Browsing by Author "Mselle, Leonard J."
Now showing 1 - 11 of 11
Results Per Page
Sort Options
Item Against the “Hello World”(Foundation of Computer Science, 2014) Mselle, Leonard J.; Kondo, Tabu S.Computer programming is a "two-way thinking process.” The programmer must think and implant his/her thought in the computer in the form of code. In return, the computer must think like the programmer in the way of output. Compilation is the only initial accurate way of confirming that the programmer and the computer are thinking the same way. In case of novice programmers, the compiler feedback does not suffice the need. In some cases it is a source of confusion and despair. To add to this complexity, the way initial programming is taught and the way programming materials are presented to learners goes contrary to the "two-way thinking.” There is a need for another (mediating) language between the compiler and the novice programmer. In this paper, the traditional practice of introducing programming lessons through programs that display a message such as "Hello World" or any other message is debunked. A new visualization approach through Memory Transfer Language (MTL) is proposed. It is proved that MTL is a language to learn programming whereby students are able to employ hands-on, minds-on and "two-way-thinking" approach to develop coding skills.Item Deploying computer-based learning under suboptimal conditions(IEEE, 2012) Mselle, Leonard J.; Kondo, Tabu S.In this study, secondary school students were taught mathematics using Computer-Based Learning (CBL) approach in four lessons, during their mathematics classes. CBL was deployed without Internet connectivity. Data were recorded to measure any cognitive progress observed amongst the students; the impact that the method had on them, the position of CBL in relation to face-to-face approach and the viability of deploying digital content off-line to students without basic computer knowledge. For revision classes, the students showed a modest improvement in their cognition of mathematics. However, studying mathematics through digital content before face-to-face session had discouraging results. Information from the questionnaire revealed that overall; CBL approach was preferred as a complement to the face-to-face method. While cognitive improvement was not statistically significant, the main challenge to digital approach seems to be the alignment of CBL with face-to-face method. The study confirms that basic computer knowledge is not necessary for successful deployment of CBL. It is further concluded that investing in off-line CBL under sub-optimal conditions (where Internet connectivity is not available) is the viable alternative to Web-learning and Mobile-learning (M-learning). It is insisted that even without connectivity, the effect of severe lack of mathematics teachers and books can be mitigated by CBL, if this is properly deployed.Item Deploying technology-enhanced learning environments in Tanzanian secondary schools(Foundation of Computer Science, 2013) Kondo, Tabu S.; Mselle, Leonard J.In this paper, we describe how technology can be combined with a face-to-face method to facilitate teaching and learning various subjects in Tanzanian secondary schools. A smart school model is proposed. The model consists of students, teacher/facilitator/digital content expert and digital content delivery vehicles that can be implemented in a learning environment in which technology plays a subordinate role and serves to enrich the traditional face-to-face classroom.Item An extended version of the polybius cipher(Foundation of Computer Science, 2013) Kondo, Tabu S.; Mselle, Leonard J.This paper provides a security method which can be used for data that contains alphabets, numerals and some special symbols during their transmission. A discussion about cryptology and the existing Polybius cipher is made. The existing Polybius cipher is based on the use of a 5X5 matrix of letters constructed using numbers from 1 to 5. This square can allow the text that contains alphabets only. For this reason, we have proposed an improvement to the existing Polybius cipher, in which an 8X8 matrix can be constructed.Item Formalization of memory transfer language with C, C++ and Java on the mold of register transfer language(IEEE, 2014) Mselle, Leonard J.In this article, Memory Transfer Language (MTL) is formalized on the mold of Register Transfer Language (RTL). C, C++ and Java are used to demonstrate how MTL can be used to translate programs from multiple languages.Item The ICM approach as a way for improving leaning science subjects in High Schools in Tanzania(KHALSA Publications, 2014) William, Francis; O-Saki, Kalafunja M.; Mselle, Leonard J.; Gabriel, ProsperThis paper focuses on the design and trial of the Integrated Chemistry Modules (ICM). The objective was to design the approach, thereafter try it out. Observations show that teachers and students appreciated the approach. A very significant improvement in performance in post-test in the first trial group (t (37) = 21, p < 0.001) was observed. Similarly A very significant improvement in performance in post-test in the second trial group (t (26) = 33, p < 0.001) was observed. It is concluded that video materials, classroom experiments and worksheets can assist students attain required competencies.Item Investigating the viability of using online social networks as e-learning platforms in Tanzanian universities(Academia, 2015) Titus, Carina; Mselle, Leonard J.This study is to investigate the viability of using Online Social Networks (OSNs) as e-learning platforms in Tanzanian Universities. Students from the University of Dodoma constituted the sample for this study. Observation and questionnaires were used as a research instruments. The findings indicate that most active users of OSNs are individuals aged between 21 and 30 years. The most preferred site is Facebook followed by Google. Most students have the required experiences, skills and drive for effectively using OSNs as educational platforms. It is determined that the type of course that a student is pursuing has influence on students‘ perceptions, attitudes as well as experiences towards the use of OSNs as e-learning platforms.Item Memory Transfer Language: an absolute learner-driven visualizer(CIRWOLRD, 2014) Mselle, Leonard J.This article discusses visualization as a technique to enhance programming comprehension. It points out that current animation approach, being machine-based technique, is inadequate due to the fact that machine-based animation tools are difficult to integrate in the current teaching materials. In addition, machine-centered animators do not guarantee the learner with absolute engagement. In this paper, MTL, as a visualization technique which is absolutely learner-driven is demonstrated and discussed. It is shown that MTL can be integrated with current materials for teaching and learning programming and it can guarantee absolute authority to the learner.Item Results on implementing personal learning environments in Tanzanian secondary schools(IEEE, 2013) Mselle, Leonard J.; Kondo, Tabu S.In this paper we describe how an Offline Personal Learning Environment (OPLE) for learning mathematics was implemented in Tanzanian secondary schools. Students and teachers' perceptions were captured and discussed. The viability of delivering mathematics classes through offline digital content was tested. Results show that OPLE can be used to improve teaching and learning in Tanzanian secondary schools.Item Reverse social engineering to counter social engineering in mobile money theft: a tanzanian context(Routledge, 2020) Kilavo, Hassan; Mselle, Leonard J.; Rais, Ramadhani I.; Mrutu, Salehe ISocial engineering entails deception where one manipulates individuals into divulging confidential or any personal information that may be used for fraudulent purposes. In mobile money theft, the attackers plan a “lure” to tempt a victim directly, via mobile phones; mostly to gain money by proposing a phony undertaking. The victim is often asked to pay some money to facilitate a lucrative undertaking, which in reality is phony. Once the victim has paid the money, the attackers become inaccessible. Reverse social engineering entails deception of the predator by the pray in order to capture or discourage the predator. Through a case study, this paper investigates and presents an incident where a victim of mobile social engineering attempts to reverse the process in order to arraign the attackers.Item Technology applications in out-of-school time and performance in home assignments among primary school learners in Meru District, Tanzania(Journal Issues Limited, 2018) Kiwango, Thadei A.; Mselle, Leonard J.; Mtahabwa, Lyabwene M.This paper sought to establish whether the increased use of technology during out-of-school time (OST) by primary school learners improves their academic performances in home assignments. Null Hypothesis tested in this study states that: The improvement in the speed of the use of educational technology by primary school learners during OST will not improve their performance in home assignments. This paper reports the findings of quasi experiment that involved class six pupils from 6-day primary schools with experimental and control groups of 110 and 46 pupils respectively. Materials used were mainly the Digital Video Disk (DVD), question booklets, and answer booklets. Descriptive statistics and t-test were deployed for data analysis. The t-test (t = 3.20, p (0.002)