Browsing by Author "Kondo, Tabu S."
Now showing 1 - 11 of 11
Results Per Page
Sort Options
Item Against the “Hello World”(Foundation of Computer Science, 2014) Mselle, Leonard J.; Kondo, Tabu S.Computer programming is a "two-way thinking process.” The programmer must think and implant his/her thought in the computer in the form of code. In return, the computer must think like the programmer in the way of output. Compilation is the only initial accurate way of confirming that the programmer and the computer are thinking the same way. In case of novice programmers, the compiler feedback does not suffice the need. In some cases it is a source of confusion and despair. To add to this complexity, the way initial programming is taught and the way programming materials are presented to learners goes contrary to the "two-way thinking.” There is a need for another (mediating) language between the compiler and the novice programmer. In this paper, the traditional practice of introducing programming lessons through programs that display a message such as "Hello World" or any other message is debunked. A new visualization approach through Memory Transfer Language (MTL) is proposed. It is proved that MTL is a language to learn programming whereby students are able to employ hands-on, minds-on and "two-way-thinking" approach to develop coding skills.Item Application of fuzzy Delphi technique to identify analytical lenses for determining the preparation of free and open source software projects for user experience maturity(Elsevier BV, 2024) Namayala, Phesto P.; Kondo, Tabu S.User eXperience (UX) significantly influences the success of free and open source software (FOSS) projects and is measured using UX capability maturity models (UXCMMs). Every organization desires higher levels of UX maturity; however, it requires upfront preparations and process quality control. Harmonizing processes and analytical lenses for determining preparation for UX maturity are still challenging, and studies to create them are limited. The analysis is ad hoc and based on the actors’ will and experiences. This study proposes and validates analytical lenses. Findings show that UX experts agreed that the lenses could be used with a consensus percentage of 81 %, the threshold value (d) = 0.112, and crisp values greater than α-cut = 0.5. On validation, 47.57 % of stakeholders agreed, and 52.43 % strongly agreed they were relevant. Results help evaluate the status quo and change culture and policies toward ideal preparation. Two areas are suggested for future research.Item Deploying computer-based learning under suboptimal conditions(IEEE, 2012) Mselle, Leonard J.; Kondo, Tabu S.In this study, secondary school students were taught mathematics using Computer-Based Learning (CBL) approach in four lessons, during their mathematics classes. CBL was deployed without Internet connectivity. Data were recorded to measure any cognitive progress observed amongst the students; the impact that the method had on them, the position of CBL in relation to face-to-face approach and the viability of deploying digital content off-line to students without basic computer knowledge. For revision classes, the students showed a modest improvement in their cognition of mathematics. However, studying mathematics through digital content before face-to-face session had discouraging results. Information from the questionnaire revealed that overall; CBL approach was preferred as a complement to the face-to-face method. While cognitive improvement was not statistically significant, the main challenge to digital approach seems to be the alignment of CBL with face-to-face method. The study confirms that basic computer knowledge is not necessary for successful deployment of CBL. It is further concluded that investing in off-line CBL under sub-optimal conditions (where Internet connectivity is not available) is the viable alternative to Web-learning and Mobile-learning (M-learning). It is insisted that even without connectivity, the effect of severe lack of mathematics teachers and books can be mitigated by CBL, if this is properly deployed.Item Deploying technology-enhanced learning environments in Tanzanian secondary schools(Foundation of Computer Science, 2013) Kondo, Tabu S.; Mselle, Leonard J.In this paper, we describe how technology can be combined with a face-to-face method to facilitate teaching and learning various subjects in Tanzanian secondary schools. A smart school model is proposed. The model consists of students, teacher/facilitator/digital content expert and digital content delivery vehicles that can be implemented in a learning environment in which technology plays a subordinate role and serves to enrich the traditional face-to-face classroom.Item An extended version of the polybius cipher(Foundation of Computer Science, 2013) Kondo, Tabu S.; Mselle, Leonard J.This paper provides a security method which can be used for data that contains alphabets, numerals and some special symbols during their transmission. A discussion about cryptology and the existing Polybius cipher is made. The existing Polybius cipher is based on the use of a 5X5 matrix of letters constructed using numbers from 1 to 5. This square can allow the text that contains alphabets only. For this reason, we have proposed an improvement to the existing Polybius cipher, in which an 8X8 matrix can be constructed.Item The impact of teaching computer programming in Tanzanian primary schools(Taylor & Francis, 2022) Kilavo, Hassan; Kondo, Tabu S.; Hassan, FeruziToday computing is intricate in all aspects of our lives, beginning with communications and education to banking, information security, health, shopping, and social media. Development of the computing is proportional to the development of software which is becoming a serious part of all daily lives. This paper, therefore, assessed the impact of teaching Computer Programming Language in Tanzanian primary schools. To achieve this, a new tool for teaching and learning a computer programming language was developed. Furthermore, a two-tier approach was adopted where the training started on an algorithm first, then if, loops and case conditionals as the third concept inside the first tier. On the other hand, variables, lists, and functions are hooked on the second tier. Results indicate that students acquired together reasoning learning in a conceptual argument of view and skill performance. Students were able to accomplish the expertise to practice or apply the theories of programming knowledge in programming-connected tasks.Item The impact of the actual use of e-Learning, academic performance and community interaction on the continued use of e-Learning in Tanzanian secondary schools(The Society of Digital Information and Wireless Communications, 2020) Kondo, Tabu S.The purpose of this research was to investigate the impact of the actual use of e-Learning, academic performance and community interaction on the continued use of e-Learning. To achieve this objective, an experiment was conducted to test the adoption of e-Learning in diverse infrastructural settings in Tanzanian secondary schools. Firstly, the adoption of e-Learning by using DVD player and Television were tested. Secondly, the adoptions of e- Learning by using either smart phone or smart phone connected to a TV were tested. Thirdly, the adoptions of e-Learning by using either standalone computer or computer connected to a projector were tested. Results of the pre-test and post-test showed that the actual use of e-Learning has a positive relationship with the academic performance of students. In addition to that, results of the field observations revealed that: (i) the academic performance of students has a positive relationship with the continued use of e-Learning (ii) the actual use of e- Learning indirectly affects the continued use of e- Learning through the academic performance of students (iii) bringing students and teachers in contact with the broader community enhance the continued use of e-Learning.Item Investigating the efficiency of secret key encryption algorithms with similar key length and block size(The Society of Digital Information and Wireless Communications, 2020) Kondo, Tabu S.A secure communication over the web is being provided by encryption algorithms and so they still play a serious role in any security system. However, a substantial amount of your time and resources like memory, CPU time, and computation time to encrypt and decrypt data are being consumed by these algorithms. Therefore, this study empirically investigated the efficiency of secret key encryption algorithms with similar key length and block size to identify the best algorithm which provides optimum performance. So, diverse experiments have been performed to evaluate the performance of IDEA, Blowfish, and CAST5 symmetric encryption algorithms in terms of throughput, encoding time, and decoding time over variable text files and modes of operation. The results of the experiments show that Blowfish is the most competent data encoding algorithm as far as the used parameters are concernedItem Network security analysis in the enterprise LANS(Foundation of Computer Science, 2014) Mutembei, Leonard L.; Mvuma, Aloys N.; Kondo, Tabu S.Enterprise Local Area Networks (ELANs) have been expanding following an increase in the number of staff which necessitates the establishment of new offices. However, the reliability and security of services provided by ELANs need to be ensured at all times to meet the expectations of users. In this paper, the network security holes existing within the ELANs were investigated. Vulnerabilities and threats were critically examined in one of the ELANs. It was observed that known vulnerabilities were still around within the network. Based on the findings, the paper suggests that all software used in the networking devices need to be updated; unneeded open ports need to be closed; cache servers and security policy need to be implemented. The suggestions will ensure the stability of the network during scaling out as the number of staff continues to grow.Item A proposed system design of deleted image metadata recovery software(The Society of Digital Information and Wireless Communications, 2021) Kondo, Tabu S.This paper describes the design and implementation features of Deleted Image Metadata Recovery Software which can automatically extract deleted image metadata so that important information of the senders of an offensive image on the web can be identified. By so doing, the identified information will be used as evidence in a court of law. It is hoped that the software can be used by forensics professionals to recover deleted image metadata from the digital image. The proposed design of the Deleted Image Metadata Recovery Software is expected to use the algorithm for extracting deleted image metadata. Therefore, the proposed software will be able to analyze the authenticity of the digital image downloaded from the web and produce a report that can be utilized as evidence in a court of law.Item Results on implementing personal learning environments in Tanzanian secondary schools(IEEE, 2013) Mselle, Leonard J.; Kondo, Tabu S.In this paper we describe how an Offline Personal Learning Environment (OPLE) for learning mathematics was implemented in Tanzanian secondary schools. Students and teachers' perceptions were captured and discussed. The viability of delivering mathematics classes through offline digital content was tested. Results show that OPLE can be used to improve teaching and learning in Tanzanian secondary schools.