5th ANNUAL INTERNATIONAL CONFERENCE ON COMPUTING AND ICT RESEARCH - ICCIR 09
|View Full Text Document|
|Part One: Information Technology|
|Abanti Cyrus Makori||Integration of Biometrics with Cryptographic Techniques for Secure Authentication of Networked Data Access|Abstract
The modern Information Technology evolution demands the use of computer networks with strict
security performance. The password-based authentication system and the token-based systems that are
current deployed, are not able to meet this performance. Achieving higher levels of security requires
authentication. Today’s standard security mechanism is a password that you create, remember it, and
change it frequently. These passwords are not foolproof because they can be stolen, forgotten, cracked,
sniffed and even tampered with. In fact it is quicker to gain access to electronically held data, copy or
print it out than it is to search through or photocopy manually held files.
The problems of traditional personal authentication systems may be solved by biometric systems.
Biometric identification is extremely effective authentication. It is an important weapon to protect
against credit card fraud and phantom withdraws. Biometrics can identify a person’s unique physical
characteristics, including fingerprints, facial features, voice pattern, retinal, irises DNA and
The problem with biometrics approach is that the biometric properties cannot reasonably be kept
secret. Although biometric systems have advantages over traditional system, one of the unsolved issues
is how we can combine cryptography with biometrics to increase overall system security The objectives
of this paper are:
|Philip O Ayoo and Jude T Lubega||A Requirements Analysis Framework for Human Activity Systems
(HAS):The Case of Online Learning |Abstract
The task of designing information systems is clearly interdisciplinary, since it requires domain knowledge in business process development within the social environment, and the processes management of technological applications. This paper explains e-learning as a human activity system, which requires soft methodologies that deal with the analysis of evolving and ill-defined needs, as well as traditional hard approaches to the design of physical solutions to meet those needs. Consequently, a requirements analysis framework is proposed for constructivist online learning systems in which soft systems thinking is integrated as the essential strategy of requirements elicitation and analysis. This framework is capable of capturing both the formal and informal, as well as the hard and soft aspects of the requirements within a social environment.
|Kyoratung ye Karemente, Jennifer Rose Aduwo, Emmanuel Mugejjera and Jude Lubega||Knowledge Management Frameworks: A Review of Conceptual
Foundations and a KMF for IT-based Organizations. |Abstract
In the new economic era, knowledge has become the primary source of wealth and consequently, the term knowledge economy or knowledge age. Rapid technological advancements and innovations have narrowed the gap between competing organizations such that the collective knowledge of employees is regarded as the key factor in producing innovative and competitive products or services. Organizations, since the early 1990s, have been forced to rethink the way they manage their intangible assets, which are in form of knowledge resources and therefore the need for knowledge management. Many organisations use knowledge management frameworks as a model that initiates and strengthens knowledge management activities in the context of achieving organisational excellence. However, different knowledge management frameworks do not fully address knowledge management activities across the organisation, such that each of them addresses certain knowledge management elements, while leaving others unattended to. The paper examined 21 knowledge management frameworks guided by three themes as knowledge management activities, knowledge management resources and knowledge management enablers (or influences) on knowledge management. A matrix was developed to capture the individual components advanced by each author with respect to knowledge management activities, resources and influences. Based on the matrices for activities, resources and influences, the individual components were harmonised and integrated in terms of relationships in the context of knowledge management.
The findings are that knowledge management activities are socially enacted activities that support individual and collective knowledge. The activities vary depending on which of the knowledge resources the organization aims at improving. Since each organization has a different focus, knowledge management activities take place in different contexts. These activities have been summarized as knowledge acquisition, creation, repository, sharing, use and evaluation. The organization should consciously choose which of these activities they intend to support in order to identify appropriate organizational variables and technology to enable them have effect. Based on findings, a new knowledge management framework has been proposed to guide practitioners and researchers when conducting knowledge management.
|Part Two: Information Systems|
|Anthony. J. Rodrigues||Managing University Research: Key Policy Issues. |Abstract
We examine the pursuit of research in a community of persons that constitute a University. The responsibilities of the different sectors of that community, as well the commitment required of the institution in order that research may flourish are discussed. Some generic principles and policy issues pertaining to university research are highlighted. Finally we outline a case on the politics of a research quality framework in a developed country. A contextual analysis of the case emphasizes the need for and importance of universities having balanced research policies.
|Sadeque Imam Shaikh||Application of Grid Computing for on line Learning Resources. |Abstract
There is a big difference in education sector between first world and developing world. This difference is based on digital learning resources and computing power. Unfortunately all of these resources are geographically distributed all over the world. There is no doubt that ICT is playing a big role for introducing E-learning around the world. But if we really want to overcome these differences we need a revolutionary approach that support mutual use of geographically distributed computing and learning resources as an aggregated environment that will create new ways of flexibility, interoperability and extensibility. According to IBM there are millions of distributed computers on the web and most of the computing powers of those PCs are under utilized. Fortunately Grid is the technologies that can integrate all of these resources of knowledge’s and produce super-computing power from those geographically distributed computers to access those knowledge’s without sacrificing local autonomy. In this paper we will describe the ICT infrastructure for on line collaborative learning and then we will design service oriented Grid technology that will be able to support ICT infrastructure by generating supper computing power from distributed resources for sharing learning resources. We will also analyze the challenges related with technology, standard, security and performance of grid Technology for resource share and management based on literature review and cutting edge technologies of available industry standard software and toolkits. Finally we will propose recommendations for successful implementation of Grid technology with ICT for collaborative leaning revolution in the world. Methodology of this paper is based on study, analysis and literature review as well as empirical as we will do few experiments using grid tools to taste feasibility of this technology.
|Peter Nabende, Benjamin Ahimbisibwe, Jude T. Lubega||Relationship between Information Systems Development
Paradigms and Methods. |Abstract
There are well established paradigms for information systems development but the methods used for Information Systems Development (ISD) have not been tied to most of these paradigms. Researchers have attempted to document the assumptions underlying different paradigms with the goal of making systems developers become aware of the assumptions and beliefs that they employ for a system development task. However, a number of Information Systems that have failed are as a result of lack of awareness by the information systems developers of some methods that should be used when dealing with an ISD problem. Information Systems researchers have not related ISD methods that can be used by practitioners to the identified ISD paradigms. In this paper, ISD methods have been classified under some of the major paradigms in form of a matrix. It is hoped that such classification will enable IS Developers easily identify methods they should use which in turn should lead to better quality of Information Systems, and a reduction in time and costs in Information Systems Development.
|Kathy Lynch and Stacey Lynch||From the Ground Up: User Involvement in the Development of an
Information System for use in HIV Voluntary Counselling and Testing. |Abstract
This research investigates end-user involvement in the development of a simple HIV Voluntary Counselling and Testing (VCT) data collection instrument and associated spreadsheet. The research involved end-user participation in developing a paper-based VCT data collection instrument, followed by the development of, and training in an associated electronic spreadsheet. The collection of data together with the electronic storage and retrieval of the data constitute, however simple, an information system. The findings show that involving the end-user in the development and use of something fundamental to their mission, not only gives them something tangible that can assist in developing strategies for identifying groups for VCT sessions, manage resources and data, and generate reports, but can also encourage the collection of useful and complete data, invoke a sense of achievement and positive prospects for the future. The study involved working with end users from six rural Ugandan NGOs who deliver VCT in rural communities in the Mukono district. Categories and Subject Descriptors: H.4 Information Systems Applications General Terms: Information systems development
|Jörg Tiedemann and Peter Nabende||Translating Transliterations. |Abstract
Translating new entity names is important for improving performance in Natural Language Processing (NLP) applications such as Machine Translation (MT) and Cross Language Information Retrieval (CLIR). Usually, transliteration is used to obtain phonetic equivalents in a target language for a given source language word. However, transliteration across different writing systems often results in different representations for a given source language entity name. In this paper, we address the problem of automatically translating transliterated entity names that originally come from a different writing system. These entity names are often spelled differently in languages using the same writing system. We train and evaluate various models based on finite state technology and Statistical Machine Translation (SMT) for a character-based translation of the transliterated entity names. In particular, we evaluate the models for translation of Russian person names between Dutch and English, and between English and French. From our experiments, the SMT models perform best with consistent improvements compared to a baseline method of copying strings.
|John Kizito||Decision Support in the Operating Theatre – Usability Aspects. |Abstract
Anesthesiology deals with such a complex social system that it can spawn over an infinite number of states. Diagnesia, a prototype built to offer decision support to anesthetists continuously estimates the likelihood and unlikelihood of diagnoses during surgery, by applying arguments for and against the different diagnoses, and presents the most probable diagnoses to the anesthetist. In this paper, we present the usability aspects and/or design decisions pertaining the prototype
|Stella Ouma, Marlien E. Herselman and Van Greunen||Implementing Successful E-health Implementations within
Developing Countries. |Abstract
The use of Information Communication Technologies (ICT) within healthcare can make significant changes in the daily operations of hospitals particularly win the developing world. A technology assessment of five hospitals based within Nyanza Province in Kenya was conducted to find out how hospitals are embracing the use of ICT. Both primary and secondary data were collected to be used in the study. A qualitative study was used through the application of a multiple case study to investigate five randomly selected hospitals. Structured interviews, open ended questionnaires and observations were used as methods to collect data from the various hospitals. In order to collect relevant data the participants were divided into three categories. Managers (n=5), hospital staff members (n=31) and patients (n=24). Therefore a total of (n=60), participated in the study. The findings revealed that just like in the majority of the developing nations, there are very few computers and e-health solutions that are currently used in the hospitals as a result of various challenges in Kenya. Consequently, this paper analyses the challenges and provide a way forward for developing nations when implementing e-health solutions.
|André P. Calitz, Marco C. Pretorius, Darelle Van Greunen||The Evaluation of Information Visualisation Techniques Using Eye
The general increase in the use of information visualisation techniques has highlighted the need for methodologies to evaluate the user interface of software system utilising these techniques. Usability evaluation techniques have evolved over several years in order to assess the user interface of systems with regard to efficiency, interaction flexibility, interaction robustness and quality of use. The evaluation of the user’s thought processes when using software systems is difficult to access with traditional usability techniques. Eye movement data can supplement the data obtained through usability testing by providing more specific information about the strategies that users apply. In this paper, the authors investigate how eye tracking data can supplement the usability evaluation data of information visualisation techniques, by applying eye tracking in a usability evaluation case study of an information visualisation tool. The results of a pilot study have previously been reported and these results are compared specifically to the main case study. The results of the main case study are reported in this article and illustrate that eye tracking does provide additional value to the usability evaluation of information visualisation techniques.
|Bronwin Jason and Andrè Calitz||A Model for the Adaptation of Contact Centre Computer User
Maintaining effective customer contact is important because customer interaction is seen as a valuable
asset for building lasting and profitable customer relationships. Contact centres, are the primary
|Gilbert Maiga||A Flexible Biomedical Ontology Selection Tool. |Abstract
The wide adoption and reuse of existing biomedical ontologies available in various libraries is limited by the lack of suitable tools with metrics for their evaluation by both naïve users and expert ontologists. Existing evaluation tools perform technical evaluation of the structure of an ontology as presented by its design and knowledge representation. These find little use in evaluating the processes and representation of granularity presented by biomedical ontology. In this paper we present an evaluation tool as part of a flexible framework that enables users to select a suitable biomedical ontology for use in building applications that integrate clinical and biological data. Requirements for such a tool were elicited in a descriptive survey using questionnaires, and a prototype developed. The tool also enables ontology modelers to iteratively elicit new requirements for improving upon existing biomedical ontologies, leading to new ones that are able to integrate data across structure, processes and granularity. By facilitating biomedical ontology evaluation, the tool contributes towards reuse of existing biomedical ontologies. This helps to avoid the need for costly time consuming tasks of developing entirely new biomedical ontologies. The utility of this tool was demonstrated in experiments that evaluated the infectious disease ontology. The results were validated using a questionnaire based human assessment.
|Rehema Baguma, Jude T. Lubega, Roger G. Stone and Th.P. van der Weide||Web Content Filtration According to Context of Use: Case Study of
Accessibility Guidelines. |Abstract
In this paper, we propose an approach for filtering Web based content according to context of use based on user roles and other use case scenarios. The purpose of the filtration approach is to make such Web content easier to use for the target audience. Context of use is important for the usability of Web based content particularly that used by different groups of people with different roles, interests and skill base. We use the Web content accessibility guidelines (WCAG) to demonstrate how the approach can be used to improve usability of Web based content. Other than accessibility guidelines, the approach is relevant to ANY Web based content for any subject if intended for multiple classes of users.
|Part Three: ICT Sustainable Development|
|Hannah Thinyane||SIM or Application Layer? An Implementation-Level Analysis on
the use of Mobile Phones for ICT Development. |Abstract
In recent years, mobile phones have started to become popular in their use as a platform for ICT based development projects. This paper provides an implementation level analysis on the use of SIM card programming and application layer programming. This is a particularly important consideration when the program is to be run in developing nations due to the older handsets that are frequently used. The paper describes the ramifications that each layer would have on the application that is created, in particular in the context of developing nations. It then describes a case study of a development project where we have implemented two such applications, illustrating the principles described in the paper.
|Aramanzan Madanda, Dorothy Okello,Grace Bantebya – Kyomuhendo||A Gender Critique of Uganda’s Rural ICT Access Policy:
Opportunities and Challenges. |Abstract
Rural access to ICT has been highlighted as key in driving development. It is argued that rural access to ICT boosts production, improves household income, reduces inequalities and widens market options. The Uganda government in 2001 put in place a rural ICT access policy named the Rural Communications Development Policy (RCDP) that provided for a Rural Communications Development Fund (RCDF) through which government subsidises communication investment in areas that are considered unprofitable if left to free market forces to promote universal access. Since 2002 support has been provided to establish telephone points, computer training centres and Internet services. In 2006 a gender analysis of the Rural Communications Development Policy/Fund (RCDP/F) was conducted in 14 districts of Uganda. The objective was to find out the extent to which the initiatives supported under RCDP/F had provided universal access to rural communications by both women and men and whether the implementation process took into account gender considerations. The findings and subsequent follow-ups in two districts show contradictions and discrepancy between policy conception and implementation, pointing to failure to achieve intended objectives of reaching out especially to women. No women’s organisation had ever accessed support. Culture, attitudes and gender blind project selection criteria inhibited females’ access to funding. The policy and its implementation did not take into account women’s and gender needs. The paper suggests a review and re-conceptualisation of the RCDP/F to remove contradictions so that selected projects benefit women and men equitably.
|Bada Joseph Kizito, Jarkko Suhonen||Pedagogical and Conceptual Design of An E-learning Environment
for HIV/AIDS Education. |Abstract
In this paper, we present the pedagogical and conceptual design of an e-learning environment, NetAIDS, for HIV/AIDS education in Uganda. We also identify the first concrete design solutions for the NetAIDS environment, which will be later implemented and evaluated. Our focus is to analyse the first steps towards the design of the NetAIDS environment following a development research methodology. Four important design aspects for the NetAIDS environment are identified. First, the design of the environment should be based on sound pedagogical principles. In our case, we suggest a constructivist approach. Second, the design and development of technological solutions is based on the development research method for generation of a prototypical e-learning environment, which uses scaffolds and new web technologies (e.g. web 2.0.) to support Ugandan youth to learn about HIV/AIDS. Thirdly, we present a framework for designing NetAIDS environment in the context of Ugandan schools. Finally, a formative evaluation scheme is presented to provide early feedback from the users so that the designed NetAIDS environment can be modified to suit better suit the needs and requirements of the users. The conceptual and pedagogical design principles for HIV/AIDS e-learning environment can also be applied in other contexts.
|Markus Pscheidt, Victor Van Reijswoud and Theo Van Der Weide||Assessing Appropriate ICT with ARIS case in Mozambique. |Abstract
ICT projects in developing countries need to integrate requirements of the local context in order to be successful. Appropriate Technology (AT) has been applied in many domains to deliver technological solutions that are suitable to the local contexts for which they are intended. The Appropriate ICT framework has adopted the principles of AT within the domain of ICT. This paper assesses the Appropriate ICT framework in the context of developing and implementing an Academic Registry Information System (ARIS) in Mozambique, and proposes an enhancement to the Appropriate ICT framework in order to facilitate further research on appropriate ICT tools and methods.
|D Patel, C Lawson-Johnson & S Patel||The Effect of Cultural Differences on Software Development. |Abstract
This study investigates the cultural issues concerning software development in which the United States (US) and Europe outsource their Information Technology (IT) offshore to emerging countries. Though the benefits of Offshore Software Development (OSD) may result in reduced labour costs for UK and Europeans software development companies; there are concerns about the practice as there are other impacts. The virtual setting of the global environment inhibits team cohesion and interferes with the communication process as the teams collaborate across both regional and functional boundaries. This presents challenges in the cross-cultural relationship of OSD projects as it influences work ethics, task performance and other factors, not just at a management level but at all levels in the organisation. Evidence of the dynamic effect of culture is demonstrated through the experiences of experts associated with OSD; highlighting cultural variables that negatively influence the quality, time and cost of software development.
|Agnes F. N. Lumala, Benjamin Kanagwa, José Ghislain Quenum and
Jude T. Lubega
|Service-oriented Architectures as a Vehicle for ICT in developing
Countries: An Awareness Campaign. |Abstract
Service-oriented architecture(SOA) is one of the ways to build applications today. Indeed current applications of SOA type are an aggregation of several smaller applications. Such applications are synonymous with Web 2.0. The cost of consuming and using existing SOA services is much lower than establishing a new infrastructure to provide the same services and there exists free and open source services. Such a technology is appropriate for developing countries where technical and financial resources to setup and support ICTs are severely constrained. Therefore we organized a contest to create awareness about SOA as alternative application development strategy and to expose university students in Uganda to SOA technologies. In this paper we discuss the SOA contest and we give lessons learned from the SOA awareness as a whole.
|Part Four: Data Communication and Computer Networks|
|Joseph Kizza Migga||(Inter)net Neutrality: Your Voice Matters. |Abstract
The growing use of the Internet coupled with the rapid growth in applications’ bandwidth requirements
are pushing network owners (ISP) to a point where they can no longer treat all Internet content,
sites, and platforms equally. This in turn is leading providers to start employing proprietary protocols
or to enter into exclusivity agreements with content providers that may reduce the transparency and
hence the neutrality of the Internet. Current network neutrality rules forbid network operators to
discriminate against third-party applications, content or portals or to exclude them from their network.
However, there is mounting evidence that providers are circumventing these rules. The debate haserupted for advocates of more network neutrality regulation to stop this from escalating and there are
|Drake Patrick Mirembe and Maybin Muyeba||Security Issues in Ambulatory Wireless Sensor Networks (AWSN):
Security Vs Mobility. |Abstract
This paper presents a high level design of a typical Ambulatory Wireless Sensor Network (AWSN) and it security requirements. It presents a theoretical analysis of the effects of mobility and dynamism of nodes in relation to the delivery of (authentication, reliability, data freshness, and integrity) services by routing protocols. The analysis focuses on Ariadne protocol and uses the Random-Way Point as the mobility model. The delivery of security services is modeled in terms of packet delivery ratios, link re-connections, and end-to-end delays. The logical analysis reveals that, the rate of node mobility and dynamism affects the delivery of security services. The paper concludes with the emerging research directions, which form the basis of the future work. Note that this is work in progress.
|Grace Bakaki and Idris A. Rai||Measurement and Analysis of Copper Access Network for ISDN
Basic Rate Interface. |Abstract
Improper combination of copper pair properties like gauge, longitudinal balance, loop resistance, insulation resistance and distance for Integrated Services Digital Network Basic Rate Interface (ISDN BRI) leads to users experiencing connectivity problems and fluctuating link speeds. Installations, configurations, troubleshooting and maintenance of ISDN BRI services can be very complex to the technical team of the service provider. There may be many reasons causing this in developing countries. Troubleshooting at Uganda telecom, for instance, has been cumbersome due to the absence of manuals that guide technicians on proper installation of copper lines. In this paper, we report measurements study to analyze and asses the impact of the copper pair parameters/properties combination to the copper line speeds. The study aimed at simplifying the installations, configurations, troubleshooting and maintenance of the ISDN BRI services on the side of the technical people. This was achieved by taking measurements at different parameters (distance, gauge, longitudinal balance, loop resistance, and insulation resistance) in order to come up with optimal values for the design of the computer based program for optimization of data connectivity in ISDN BRI. We use the measurement results to design and develop a computer based program that can be used to verify the measurements and identify the expected optimal parameters in troubleshooting.
|Part Five: Computer Science|
|Bernabe Batchakui , Claude Tangha , Roger Nkambou And Thomas Ndie Djotio||Apprenticeship Environment and Co-operation Based on the Grid and
Web 2.0 Designed for Training Communities with Common Interest
Common interest centers specialized in training communities, such as secondary schools, university training institutes, have heterogeneous, rich and varied resources in contents. Yet in their assessment, these communities present very disproportionate results. The present article comes out with an apprenticeship and co-operation setting which is based on Grid technologies and uses Web 2.0. The new environment is designed to ease the communication between the communities and thereby reduce the gap between them. To achieve this objective, a set of technologies and tools is used. It includes domain ontology for the validation of course contents, intelligent agents for communication and guidance, extended Moodle platform for contents surfing, multimedia message services (MMS) for transfer and retrieving grid courses through the mobile phone.
|Jean Greyling||Developing a Set of Requirements for Algorithm Animation Systems. |Abstract
The learning and analysis of algorithms and algorithm concepts are challenging to students due to the abstract and conceptual nature of algorithms. Research conducted at the Nelson Mandela Metropolitan University in Port Elizabeth, South Africa focused on the design of an extensible algorithm animation framework to support the generation of interactive algorithm animations. A comprehensive literature study showed that no unified and common instrument for evaluating the pedagogic effectiveness of algorithm animation systems exists. An output of this research was the compilation of a list of requirements that could serve as such an instrument. The value of this list is proven through the evaluation of extant systems as well as in developing a prototype in order to prove the effectiveness of the animation framework.
|Fred N. Kiwanuka||Multi-Scale Angiography Filters: Techniques Today. |Abstract
Vessel Enhancement and extraction in Angiography is still in developing state as many important problems still remain to be solved. The computation procedure of vessels in angiography is a very important due to limited computational resources. Computational procedure based on multi-scale has received considerable attention from scientists. Multiscale approaches perform enhancement based on ima g e resolutions and structure sizes. Many contributions have been made on the problem of vessel enhancement multiscale computing of volume data sets but there has never been a head to head evaluation of these approaches. In this paper the various multi-scale vessel enhancement approaches are put in perspective through a head to head comparison of algorithms of the existing research and a generic framework for linear multiscale is presented.
Richard Ssekibuule and Jose Ghislain Quenum
|Security Analysis of an Agent-Mediated Book Trading Application. |Abstract
This paper presents a security analysis of an agent mediated application in an open distributed environment. We use a case study of a booktrading application that we implemented using AgentScape and JADE agent platforms. The paper analyzes whether security requirements, threats and countermeasures for an agent mediated application change when implemented on different types of agent platforms and presents countermeasures to generic and application speciﬁc threats.