Conference Proceedings
Browse by
Recent Submissions
-
Conclusions of the digital health hub of the Transform Africa Summit (2018): strong government leadership and public-privatepartnerships are key prerequisites for sustainable scale up of digital health in Africa
(BMC Proceedings, 2018)The use of digital technologies to improve access to health is gaining momentum in Africa. This is more pertinent with the increasing penetration of mobile phone technology and internet use, and calls for innovative strategies ... -
Are Organisational Characteristics Antecedents of Employee Commitment? Evidence using Academic Staff in Private Universities in Uganda by Wilson
(International Conference on Private Higher Education in Africa, 2016)The study sought to find out whether organizational structure, leadership, relationships and support were antecedents of the employee commitment (EC) of the academic staff. The correlational study involved 173 respondents ... -
A Literature Review on Sampling Techniques in Semiconductor Manufacturing
(IEEE Transactions on Semiconductor Manufacturing, 2013)This paper reviews sampling techniques for inspection in semiconductor manufacturing. We discuss the strengths and weaknesses of techniques developed in the last last 20 years for excursion monitoring (when a process or ... -
The Role of Blockchain Technology in Financial Engineering
(Springer Singapore., 2021)Home ICCCE 2020 Conference paper The Role of Blockchain Technology in Financial Engineering Venkamaraju Chakravaram, Sunitha Ratnakaram, Ester Agasha & Nitin Simha Vihari Conference paper First Online: 12 October ... -
Cryptocurrency: Threat or Opportunity
(Springer Singapore, 2021)Though a weak currency is a sign of a weak economy and a weak economy leads to a weak nation, here we gave an attempt to study about the cryptocurrency. Cryptocurrency is also known as the digital currency of the 21st ... -
The relationship between the Old Case Loads and New Case Loads in Nakivale refugee settlement in Southwestern Uganda
(Journal of Eastern African Studies, 2016)Forced migration from Rwanda has become a common trend. It has been there since time immemorial and is still continuing at varying magnitudes. Scholarly literature indicate that over 100,000 Rwandan refugees crossed into ... -
Indigenous Knowledge in Agriculture: A case study of the challenges in sharing knowledge of past generations in a globalized context in Uganda.
(IFLA General Conference and Council, 2007)For centuries, farmers have planned agricultural production and conserved natural resources by adopting indigenous knowledge. The development of indigenous knowledge systems, including management of natural environment, ... -
ADSMS: Anomaly Detection Scheme for Mitigating Sink Hole Attack in Wireless Sensor Network
(IEEE, 2017)In past years, mobile ad hoc networks (MANETs) widespread use in many applications, including for some mission-critical applications, and has become one of the major concerns such as security MANETs. MANETs due to some ... -
A Normalized Approach for Service Discovery
(Procedia Computer Science, 2015)In today’s world web services are the known perception to all the users who uses the internet. The Web Service process involves service discovery, selection and ranking. Discovery is the process of matchmaking of user ... -
mira: an Application Containerisation Pipeline for Small Software Development Teams in Low Resource Settings
(Development Engineering, 2022)Cloud native applications leverage Development and Operation (DevOps), microservice architectures and containerisation for primarily availability, resilience and scalability reasons. Small developer teams in low resource ... -
Hydraulic conductivity predictive model of RHA-ameliorated laterite for solving landfill liner leachate, soil and water contamination and carbon emission problems
(International Journal of Low-Carbon Technologies, 2022)The environment is seriously being affected by the leachate release at the unconstructed and badly constructed waste containment or landfill facilities around the globe. The worst hit is the developing world where there ... -
Why Social Protection programmes have attracted domestic political support in Uganda: Evidence from Social Assistance Grant for Empowerment (SAGE) Pilot programme
(ResearchGate, 2014)This paper examines why Social Protection interventions such as the current Social Assistance Grant for Empowerment (SAGE) pilot programme in 14 districts of Uganda has attracted more domestic political support in the ... -
The Role of Local Government in Social Protection Programmes: A Case of Social Assistance Grant for Empowerment (Sage) in Uganda.
(ResearchGate, 2015)Social protection has been recognized as a critical element of national development strategies in both developed and developing countries. Uganda have embraced social protection interventions in the recent years as key to ... -
Energy Efficiency and Spectral Efficiency Trade-off of a Novel Interference Avoidance Approach for LTE-Femtocell Networks
(IEEE., 2012)The trade-off between energy efficiency and downlink spectral efficiency for LTE-femtocells can be significantly balanced by a novel interference management technique in the presence of the interference from the co-channel ... -
Security Analysis of Mobile Edge Computing in Virtualized Small Cell Networks
(Springer International Publishing., 2016)Based upon the context of Mobile Edge Computing (MEC) actual research and within the innovative scope of the SESAME EU-funded research project, we propose and assess a framework for security analysis applied in virtualised ... -
Energy Efficiency Comparison of Common Packet Schedulers
(IEEE., 2014)This paper presents a characterisation of the energy performance of common and well-known packet schedulers in a multi-cell multi-user UTRAN long-term evolution (LTE) system. First, it was shown that the maximum SINR ... -
Long Term Evolution Downlink Packet Scheduling using A Novel Proportional-Fair-Energy Policy
(IEEE., 2012)Inter-cell interference (ICI) is a key limiting factor to the general performance of a multi-cell multi-user radio access network. The channel quality of cell edge users is greatly impaired by ICI owing to the fact that ... -
SFBC MIMO Energy Efficiency Improvements of Common Packet Schedulers for the Long Term Evolution Downlink
(IEEE., 2011)It is desirable that energy performance improvement is not realized at the expense of other network performance parameters. This paper investigates the trade off between energy efficiency, spectral efficiency and user QoS ... -
Performance Security Trade-off of Network Intrusion Detection and Prevention Systems
(UK Performance Engineering Workshop and Cyber Security Workshop, 2016)Security cyber threats are increasing with most companies being overwhelm by the complexity attached to prevention against attacks. Network Intrusion detection and prevention systems (NIDPS) are now a stable in any enterprise ... -
Performance Modelling and Analysis of the Delay Aware Routing Metric in Cognitive Radio Ad Hoc Networks
(IEEE, 2013)Cognitive Radio Networks have been proposed to solve the problem of overcrowded unlicensed spectrum by using the cognitive ability built in software radios to utilise the underutilised licensed channel when the licensed ...