Search
Now showing items 1-10 of 26
An Energy-Efficient Dynamic Source Routing Protocol for Mobile Ad Hoc Networks
(Makerere University, 2012)
The Dynamic Source Routing Protocol (DSR) is one of the most reliable and effective protocols in the
Mobile Ad Hoc Networks (MANETs). It is also one of the few MANET protocols whose routing scheme
can easily be optimized. ...
Who should diversify and move out of agriculture? Income portfolios and household welfare in rural Uganda
(2018)
In this paper we present empirical evidence of the welfare effects of rural income diversification and off-farm income generation. We use household survey data from two panel rounds in rural Uganda, and fixed and random ...
An Access Control Framework for Protecting Mobile Health Records: The Case Study of Developing Countries
(2012)
Mobile health records are a good way of providing users with on-demand access to health care
data. Standard approaches of securing health records include role-based access control
(RBAC) because this is a flexible approach ...
On the Challenge of Adopting Standard EHR Systems in Developing Countries
(2013)
Electronic health record (EHR) systems are a popular mechanism for accessing health records in the developed world and have contributed towards improved and cost-effective health care management. However, the development ...
Security Analysis of Remote Tower Control
(University of Trento, 2015)
The main target of the analysis is the Remote Tower control center. This will provide Air traffic control services for more than one airport by a single operator in a remote location therefore eliminating an individual ...
Privacy and Digital Technologies: E-Dossier
(Università degli Studi di Trento, 2014-06)
Privacy has been a key issue that needs to be addressed in the digital era. With development of digital technologies now information is shared so easily and fast. The rise of online giants like Google who collect personal ...
Diversity in Security Environments: The Why and the Wherefore
(Uganda Martyrs University, 2014)
Information security is generally discussed in terms of preventing adversarial access to applications and to the data these applications handle. The authors note, however, that increasingly, creating information security ...
Conceptual Modeling of Nodding Syndrome: A System Dynamics and Sequence Approaches
(2017)
Conceptual modelling of nodding syndrome (NS) has hardly been considered in most scientific literature although symptoms of the disease has been widely studied. A conceptual model is a representation of hypothesis about a ...
Hopf-Bifurcation Analysis of Pneumococcal Pneumonia with Time Delays
(Hindawi, 2019-02-03)
In this paper, a mathematical model of pneumococcal pneumonia with time delays is proposed. The stability theory of delay differential equations is used to analyze the model. The results show that the disease-free equilibrium ...