Department of Informatics and Information Technology
Permanent URI for this communityhttp://10.10.97.169:4000/handle/123456789/74
Browse
Browsing Department of Informatics and Information Technology by Title
Now showing 1 - 20 of 120
- Results Per Page
- Sort Options
Item 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges(Elsevier, 2019-11) Barakabitze, Alcardo Alex; Ahmad, Arslan; Mijumbi, Rashid; Hines, AndrewThe increasing consumption of multimedia services and the demand of high-quality services from cus- tomers has triggered a fundamental change in how we administer networks in terms of abstraction, sep- aration, and mapping of forwarding, control and management aspects of services. The industry and the academia are embracing 5G as the future network capable to support next generation vertical appli- cations with different service requirements. To realize this vision in 5G network, the physical network has to be sliced into multiple isolated logical networks of varying sizes and structures which are ded- icated to different types of services based on their requirements with different characteristics and re- quirements (e.g., a slice for massive IoT devices, smartphones or autonomous cars, etc.). Softwarization using Software-Defined Networking (SDN) and Network Function Virtualization (NFV)in 5G networks are expected to fill the void of programmable control and management of network resources. In this paper, we provide a comprehensive review and updated solutions related to 5G network slicing us- ing SDN and NFV. Firstly, we present 5G service quality and business requirements followed by a descrip- tion of 5G network softwarization and slicing paradigms including essential concepts, history and differ- ent use cases. Secondly, we provide a tutorial of 5G network slicing technology enablers including SDN, NFV, MEC, cloud/Fog computing, network hypervisors, virtual machines & containers. Thidly, we compre- hensively survey different industrial initiatives and projects that are pushing forward the adoption of SDN and NFV in accelerating 5G network slicing. A comparison of various 5G architectural approaches in terms of practical implementations, technology adoptions and deployment strategies is presented. Moreover, we provide a discussion on various open source orchestrators and proof of concepts representing industrial contribution. The work also investigates the standardization efforts in 5G networks regarding network slicing and softwarization. Additionally, the article presents the management and orchestration of net- work slices in a single domain followed by a comprehensive survey of management and orchestration approaches in 5G network slicing across multiple domains while supporting multiple tenants. Further- more, we highlight the future challenges and research directions regarding network softwarization and slicing using SDN and NFV in 5G networks.Item A bibliometric analysis of human-wildlife conflicts in East Africa(IJCS, 2022) Mnzava, Ester Ernest; Sirima, Agnes AnthonyLiterature appraisal reveals a sufficient number of studies (research productivity), which have been conducted in the field of human-wildlife conflicts. However, little is known about the evolution of knowledge generation in the field, trends in research output, countries of publication, and international collaborations and specifically statistical related data. To track research productivity of human-wildlife conflict in East Africa, the study examines literature growth, describes the country-wise production of literature and establishes the degree of collaboration by studying authorship patterns on human-wildlife conflicts for the last 20 years. Publish or Perish software was used, followed by the execution of the search via Google scholar database on 28 March 2019. Regarding the country-wise contribution of literature, Tanzania was found to contribute 46 (32.2%), Uganda 45 (31.5%), Kenya 44 (30.8%) and Rwanda 8 (5.6%) and none from Burundi and South Sudan. The overall research productivity in the field of human-wildlife conflicts for Tanzania, Kenya, Uganda and Rwanda is increasing. This study provides a fairly accurate representation of research productivity on human-wildlife conflicts in East Africa from Google scholar database.Item A bibliometric analysis of the Tanzania journal of agricultural science (1998-2017)(Libraries at University of Nebraska-Lincoln, 2019) Chirwa, Mussa Ndambile; Mnzava, EsterThe term bibliometrics was first coined by Pritchard in 1969. From there on different people defined and interpreted bibliometrics in various ways. For instance, British Standards Institution, (1976) define bibliometrics as the use of mathematical and statistical methods to study documents and patterns of publication. One year later Hawkins (1977) interpreted bibliometrics to mean the “quantitative analysis of the bibliographic features of a body of literature”. Historically, the term “librametry” was firstly used as coined by S.R. Ranganathan to refer quantitative study of librarianship. Bibliometrics is analogous to Ranganathan’s librametrics and the Russian concept scientometrics (Thanuskodi, 2010).Item A novel qoe-aware sdn-enabled, nfv-based management architecture for future multimedia applications on 5g systems(2019) Barakabitze,Alcardo Alex; Sun,Lingfen; Mkwawa,Is-Haka; Ifeachor,EmmanuelThis paper proposes a novel QoE-aware SDN enabled NFV architecture for controlling and managing Future Multimedia Applications on 5G systems. The aim is to improve the QoE of the delivered multimedia services through the fulfilment of personalized QoE application requirements. This novel approach provides some new features, functionalities, concepts and opportunities for overcoming the key QoE provisioning limitations in current 4G systems such as increased network management complexity and inability to adapt dynamically to changing application, network transmission/traffic or end-user’s demandItem A study of data sources for accessibility and reuse practices among agricultural researchers in Tanzania(Journal of Agricultural & Food Information, 2023-03-10) Mwinami, Nolasko Victory; Dulle, Frankwell W.; Mtega, Wulystan PiusThis paper reports a study that investigated how agricultural researchers use and reuse other researchers’ data in Tanzania. This research used a survey method to investigate the factors influencing researchers in this use/reuse. Findings indicated that more than 80% of researchers use and reuse data accessed from different sources. Several factors influence the majority of researchers (more than 70%) to use and reuse data. The results of this study may attract the attention of agricultural researchers elsewhere to agricultural data use and reuse practices.Item Access and use of agricultural market information by smallholder farmers: measuring informational capabilities(John Wiley & Sons Ltd, 2019) Magesa, Mawazo M; Michael, Kisangiri; Ko, JesukWhile farmers sell their crops, middlemen provide a linkage between them, markets and buyers. Middlemen have good knowledge of working conditions of markets and have access to agricultural market information. Due to poor access to markets and agricultural market information by smallholders, there is a feeling that middlemen benefit more while farmers sell their crops. Good access to markets and market infor- mation may help farmers bypass middlemen while selling crops and thus benefit more. Thus, it is best to improve the informational capabilities (ICs) of farmers in agri- cultural marketing. Thus, this research measured ICs of farmers accessing market information, through a program NINAYO, while selling their crops. The research uti- lized the informational, psychological, social, and economic dimensions of the empowerment framework in identifying capability indicators to formulate survey questions. Data were collected from smallholders in six regions in Tanzania. The anal- ysis utilized measures of life satisfaction and results showed that about half of the variation in the dependent variable, satisfaction with capabilities, was explained by the model. Backward elimination analysis confirmed that life satisfaction is multi- dimensional. Robustness test confirmed a positive relationship between satisfaction and capabilities. Overall, results confirmed ICs are multidimensions, their improve- ment empowers farmers in agricultural marketing.Item Accessibility and use of nutrition information in addressing under five child malnutrition in Morogoro urban, Tanzania(Sokoine University of Agriculture, 2002) Chilimo,Wanyenda LeonardThis study was undertaken to examine the access to and use of nutrition information in addressing the problem of malnutrition in Morogoro urban district Tanzania. The study investigated the Maternal and Child Health clinics (MCH) nutrition information delivery systems; variables that determine accessibility and use of information; extent of the use of nutrition information in addressing malnutrition and the relationship between the information that mothers have and the nutritional status of their children. Survey research method was used for data collection whereby questionnaires and face-to-face interviews were used for collecting data. The study found that although the MCH health and nutrition education sessions arc an important aspect in disseminating nutrition information to mothers, these sessions are seldom conducted and the attendance of mothers to these sessions is poor; awareness of mothers concerning different nutritional aspects is still low due to lack of information; and education is the most important variable that determines use and access to nutrition information.Item Accessibility of women to health information in Tanzania: A case study of Morogoro Region(Emerald Publishing Limited, 2017-05) Benard, Ronald; Chipungahelo, Monica SamwelPurpose – The aim of this study is to examine accessibility of health information to women in Tanzania with reference to the Morogoro region. The specific objectives of the study were: first, to identify the health information needs of women; second, to determine the accessibility of the needed health information to women in the study area; and third, to determine the preferred sources of information used by women in accessing health information in the study area. Design/methodology/approach – A descriptive survey method – cross-sectional design – was used. Semi-structured questionnaires with both open- and close-ended questions were used to collect data from four wards of Morogoro Municipal Council, Tanzania. Key informant interviews were conducted with 12 women from four wards, 3 women were selected from each ward. Findings – The findings also indicated that there was a significant relationship between wards and accessibility to certain types of information which were concerning hypertension, family planning, malaria and typhoid. Although information on diabetes and hypertension had lower percentages of accessibility in all four wards, the study findings revealed that medical doctors, pharmacy shops and family were the main sources of information used by women to access health information. Radio and television were rated as preferred sources of information required by women, whereas internet, local herb hawkers and mobile phones were rated as non-preferable. It is therefore recommended that the government through health-care providers and medical librarians should be proactive in creating awareness and disseminate health information on non- communicable diseases such as hypertension and diabetes to women. Practical implications – This paper provides practical recommendations on how to improve accessibility of health information in the communities. Social implications – The paper has an implication of improving accessibility of health information to women in the communities. Originality/value – The paper provides appropriate knowledge that is needed in improving access to health information in Tanzanian communities and in other developing countries communitiesItem Adaptive cache server selection and resource allocation strategy in mobile edge computing(International journal of information communication technologies and human development (ijicthd), 2023) Mahenge, Michael Pendo John; Kitindi, Edvin JonathanThe enormous increase of data traffic generated by mobile devices emanate challenges for both internet service providers (ISP) and content service provider (CSP). The objective of this paper is to propose the cost-efficient design for content delivery that selects the best cache server to store repeatedly accessed contents. The proposed strategy considers both caching and transmission costs. To achieve the equilibrium of transmission cost and caching cost, a weighted cost model based on entropy-weighting- method (EWM) is proposed. Then, an adaptive cache server selection and resource allocation strategy based on deep-reinforcement-learning (DRL) is proposed to place the cache on best edge server closer to end-user. The proposed method reduces the cost of service delivery under the constraints of meeting server storage capacity constraints and deadlines. The simulation experiments show that the proposed strategy can effectively improve the cache-hit rate and reduce the cache-miss rate and content access costs.Item Algorithm for the evaluation of Free and Open Source Software when the Evaluator is "Uncertain"(North American Institute of Science and Information Technology (NAISIT), 2015-09) Sanga, C; Venter, I. MFree and Open Source Software is freely available on the Internet and making use of it, could benefit many higher learning institutions in developing countries. However, before adoption, it is necessary to evaluate the software to see if it meets the requirements of the institution. The evaluation of software involves considering the quality attributes of the software, which can either be evaluated objectively or subjectively, depending on whether the attributes are measured directly or indirectly. To handle the subjectivity of qualitative evaluation an algorithm with inherent computational intelligence was developed. The algorithm, Fuzzy Analytic Hierarchy Process incorporates a modified version of extent analysis. It can tolerate fuzziness, ambiguity, imprecision, uncertainty and ill-illustrated judgements. In addition to the improved Fuzzy Analytic Hierarchy Process development, the Group Fuzzy Analytic Hierarchy Process was developed. Using a specially derived set of end-user centric metrics, the algorithm provides the means for evaluating software according to quality attributes. Software developers, to predict end-user requirements, and to more accurately measure end-user satisfaction can use these quality attributes. Soft Systems Methodology was the preferred research methodology in this investigation as it is well suited for fuzzy problems. The algorithm was validated by evaluating Moodle, a free and open source e-learning system, adopted by a University in Tanzania. Students and staff from the university were involved in providing the subjective opinions about the software. The data collected from the subjective evaluation was captured and using Soft System Methodology, the data was analysed cyclically, improving the algorithm with each cycle. The advantages of the proposed final algorithm are: it is efficient, simple to use and cost-effective. It guides the end user to form an informed decision based on the evaluation results of software. The evaluation results determine whether the outlook is pessimistic, moderate or optimistic.Item Artificial intelligence and deep learning based Technologies for emerging disease recognition and pest Prediction in beans (phaseolus vulgaris l.): A systematic review(African Journal of Agricultural Research, 2023) Mahenge, Michael Pendo John; Mkwazu, Hussein; Madege, Richard Raphael; Mwaipopo, Beatrice; Maro, CarolineArtificial Intelligence (AI) and deep learning have the capacity to reduce losses in crop production, such as low crop yields, food insecurity, and the negative impacts on a country’s economy caused by crop infections. This study aims to find the knowledge and technological gaps associated with the application of AI-based technologies for plant disease detection and pest prediction at an early stage and recommend suitable curative measures. An evidence-based framework known as the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) methodology was used to conduct systematic reviews of the state-of-the-art of AI and deep learning techniques for crop disease identification and pest prediction in developing countries. The results demonstrate that conventional methods for plant disease management face some challenges, such as being costly in terms of labour, having low detection and prediction accuracy, and some are not environmentally friendly. Also, the rapid increase in data-intensive and computational-intensive tasks needed for plant disease classification using traditional machine learning methods poses challenges such as high processing time and storage capacity. Consequently, this paper recommends a deep learning and AI-based strategy to enhance the detection, prediction and prevention of crop diseases. These recommendations will be the starting point for future research.Item Assessing the impacts of climate variability and change on agricultural systems in Eastern Africa while enhancing the region’s capacity to undertake integrated assessment of vulnerabilities to future changes in climate(ICRISAT, 2015-02) Sanga, C; Sumari, Neema; Tumbo, Siza; Mourice, Sixbert K; Kadigi, Ibrahim; Kahimba, FrederickOne of the key messages emerging out of the recent IPCC reports is that the climate change is real, happening and will continue to happen for the foreseeable future , irrespective of what happens to future greenhouse gas emissions . The report also estimates wi th high confidence that the negative impacts on agriculture outweigh the positives which makes adaptation an urgent and pressing challenge. However, adaptation planning requires accurate information about where, when and how the impacts are going to be fel t and who will be more vulnerable. Among the regions, Africa is considered as more vulnerable due to its high dependence on agriculture for subsistence, employment and income. In Eastern Africa, agriculture accounts for 43% of GDP and contributes to more than 80% employment (Omano et al. 20 06). Within Africa, Eastern Africa is one of the most vulnerable regions due to its high dependence on rain - fed agriculture for subsistence, employment and income. The region experiences high variability in rainfall (Webster et al., 1999, Hastenrath et al. , 2007) which has a direct bearing on the performance of agriculture. Generally the region experiences prolonged and highly destructive droughts covering large areas at least once every decade and more localized events even more frequently. The region reco rded severe droughts and/or famines in 1973 - 74, 1984 - 85, 1987, 1992 - 94, 1999 - 2000, 2005 - 2006 and more recently in 2010 - 11. According to UNDP (2006), a single drought event in a 12 - year period will lower GDP by 7% – 10% and increase poverty by 12% – 14%. Extrem e events, including floods and droughts, are becoming increasingly frequent and severe (IPCC 2007). Based on the analysis of data from the international Disaster Database (EM - DAT), Shongwe et al. (2009) concluded that there has been an increase in the numb er of reported disasters in the region, from an average of less than 3 events per year in the 1980s to over 7 events per year in the 1990s and 10 events per year from 2000 to 2006. The negative impacts of climate are not limited to the years with extreme c limatic conditions. Even with normal rainfall, the countries in the region do not produce enough food to meet their people’s needs. Left unmanaged, these impacts can have far - reaching consequences on the local food security, economy, and poverty. Over the past few years, climate research has contributed significantly to increased understanding of how the climate in the region is var ying on inter - annual and decadal time scales and on how the climate is changing in response to global warming and other factors . The impacts of this variability and changes in climate on various sectors including agriculture have also received considerable attention . These studies indicate that a griculture, especially the one practiced under rainfed conditions in moisture limiting environments such as semi - arid tropics , is one of the most vulnerable sectors since these are relatively warmer places and rainfall is the only source of water. There is a rapidly growing literature on vulnerability and adaptation to climatic variability and change , but most of these studies are based on assessments made using statistical and empirical models that fail to account for the full range of complex interactions and their effects on agricultural systems (Parry et al., 2004; Cline, 2007; Lobell e t al., 2008). Evidence available to date indicate s that w ith 1°C of warming, roughly 65% of current maize growing areas in Africa will experience yield losses (Lobell et al., 2011) and the average predicted production loss es by 2050 for most crops are in t he ra n ge of 10 - 25% (Schlenker and Lobell, 2010) . For developing and implementing adaptation programs, more detailed information about the impacts of climate change on various components of the smallholder farming systems such as which crops and varieties are more vulnerable and which management practices are unviable is required . This requires a comprehensive assessment using site and location specific climate and crop management information. However, s everal problems constrain such an assessment. Firstly, downscaled local level climate change projections that are required to make such assessments are not readily available . While climate models provide various scenarios with high levels of confidence at global and sub - regional level, there are challenges in downscaling them to local level (IPCC, 2007) . Secondly, lack of information on the sensitivity of smallholder agricultural systems to changes in climate . Though process based crop simulation models can serve as important tools to make a more realistic assessment of impacts of climate variability and change on agricultural systems, application of the same is limited to few location specific studies mainly because of the intensive data requirements and practical limitations including capaci ty to calibrate, validate and perform detailed analyses. Thirdly, there is scarcity of information on how the impacts of climate change on the production and productivity of agriculture translate into economic impacts including food security at household a nd national levels. This assessment is aimed at developing more accurate information on how the projected changes in climate impact the productivity and profitability of agricultural systems that are widely adopted by smallholder farmers in Eastern Africa using the protocols and methods developed by Agricultural Model Intercomparision and Improvement Project (AgMIP) (Rosenzweig et al., 2013) . One key aspect of this assessment is the attention paid to captur e the complexity and diversity that exists in the s mallholder farm ing systems including the different ways in which th e system is managed. The study is an attempt to make a comprehensive assessment of climate change on crop growth and performance under conditions that interactions as well as related economic impacts by integrat ing state of the art downscal ed climate scenarios with crop and economic models. Th e assessment was carried out in contrasting agro - ecological zones spread over the four major countries in eastern Africa – Ethiopia, Keny a, Tanzania and Uganda. This report summarizes the findings that include trends and changes in the observed and downscaled climate scenarios, quantified information on impacts of these trends and changes on performance of maize under a range of environment al and management conditions, implication of these changes in crop performance on in come, poverty and food security of smallholder farmers and potential adaptation strategies that can assist smallholder farmers in minimizing negative impacts .Item Assessing the information needs and information sources of urban and peri-urban livestock keepers in Kinondoni and Morogoro Urban Districts, Tanzania(Library Philosophy and Practice, 2016) Angello, Consolata; Msuya, Jangawe; Matovelo, DorisThis paper discusses the information needs of urban and peri-urban livestock keepers and the various information sources used and their effectiveness in disseminating livestock information. Mixed method approach was the methodology used in the study whereby quantitative data was gathered using questionnaires while qualitative data was gathered using in-depth interviews and participant observations. Findings from this study revealed that livestock keepers had various information needs such as disease control (95.3%), nutrition and feeds (62.2%), markets (56.3%), housing techniques (29.1%) and loans (20.1%). Urban livestock keepers also used different sources of information to access information including veterinary shops (77.2%), extension services (63.8%), fellow livestock keepers (40.2%), print sources (39.8%) agricultural exhibitions (29.1%) and seminars (12.6%). It was concluded that most urban livestock keepers do benefit from various information sources (especially veterinary shops and extension officers) to access livestock information. The study recommended for improvement and regulation of policies concerning extension and veterinary services through relevant bodies for enhanced access to information on livestock husbandry, in order to improve the livestock husbandry practices and increase productivity for economic development.Item Attacks in wireless sensor networks(IGI Global, 2016) Kibirige, George William; Sanga, Camilius A.Wireless Sensor Networks (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the WSN which make it to be vulnerable to attacks are based on their charac- teristics which include: low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Examples of attacks which can occur in a WSN are sinkhole attack, selective forwarding attack and wormhole attack. One of the impacts of these attacks is that, one attack can be used to launch other attacks. This book chapter presents an exploration of the analysis of the existing solutions which are used to detect and identify passive and active attack in WSN. The analysis is based on advantages and limitations of the proposed solutions.Item Availability and usage of ICTs and e-resources by livestock researchers in Tanzania: Challenges and ways forward(International Journal of Education and Development using Information and Communication Technology, 2010) Angello, Consolata; Wema, EvansA study was conducted to investigate the accessibility and use of e-resources in Tanzania. The methodology adopted for the study was survey in which questionnaires, interviews and observations were used in collection of the data. A total of 50 respondents participated in the study. The study revealed that livestock research institutes in Tanzania had very few e-resources for their researchers. It was concluded that most livestock researchers were not aware of most of the e-resources available hence they could not access and use them effectively in their research work. The researchers recommended for improvement of internet connectivity to enable efficient information searching from the internet.Item The awareness and use of electronic information sources among livestock researchers in Tanzania(2010-12) Angello, C.This paper is the result of a study that was conducted to investigate the accessibility and use of electronic information resources by the livestock researchers in Tanzania. One of the main objectives of the study was to assess the information literacy skills of livestock researchers. The study was conducted in three livestock research institutes in Tanzania with an overall sample size of fifty respondents consisting of livestock researchers and information professionals. Detailed questionnaires, interviews and observations were the methods used for data collection while data was analysed by Statistical Package for Social Sciences (SPSS) and content analysis. One of the findings of the study was the lack of information literacy skills among most of the researchers and this was found to be limiting their access and use of e-resources. This paper discusses the level of information literacy that livestock researchers possess and its impact on these researchers’ awareness and use of e-resources.Item Behavior and techniques for improving performance of OFDM systems for wireless communications(2015-01) Barakabitze, Alcardo Alex; Ali, Md. AbbasOrthogonal frequency division multiplexing (OFDM) is a special case of multicarrier transmission which transmits a stream of data over a number of lower data rate subcarriers. OFDM splits the total transmission bandwidth into a number of orthogonal and non-overlapping subcarriers and transmit the collection of bits called symbols in parallel using these subcarriers. This paper gives a total insight of various Peak -to Average Power Reduction (PAPR) techniques and principles of OFDM systems used in wireless communications. The research paper places a focus also on OFDM behaviors and techniques like Carrier Frequency Offset (CFO) estimation that improves performance of OFDM for wireless communications. Finally, the paper provides a number of wireless communication standards and many of the applications where OFDM systems are used.Item Blockchain-based secure storage management with edge computing for IoT(MDPI, 2014) Nyamtiga, Baraka William; Sicato, Jose Costa Sapalo; Rathore, Shailendra; Sung, Yunsick; Park, Jong HyukAs a core technology to manage decentralized systems, blockchain is gaining much popularity to deploy such applications as smart grid and healthcare systems. However, its utilization in resource-constrained mobile devices is limited due to high demands of resources and poor scalability with frequent-intensive transactions. Edge computing can be integrated to facilitate mobile devices in offloading their mining tasks to cloud resources. This integration ensures reliable access, distributed computation and untampered storage for scalable and secure transactions. It is imperative therefore that crucial issues of security, scalability and resources management be addressed to achieve successful integration. Studies have been conducted to explore suitable architectural requirements, and some researchers have applied the integration to deploy some specific applications. Despite these efforts, however, issues of anonymity, adaptability and integrity still need to be investigated further to attain a practical, secure decentralized data storage. We based our study on peer-to-peer and blockchain to achieve an Internet of Things (IoT) design supported by edge computing to acquire security and scalability levels needed for the integration. We investigated existing blockchain and associated technologies to discover solutions that address anonymity, integrity and adaptability issues for successful integration of blockchain in IoT systems. The discovered solutions were then incorporated in our conceptual design of the decentralized application prototype presented for secure storage of IoT data and transactions.Item Caching and data routing in Information Centric Networking (ICN): the future internet perspective(International Journal of Advanced Research in Computer Science and Software Engineering, 2014-11-11) Barakabitze, Alcardo Alex; Xiaoheng, TanInformation Centric Networking (ICN) is becoming an important direction of the future internet architecture research. Different ICN architectures like PSIRP, NetInf, PURSUIT, CCN, DONA, and NDN have been proposed with the aim of moving from the current host-to-host communication model to a content-centric communication model. Caching and data routing are among the most significant properties of ICN features which improves network efficiency and content distribution performance by satisfying user requests with cached content. New characteristics of ICN caching include the Internet to be transparent to applications, ubiquitous in-network caching (caching contents in routers in a granularity based-level different from the current Internet architecture which cache contents in file-level. This paper describes in-depth, the concepts of caching and data routing in ICN by providing a comprehensive survey of a number of cache decision and data routing policies in ICN. The paper provides also the caching and data routing mechanisms in the Named Data Networking (NDN) which is the promising ICN design for the future Internet architecture. In general, by modelling the in-network caching and data routing which will be based on more efficient cache decision and routing schemes, it will have more practical significance in ICN designs for the future Internet architecture.Item Can e-learning promote participation of female students in STEM disciplines in higher learning institutions of Tanzania?(International Journal of Education and Development using Information and Communication Technology, 2013) Sanga, C; Magesa, M.M; Chingonikaya, E; Kayunze, K.AThe recent development of ICTs has brought many changes in different sectors. In Higher Learning Institutions, there are a number of positive changes. ICTs have brought efficiency, effectiveness and efficacy in the provision of the core functions namely: teaching, outreach, research and consultancy. Previous studies showed that even though there is improvement in teaching and learning through e-learning but few studies researched e-learning as tool for promoting female students to participate in science, technology and mathematics disciplines. This study was done to evaluate if the e-learning can promote the participation of female students in science, technology and mathematics subjects in different Higher Learning Institutions of Tanzania. The mixed research methodology was used in this study. The results showed that the potential benefits of e-learning as tool for promoting students uptake for science, technology and mathematics subjects was not fully exploited in Tanzania. Thus, this calls different stakeholders to fully implement and mainstream e-learning in Higher Learning value chain to make it a reality and not myth in promoting female students participation is science, technology and engineering.