Research Articles
Permanent URI for this collection
Browse
Browsing Research Articles by Issue Date
Now showing 1 - 20 of 41
Results Per Page
Sort Options
Item The role of ICT to make teaching-learning effective in higher institutions of learning in Uganda(International Journal of Innovative Research in Science, Engineering and Technology, 2013-08) Guma, Ali; Faruque, A. Haolader; Khushi, MuhammadThe use of ICT in teaching-learning process is a relatively new phenomenon and it has been the educational researchers' focus. The effective integration of this technology into classroom practices poses a challenge to teachers and administrators. This empirical study aimed at finding out the factors influencing use of ICT to make teachinglearning effective in higher institutions of learning in Uganda and identifying the innovations that ICT has brought into teaching-learning process, particularly in higher institutions of learning in Uganda. A survey was employed and in order to empirically investigate the study. The findings of this study revealed that teaching staff and administrators had a strong desire to integrate ICT into teaching-learning processes. The innovations that ICT has brought in teachinglearning process include: E-learning, e-communication, quick access to information, online student registration, online advertisement, reduced burden of keeping hardcopy, networking with resourceful persons, etc. However, the presence of all these factors increased the chance of excellent integration of ICT in teaching-learning process. Therefore, the training of teaching staff in the pedagogical issues and administrators in administration should be increased if teachers and administrators are to be convinced of the value of using ICT in their teaching-learning process and administration.Item Packet drop attack detection techniques in wireless Ad hoc networks: a review(International Journal of Network Security & Its Applications (IJNSA), 2014) Edemacu, Kennedy; Euku, Martin; Ssekibuule, RichardWireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks. One of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in this paper we review some of the packet drop attack detection techniques and comparatively analyze them basing on; their ability to detect the attack under different attack strategies (partial and or cooperate attacks), environments and the computational and communication overheads caused in the process of detection.Item Resource sharing between M2M and H2H taffic under time-controlled scheduling scheme in LTE networks(Proceedings of 2014 8th International Conference on Telecommunication Systems Services and Applications, TSSA 2014, 2014) Edemacu, Kennedy; Bulega, TonnyMachine-to-Machine (M2M) communication is becoming a commonly used terminology due to the idea of Internet of Things (IoT). M2M communication has many areas of application, such as in; medical, transport, environmental monitoring, smart grids among others. As the field of its application expands, the number of M2M devices is expected to grow exponentially in the next few years. Long Term Evolution (LTE) has been identified as one of the suitable wireless communication technologies for M2M communication. Incorporating M2M communication on top of regular Human-to-Human (H2H) communication in LTE is a challenging task due to the expected increase in the number of M2M devices coupled with the unique characteristics of M2M traffic. Therefore, the current scheduling and resource allocation techniques among others being used in LTE need to be refined to efficiently accommodate M2M communication. A scheduling scheme called fixed Access Grant Time Interval (AGTI) time-controlled scheduling scheme was proposed for scheduling M2M traffic in LTE. Resource sharing and utilization under this scheme is inefficient due to fixed AGTI assignment which results into fixed nature of resource allocation. In this work, we propose a scheduling scheme called Dynamic AGTI Time-controlled Scheduling Scheme in which the AGTI is dynamically assigned basing on M2M and H2H traffic intensities. We model the proposed scheme using M/G/m/m queuing technique focusing on resource utilization and Quality of Service (QoS) of both M2M and H2H traffic. The analytical results show that, the Dynamic AGTI Time-controlled Scheduling Scheme achieves; better percentage resource utilization as compared to Fixed AGTI Time-controlled Scheduling Scheme while providing optimal blocking probability for both M2M and H2H traffic. However, the monitoring of resource usage and reassignments of AGTI in Dynamic AGTI Time-controlled Scheduling Scheme increases scheduler complexity.Item Assessing organisational information systems security by human insiders in private and public universities in Uganda(IMPACT: International Journal of Research in Engineering & Technology, 2015) Businge, Phelix MbabaziInformation system security management is expected to be a high priority for organizational success, given that Information is critical both as input and output of an organization. Hence, there is need to have a secure information system to conduct any business related activities to ensure six objectives of information security: confidentiality; integrity; availability; legitimate use (identification, authentication, and authorization); auditing or traceability; and non-repudiation of the information. This study identified the objectives of information security, key human insider threats which affect information system security of Business organization and the level of information security policy compliance in organizations. The study was carried out in two Universities one private and another Public University where forty (40) Questionnaires were distributed and the findings showed Institutional data security (protecting company information assets) with mean of 3.79 and Employees (safety, satisfaction, retention) with mean of 3.00 which helps to motivate insider to feel part of organization were given law priority and Respondents also identified Laptops ranked as number 1 (mean =3.91) as frequently used device in the institution to cause threat on institutional data security followed by Mobile phones ranked as Number 2(mean=3.75). The study also further discovered that Policies on cyber security (use of social medias e.g. face book) (mean=2.45) was not implemented, Policies on Bring Your Own Device to be used at the Institution (Mean =2.53) was not implemented and Data destruction policies for your Institutional data materials that contain sensitive information (mean=2.52) was not implemented. The following behaviors were ranked top which need to be worked on; usage of secondary storage devices like flash discs, CD, Hard disks (mean=3.88), Sharing of secondary storage devices like flash discs, CD, Hard disks (Mean=3.48) was also frequent and using of personally owned mobile devices to do office work (mean=3.27) was also ranked among the top behaviors.Item Determining important parameters in Ebola epidemics(International Journal of Sciences: Basic and Applied Research (IJSBAR), 2016) Arop, Martin; Luboobi, Livingstone; Nannyonga, BettyThe dynamics of Ebola can best be understood using a mathematical model that determines its dynamics in the community. The model designed in this study explicitly incorporates the latency period, the different transmission compartments, and immigration and emigration effects. The steady states of the system are analysed for existence of equilibria and their stability investigated. From qualitative analysis of the model, it is established that a disease-free equilibrium exists and is stable when ℛ0<1. When ℛ0>1, an endemic equilibrium state exists and is stable. Results show further that the model undergoes a hopf bifurcation at the endemic equilibrium and exhibits periodic oscillations. Sensitivity analysis shows that the most effective control measures are increasing hospitalization and reducing transmission rates. The numerical simulations performed demonstrated the theoretical results.Item Unintentional human insider threats mitigation measures in universities in Uganda(International Journal of Multidisciplinary Research and Development, 2016) Businge, Phelix Mbabazi; Jehopio, Peterand; Muwanga – Zake, J.W.FThe purpose of this research paper to indentify the unintentional human insider threats and assess the various unintentional Human Insider threats mitigation measures currently used in universities in Uganda. It also intends to know the mitigation measures are actually being implemented in the universities in Uganda. The primary data was collected by using survey method. Sampling was all from ICT Staff members and the various heads of Departments who are in charge of handling institutional data. The questionnaires were distributed to 212 respondents from conveniently selected respondents from different Nine (9) Universities in Uganda. Reliability and validity of the constructs tests were carried out and all were found to be above the recommended values and Descriptive Statistics and coefficient of Variation was used to analyze these constructs. The study found out that sharing of secondary storage devices like flash discs, CD, Hard disks, Losing of Secondary storage devices like flash disks, CD, Hard and Working on a mobile device e.g. Laptop while travelling, Leaving computers unattended to were the top ranked insider threats and Usability of security tools were being implemented while Technological measures, Security training and awareness, Deterrence measures were partly implemented and Motivation measures, and Time pressure and Workload were sometimes implemented. Its recommend to further investigate on the other unintentional mitigation measure which can be used in mitigating other insider threats on institutional data security for example hackers and none human threats to information security such natural disasters and systems failures.Item Evaluation of e-learning management systems by lecturers and students in Ugandan universities: a case of Muni university(International Journal of Innovative Research in Science, Engineering and Technology, 2016-06) Businge, Phelix Mbabazi; Guma, AliThe use of eLearning is increasing dramatically in Uganda, and most of institutions invest huge amounts in developing and deploying e-Learning systems. As far as Learning Management System is concerned, it offers an integrated platform for educational materials, distribution and management of learning as well as accessibility by a range of users including lecturers, students and content makers; however, the focus is still largely on getting the infrastructure and creating the e-learning content. It is necessary to consider the individual factors that play an important role in the adoption of e-learning in Ugandan universities, a case of Muni University. For example, the attitudes and perceptions of students and lecturers towards e-learning may affect their acceptance of the technology in the teaching-learning process. The study aimed at evaluating the level of user satisfaction, usability issues affecting e-learning adoption and established the factors hindering the Acceptance and Use of teach management Systems by Lecturers and Students in Uganda. Primary research method was cross sectional design using questionnaire survey, and data was collected from 130 students and 10 lecturers of Muni University. The respondents agreed that the functionality of the system is good; the system is reliable, portable, usable, maintainable and efficient. The users also showed a positive Attitude to use the system and also indicated that, there are no specific person available to provide assistance for the users and Lack of Equipments, Course Quality Concerns, Slow Speed of the E-system, Power problems, Accessibility problems, Network Connections Issues, Lack of Usability policy, Legal concerns and Lack of regular training on use Moodle hinder their usage of the system. Therefore, in order to ensure that all the students and staff can fully embrace the E-Learning Management System, the system should be accessible to the users, there should be a user policy to guide users, more training should be given to both new and old users.Item Design and implementation of electronic voting system(International Journal of Computer & Organization Trends, 2017) Taban, Habibu; Konde, Sharif; Sebwato, NicholasThe Public opinion and democratic in universities setting are the most important determinant to establish a good administration. Voting is the process through which individuals convey their opinion and has the freedom to elect a leader of the choice to signify and address the student’s issues. In today’s technological and knowledge age, computerized related matters become widespread. E-voting is one of these substances and it is capable to deliver appropriate, less costly, fast and secure services. The aim of this paper is to present an electronic voting system (E-Voting) to be applied to Muni University student’s electoral body. Several security measures were integrated into the E-Voting system in order to achieve an enhanced, speedy and accurate performance. A computer software application was developed using PHP (Hypertext processor) programming language and MYSQL (My Structural Query Language), a relational database management system in designing the database; tested and found to have produced the expected results. It is about time that traditional voting in Muni University gives way to E-Voting and hence simplifies the task for Electoral commission and his/her Officials.Item The role of indigenous knowledge in climate adaptation: experiences with farmer perceptions from climate change project in Sedumbwe Agricultural Camp of Southern Zambia(International Journal of Scientific and Research Publications, 2017) Chisanga, Kafula; Mvula, Andrew Bosco; Taban, HabibuClimate change is a world wide phenomenon that has huge implications on economic, social and ecological challenges to the global community and to smallholder farmers especially in low income countries. In this paper we seek to provide information on the role of Indigenous Knowledge (IK) to climate adaptation based on the experiences with farmer communities from the climate change research project which was implemented in Sedumbwe Agricultural Camp of Southern Zambia. Data were collected mainly through focus group discussions. The paper points out the common indicators used to predict drought/rainfall and how reliable they are. Possible recommendations are also provided on how the IK weather forecasting could be integrated and operationalized in agriculture policies of many countries in the sub Saharan African region to climate adaptation.Item Computerized private students’ admission system: a case study of Muni university(International Journal of Science and Research (IJSR), 2017) Taban, Habibu; Draku, JobAdmission of students into any institution of learning such as Muni University is a core activity. Every academic institution needs students to exist and survive. Thus an admission system of a University needs to be efficient and effective in order to avoid unnecessary delays and losses associated with such delays and inefficiencies. The aim of this paper was undertaken to design and develop the under-graduate Private Students’ Admission System at Muni University. The system targets at quickening and simplifying the process of admitting students into the University on private scheme. The data was mainly collected through interviews and document reviews followed by a design in Unified Modelling Language (UML) to meet the admission system requirements. The system was developed using Python, PHP, HTML, JavaScript and MySQL. The system was tested numerous times with real data by the department of Academic Registrar, Muni University.Item Estimating urban heat island intensity using remote sensing techniques in Dhaka City(International Journal of Scientific & Engineering Research, 2017-04) Parvin, Nigar Sultana; Abudu, DanThis study assessed the effects of urban heat island in Dhaka city, Bangladesh from 2002 to 2014 using remote sensing techniques. Land cover changes were characterized over a twelve year period with keen interested on urban expansion and the resulting impacts created by these changes on the land surface temperatures investigated. The study also compared the land surface temperature and ground station temperature data to validate the surface temperature in Dhaka. Maximum likelihood supervised classification method was used for the land cover classification resulting in a classification accuracy of 86.5% and 90.7% for 2002 and 2014 respectively. Remarkable change in land cover was observed in built-up areas which increased by 21% of the total land area from 74.12 to 135.36 square kilomentres in 2002 and 2014 respectively. Combined end member selection and linear mixture model techniques were used to estimate the surface emissivity of the land surface properties. The obtained surface emissivity together with the brightness temperatures of the thermal bands were then used to calculate the land surface temperature. Results showed that land surface temperature increased throughout the study area. Temperature ranges of 28.5°C to 35.4°C were observed in 2002 and 37.9°C to 40.1°C in 2014. The difference between ground-based temperature and the satellite derived temperatures for the ground weather station were +1.8°C and +2.7°C in 2002 and 2014 respectively. This margin of difference is attributed to sensor calibration errors. The land surface temperature increased across all land cover types over the twelve year period indicating existence and potential effects of urban heat highland in the Dhaka city. The results indicates that there is urgent need for the city authority to implement measures that must monitor and contain the resulting effects on the city population and infrastructure.Item Use of mobile devices by students to support learning in universities: a case of Muni university(International Journal of Research in Engineering & Technology, 2017-06) Guma, Ali; Businge, Phelix Mbabazi; Nkamwesiga, Lawrence; Andogah, GeoffreyIt’s a requirement in admission for every student to come with a mobile device for any programme admitted. The main objective of this study was to establish how the students use mobile devices in lecture rooms /classroom this was achieved by answering the following research questions: which mobile devices are owned by students? what are benefits of using mobile devices by students?and how mobile devices are used for learning?Quantitative design was employed using questionnaires containing a five (5) Likert scale items ranging from strongly agree, agree, neutral, disagree-strongly disagree and open-ended items was utilized in this study to obtain quantitative information to answer the research questions: A total population of 331 was considered and sample size of 181 was obtained using Krejcie and Morgan table, stratified sampling was used to collect data from each stratum and data was analyzed using SPSS Version 16. The reliability of the data collected was tested using the Cronbach's reliability test coefficient where the overall value of all the options was on average 0.65 which was beyond recommended 0.6 for an instrument to be declared reliable. The findings showed that, 56.2% (91) respondents use smart phones, 40.7 %( 66) use Laptops in class and only 1.2 %( 2) use kindle in class room while no student indicated that he/she uses Ipad or PDA in classroom or lecture room. In terms of the benefits of using mobile devices, students the following among the top four (4) benefits; easy to access information, storage of information, mobility of the device and use of social media but cost effective and security of information were ranked last. The findings also showed students use mobile devices to access course materials, doing class work, send and receive e-mails and taking and sharing of notes but virtual classroom, discussion forums and using pre-recorded lecturers with PowerPoint were ranked among the last three (3). This study recommends that Smartphone’s and mobile devices should be allowed to use by students, lecturer to start virtual classroom, discussion forums and using pre-recorded lecturers with PowerPoint so that the students can also benefit from these functionalities since they were ranked among the last three(3) services not used.Item Framework for e-learning in higher institutions of learning in developing countries: a systematic review of literature(International Journal of Science and Research (IJSR), 2017-12-12) Nkamwesiga, LawrenceThe concept of e-learning is a new phenomenon emerging in developing countries, an understanding of e-learning as a pedagogical process is crucial especially with the global proliferation of Information and Communication Technologies(ICTs). E-learning is an emerging pedagogical phenomenon that developing counties have not embraced fully due to its challenges associated with various implementation factors. A systematic review of 78 e-learning published research articles was conducted and gaps were analysed in the existing research and recommendations with a focus on developing countries. The purpose of the study was to establish evidence among researchers for e-learning challenges in developing countries with focus on Ugandan public universities. The synthesis of selected articles resulted into identification of recurring trends, crucial knowledge gaps, and a road map that shows the current state of e-learning in developing countries. The articles were taken from various African countries located in the sub-Saharan region that exhibited similar challenges of implementing e-learning in developing countries. Other developing countries in Europe, Middle East, south pacific, and Australia were included in the review. In an endeavour to produce unbiased results, the quality of the papers was critically observed by considering only peer reviewed articles published in recognized journals within the last 5 years. That would guide researchers, practitioners, implementers such as governments that would like to conduct research in the emerging e-learning as a crucial pedagogical process in the field of knowledge transfer and teaching.Item Mobile devices for learning in universities: challenges and effects of usage.(International Journal of Scientific Engineering and Science, 2018) Businge, Phelix Mbabazi; Guma, Ali; Andogah, Geoffrey; Nkamwesiga, LawrenceMobile devices are no longer playing the role of voice or short message communication but also in learning. These devices allow students to interact with educational content and learning can occur regardless of their location. It is therefore important to establish the factors hindering the use of Mobile devices for learning in Universities: A Case of Muni University. The study answered research questions such as; (a) what are the negative effects of using Mobile devices during lectures for other activities not related to the Lecture? (b) what are the reactions of lecturers towards the use of Mobile devices during lecture time? which factors are hindering the use of Mobile devices for learning? Quantitative design was employed using questionnaires containing a Five (5) Point Likert scale items ranging from strongly agree, agree, neutral, disagree, and strongly disagree and open-ended items were utilized in this study to obtain quantitative information to answer the research questions: A total population of 331 was considered and sample size of 181 was obtained using Krejcie and Morgan table. Stratified sampling was used to collect data from each stratum and data was analyzed using SPSS Version 20. The reliability of the data collected was tested using the Cronbach's reliability test coefficient were the overall value of all the options was on average 0.67 which was beyond recommended Cronbach’s Alpha coefficient values 0.6 for an instrument to be declared reliable. In terms of ascertaining the negative effects of using Mobile devices during lectures for other activities to the related Lecture, students agreed that it distract students' attention, disturb other students, disturbs the instructors and the course of the lesson and reflects disrespect for the instructor. The findings also agreed that the following were ranked among top five (5) factors hindering the use of Mobile devices for learning: Lack of mobile devices, Slow Speed of the mobile devices, Power problems, Network Connections Issues and Battery problem but disagreed that the course is not suited for mobile devices, lack of interest and complicated to use. This study recommended that mobile devices should be encouraged, allow students to use Mobile devices according to lesson’s topics since students disagreed that lack of interest is not hindering the use of mobile devices, discourage students from using Mobile devices in class for other activities not related to the topic and formulate the usability policy of mobile devices.Item Towards personalized learning environment in universities in developing countries through blended learning: a case of Muni university(Scholars World-International Refereed Journal of Arts, Science & Commerce, 2018) Oroma, O. Josephat; Guma, Ali; Businge, Phelix MbabaziPersonalized Learning Environment (PLE) is the future of education at higher education institutions (HEIs), and blended learning is a means to achieve it in emerging regions. However, several challenges hamper its implementation. This study therefore uses a combination of research approaches to investigate these challenges and report on the experience of more than a year of adoption and implementation of blended learning in Muni University in an effort to improve the quality of education as well as to set in the foundation for PLE.A total of 200 questionnaires were distributed and total of 165 were collected, making a return rate of 82.5%. The results indicate that, the respondents had skills and university has the will to implement blended learning environment however, critical issues related to user training, technical support and proper benchmarking were insufficiently included as essential and integral part of the implementation. The study recommends that self-enrolment of the students be enabled and Coverage must be extended, Training should be given to students, FAQs should be included and enrolment process should be simplified.Item Examining the use of information systems to preserve indigenous knowledge in Uganda: a case from Muni university(2018-05) Oroma, Josephat O.; Guma, AliIndigenous Knowledge (IK), can be preserved using Information Systems in order to protect cultural heritage and disseminate local knowledge for development. This knowledge often passed on orally for generations has become significant in searching for answers to several world's critical problems, are at risk of becoming extinct. This "traditional wisdom" is highly useful in solving complex problems of health, agriculture, education, use of natural resources and the environment. The main challenges of IK are inadequate documentation and diminishing transmission channels. Both descriptive and quantitative methods are used in this study that focuses on highlighting the importance of indigenous knowledge in the sustainable development process and illustrating ways in which technology can be used to preserve it, thereby enriching the development process from a holistic perspective. This research strengthens the preservation of local IK, enhances its adoption in the formal educational settings, leads to improvement in scientific knowledge development and inspire sustainable community development using a holistic approachItem Arduino based smart energy saving system in Ugandan public universities: a case study of Muni university(International Journal of Innovative Research and Development, 2019-06) Nkamwesiga, Lawrence; Kazibwe, Julius Junior; Male, PaulThe application of internet of things in the real world offers numerous benefits including smart homes and offices, a technology that does not only save energy but also saves money. Office automation is becoming popular due to its numerous benefits as applied in the world of internet of things. The specific objectives of the study were: to assess the current energy usage, identify current energy saving measures, and design and implement a smart energy saving system for Muni University. System requirements were collected from the respondents who were staff of Muni University. The study considered 2 respondents from estates office, 2 from procurement, 1 from each of the three departments of education, Computer and Information Science, and Nursing Sciences. User requirements were gathered a qualitative protocol using focus group discuss and thematic analysis technique was employed. Heterogeneous home automation systems and technologies were considered in review with central controller-based Arduino, sensors, web based, email, Bluetooth, mobile, SMS, ZigBee, Dual Tone Multi Frequency, and cloud based. The study design utilized the Global system for mobile communication technology as a user interface using SMS based communication with Arduino as the central controller. The system supports internet of things concept that can be applied in saving electrical energy usage in public places including public universities. The study further recommends the Ugandan government to advocate for Arduino Based Smart Energy Saving System that can reduce electrical energy expenditure in Ugandan public universities Muni University inclusive.Item The mediation effect of the semantic layer on the relation-ship between technical and information infrastructure with eHealth interoperability in Ugandan pubic hospitals(International Journal of Innovative Research and Development, 2019-07) Nkamwesiga, Lawrence; Mayoka, Kituyi; Moya, Musa B.; Alain, Ndi Isoh; Tsuma, Clive; Mbarika, VictoreHealth Interoperability appears to be in its infancy in developing countries including Uganda. The study investigated the Semantic Layer as the mediator on the relationship between Technical and Information Infrastructure with eHealth interoperability in Ugandan Public Hospitals using a quantitative approach. Stratified and simple random sampling were used to select respondents. The study used descriptive statistics and structural equation modelling approach for data analysis. The findings further revealed that all hypotheses, H1, H2, and H3, significantly explained eHealth Interoperability in Ugandan Public Hospitals. Thus, all the objectives of the study (Objective 1 and 2) were achieved. It is recommended that stakeholders implementing eHealth Interoperability should consider Technical and Information Infrastructure, and Semantic Layer as key factors explaining eHealth Interoperability in Ugandan Public Hospitals. The study further recommends that software developers should adopt Semantic Layer to improve information exchange in Ugandan Public Hospitals. Further, the Ugandan government should adopt key factors of eHealth Interoperability proposed in this study to achieve sustainable development goals and Uganda Vision 2040 goals.Item SWOT analysis of blended learning in public universities of Uganda: a case study of Muni University(MDPI AG, 2019-07-15) Guma, Ali; Buruga, Bosco Apparatus; Taban, HabibuWith the fusion of information communication technology (ICT) in higher institutions of learning, new teaching and learning practices have developed—often called blended learning—allowing students and teachers to interact with information and each other more independently. This study, therefore, analyses the strengths, weaknesses, opportunities and threats (SWOT) of blended learning in the Public Universities of Uganda, in a case study of Muni University. Descriptive survey design was employed in the research. The target sample of the survey was 25 lecturers and 189 students selected using a stratified random sampling technique from the three faculties. A questionnaire was employed in this study and the data collected were analyzed using SPSS Version 25. The findings of the study identified accessibility, positive attitude, and knowledge and skills as the major motivators for blended learning. The strengths of blended learning found included serving many students in a short time, university readiness, connected both in and out of class, basic IT skills and top management commitment. The weaknesses included low bandwidth and unstable internet, lack of a plagiarism tool, insufficient numbers of computers and dependent on internet connectivity. Opportunities cited were competency-based systems that made it easier to manage individual progress in line with university expansion plans, an accessible way of learning regardless of location and available external support. The threats included unreliable power supply, unreliable internet connection, exchanges of username and passwords by students, internet shorthand used in student assignments. Based on these results, the study provides a baseline to help government and public universities that would like to implement or newly incorporate blended learning to identify strengths, weaknesses, opportunities and threats associated with the blended learning approach. The survey urges that plagiarism plugins for Moodle and BigBlue Button should be added, steady power supply should be provided, internet accessibility should be improved, blended learning training and workshops need to be improved and finally, policies, rules and standards pertaining to blended learning should be enacted.Item Spatial assessment of urban sprawl in Arua Municipality, Uganda(The Egyptian Journal of Remote Sensing and Space Science, 2019-12) Abudu, Dan; Echima, Robert Azo; Andogah, GeoffreyArua Municipality is one of the regional municipalities that has been earmarked for transformation to city status. Its population has been growing at rate of 3% per annum 1% higher than the capital, Kampala. Urbanisation provides economic opportunities. However, it also lead to emergence of unplanned urban settlements and urban sprawl. This paper applied remote sensing and geographical information system techniques to map land cover changes from 2001 to 2016, quantify urban sprawl within the period and estimate the urban growth pattern up to 2031. TerrSet’s Land Change Modeller has been used to model the urbanisation and Markov Chain matrices used to predict future changes in the urban composition. Land cover classification accuracy of 85% in 2001, 84% in 2010 and 89.2% in 2016 were obtained. From 2001 to 2016, the four land cover types considered, contributed a total of 11.5% to the composition of built-up area with agricultural land cover type contributing the most at 7.4%. Results of urbanisation analyses indicated that in 2001, 18.2% of the total area were built-up. This increased to 28.8% in 2010 and 40.9% in 2016. Urbanisation is predicted to increase to 57.4% by the year 2031. This prediction indicates that agricultural land cover will be most negatively affected at _10% loss rate while built-up areas will increase by 6%. While urbanisation continues to increase at this rate, the municipal authority must implement sustainable measures to protect agricultural lands and ecosystems against the land consuming urbanisation.
- «
- 1 (current)
- 2
- 3
- »