Fingerprint Recognition
(International conference on Signal Processing, Communication, Power and Embedded System, 2016)Minutiae-based fingerprint matching methods suffer difficulty in automatically extracting all minutiae points due to failure to detect the complete ridge structures of a fingerprint, as well as describing all the local ... -
Contextual Factors Influencing the Performance of Mobile Services in Monitoring the Delivery of Public Health Services
(Regional Journal of Information and Knowledge Management, 2023)Rationale of Study: This paper established contextual factors affecting the performance of mobile services for monitoring the delivery of public health services in Uganda. Methodology: The study adopted a survey type of ... -
Decision Enhancement Services for Small and Medium Enterprise Start-ups in Uganda
(45th Hawaii International Conference on System Sciences, 2012)While start-up firms create a substantial economic impact on most economies, the failure rate of start-up firms seems to remain high due to inadequate agile decision services. Deciding to start-up mining Small and Medium ... -
Digital Anti-Corruption Typology for Public Service Delivery
(International Journal of Computer Applications, 2021)Digital anti-corruption refers to a family of digital technology tools that are used to fight corruption. Many such tools have not performed well in practice due to their non-alignment with forms of corruption they are ... -
Digital Determinants of Health: Health data poverty amplifies existing health disparities— A scoping review
(PLOS Digital Health, 2023)Artificial intelligence (AI) and machine learning (ML) have an immense potential to transform healthcare as already demonstrated in various medical specialties. This scoping review focuses on the factors that influence ... -
Digital Determinants of Health: Health data poverty amplifies existing health disparities— A scoping review
(PLOS Digital Health, 2023)Artificial intelligence (AI) and machine learning (ML) have an immense potential to transform healthcare as already demonstrated in various medical specialties. This scoping review focuses on the factors that influence ... -
Eclipse API usage: the good and the bad
(Software Quality Journal, 2013-10-01)Today, when constructing software systems, many developers build their systems on top of frameworks. Eclipse is such a framework that has been in existence for over a decade. Like many other evolving software systems, the ... -
An Empirical Study of Bugs in Eclipse Stable Internal Interfaces
(arXiv preprint arXiv, 2022)The Eclipse framework is a popular and widely used framework that has been evolving for over a decade. The framework provides both stable interfaces (APIs) and unstable interfaces (non-APIs). Despite being discouraged by ... -
An Empirical Study of the Evolution of Eclipse Third-party Plug-ins
(International Workshop on Principles of Software Evolution (IWPSE), 2010-09)Since the inception of Lehman's software evolution laws in the early 1970s, they have attracted significant attention from the research community. However, to our knowledge, no study of applicability of these laws on the ... -
Enhancing Bring Your Own Device Security in Education
(Journal of Science & Technology, 2022)Background: The acceptance and use of personal devices at educational institutions is on the rise, resulting in the education sector's adoption of Bring Your Own Device (BYOD). The institutions benefit from cost reduction ... -
Enhancing Tuberculosis Care in Southwestern Uganda: Facilitators and Barriers to Utilizing Mobile Health Technologies
(Global Implementation Research and Applications, 2022)Although mobile health technologies are low-cost approaches that can enhance tuberculosis care, there is a dearth of research about the facilitators and barriers regarding their utilization in enhancing the public–private ... -
Environmental Factors: Examining the Analytical Power of Its Dimensions in Explaining the Adoption of a Unified Identification System of MDAs in Uganda
(International Journal of Electronic Government Research, 2020)The use of the unified identification system (UIDS) can undoubtedly result in increased effectiveness and efficiency, improvement in the quality of life, reduction of crime, enhanced transparency, and good government. This ... -
Ethical Climate: Analyzing the Moderation Effect on Cardinal Virtues and Employees’ Cyber Security Ethical Behavior Intention in Ugandan Commercial Banks.
(European Journal of Technology, 2022)Purpose: Ethics is the last issue that organizations ponder about when planning cyber security strategies. Yet Ethical behaviors have a big impact on the interactions with software and technology. The lack of employees’ ...