Faculty of Computing ,Library and Information Science (FCLIS).
Permanent URI for this collection
Browse
Browsing Faculty of Computing ,Library and Information Science (FCLIS). by Title
Now showing 1 - 20 of 47
Results Per Page
Sort Options
Item Open Access 00R - The Library Association RECORD 2000- Index(kabale university, 2000) Bazirake, Bernard BamuhiigaThis item contains the Library Association Record index 2000Item Open Access A Mobile Based Technology to Improve Male Involvement in Antenatal Care.(Kabale University, 2024) Muhoza, B. Gloria; Ssemaluulu, Paul Mukasa; Mabirizi, VicentThe World Health Organization Technical Working Group on maternal health unit recommended a minimum level of care to be four visits throughout the pregnancy for pregnant mothers [1]. The first visit which is expected to screen and treat anaemia, and syphilis, screen for risk factors and medical conditions that can be best dealt with in early pregnancy and initiate prophylaxis if required (e.g., for anaemia and malaria) is recommended to be made before the end of the fourth month of pregnancy. The second, third and fourth visits are scheduled at 24–28, 32 and 36 weeks, respectively. Male involvement in Antenatal health care has been described as a process of social and behavioural change that is needed for men to play more responsible roles in maternal health care to ensure women's and children’s wellbeing. A study by Okoth [1] reported that, in Uganda, male involvement in antenatal care stands at only 6% and this has been attributed to social, economic and cultural related factors. The situation worsens with the lack of an effective coordinated platform for males sharing their experience in taking part in ANC and this has affected the process of antenatal care service delivery. Objective. To assess the role of mobile technology in improving male involvement in antenatal care by developing a mobile-based technology which sends SMS reminders to male partners encouraging them to escort their pregnant wives for antenatal care services. Research questions. What are the challenges towards the limited antenatal care-seeking behaviours among pregnant mothers? What are the causes of limited male involvement in antenatal care? What roles do ICTs play in enhancing Antenatal Care seeking behaviours among pregnant mothers and in increasing the male involvement in Antenatal Care? Method. We purposively selected pregnant mothers whose phones, had been receiving antenatal care services from Kabale General Hospital and reported staying with their male partners. The recruited participants were interviewed together with their male partners. STATA 13 software was used to define participants’ demographics while qualitative data were analysed using content analysis to come up with classes describing participants’ perceptions. Results. Participants reported that reminding them of their next antenatal visit via SMS reminder plays a significant role towards their antenatal care-seeking behaviour. Conclusion. Mobile health could be a potential approach to improving male involvement in antenatal care through sending timely SMS reminders to both the expectant mother and her male partner reminding them of their next antenatal visit.Item Open Access An algorithm to Detect Overlapping Red Blood Cells for Sickle Cell Disease Diagnosis.(Kabale University, 2024) Mabirizi, Vicent; Kawuma, Simon; Safari, YonasiIn Africa, Uganda is among the countries with a high number of babies (20,000 babies)born with sickle cell, contributing between 6.8% of the children born with sickle cell every year worldwide and approximately 4.5% of the children born with hemoglobinopathies worldwide. It is estimated that by 2050, sickle cell cases will increase by 30% if no intervention is put in place. To facilitate early detection of sickle cell anemia, medical experts employ machine learning algorithms to detect sickle cell abnormality. Previous research revealed that algorithms for recognizing the shape of a sickle cell from blood smear by fractional dimension, cannot detect sickle cells if applied to blood samples containing overlapping red blood cells. In this research, the authors developed an algorithm to detect overlapping red blood cells for sickle cell disease diagnosis. The algorithm uses canny edge and double threshold machine learning techniques and takes overlapping red blood cell images as inputs to detect if these cells are sickle cell anemic. These images have a scale magnification of (200×, 400×, 650×) pixel taken using a microscope. The algorithm was tested on a total of 1000 digital images and the overall accuracy, sensitivity, and specificity were 98.18%, 98.29%, and 97.98% respectively.Item Open Access An Empirical Study of Bugs in Eclipse Stable Internal Interfaces.(Kabale University, 2024) Simon, Kawuma; Nabaasa, Evarist; Bamutura, David Sabiiti; Mabirizi, VicentThe Eclipse framework is a popular and widely used framework that has been evolving for over a decade. The framework provides both stable interfaces (APIs) and unstable interfaces (non-APIs). Despite being discouraged by Eclipse, application developers often use non-APIs which cause their systems to fail when ported to new framework releases. Previous studies showed that applications using relatively old non-APIs are more likely to be compatible with new releases compared to the ones that used newly introduced non-APIs. Furthermore, from our previous study about the stability of Eclipse internal interfaces, we discovered that there exist 327K stable non-API methods as the Eclipse framework evolves. In the same study, we recommended that 327K stable non-API methods can be used by Eclipse interface providers as possible candidates for promotion to stable interfaces. However, since non-APIs are unsupported and considered to be immature i.e., can contain bugs, to this end, there exists a need to first investigate the stable non-APIs for possible bugs before they can be promoted to APIs. In this study, we empirically investigated the stable non-API for possible bugs using the Sonarqube software quality tool. We discovered that over 79.8% of classes containing old stable non-API methods have zero bugs. Results from this study can be used by both interface providers and users as a starting point to analyze which interfaces are well tested and also estimate how much work could be involved when performing bug fixing for a given eclipse release.Item Open Access An examination of the correlation between website traffi c and the quality of services provided by Jumia Uganda.(Kabale University, 2024) Ssemaluulu, Paul Mukasa; Isingoma, Fenehansi; Mugavu, GeorgeAn attempt to divorce E-marketing from current business operations is a futile one worldwide presently. The two are like Siamese twins since a strong digital marketing platform benefits from current business operations very well. Website development became fundamental following the discovery of the Internet in early 1983 and the World Wide Web in 1989. It is on such background that Jumia Uganda, an online business platform was conceived. The research employed a cross-sectional survey design to investigate the association between electronic marketing efforts and service quality. A mixed-methods research approach, incorporating both quantitative and qualitative methodologies, was deemed highly relevant for this study. In addition, from the 255 target respondents, a definite sample size of 101 was determined using William G. Cochran's (1997) formula. However, just like any usual business, web-based businesses like the ones of Jumia Uganda are not short of incapacitation which among others is low website traffic which impacts the sales of such businesses directly. The paper provides a detailed literature review concentrating on the nexus between website traffic and quality services. Based on empirical evidence, we conclude that the moderate positive correlation coefficient of (r=0.390**) suggests a correlation between website traffic and service quality. As website traffic increases, there is a tendency for service quality to improve. The significance level for both correlations was 0.000, indicating that the correlation coefficients were highly significant at the 0.01 level (2-tailed). This positive correlation implies a connection between website traffic and service quality. From the empirical conclusion, we are in a position to come up with a key recommendation stating that to enhance its online presence, Jumia should consider diversifying its website content with engaging formats such as blog posts, videos, and infographics to appeal to a broader audience. Consistent updates and the regular refreshment of content are crucial for maintaining visitor interest.Item Open Access An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations.(Kabale University, 2023) Ahimbisibwe, Benjamin K.; Nabende, Peter; Musiimenta, FlorenceThe study aims to examine information security managerial practices in organisations. It was guided by three specific objectives: identification of information security practices critical to information assets management; establishment of implementation processes involved in the execution of structured information security governance; and evaluation of policies that influence information security best practices. In line with these objectives, security was acknowledged as a requisite element in protecting organizational information assets. The study covered two public sector organisations specifically, Uganda Wildlife Authority and National Forestry Authority. Focus was made on information security practices critical to managing information like human security, information classification, procedures for information labelling, compliance, standards, command and control techniques. These security practices were selected based on their importance in the protection of confidentiality, integrity and availability of information assets. Descriptive research design was adopted to describe the phenomenon under study. Being an in-depth inquiry, qualitative approach was used, survey questionnaires representing zero and one scores were designed to collect data. The respondents were purposively selected based on their knowledge in the subject area, cost-effectiveness and delivery of timely results. These respondents included information technology officers, administrative secretaries, data clerks and security guards. Findings from the field were analyzed and presented in meaningful tables. The research findings demonstrate that evaluation of users’ actions was hierarchical in nature; based on associations with tasks performed; information security practices are not aligned to guidelines set by National Information Technology Authority; there was need to establish appropriate measures to handle new information security risk in organizations. Based on these findings, recommendations that reflect the importance of examining information security managerial practices in organizations were made.Item Open Access Analysis of E-Exams performance under COVID-19 Pandemic at Kabale University, Uganda(East African Journal Of Science ,Technology and Innovation, 2022) Phelix, Businge Mbabazi; Nicholas, Nkamwesiga; BC, BashekaThere has been a shift in a mode of conducting exams from physical appearance of students to the electronic examinations due to covid-19 pandemic. This paper presents the experience in the management of e-exams as part of the summative evaluation of students. This was achieved by establishing the readiness strategies for managing e-exams, determining the performance of e-exams management and ascertaining the challenges faced during the management of e-exams.Item Open Access Analysis of Library and Information Science/Studies (LIS) Education Today: The Inclusion of Indigenous Knowledge and Multicultural Issues in LIS Curriculum(Kabale University, 2013) G. Kabatangare, TumuhairweThe paper analyses the inclusion indigenous knowledge and multicultural issues in library and information science/studies (LIS) curricula. Using literature review the paper presents the scenario in both developed and developing countries. In North America and Europe, recognition of diversity as valuable to professionalism and necessary for generating culturally competent librarians and library staff is evident. On the contrary, LIS schools and LIS institutions and educators in developing countries of Africa have almost no record on the inclusion of indigenous knowledge and multiculturalism in LIS education. Challenges to the effective inclusion of indigenous knowledge and multiculturalism to LIS education programs in developing countries exist, and are largely perception and attitude, inadequacy in skills, and inadequacy in funding. There is a need to revise and improve the curricula for library schools, especially in the developing countries of Africa, towards the inclusion of indigenous knowledge and multicultural issues.Item Open Access Application Of ArtifiCial Intelligence in E-Governance: A Comparative Study of Supervised Machine Learning and Ensemble Learning Algorithms on Crime Prediction.(Kabale University, 2024) Niyonzima, Ivan; Muhaise, Hussein; Akankwasa, AureriIn the developing world, the daily activities of humans’ social, political and economic life make it vital and easy to encounter the phenomenon of crime. Crime is an unnecessary evil in society and for any economic, social and political activities to run smoothly, criminal offenses must be completely eliminated from society. Advancement in information and communications technology enables law enforcement agencies to collect a huge amount of crime data, and the data collected by these organizaions have been doubling every two years. It has been found out that only 17% of the collected crime data is used in their operations today and several studies have noted that Law Enforcement Agencies are data rich but information poor. Machine learning, a subfield of artificial intelligence, has been used by government agencies in developed countries in different operations like face recognition, computer forensics, image and video analysis to identify criminals and crime predictions. It is therefore time for developing countries to leverage such technologies in order to reduce crimes. Therefore, this study proposes the application of supervised machine learning techniques in the prediction of crimes basing on the past crime data. During this study, we used open-source crime data from the UCI Machine learning repository to train and validate our algorithms. The performance of supervised machine learning and ensemble learning algorithms was done using crime data. The supervised machine learning algorithms used include K-Nearest Neighbor (KNN), decision tree classifier (CART), Naïve Bayes (NB) and Support vector machine (SVM). The ensemble learning algorithms used include AdaBoost (AD), Gradient Boosting Classifier (GBM), Random Forest (RF) and Extra Trees (ET). We used an accuracy metric to measure the performance of the algorithms. Python 3 was used in all the experiments using windows 10 laptop with 8GB RAM and 2.0GHZ processor. The performance of the supervised machine learning algorithms using the original datasets includes 60.33%, 56.24%, 57.01% and 59.06% for KNN, CART, NB, and SVM respectively. The performance of ensemble learning algorithms using the original datasets includes 58.58%, 59.81%, 55.23% and 55.74% for AD, GBM, RF and ET respectively. Experimental results revealed that KNN generally performed better when compared to the rest of the algorithms. we then developed a crime prediction model based on KNN and its prediction accuracy was 66% on our test dataset. The use of Artificial Intelligence has the potential to ameliorate several existing structural inefficiencies in the discharge of governmental functions. Machine learning, a subfield of artificial intelligence, has been used by government agencies in developed countries in crime analysis and predictions. It is therefore time for developing countries to leverage such technologies in order to reduce crimes.Item Open Access Assessing Medical Students’ Learning Style Preferences at Kabale University Medical School, Uganda.(Kabale University, 2024) Muhaise, Hussein; Businge, Phelix Mbabazi; Ssemaluulu, Paul; Kyomugisha, PatriciaThis article is based on an empirical study conducted to assess and establish the preferred learning styles of medical students in the Kabale University Medical School. The study was prompted by a paradigm shift in teaching-learning strategies from the conventional knowledge-based medical curriculum to competency-based medical education (CMBE). In line with the learners’ diversity and inclusion, CBME liberalizes the learning environment by providing a variety of learning methods. Hence, this study aimed to ascertain the preferences of medical students’ learning styles concerning competency-based learning approaches. Procedurally, the study employed online survey methods, and the respondents included 160 medical (MBChB) students, all from Kabale University School of Medicine. The data collected were captured on SPSS version 26 and subjected to t-test analysis. Besides, Visual, Aural, ReadWrite, and Kinaesthetic (VARK) learning inventory was used to determine the student’s learning preferences, while a t-test was used to establish the relationships between the demographic profiles and the learning styles. Notably, the Aural learning style produced the highest mean score of 7.21 ± 3.61, followed by Kinaesthetic (6.43 ± 3.22), ReadWrite (6.12 ± 2.23) and Visual (4.04 ± 2.42). Relatively, t-test results showed significant (p < 0.05) differences in learning styles between preclinical and clinical students. However, the t-test results for gender factors for all the learning dimensions were insignificant (p > 0.05). Pre-clinical students prefer visual and read-write learning styles, while clinical students prefer kinaesthetic and visual learning styles. Based on the findings, this study believes that identifying the learners’ preferred learning styles will help educators choose the most effective teaching methods.Item Open Access Assessing the Effectiveness of Tools Used for Lecturer and Course Evaluation in Institutions of Higher Learning: A Case Study from Ugandan Universities.(Kabale University, 2024) Mabirizi, Vicent; Karungi, Monica; Murangira, Jones; Muhoza, B. Gloria; Mutebi, Michael; Mbago, Ronald; Kohabohebwa, John Ivan; Birungi, RuthBlended learning, a pedagogical method integrating face-to-face and online instructions methodologies, has been identified as a strategic educational approach since its inception in the late 1990s. Moreover, its adoption especially in developing countries such as Uganda was widely recognized during the COVID-19 pandemic’s acceleration of digital learning adoption. However, this adoption has paused many challenges in evaluating learning content, teaching methodologies, and their impact on student progress. This study therefore, explores the critical role of quality assurance in higher education, focusing on the assessment of lecturer performance and course content. Apparently, paper-based mode of evaluation is the commonly used method in Ugandan universities, posing issues of privacy, delayed analytics, and ever-increasing operational costs. To address these challenges, this research proposes the development of an automated assessment system, informed by a benchmarking study across four universities. By adopting insights from existing evaluation practices, the proposed system aims to enhance the efficiency, accuracy, and students’ privacy during lecturer and course assessment. The implementation of this automated system at Kabale University promises to streamline evaluation process, ultimately enhancing teaching quality and academic outcomes.Item Open Access Awareness and Use of Electronic Resources by Undergraduate Students at Kabale University, Uganda(Islamic University Multidisciplinary Journal, 2020) Iroroeavwo Edwin, Achugbue; Benjamin, AhimbisibweThe paper focused on the awareness and use of electronic resources by undergraduate students at Kabale University. It discusses the importance of electronic resources and types of electronic resources; survey research design was adopted for the study and the instrument used for data collection was questionnaire. The target population of this study comprises 2, 600 undergraduate’s students who are duly registered at Kabale University library for the 2018/2019 academic session. A total of 475 of the total population were drawn using a random sampling technique. 475 questionnaires were distributed to the respondents and a total of 469 was duly completed and found usable, which gave 99% response rate. The data collected for this study was analyzed using simple percentage and frequency counts. The study revealed that electronic resources have tremendous impacts on the undergraduate’s students in the course of their academic pursuit. The study also revealed that majority of the respondents makes use of electronic resources on a weekly basis. However, the major challenge undergraduates face with the use of electronic resources is lack of adequate training, followed by lack of expert help while some others complained of slow internet connectivity.Item Open Access Cart abandonment rate and service quality of on-line merchandisers: a case study of Jumia Uganda.(Kabale University, 2024) Ssemaluulu, Paul Mukasa; Isingoma, Fenehansi; Mugavu, GeorgeThe study examined electronic marketing and service quality of online merchandisers, a case study of Jumia Uganda. The specific objective was to determine the relationship between cart abandonment rate and service quality in Jumia Uganda. The research employed a cross-sectional survey design to investigate the association between electronic marketing efforts and service quality. A mixed-methods research approach, incorporating both quantitative and qualitative methodologies, was deemed highly relevant for this study. In addition, from the 255 target respondents, a definite sample size of 101 was determined using William G. Cochran's (1997) formula. The study revealed significant correlations between various factors in the context of Jumia Uganda's electronic marketing. The study revealed that a moderate positive correlation (r = 0.422**) was identified between cart abandonment rate and service quality, emphasizing the critical role of service quality in customer retention and reducing cart abandonment. It was recommended that: Jumia should launch remarketing campaigns to re-engage customers who abandoned their carts. Personalized messages and incentives should be used to encourage them to return and finalize their transactions.Item Open Access Citation Analysis of Undergraduate Projects Report in the Department of Library and Information Science Kabale University Uganda: An In-Text Citation Study(Journal of Library and Information Sciences, 2020) Iroroeavwo Edwin, Achugbue; Benjamin, Ahimbisibwe; Olivia Nina, Rugambwa; Patrick, OdongPurpose – The study focused on citation analysis of in-text citations of undergraduate projects research in the department of library and information science, Kabale University Uganda. The purpose is to determine numbers of in-text citations, in-text citations sources, number of in-text citations per programme and students conformity with American Psychological Association style of citations and references. Design/method/approach - The study adopted a citation analysis method to study the in-text citations of undergraduate research projects submitted by graduates of the department of library and information science Kabale University, Uganda. The study covered the period of 2015 to 2019 sets of graduate’s research projects submitted to the department. Analysis focused on in- text citations, in-text citations per programme, in-text citations conformity with APA and in-text citations not in conformity with APA. Findings - The study found that students had the highest number of in-text citations in their research project in 2019 and most of their citations were in journals and books. The study also revealed that programmes in the department of library and information science (Bachelor of Library and Information Sciences- BLIS and Bachelor of Records Management -BRIM)) students’ projects research had the highest number of in-text citations in their research and that most of their in-text citations in both programmes did not conform to APA style of citations. Originality - Undergraduate students of the department of library and information science of Kabale University, Uganda, need good orientation on broad research culture. Most especially in-text citation and referencing this will help them to guild against plagiarism and ensure that sources of research information, authors and literature are acknowledged.Item Open Access Comparison of Deep Learning Techniques in Detection of Sickle Cell Disease.(Kabale University, 2023) Mabirizi, Vicent; Kawuma, Simon; Kyarisiima, Addah; Bamutura, David; Atwiine, Barnabas; Nanjebe, Deborah; Oyesigye, Adolf MukamaRecently, the transfer learning technique has proved to be powerful in enhancing the development of deep learning methods for sickle cell disease (SCD) detection as a complement to the clinical method where a hemoglobin electrophoresis machine is used. This is evidenced by some models and algorithms with ≥90% prediction accuracy. From the literature, most of the proposed methods are trained and tested on pre-trained deep learning models like VGG16, VGG19, ResNet, Inception_V3, and ReNet. However, training and testing of these methods are limited to one model and separate datasets which may lead to biased results due to implementation in a variation of these models which affects the results produced. To this end, there exists a need to evaluate the SCD models using the same dataset. Thus, in this research study, we carried out a comparative investigation and evaluated predominate pre-trained models used to detect SCD using the same dataset to ascertain which one has the best accuracy. We used a secondary dataset obtained from an online dataset. In our study, we have discovered that Inception V3 yielded the highest accuracy of 97.3% followed by VGG19 at 97.0%, VGG16 at 91%, ResNet50 at 82% and ReNet at 67%, and the CNN-scratch model achieved 81% accuracy. Results from our study will aid researchers and industry practitioners in making decisions on the best deep-learning model to use while detecting SCD.Item Open Access A Computer-Aided Justice Management System: A prototype for Universities in Uganda(International Journal of Engineering Research & Science, 2019) Conrad M., Mubaraka; Moses, Agaba; Ngige, J. Ng’ang’aJustice Management in any organisation is recipe for proper management and organisational prosperity. As error is to human, disputes are inevitable but should be resolved amicably. With a focus on higher institutions of learning justice administration and management is handy in managing competition and so profit maximization especially in the current privatization of higher education. The study aimed at designing a prototype for universities which ultimately helps local citizens to interpret law. Six universities were purposively selected and a cross sectional and design science research methodology employed. The study found that if improved the proposed justice management system would significantly reduce the prevailing challenges of case backlog, losses and postponed hearing records, timely and responsiveness of summons among others. However, in future the small messaging system (SMS) enabled systems could also be considered together with translator into major local languages.Item Open Access Contextualizing Wilson’s Information Behavior model in Seeking Indigenous Information for HIV prevention among Adolescents in Secondary schools, Uganda(DigitalCommons@University of Nebraska - Lincoln, 2020) Olivia Nina, Rugambwa; Lyaka, Martha; Mutibwa, Lois NankyaEffective communication of quality health information in emergency situations is critical in curbing the spread of diseases. Health programs promoting both biomedical and indigenous representations in HIV prevention have been found to be more effective than those that ignore lay representations. Nonetheless, there is still limited documentation on indigenous information supporting health choices among adolescents in secondary schools in Uganda. Besides, the information sources from where adolescents seek this information are not clear. This paper presents Wilson’s Information Behavior model as the theoretical anchor used to understand how utilization of Indigenous information can be enhanced among adolescents for improved health choices on HIV prevention. The model was used as part of a doctoral study project to study the problem and propose a research design. The key constructs of the model adopted for the study include; context of information need, person in context, activating mechanism, and information search behavior, information processing and use. These served as the blueprints for enhancing access and use of indigenous information for HIV prevention in a school setting.Item Open Access Crime Prediction Using Decision Tree (J48) Classification Algorithm.(International Journal of Computer and Information Technology, 2017) Ivan, Niyonzima; Emmanuel Ahishakiye; Elisha Opiyo Omulo; Danison TaremwaThere had been an enormous increase in the crime in the recent past. Crimes are a common social problem affecting the quality of life and the economic growth of a society. With the increase of crimes, law enforcement agencies are continuing to demand advanced systems and new approaches to improve crime analytics and better protect their communities. Decision tree (J48) applied in the context of law enforcement and intelligence analysis holds the promise of alleviating such problem. Data mining is a way to extract knowledge out of usually large data sets; in other words it is an approach to discover hidden relationships among data by using artificial intelligence methods of which decision tree (J48) is inclusive. The wide range of machine learning applications has made it an important field of research. Criminology is one of the most important fields for applying data mining. Criminology is a process that aims to identify crime characteristics. This study considered the development of crime prediction prototype model using decision tree (J48) algorithm because it has been considered as the most efficient machine learning algorithm for prediction of crime data as described in the related literature. From the experimental results, J48 algorithm predicted the unknown category of crime data to the accuracy of 94.25287% which is fair enough for the system to be relied on for prediction of future crimes.Item Open Access Deep Learning Techniques in DICOM Files Classification: A Systematic Review(BON VIEW PUBLISHING PTE.LTD., 2025) Mabirizi, Vicent; Kawuma, Simon; Natumanya, Deborah; Wasswa, WilliamThe digital imaging and communications in medicine (DICOM) format is a widely adopted standard for storing medical imaging data, integrating both image and metadata critical for clinical diagnostics. However, its complexity poses challenges for deep learning applications, particularly in extracting and processing this dual-layered data. This review analyzes 23 peer-reviewed studies published between 2014 and 2024, sourced from PubMed, Google Scholar, PLOS, Science Direct, and IEEE databases. Guided by Arksey and O’Malley’s scoping methodology, the review reveals that existing deep learning techniques typically rely on converting DICOM images into simpler formats like JPEG, TIF, or PNG for classification, a process that often results in metadata loss and reduced classification accuracy. Frameworks such as MONAI, NVIDIA Clare, SimpleITK, and OpenCV facilitate direct DICOM processing but face limitations, including overfitting, challenges with data heterogeneity, and inefficiencies in handling large datasets. This review emphasizes the urgent need for developing a robust convolutional neural network architecture capable of directly processing DICOM data to preserve metadata integrity and enhance predictive performance, paving way for more reliable and scalable medical imaging solutions.Item Open Access Developing Countries and Blockchain Technology: Uganda’s Perspective(International Journal of Latest Research in Engineering and Technology, 2018) Ivan, Niyonzima; Ruth Wario; Emmanuel AhishakiyeBlockchain is receiving ever-growing attention from research and industry and is considered a breakthrough technology. This paper presents an overview of Blockchain Technology and its potential applications in developing countries especially Uganda. It was noted that these nations have the potential to progress, but do not have adequate access to present day technology, primarily due to lack of infrastructure and thus Blockchain Technology will fill the gaps. Fundamentally, these nations need transparency, security, and accountability in their processes, all of which are cornerstones of Blockchain technology. Finally, this paper reveals that due to the support from both government and non-governmental organizations, and the establishment of the Blockchain Association of Uganda, Uganda is ready for Blockchain Technology.
- «
- 1 (current)
- 2
- 3
- »