Browsing by Author "Guma, Ali"
Now showing 1 - 11 of 11
Results Per Page
Sort Options
Item Design a Hybrid Approach for the Classification and Recognition of Traffic Signs Using Machine Learning(Wasit Journal of Computer and Mathematics Science, 2023) Guma, Ali; Sadıkoğlu, Emre; Abdelhak, HatimAdvanced Driver Assistance Systems (ADAS) are a fundamental part of various vehicles, and the automatic classification of traffic signs is a crucial component. A traffic image is classified based on its recognizable features. Traffic signs are designed with specific shapes and colours, along with text and symbols that are highly contrasted with their surroundings. This paper proposes a hybrid approach for classifying traffic signs by combining SIFT with SVM for training and classification. There are four phases to the proposed work: pre-processing, feature extraction, training, and classification. A real traffic sign image is used for classification in the proposed framework, and MATLAB is used to implement the frameworkItem Evaluation of E-Learning Management Systems by Lecturers and Students in Ugandan Universities: A Case of Muni University(International Journal of Innovative Research in Science, Engineering and Technology, 2016) Businge, Phelix Mbabazi; Guma, AliThe use of eLearning is increasing dramatically in Uganda, and most of institutions invest huge amounts in developing and deploying eLearning systems. As far as Learning Management System is concerned, it offers an integrated platform for educational materials, distribution and management of learning as well as accessibility by a range of users including lecturers, students and content makers; however, the focus is still largely on getting the infrastructure and creating the e-learning content. It is necessary to consider the individual factors that play an important role in the adoption of e-learning in Ugandan universities, a case of Muni University. For example, the attitudes and perceptions of students and lecturers towards e-learning may affect their acceptance of the technology in the teaching-learning process. The study aimed at evaluating the level of user satisfaction, usability issues affecting e-learning adoption and established the factors hindering the Acceptance and Use of teach management Systems by Lecturers and Students in Uganda. Primary research method was cross sectional design using questionnaire survey, and data was collected from 130 students and 10 lecturers of Muni University. The respondents agreed that the functionality of the system is good; the system is reliable, portable, usable, maintainable and efficient. The users also showed a positive Attitude to use the system and also indicated that, there are no specific person available to provide assistance for the users and Lack of Equipments, Course Quality Concerns, Slow Speed of the E-system, Power problems, Accessibility problems, Network Connections Issues, Lack of Usability policy, Legal concerns and Lack of regular training on use Moodle hinder their usage of the system. Therefore, in order to ensure that all the students and staff can fully embrace the E-Learning Management System, the system should be accessible to the users, there should be a user policy to guide users, more training should be given to both new and old users.Item Evaluation of Key Security Issues Associated with Mobile Money Systems in Uganda(information, 2020) Guma, Ali; Dida, Mussa Ally; Elikana Sam, AnaelSmartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the usage and acceptance of mobile money has mostly been low due to security issues and challenges associated with the system. As a result, there is a need to carry out a survey to evaluate the key security issues associated with mobile money systems in Uganda. The study employed a descriptive research design, and stratified random sampling technique to group the population. Krejcie and Morgan’s formula was used to determine the sample size for the study. The collection of data was through the administration of structured questionnaires, where 741 were filled by registered mobile money (MM) users, 447 registered MM agents, and 52 mobile network operators’ (MNOs) IT o cers of the mobile money service providers (MMSPs) in Uganda. The collected data were analyzed using RStudio software. Statistical techniques like descriptive analysis and Pearson Chi-Square test was used in data analysis and mean (M) > 3.0 and p-value < 0.05 were considered statistically significant. The findings revealed that the key security issues are identity theft, authentication attack, phishing attack, vishing attack, SMiShing attack, personal identification number (PIN) sharing, and agent-driven fraud. Based on these findings, the use of better access controls, customer awareness campaigns, agent training on acceptable practices, strict measures against fraudsters, high-value transaction monitoring by the service providers, developing a comprehensive legal document to run mobile money service, were some of the proposed mitigation measures. This study, therefore, provides a baseline survey to help MNO and the government that would wish to implement secure mobile money systems.Item The Evolving Role of Artificial Intelligence in the Future of Distance Learning: Exploring the Next Frontier(Mesopotamian Journal of Computer Science, 2023) Mijwil, Maad M.; Guma, Ali; Sadıkoğlu, EmreIn recent years, education has become especially related to the applications provided by artificial intelligence technology through a digital environment that includes a set of tools that assist in processing and storing information. Artificial intelligence techniques contribute to the development of students' skills by providing them with advanced scientific content and building their mental capabilities faster. Moreover, these techniques support analysing student data and suggest suitable educational materials and activities for them. Artificial intelligence is a noteworthy tool for the growth of distance education, especially after the development of expert systems that have become a human advisor in many domains, as this leads to the development of education systems that adjust the level of difficulty of materials based on the student’s performance in the electronic classroom, which ensures that the student continues in education and is not frustrated. This article will review the influential role of artificial intelligence applications in growing distance learning, improving the quality of education, and making it an adaptable and practical environment for students.Item Examining the Use of Information Systems to Preserve Indigenous Knowledge in Uganda: A Case from Muni University(I.J. Modern Education and Computer Science, 2018) Oroma, Josephat O.; Guma, AliIndigenous Knowledge (IK), can be preserved using Information Systems in order to protect cultural heritage and disseminate local knowledge for development. This knowledge often passed on orally for generations has become significant in searching for answers to several world's critical problems, are at risk of becoming extinct. This "traditional wisdom" is highly useful in solving complex problems of health, agriculture, education, use of natural resources and the environment. The main challenges of IK are inadequate documentation and diminishing transmission channels. Both descriptive and quantitative methods are used in this study that focuses on highlighting the importance of indigenous knowledge in the sustainable development process and illustrating ways in which technology can be used to preserve it, thereby enriching the development process from a holistic perspective. This research strengthens the preservation of local IK, enhances its adoption in the formal educational settings, leads to improvement in scientific knowledge development and inspire sustainable community development using a holistic approach.Item Heuristic Evaluation and Usability Testing of G-MoMo Applications(Journal of Information Systems Engineering and Management, 2022) Guma, Ali; Dida, Mussa Ally; Elikana Sam, AnaelFinancial technology (FinTech) has swiftly revolutionized mobile money as one of the ways of accessing financial services in developing countries. Numerous mobile money applications were developed to access mobile money services but are hindered by severe authentication security challenges, thus, forcing the researchers to design a secure multi-factor authentication (MFA) algorithm for mobile money applications. Three prototypes of native mobile money applications (G-MoMo applications) were developed to confirm that the algorithm provides high security and is feasible. This study, therefore, aimed to evaluate the usability of the G-MoMo applications using heuristic evaluation and usability testing to identify potential usability issues and provide recommendations for improvement. Heuristic evaluation and usability testing methods were used to evaluate the G-MoMo applications. The heuristic evaluation was carried out by five experts that used the 10 principles proposed by Jakob Nielsen with a five-point severity rating scale to identify the usability problems. While the usability testing was conducted with forty participants selected using a purposive sampling method to validate the usability of the G-MoMo applications by performing tasks and filling out the post-test questionnaire. Data collected were analyzed in RStudio software. Sixty-three usability issues were identified during heuristic evaluation, where 33 were minor and 30 were major. The most violated heuristic items were “help and documentation”, and “user control and freedom”, while the least violated heuristic items were “aesthetic and minimalist design” and “visibility of system status”. The usability testing findings revealed that the G-MoMo applications’ performance proved good in learnability, effectiveness, efficiency, memorability, and errors. It also provided user satisfaction, ease of use, aesthetics, usefulness, integration, and understandability. Therefore, it was highly recommended that the developers of G-MoMo applications fix the identified usability problems to make the applications more reliable and increase overall user satisfaction.Item Mobile Devices for Learning in Universities: Challenges and Effects of Usage(International Journal of Scientific Engineering and Science, 2018) Businge Mbabazi, Phelix; Guma, Ali; Andogah, Geoffrey; Nkamwesiga, LawrenceMobile devices are no longer playing the role of voice or short message communication but also in learning. These devices allow students to interact with educational content and learning can occur regardless of their location. It is therefore important to establish the factors hindering the use of Mobile devices for learning in Universities: A Case of Muni University. The study answered research questions such as; (a) what are the negative effects of using Mobile devices during lectures for other activities not related to the Lecture? (b) what are the reactions of lecturers towards the use of Mobile devices during lecture time? which factors are hindering the use of Mobile devices for learning? Quantitative design was employed using questionnaires containing a Five (5) Point Likert scale items ranging from strongly agree, agree, neutral, disagree, and strongly disagree and open-ended items were utilized in this study to obtain quantitative information to answer the research questions: A total population of 331 was considered and sample size of 181 was obtained using Krejcie and Morgan table. Stratified sampling was used to collect data from each stratum and data was analyzed using SPSS Version 20. The reliability of the data collected was tested using the Cronbach's reliability test coefficient were the overall value of all the options was on average 0.67 which was beyond recommended Cronbach’s Alpha coefficient values 0.6 for an instrument to be declared reliable. In terms of ascertaining the negative effects of using Mobile devices during lectures for other activities to the related Lecture, students agreed that it distract students' attention, disturb other students, disturbs the instructors and the course of the lesson and reflects disrespect for the instructor. The findings also agreed that the following were ranked among top five (5) factors hindering the use of Mobile devices for learning: Lack of mobile devices, Slow Speed of the mobile devices, Power problems, Network Connections Issues and Battery problem but disagreed that the course is not suited for mobile devices, lack of interest and complicated to use. This study recommended that mobile devices should be encouraged, allow students to use Mobile devices according to lesson’s topics since students disagreed that lack of interest is not hindering the use of mobile devices, discourage students from using Mobile devices in class for other activities not related to the topic and formulate the usability policy of mobile devices.Item The Role of ICT to Make Teaching-Learning Effective in Higher Institutions of Learning in Uganda(International Journal of Innovative Research in Science, Engineering and Technology, 2013) Guma, Ali; Faruque A., Haolader; Muhammad, KhushiThe use of ICT in teaching-learning process is a relatively new phenomenon and it has been the educational researchers' focus. The effective integration of this technology into classroom practices poses a challenge to teachers and administrators. This empirical study aimed at finding out the factors influencing use of ICT to make teachinglearning effective in higher institutions of learning in Uganda and identifying the innovations that ICT has brought into teaching-learning process, particularly in higher institutions of learning in Uganda. A survey was employed and in order to empirically investigate the study. The findings of this study revealed that teaching staff and administrators had a strong desire to integrate ICT into teaching-learning processes. The innovations that ICT has brought in teachinglearning process include: E-learning, e-communication, quick access to information, online student registration, online advertisement, reduced burden of keeping hardcopy, networking with resourceful persons, etc. However, the presence of all these factors increased the chance of excellent integration of ICT in teaching-learning process. Therefore, the training of teaching staff in the pedagogical issues and administrators in administration should be increased if teachers and administrators are to be convinced of the value of using ICT in their teaching-learning process and administration.Item A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications(Future Internet, 2021) Guma, Ali; Dida, Mussa Ally; Elikana Sam, AnaelWith the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money users. These 2FA schemes are vulnerable to numerous security attacks because they only use a personal identification number (PIN) and subscriber identity module (SIM). This study aims to develop a secure and efficient multi-factor authentication algorithm for mobile money applications. It uses a novel approach combining PIN, a one-time password (OTP), and a biometric fingerprint to enforce extra security during mobile money authentication. It also uses a biometric fingerprint and quick response (QR) code to confirm mobile money withdrawal. The security of the PIN and OTP is enforced by using secure hashing algorithm-256 (SHA-256), a biometric fingerprint by Fast IDentity Online (FIDO) that uses a standard public key cryptography technique (RSA), and Fernet encryption to secure a QR code and the records in the databases. The evolutionary prototyping model was adopted when developing the native mobile money application prototypes to prove that the algorithm is feasible and provides a higher degree of security. The developed applications were tested, and a detailed security analysis was conducted. The results show that the proposed algorithm is secure, efficient, and highly effective against the various threat models. It also offers secure and efficient authentication and ensures data confidentiality, integrity, non-repudiation, user anonymity, and privacy. The performance analysis indicates that it achieves better overall performance compared with the existing mobile money systems.Item SWOT Analysis of Blended Learning in Public Universities of Uganda: A Case Study of Muni University(J. Multidisciplinary Scientific Journal, 2019) Guma, Ali; Buruga, Bosco Apparatus; Taban, HabibuWith the fusion of information communication technology (ICT) in higher institutions of learning, new teaching and learning practices have developed—often called blended learning—allowing students and teachers to interact with information and each other more independently. This study, therefore, analyses the strengths, weaknesses, opportunities and threats (SWOT) of blended learning in the Public Universities of Uganda, in a case study of Muni University. Descriptive survey design was employed in the research. The target sample of the survey was 25 lecturers and 189 students selected using a stratified random sampling technique from the three faculties. A questionnaire was employed in this study and the data collected were analyzed using SPSS Version 25. The findings of the study identified accessibility, positive attitude, and knowledge and skills as the major motivators for blended learning. The strengths of blended learning found included serving many students in a short time, university readiness, connected both in and out of class, basic IT skills and top management commitment. The weaknesses included low bandwidth and unstable internet, lack of a plagiarism tool, insu cient numbers of computers and dependent on internet connectivity. Opportunities cited were competency-based systems that made it easier to manage individual progress in line with university expansion plans, an accessible way of learning regardless of location and available external support. The threats included unreliable power supply, unreliable internet connection, exchanges of username and passwords by students, internet shorthand used in student assignments. Based on these results, the study provides a baseline to help government and public universities that would like to implement or newly incorporate blended learning to identify strengths, weaknesses, opportunities and threats associated with the blended learning approach. The survey urges that plagiarism plugins for Moodle and BigBlue Button should be added, steady power supply should be provided, internet accessibility should be improved, blended learning training and workshops need to be improved and finally, policies, rules and standards pertaining to blended learning should be enacted.Item Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures(MDPI AG, 2020-09-24) Guma, Ali; Mussa, Ally Dida; Anael, Elikana SamThe proliferation of digital financial innovations like mobile money has led to the rise in mobile subscriptions and transactions. It has also increased the security challenges associated with the current two-factor authentication (2FA) scheme for mobile money due to the high demand. This review paper aims to determine the threat models in the 2FA scheme for mobile money. It also intends to identify the countermeasures to overcome the threat models. A comprehensive literature search was conducted from the Google Scholar and other leading scientific databases such as IEEE Xplore, MDPI, Emerald Insight, Hindawi, ACM, Elsevier, Springer, and Specific and International Journals, where 97 papers were reviewed that focused on the topic. Descriptive research papers and studies related to the theme were selected. Three reviewers extracted information independently on authentication, mobile money system architecture, mobile money access, the authentication scheme for mobile money, various attacks on the mobile money system (MMS), threat models in the 2FA scheme for mobile money, and countermeasures. Through literature analysis, it was found that the threat models in the 2FA scheme for mobile money were categorised into five, namely, attacks against privacy, attacks against authentication, attacks against confidentiality, attacks against integrity, and attacks against availability. The countermeasures include use of cryptographic functions (e.g., asymmetric encryption function, symmetric encryption function, and hash function) and personal identification (e.g., number-based and biometric-based countermeasures). This review study reveals that the current 2FA scheme for mobile money has security gaps that need to be addressed since it only uses a personal identification number (PIN) and a subscriber identity module (SIM) to authenticate users, which are susceptible to attacks. This work, therefore, will help mobile money service providers (MMSPs), decision-makers, and governments that wish to improve their current 2FA scheme for mobile money.