Bachelors’ Degree in Computer Science
Permanent URI for this collection
Browse
Browsing Bachelors’ Degree in Computer Science by Title
Now showing 1 - 20 of 106
Results Per Page
Sort Options
- ItemAnalysis and evaluation of network intrusion detection methods; a case of anomaly detection and signature detection approaches(Kampala International University, College of Computing, 2010-06) Kaweesa, JamesMany Network administrators and network analysts in organizations do not know which intrusion detection system to use. This is partly due to the fact that there is no clear comparison between the different intrusion detection systems. Therefore. organizations need concrete comparisons between different tools in order to choose which best suite for their needs is. This research aims at comparing anomaly with signature detection methods in order to establish which is best suited to guard organization. such as data theft. The difference between anomaly and signature-based detection is that an anomaly Intrusion Detection System needs to be trained and generate many alerts, the majority of which being false alarms: hence another aim is to establish the in influence of the training period length of an anomaly Intrusion Detection system on its dctcction rate. I lence. this research presents a Network-based Intrusion Detection System evaluation testbed setup. and it shows the setup for two of these using the signature detector (Snort) and the anomaly detector Statistical Packet Anomaly Detection Engine (SPADE). Thc evaluation test bed is then used to create a data theft scenario that includes the following stages: reconnaissance: gaining unauthorized access: and finally data theft. Therefore. it offers the opportunity to compare both detection methods with regards to that threat. this research acts as documentation for setting up a network Intrusion Detection System evaluation test bed. SPADE. lack a centralized documentation and no research paper could be identified that clearly documents the configuration of an evaluation test bed for Intrusion Detection System. Standards for evaluating Intrusion Detection System could not identified, and thus this required the creation of a bespoke evaluation test bed which. in tum~ limited the time dedicated to evaluating the threat scenario itself. Along with this. results show that configuration. testing and verification of the anomaly detection s> stem is highly error-prone.
- ItemAn analysis of computer forensic activities in data network(Kampala International University, School of Computing and Information Technology, 2010-06) Liz Mutiioni, Miciiuki; Olowo Charles, ObadiThe report summarizes that in this Information Technology age, the needs of law enforcement are changing. Some traditional crimes, especially those concerning finance and commerce, continue to be upgraded technologically. Paper trails have become electronic trails. Crimes associated with the theft and manipulations of data are detected daily. According to the website w~~v.cyber crime.com~ an attack is defined as any kind of malicious activity targeted against computer system resources. including, but not limited to, a break-in (any unauthorized access), virus infestation, data or destruction, or distributed denial of service attacks. In addition, some suggest attackers are likely to strike in the midst of confusion that people expect with the arrival of the Year 2000 computer problem. Tribe and Trinoo also may be more powerful than previous programs of the same kind. The duo, which started appearing in recent months. are steps above what has happened before, according to Dave Dittrich, a computer security technician at the university of Washington who wrote analyses of the programs. When installed onto hundreds or thousands of computers, the programs simultaneously bombard a select point on the Internet. If the information from the attackers comes fast enough, the target computer freezer up. Flooding attacks such as Tribe and Trinco are examples of so-called denial of-service attacks. a method that’s been around as long as there have been networks to inundate. There is a critical need in the law enforcement community to ensure the reliability of computer forensic tools. The goal of the Computer Forensic Tool Testing (CFTT) project at the National Institute of Standards and Technology (NIST) is to establish a methodology for testing computer forensic software tools by development of general tool specifications, test procedures, test criteria, test sets. and test hardware. The results provide the information necessary for toolmakers to improve tools. for users to make informed choices about acquiring and using computer forensics tools. and (hr interested parties to understand the tools capabilities. A capability is required to ensure that forensic software tools consistently produce accurate and objective test results. Our approach for testing computer forensic tools is based on well-recognized international methodologies for conformance testing and quality testing. The researcher used interview, questionnaire~ observation and internet and reading materials in order to analyze, collect, and to gather evidence of criminal activity which is admissible in a court of law
- ItemAn android application for the provision of agricultural information to farmers and community: A case of lweru parish in Buikwe district(School of Computing and Information Technology, 2013-09) Hussein, Azizi; Rugandura, ArnoldThe generation of this is intended to show whatever that was covered in the field of research that took place between the months of December 2012 and January 2013. It shows the different areas in which skills were acquired. It also seeks to show how the acquisition of these skills benefited a person who took research, the challenges that were met and solutions used. In our research we covered mobile development platform, deployment of android application This still comprises of Microsoft.NET compact framework of the development environment
- ItemAssessment of Internet Agent Security on Data Networks(Kampala International University, bachelor's degree of computer science, 2010-06) Ismail Mukasa, ApuriThe whole project deals with Network disruptions, unauthorized users, software failures, hardware failures, natural disasters, employee errors and terrorist attacks can prevent information systems from running properly or running at all. Computer systems play such a critical role in business, government, and daily life that firms need to make security and control a top priority. When a computer connects to a network and begins communicating with other computers, it is essentially taking a risk. Internet security involves the protection of a compute?s internet account and files from intrusion of an unknown user. Basic security measures involve protection by well selected passwords, change of file permissions and backup of computerts data. It also presents any thing that deal with the Internet Security of the Internet and all things that may help the Internet to work very well without any problem and this can be referred to as risk in Information technology and its mitigations. The references were collected from Internet, books, publication, and magazines. The researcher collected data from two sources included the primary and secondary sources. Primary sources were included in the questionnaires that were designed to collect data from respondents. This data was used to draw conclusion about the problem under study. Secondary source included the text books, journals, research reports, internet, news papers and other publication from which data was obtained. In most organizations, the network itself continually be expanded and updated, its components changed, and its software applications replaced or updated with newer versions. In addition, personnel changes will occur and security policies are likely to change over time. These changes mean that new risks surface and risks previously mitigated have again become a concern. Thus, the risk management process is ongoing and evolving.
- ItemAuto Mobile Inventory Model and Transaction Management: A Case Study of Jacar Ltd-Ndeeba(School of Computing and Information Technology, 2012-09) Achiro, Harriet Norah; Luvima, RehemabThe main objective of the study was to design an information system and an inventory model and transaction management that can monitor and track information about the products, customers’ information and suppliers’ details. This can monitor the stock levels and automatic updating of the database in James car dealers. The specific objectives were; to study the auto mobile inventory methods, to build and test the system to ensure that the system architecture meet the original requirement and work properly and to analyze requirements for developing an information system…
- ItemAutomated examiner allocation system for Kenya National Examination Council(Kampala International University. School of Computing and Information Science, 2011-04) Charles, M.; Nyagah; Taruru, L; SaigutThis study about examiner allocation system was conducted at Kenya Examiuation council in Nairobi. It was clearly observed that the current allocation system is time and resource consuming and also not convenient due to repetition of examiner to the same centre they were allocated last season, thus creating the need for a system that will automatically allocate examiners. An administrator receives exams from different centers and forwards them to examiners for marking and then they forward the results to administrators. Data collection was achieved by use of interviews, observation, reading and questionnaires. Implementation was done by use of PHP, MySQL, CSS and HTML. The system can automatically allocate examiners to centers without repeating or sending an examiner to the same center he/she marked the previous year. Also an examiner can’t mark more than one subject. Authentication is also put into consideration whereby the system validates the inputs where the administrator the only one responsible for adding, editing and allocating examiners and centers
- ItemAn automated monopoly gaming system: case study African Golden Hotel and Casino, Mbale(2011-10) Pekke, Phyllis; Obegi, K. C.We estimate the probability that the game of monopoly between two players playing very simple strategies never ends. Four different estimators, based respectively on straightforward simulation, a brownian motion approximation, asymptotic formarkov chains, and importance sampling all yield an estimate of approximately twelve percent.
- ItemAn automated orphanage Records Information System : a case study of Tumaini Center in Dar es salaam, Tanzania(Kampala International University, School of Engineering and Applied Sciences, 2011-05) Hassan, RamadhaniTumaini center is located in Ukonga a suburb of the town center 8 kilometers from the city of Dar es salaam. This center is still using paper based file system to collect and store data, the paper based file system has been faced with many problems in daily working such as losing of some document, lack of security, data duplication, updating files, Therefore a computerized system should be introduced to alleviate the mentioned problems.
- ItemA centralized event management system for a hotel: a case study of Slumberland Hotel, Arua School of Computer Studies(Kampala International University, School of Computing and Information Technology, 2012-07) Nakiganda, Christine; Obua, GeorgeThe hospitality Industry is a dynamic Business characterized by constant activity and change. Which means for a hotel to gain its market share, it has to accommodate change and manage its activities efficiently. This industry is known to deal with services and products that are both tangible and intangible in nature that are highly competitive. For that matter, for a hotel to be competitive it has not only to concentrate on the satisfaction of its customers, but also provide good services to satisfy its customers. Customer satisfaction can be gained in a 1-lotel through improving service quality which involves well planned schedules and good organization within its management. Having satisfied customers should not necessarily mean ignoring the employee’s needs, a balance of needs have to be met through proper communication and organization. In this study, we look at an Event Management System which provides computerized management and organization of events.
- ItemComputer-Based Data System of Patient’s Medical Archives(School of Computing and Information Technology, 2022-04) Mubark, Basher Mohamed WadiInformation is a very important aspect in our day-to-day activities to ensure effective communication. As result of this, Information Communication Technology plays a great role to guarantee efficient and effective communication within and among different institutions and organizations. In response to this, each organization/institution strives to make sure that there is a secure means of disseminating, storing and retrieving of information within their boundaries. This calls for an information system that is capable of handling all these tasks without fail. The outpatient department of Webuye District hospital has been used as a case study. With the use of computer database systems, it becomes easier to run and effectively coordinate the operations of the department bearing in mind the environment under which it operates (vast inhabited national referral hospital). Consequently, in this project, i have displayed database development using the system development life cycle to come up with a good database design for ease of operations within the department, using Microsoft Access and Visual Basic 6.0.
- ItemA computerized records management database system for Edgar’s Soccer Academy(Kampala International University, School of Computing and Information technology, 2008-10) Segirinya Saidi, Segirinya; Michael, KanyoroSoccer Academies today necessitate a competent administration when managing all entities in the academy systems. These entities may include the staff members, trainees (players), registration processes, grading process and attendance as well as their discipline which I believe is a key factor for better Academy performance. Unfortunately, Edgars Soccer Academy does not have a Computerized Records Management System to efficiently perform these administrative tasks. To check for registered trainee, on has to check in the manual filing cabinet for the registration file and look at the registration forms one at a time until he/she gets the trainee’s information which is very tiresome and time consuming. Tracking of trainees’ attendance records both weekly and monthly is also tedious as roll call sheets are not that durable. For the case of trainees performance, grading of trainees marks is tiresome normally the trainer(coach) has to enter the marks of the trainee and check for the grade in which those marks fall, which is very tiresome given the number of trainees whose marks the coach has to grade. The method of storing the Academy’s financial information also possess a security threat to sensitive data and as if that is not enough follow up of trainees’ disciplinary records in the Academy is so tedious. For registration of both staff and trainees, these records are very important for both the sake of the Academy’s history and the trainee, thus these records should be as accurate and as reliable as possible. This research project aimed at developing a Computerized Records Management Database System that centralizes all the management of entities in the Academy. In order to achieve this goal, a thorough System Study and investigation was carried out on the existing Academy reporting system through the use of questionnaires, interviews and observation methods in order to discover its operations and its weaknesses and the data collected was then analyzed using document and data flow diagrams
- ItemA computerized students' records management system a case study of faculty of science and technology Kampala international university Western campus Bob john(Kampala international international: School of computing and Information technology, 2015-10) Bob, JohnA computerized students' records management system (CSRMS) is a computer programdesigned to capture, store, manage the creation and maintenance of students' records in an organisation. Records management (RM) is the practice of controlling records of an organization from the time they are created to the time of disposal which includes indentifying, creating, classifying, using, storing, securing, retrieving, and destroying or permanently preserving records. Records management system (RMS) is a collection of elements in an organization managing records. The activities in this management include the systematic and efficient control of the creation, maintenance and destruction of the records along with the business transaction associated with them, for this case which is students' records management system. The major objective of the study was to design a Computerized Students' Records Management System that would help the Faculty of Science and Technology KIU-WC to efficiently and effectively manage Students'. The specific objectives of this study were to investigate the current system of students' record management. gather requirements for designing a computerized students' records management system, design and develop a computerized records management system, test, implement and validate the system. Data was gathered using interviews, observation and questionnaires. The collected data was sorted and analyzed using Microsoft excel software and it was found out that the current manual system is in efficient, time and space consuming in addition to being insecure hence judged not good for the management of records. After gathering the requirements, entity relation diagrams and dataflow diagrams were used to design the computerized system. Microsoft Visual basic was used to create user interface while Ms- Access was used to create the database. The Computerized system developed enables electronic capturing of students' data, storing of this data in an electronic database which eases the retrieval of the same data, any time by only authorized people. The developed computerized system also allows the backup of data on movable devices like flash disks, memory cards and external hard drives which increases the capacity of backup. The computerized system reduces a burden of over compiling of papers and the need for more shelves which reduce congestion in the Faculty of Science and Technology.
- ItemA conceptual real time backup Sim card replacement application for telecommunication industry a case study: MTN-Uganda(Kampala international international: School of computing and Information technology, 2011-06) Edward, Isingoma; Simon, Peter WakubeNo Abstract
- ItemConvoy Management Information System Case Study: Imani Express (Bus Services), Kenya(Kampala International University, School of Computer and Information Technology, 2010-11) Njiru, John Nyagah
- ItemThe database management system (DBMS) in improving school’s administration case study: St. Paul’s Seminary (Kabale Municipality)(Kampala International University, School of Computing and Information Technology, 2019-07) Kyobutungi, ScholasticaThis project describes the entire process for designing Database Management System (DBMS) of St. Paul’s Seminary. The main purpose for this project was to investigate the role of computer technology in improving school’s administration and to design database management system for the school so as to simpler the work of administrators, to be more effective, efficient, reliable and to have more organized records for the school, for accuracy and better performance as far as modern technology is concerned. It was aimed at coming up with a system that is computerized, the data was collected from both primary and secondary sources using direct interviews, questionnaire, document analysis and observation. The project gives the analysis of the old system that was semi- manual. All the above apply that the system will run smoothly thereby improving efficiency and effectiveness of the work done at the seminary
- ItemA Design & Development of A Web-Based Activity Monitoring Tool A Case Study of Uganda Revenue Authority(Kampala International University, School of Computing and Information Technology, 2014-08) Kwagala, Peter WThis research aimed at designing and developing the monitoring tool of employee activities in Uganda Revenue Authority. The main objective of the research was to design and test a web-based activity monitoring tool for employees of Uganda Revenue Authority. The study specific objectives were; to identify the requirements for designing and developing a web-based activity monitoring tool, to design and develop a web-based activity monitoring tool that monitors activities of employees in Uganda Revenue Authority, to implement and to test the web-based activity monitoring system. The study Research questions included; what are the requirements for designing and developing a web-based activity monitoring tool? How can a web-based activity monitoring tool help employee carry out the assigned activities within the stipulated period in order to meet the organizational set objectives? What technology instrument is required to allow easy monitoring of activities within the organization? The research methodology involved going to the field to conduct interviews, carryout observations, and also the use of a questionnaires. The study findings revealed that the current system needed to be improved in order to have all the required information captured and stored in a more advanced way for safety and future reference. The research recommended that URA needed to implement the designed system to facilitate employees’ easy access and input of accurate information on the assigned activities as per the division. The research concluded that the web-based activity monitoring tool was to solve a problem of in accuracy as far as information gathering for the organization is concerned it also discourages lazy employees from providing required information past the deadline thus increasing the organizational output.
- ItemA design & development of a web-based activity monitoring tool: a case study of Uganda Revenue Authority(Kampala International University, School of Computing and Information Technology, 2014-08) Kwagala W., PeterThis research aimed at designing and developing the monitoring tool of employee activities in Uganda Revenue Authority. The main objective of the research was to design and test a web based activity monitoring tool for employees of Uganda Revenue Authority. The study specific objectives were; to identify the requirements for designing and developing a web-based activity monitoring tool, to design and develop a web based activity monitoring tool that monitors activities of employees in Uganda Revenue Authority, to implement and to test the web based activity monitoring system. The study Research questions included; what are the requirements for designing and developing a web based activity monitoring tool? How can a web based activity monitoring tool help employees carry out the assigned activities within the stipulated period in order to meet the organizational set objectives? What technology instrument is required to allow easy monitoring of activities within the organization? The research methodology involved going to the field to conduct interviews, carryout observations, and also the use of a questionnaires. The study findings revealed that the current system needed to be improved in order to have all the required information captured and stored in a more advanced way for safety and future reference. The research recommended that URA needed to implement the designed system to facilitate employees’ easy access and input of accurate information on the assigned activities as per the division. The research concluded that the web-based activity monitoring tool was to solve a problem of in accuracy as far as information gathering for the organization is concerned it also discourages lazy employees from providing required information past the deadline thus increasing the organizational output.
- ItemDesign and development of web application on a mail server case study: Kampala International University(Kampala International University, School of Computing and Information Technology, 2009-12) Juma Jared, Okonga; Susan. S., NaagasiiaThe significance of information technology led to an increasing recognition that communication is an essential thing in the organization. Thus, it is the duty of any organization to ensure well organized and managed information and communication for the organization to succeed. This project aims at designing and developing a mail program which will enhance communication for the university. The project gives the background and introduces the subject under study. The project includes all literature that is relevant to the study, its review of the existing literature that is related to the study. The project also talks about methods used to collect data. The project gives the analysis and the designing of the new system. The project explains the implementation of the new system the project also gives the general conclusion and summary of the project
- ItemDesign and implementation of a mailing list management system|: case study faculty of computer science.(Kampala International University.College of Computer and Informatiom Technology, 2011-05) John Richard, Jackline
- ItemDesign and implementation of a management information system for a forex bureau: a case study of Midwest Forex Bureau Limited(Kampala International University, College of Computing and Information Technology, 2009-12) Abubakar .E., Yussuf; Hinda, MohamoudA graduation report submitted to the School of Computer Studies in partial fulfillment of the requirements for the Award of a Degree of Bachelor of Computer Science of Kampala International University