Are you over 18 and want to see adult content?
More Annotations
IsibaniEdu – Skills Development Solutions
Are you over 18 and want to see adult content?
A complete backup of ediningexpress.com
Are you over 18 and want to see adult content?
Le Canal Auditif: le blogue québécois des musiques indépendantes
Are you over 18 and want to see adult content?
پروپوزال آماده-دانلود پروپوزال رایگان|نمونه پروپوزال ارشد- آسان داک
Are you over 18 and want to see adult content?
Wilson Center | Independent Research, Open Dialogue & Actionable Ideas
Are you over 18 and want to see adult content?
Socialsbox.com - Buy YouTube Views | Instagram Followers | Facebook Likes | Twitter Followers
Are you over 18 and want to see adult content?
BestReferat.ru - Банк рефератов, дипломы, курсовые работы, сочинения, доклады
Are you over 18 and want to see adult content?
Favourite Annotations
A complete backup of nepaltrekkingtourism.com
Are you over 18 and want to see adult content?
A complete backup of gestaltcleveland.org
Are you over 18 and want to see adult content?
A complete backup of horusiath.blogspot.com
Are you over 18 and want to see adult content?
A complete backup of la-petite-epicerie.fr
Are you over 18 and want to see adult content?
A complete backup of santaslicense.com
Are you over 18 and want to see adult content?
A complete backup of rightgifting.com
Are you over 18 and want to see adult content?
A complete backup of blkfshcrk-naturist.tumblr.com
Are you over 18 and want to see adult content?
Text
ZAMBIA ICT JOURNAL
The Zambia ICT Journal (ISSN: 2616-2156) is published twice a year by the ICT Association of Zambia (ICTAZ) with technical support from the University of Zambia, Copperbelt University and Mulungushi University. The objective of Journal is to support and stimulate active productive research which could strengthen the technical foundations of engineers and scientists in the African continent EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
TECHNOLOGICAL PARADOX OF HACKERS BEGETTING HACKERS: A CASE Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and A MODEL FOR AN ELECTRONIC HEALTH INFORMATION MANAGEMENT Electronic Health Records (EHR) Systems have over the recent years become an integral part of any effective Health Care System. Volumes of data is kept in heterogeneous systems and though continued health care highly depends on knowledge acquired from medical history captured at various points, this information is usually not readilyavailable.
USING OPEN SOURCE TOOLS FOR ANALYSIS OF THE MUTATION RATE Popular tools used in studies in life sciences are often costly. This often pauses challenges to researchers in spite of the fact that research continues to be a key to the successful systematic development of new knowledge and a fundamental aspect to the usefulness of all higher education. Particularly, higher education also aims to advance, create and disseminate knowledge throughresearch.
E-GOVERNANCE SYSTEMS: A CASE STUDY OF THE DEVELOPMENT OF A Use of enhanced Information Communication Technology is among the key targets set forth in the 7th National Development Plan. Absence of a rigorous approval process has seen an increase in the number of ghost farmers benefiting from the Farmer Input Support Programme. The lack of a single pool of farmer and marketing information for technocrats makes decision making a near DEMYSTIFYING RANSOMWARE ATTACKS Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. DESIGN AND CONTROL OF A GRID-CONNECTED SEVEN LEVEL ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 3 (Issue 1) (2019) Pages 21-27 Zambia (ICT) Journal, Volume 3 (Issue 1)(2019) 21
A COMPARATIVE STUDY OF NOSQL AND RELATIONAL DATABASE Relational Database and NoSQL are competing types of database models. The former has been in existence since 1979 and the latter since the year 2000. The demands of modern applications especially in web 2.0, 3.0 and big data have made NoSQL a popular database of choice. Choosing an appropriate database model to use is an important decision that developers must make based on the A MODEL FOR AN ELECTRONIC HEALTH MANAGEMENT INFORMATION ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 2 (Issue 2) (2018) Pages 28-35 Zambia (ICT) Journal, Volume 2 (Issue 2)(2018) 28
ZAMBIA ICT JOURNAL
The Zambia ICT Journal (ISSN: 2616-2156) is published twice a year by the ICT Association of Zambia (ICTAZ) with technical support from the University of Zambia, Copperbelt University and Mulungushi University. The objective of Journal is to support and stimulate active productive research which could strengthen the technical foundations of engineers and scientists in the African continent EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
TECHNOLOGICAL PARADOX OF HACKERS BEGETTING HACKERS: A CASE Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and A MODEL FOR AN ELECTRONIC HEALTH INFORMATION MANAGEMENT Electronic Health Records (EHR) Systems have over the recent years become an integral part of any effective Health Care System. Volumes of data is kept in heterogeneous systems and though continued health care highly depends on knowledge acquired from medical history captured at various points, this information is usually not readilyavailable.
USING OPEN SOURCE TOOLS FOR ANALYSIS OF THE MUTATION RATE Popular tools used in studies in life sciences are often costly. This often pauses challenges to researchers in spite of the fact that research continues to be a key to the successful systematic development of new knowledge and a fundamental aspect to the usefulness of all higher education. Particularly, higher education also aims to advance, create and disseminate knowledge throughresearch.
E-GOVERNANCE SYSTEMS: A CASE STUDY OF THE DEVELOPMENT OF A Use of enhanced Information Communication Technology is among the key targets set forth in the 7th National Development Plan. Absence of a rigorous approval process has seen an increase in the number of ghost farmers benefiting from the Farmer Input Support Programme. The lack of a single pool of farmer and marketing information for technocrats makes decision making a near DEMYSTIFYING RANSOMWARE ATTACKS Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. DESIGN AND CONTROL OF A GRID-CONNECTED SEVEN LEVEL ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 3 (Issue 1) (2019) Pages 21-27 Zambia (ICT) Journal, Volume 3 (Issue 1)(2019) 21
A COMPARATIVE STUDY OF NOSQL AND RELATIONAL DATABASE Relational Database and NoSQL are competing types of database models. The former has been in existence since 1979 and the latter since the year 2000. The demands of modern applications especially in web 2.0, 3.0 and big data have made NoSQL a popular database of choice. Choosing an appropriate database model to use is an important decision that developers must make based on the A MODEL FOR AN ELECTRONIC HEALTH MANAGEMENT INFORMATION ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 2 (Issue 2) (2018) Pages 28-35 Zambia (ICT) Journal, Volume 2 (Issue 2)(2018) 28
EMOTION RECOGNITION USING A MULTI-VIEW LEARNING METHOD The increasing use of computing devices and applications in human daily life triggers the need for natural human-computer interaction. Emotion Recognition using multiple features using a semi-serial fusion method is proposed. The study analyses the impact of the feature combinations in the enhancement of the recognition enhancement. The paper presents the use of the multi-view learning A MODEL FOR AN ELECTRONIC HEALTH INFORMATION MANAGEMENT Electronic Health Records (EHR) Systems have over the recent years become an integral part of any effective Health Care System. Volumes of data is kept in heterogeneous systems and though continued health care highly depends on knowledge acquired from medical history captured at various points, this information is usually not readilyavailable.
ASSESSING THE READINESS OF STUDENTS TO USE MOBILE To improve student performance and retention rates, higher institutions of learning are constantly researching on the approaches, tools and techniques to use. In recent times, concepts such as mobile learning, electronic learning, collaborative learning, flipped classroom and deep learning have emerged. These describe the different approaches that institutions are using to improve student ICT AS AN ENABLER TO ACADEMIC SUCCESS OF STUDENTS WITH While the World Health Organisation’s (WHO) benchmark is 15.6 percent, ‘Sim’ (pseudonym) University is way below that benchmark as only 0.001 percent are students classified as ‘disabled’ despite being in existence for more than 50 year. Within the 0.001, students with visually impaired (SwVI) are the majority estimated at70 percent.
DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH USABILITY Websites serve as the primary interface on the Internet for transactions such as subscription, downloads, database access and storage. Websites are however, sources of security breaches to information systems that are attached to them. Several techniques have been developed to provide security on websites such as secured socket layer (ssl) and CAPTCHA systems. “WHATSAPP” AS A LEARNER SUPPORT TOOL FOR DISTANCE One of the norms of distance education is that learners are the drivers of their learning and teachers merely facilitate the learning process. To this effect, learners are expected to be fully engaged in their studies throughout for them to perform well in their studies. However, the ‘distance’ factor inherent in distance education has been identified as one of the major challenges for VIEW OF USE OF DATA MINING TECHNIQUES IN HUMAN RESOURCE Return to Article Details Use of Data Mining Techniques in Human Resource Management Download Download PDF Use of Data Mining Techniques in Human Resource Management DEVELOPING AN AUTOMATIC IDENTIFICATION AND EARLY WARNING To combat the fall Army worm (FAW-Spodoptera frugiperda) pest which has a negative impact on world food security, there is need to come up with methods that can be used alongside conventional methods of spraying. Therefore this paper proposes a machine learning based system for automatic identification and monitoring of Fall Army wormMoths.
DESIGN AND CONTROL OF A GRID-CONNECTED SEVEN LEVEL ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 3 (Issue 1) (2019) Pages 21-27 Zambia (ICT) Journal, Volume 3 (Issue 1)(2019) 21
A MODEL FOR AN ELECTRONIC HEALTH MANAGEMENT INFORMATION ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 2 (Issue 2) (2018) Pages 28-35 Zambia (ICT) Journal, Volume 2 (Issue 2)(2018) 28
ZAMBIA ICT JOURNAL
The Zambia ICT Journal (ISSN: 2616-2156) is published twice a year by the ICT Association of Zambia (ICTAZ) with technical support from the University of Zambia, Copperbelt University and Mulungushi University. The objective of Journal is to support and stimulate active productive research which could strengthen the technical foundations of engineers and scientists in the African continent EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
TECHNOLOGICAL PARADOX OF HACKERS BEGETTING HACKERS: A CASE Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and A MODEL FOR AN ELECTRONIC HEALTH INFORMATION MANAGEMENT Electronic Health Records (EHR) Systems have over the recent years become an integral part of any effective Health Care System. Volumes of data is kept in heterogeneous systems and though continued health care highly depends on knowledge acquired from medical history captured at various points, this information is usually not readilyavailable.
USING OPEN SOURCE TOOLS FOR ANALYSIS OF THE MUTATION RATE Popular tools used in studies in life sciences are often costly. This often pauses challenges to researchers in spite of the fact that research continues to be a key to the successful systematic development of new knowledge and a fundamental aspect to the usefulness of all higher education. Particularly, higher education also aims to advance, create and disseminate knowledge throughresearch.
E-GOVERNANCE SYSTEMS: A CASE STUDY OF THE DEVELOPMENT OF A Use of enhanced Information Communication Technology is among the key targets set forth in the 7th National Development Plan. Absence of a rigorous approval process has seen an increase in the number of ghost farmers benefiting from the Farmer Input Support Programme. The lack of a single pool of farmer and marketing information for technocrats makes decision making a near DEMYSTIFYING RANSOMWARE ATTACKS Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. DESIGN AND CONTROL OF A GRID-CONNECTED SEVEN LEVEL ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 3 (Issue 1) (2019) Pages 21-27 Zambia (ICT) Journal, Volume 3 (Issue 1)(2019) 21
A COMPARATIVE STUDY OF NOSQL AND RELATIONAL DATABASE Relational Database and NoSQL are competing types of database models. The former has been in existence since 1979 and the latter since the year 2000. The demands of modern applications especially in web 2.0, 3.0 and big data have made NoSQL a popular database of choice. Choosing an appropriate database model to use is an important decision that developers must make based on the A MODEL FOR AN ELECTRONIC HEALTH MANAGEMENT INFORMATION ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 2 (Issue 2) (2018) Pages 28-35 Zambia (ICT) Journal, Volume 2 (Issue 2)(2018) 28
ZAMBIA ICT JOURNAL
The Zambia ICT Journal (ISSN: 2616-2156) is published twice a year by the ICT Association of Zambia (ICTAZ) with technical support from the University of Zambia, Copperbelt University and Mulungushi University. The objective of Journal is to support and stimulate active productive research which could strengthen the technical foundations of engineers and scientists in the African continent EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
TECHNOLOGICAL PARADOX OF HACKERS BEGETTING HACKERS: A CASE Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and A MODEL FOR AN ELECTRONIC HEALTH INFORMATION MANAGEMENT Electronic Health Records (EHR) Systems have over the recent years become an integral part of any effective Health Care System. Volumes of data is kept in heterogeneous systems and though continued health care highly depends on knowledge acquired from medical history captured at various points, this information is usually not readilyavailable.
USING OPEN SOURCE TOOLS FOR ANALYSIS OF THE MUTATION RATE Popular tools used in studies in life sciences are often costly. This often pauses challenges to researchers in spite of the fact that research continues to be a key to the successful systematic development of new knowledge and a fundamental aspect to the usefulness of all higher education. Particularly, higher education also aims to advance, create and disseminate knowledge throughresearch.
E-GOVERNANCE SYSTEMS: A CASE STUDY OF THE DEVELOPMENT OF A Use of enhanced Information Communication Technology is among the key targets set forth in the 7th National Development Plan. Absence of a rigorous approval process has seen an increase in the number of ghost farmers benefiting from the Farmer Input Support Programme. The lack of a single pool of farmer and marketing information for technocrats makes decision making a near DEMYSTIFYING RANSOMWARE ATTACKS Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. DESIGN AND CONTROL OF A GRID-CONNECTED SEVEN LEVEL ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 3 (Issue 1) (2019) Pages 21-27 Zambia (ICT) Journal, Volume 3 (Issue 1)(2019) 21
A COMPARATIVE STUDY OF NOSQL AND RELATIONAL DATABASE Relational Database and NoSQL are competing types of database models. The former has been in existence since 1979 and the latter since the year 2000. The demands of modern applications especially in web 2.0, 3.0 and big data have made NoSQL a popular database of choice. Choosing an appropriate database model to use is an important decision that developers must make based on the A MODEL FOR AN ELECTRONIC HEALTH MANAGEMENT INFORMATION ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 2 (Issue 2) (2018) Pages 28-35 Zambia (ICT) Journal, Volume 2 (Issue 2)(2018) 28
EMOTION RECOGNITION USING A MULTI-VIEW LEARNING METHOD The increasing use of computing devices and applications in human daily life triggers the need for natural human-computer interaction. Emotion Recognition using multiple features using a semi-serial fusion method is proposed. The study analyses the impact of the feature combinations in the enhancement of the recognition enhancement. The paper presents the use of the multi-view learning A MODEL FOR AN ELECTRONIC HEALTH INFORMATION MANAGEMENT Electronic Health Records (EHR) Systems have over the recent years become an integral part of any effective Health Care System. Volumes of data is kept in heterogeneous systems and though continued health care highly depends on knowledge acquired from medical history captured at various points, this information is usually not readilyavailable.
ASSESSING THE READINESS OF STUDENTS TO USE MOBILE To improve student performance and retention rates, higher institutions of learning are constantly researching on the approaches, tools and techniques to use. In recent times, concepts such as mobile learning, electronic learning, collaborative learning, flipped classroom and deep learning have emerged. These describe the different approaches that institutions are using to improve student ICT AS AN ENABLER TO ACADEMIC SUCCESS OF STUDENTS WITH While the World Health Organisation’s (WHO) benchmark is 15.6 percent, ‘Sim’ (pseudonym) University is way below that benchmark as only 0.001 percent are students classified as ‘disabled’ despite being in existence for more than 50 year. Within the 0.001, students with visually impaired (SwVI) are the majority estimated at70 percent.
DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH USABILITY Websites serve as the primary interface on the Internet for transactions such as subscription, downloads, database access and storage. Websites are however, sources of security breaches to information systems that are attached to them. Several techniques have been developed to provide security on websites such as secured socket layer (ssl) and CAPTCHA systems. “WHATSAPP” AS A LEARNER SUPPORT TOOL FOR DISTANCE One of the norms of distance education is that learners are the drivers of their learning and teachers merely facilitate the learning process. To this effect, learners are expected to be fully engaged in their studies throughout for them to perform well in their studies. However, the ‘distance’ factor inherent in distance education has been identified as one of the major challenges for VIEW OF USE OF DATA MINING TECHNIQUES IN HUMAN RESOURCE Return to Article Details Use of Data Mining Techniques in Human Resource Management Download Download PDF Use of Data Mining Techniques in Human Resource Management DEVELOPING AN AUTOMATIC IDENTIFICATION AND EARLY WARNING To combat the fall Army worm (FAW-Spodoptera frugiperda) pest which has a negative impact on world food security, there is need to come up with methods that can be used alongside conventional methods of spraying. Therefore this paper proposes a machine learning based system for automatic identification and monitoring of Fall Army wormMoths.
DESIGN AND CONTROL OF A GRID-CONNECTED SEVEN LEVEL ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 3 (Issue 1) (2019) Pages 21-27 Zambia (ICT) Journal, Volume 3 (Issue 1)(2019) 21
A MODEL FOR AN ELECTRONIC HEALTH MANAGEMENT INFORMATION ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 2 (Issue 2) (2018) Pages 28-35 Zambia (ICT) Journal, Volume 2 (Issue 2)(2018) 28
ZAMBIA ICT JOURNAL
The Zambia ICT Journal (ISSN: 2616-2156) is published twice a year by the ICT Association of Zambia (ICTAZ) with technical support from the University of Zambia, Copperbelt University and Mulungushi University. The objective of Journal is to support and stimulate active productive research which could strengthen the technical foundations of engineers and scientists in the African continentICICT ZAMBIA
Website is currently under maintenance. We'll be back shortly. TECHNOLOGICAL PARADOX OF HACKERS BEGETTING HACKERS: A CASE Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
GAPS IN THE MANAGEMENT AND USE OF BIOMETRIC DATA: A CASE The current physical and cybersecurity systems rely on traditional three-factor authentication to mitigate the threats posed by insider attacks. Key is the use of biometric information. Biometrics are a unique measurement and analysis of the unique physiological special traits such as voice, eye structure and others that can be used in the discipline of varying person identification. VIEW OF USE OF DATA MINING TECHNIQUES IN HUMAN RESOURCE Return to Article Details Use of Data Mining Techniques in Human Resource Management Download Download PDF Use of Data Mining Techniques in Human Resource Management E-GOVERNANCE SYSTEMS: A CASE STUDY OF THE DEVELOPMENT OF A Use of enhanced Information Communication Technology is among the key targets set forth in the 7th National Development Plan. Absence of a rigorous approval process has seen an increase in the number of ghost farmers benefiting from the Farmer Input Support Programme. The lack of a single pool of farmer and marketing information for technocrats makes decision making a near DEMYSTIFYING RANSOMWARE ATTACKS Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH USABILITY Websites serve as the primary interface on the Internet for transactions such as subscription, downloads, database access and storage. Websites are however, sources of security breaches to information systems that are attached to them. Several techniques have been developed to provide security on websites such as secured socket layer (ssl) and CAPTCHA systems. DESIGN AND CONTROL OF A GRID-CONNECTED SEVEN LEVEL ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 3 (Issue 1) (2019) Pages 21-27 Zambia (ICT) Journal, Volume 3 (Issue 1)(2019) 21
ZAMBIA ICT JOURNAL
The Zambia ICT Journal (ISSN: 2616-2156) is published twice a year by the ICT Association of Zambia (ICTAZ) with technical support from the University of Zambia, Copperbelt University and Mulungushi University. The objective of Journal is to support and stimulate active productive research which could strengthen the technical foundations of engineers and scientists in the African continentICICT ZAMBIA
Website is currently under maintenance. We'll be back shortly. TECHNOLOGICAL PARADOX OF HACKERS BEGETTING HACKERS: A CASE Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
GAPS IN THE MANAGEMENT AND USE OF BIOMETRIC DATA: A CASE The current physical and cybersecurity systems rely on traditional three-factor authentication to mitigate the threats posed by insider attacks. Key is the use of biometric information. Biometrics are a unique measurement and analysis of the unique physiological special traits such as voice, eye structure and others that can be used in the discipline of varying person identification. VIEW OF USE OF DATA MINING TECHNIQUES IN HUMAN RESOURCE Return to Article Details Use of Data Mining Techniques in Human Resource Management Download Download PDF Use of Data Mining Techniques in Human Resource Management E-GOVERNANCE SYSTEMS: A CASE STUDY OF THE DEVELOPMENT OF A Use of enhanced Information Communication Technology is among the key targets set forth in the 7th National Development Plan. Absence of a rigorous approval process has seen an increase in the number of ghost farmers benefiting from the Farmer Input Support Programme. The lack of a single pool of farmer and marketing information for technocrats makes decision making a near DEMYSTIFYING RANSOMWARE ATTACKS Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH USABILITY Websites serve as the primary interface on the Internet for transactions such as subscription, downloads, database access and storage. Websites are however, sources of security breaches to information systems that are attached to them. Several techniques have been developed to provide security on websites such as secured socket layer (ssl) and CAPTCHA systems. DESIGN AND CONTROL OF A GRID-CONNECTED SEVEN LEVEL ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 3 (Issue 1) (2019) Pages 21-27 Zambia (ICT) Journal, Volume 3 (Issue 1)(2019) 21
ICICT ZAMBIA
Website is currently under maintenance. We'll be back shortly.ZAMBIA ICT JOURNAL
The Zambia ICT Journal (ISSN: 2616-2156) is published twice a year by the ICT Association of Zambia (ICTAZ) with technical support from the University of Zambia, Copperbelt University and Mulungushi University. The objective of Journal is to support and stimulate active productive research which could strengthen the technical foundations of engineers and scientists in the African continent VIEW OF USE OF DATA MINING TECHNIQUES IN HUMAN RESOURCE Return to Article Details Use of Data Mining Techniques in Human Resource Management Download Download PDF Use of Data Mining Techniques in Human Resource Management “WHATSAPP” AS A LEARNER SUPPORT TOOL FOR DISTANCE One of the norms of distance education is that learners are the drivers of their learning and teachers merely facilitate the learning process. To this effect, learners are expected to be fully engaged in their studies throughout for them to perform well in their studies. However, the ‘distance’ factor inherent in distance education has been identified as one of the major challenges for USING OPEN SOURCE TOOLS FOR ANALYSIS OF THE MUTATION RATE Popular tools used in studies in life sciences are often costly. This often pauses challenges to researchers in spite of the fact that research continues to be a key to the successful systematic development of new knowledge and a fundamental aspect to the usefulness of all higher education. Particularly, higher education also aims to advance, create and disseminate knowledge throughresearch.
A SECURITY FRAMEWORK FOR MOBILE APPLICATION SYSTEMS: CASE Smartphones have become a major part of human’s life. And also it has been seen that new mobile applications are built day by day. Currently mobile applications are playing major role in many areas such as banking, social networking, financial apps, entertainment and many more. With this increasing number of applications, security is animportant issue.
DESIGN AND CONTROL OF A GRID-CONNECTED SEVEN LEVEL ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 3 (Issue 1) (2019) Pages 21-27 Zambia (ICT) Journal, Volume 3 (Issue 1)(2019) 21
DEVELOPING AN AUTOMATIC IDENTIFICATION AND EARLY WARNING To combat the fall Army worm (FAW-Spodoptera frugiperda) pest which has a negative impact on world food security, there is need to come up with methods that can be used alongside conventional methods of spraying. Therefore this paper proposes a machine learning based system for automatic identification and monitoring of Fall Army wormMoths.
VIEW OF DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH View of Design of Accented Character-based CAPTCHA with Usability Test for Online Transactions. Previous. IDENTIFYING BOTNETS INTRUSION & PREVENTION Systems and networks will be compromised, almost always regardless of what network engineers do. It is then paramount to install and manage systems that have a capacity to identify all forms of intrusions and possibly prevent those intrusions and related attacks on a computer network especially bots. Bots are at the midpoint of most network problems because almost all majorZAMBIA ICT JOURNAL
The Zambia ICT Journal (ISSN: 2616-2156) is published twice a year by the ICT Association of Zambia (ICTAZ) with technical support from the University of Zambia, Copperbelt University and Mulungushi University. The objective of Journal is to support and stimulate active productive research which could strengthen the technical foundations of engineers and scientists in the African continent DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH USABILITY Websites serve as the primary interface on the Internet for transactions such as subscription, downloads, database access and storage. Websites are however, sources of security breaches to information systems that are attached to them. Several techniques have been developed to provide security on websites such as secured socket layer (ssl) and CAPTCHA systems. TECHNOLOGICAL PARADOX OF HACKERS BEGETTING HACKERS: A CASE Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
USING OPEN SOURCE TOOLS FOR ANALYSIS OF THE MUTATION RATE Popular tools used in studies in life sciences are often costly. This often pauses challenges to researchers in spite of the fact that research continues to be a key to the successful systematic development of new knowledge and a fundamental aspect to the usefulness of all higher education. Particularly, higher education also aims to advance, create and disseminate knowledge throughresearch.
VIEW OF DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH View of Design of Accented Character-based CAPTCHA with Usability Test for Online Transactions. Previous. DEMYSTIFYING RANSOMWARE ATTACKS Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. VIEW OF USE OF DATA MINING TECHNIQUES IN HUMAN RESOURCE Return to Article Details Use of Data Mining Techniques in Human Resource Management Download Download PDF Use of Data Mining Techniques in Human Resource Management A COMPARATIVE STUDY OF NOSQL AND RELATIONAL DATABASE Relational Database and NoSQL are competing types of database models. The former has been in existence since 1979 and the latter since the year 2000. The demands of modern applications especially in web 2.0, 3.0 and big data have made NoSQL a popular database of choice. Choosing an appropriate database model to use is an important decision that developers must make based on the MYTF: A JOOMLA TEMPLATE DESIGN PACKAGE FOR MOBILE DEVICES Websites are created using programming languages such as HTML or content management systems (CMS). There are various technologies supporting the development of websites such as content management systems, JavaScript and ASP, thus numerous types of websites exist. Users access these websites through mobile devices and desktop systems. These users require access to websites thatZAMBIA ICT JOURNAL
The Zambia ICT Journal (ISSN: 2616-2156) is published twice a year by the ICT Association of Zambia (ICTAZ) with technical support from the University of Zambia, Copperbelt University and Mulungushi University. The objective of Journal is to support and stimulate active productive research which could strengthen the technical foundations of engineers and scientists in the African continent DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH USABILITY Websites serve as the primary interface on the Internet for transactions such as subscription, downloads, database access and storage. Websites are however, sources of security breaches to information systems that are attached to them. Several techniques have been developed to provide security on websites such as secured socket layer (ssl) and CAPTCHA systems. TECHNOLOGICAL PARADOX OF HACKERS BEGETTING HACKERS: A CASE Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
USING OPEN SOURCE TOOLS FOR ANALYSIS OF THE MUTATION RATE Popular tools used in studies in life sciences are often costly. This often pauses challenges to researchers in spite of the fact that research continues to be a key to the successful systematic development of new knowledge and a fundamental aspect to the usefulness of all higher education. Particularly, higher education also aims to advance, create and disseminate knowledge throughresearch.
VIEW OF DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH View of Design of Accented Character-based CAPTCHA with Usability Test for Online Transactions. Previous. DEMYSTIFYING RANSOMWARE ATTACKS Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. VIEW OF USE OF DATA MINING TECHNIQUES IN HUMAN RESOURCE Return to Article Details Use of Data Mining Techniques in Human Resource Management Download Download PDF Use of Data Mining Techniques in Human Resource Management A COMPARATIVE STUDY OF NOSQL AND RELATIONAL DATABASE Relational Database and NoSQL are competing types of database models. The former has been in existence since 1979 and the latter since the year 2000. The demands of modern applications especially in web 2.0, 3.0 and big data have made NoSQL a popular database of choice. Choosing an appropriate database model to use is an important decision that developers must make based on the MYTF: A JOOMLA TEMPLATE DESIGN PACKAGE FOR MOBILE DEVICES Websites are created using programming languages such as HTML or content management systems (CMS). There are various technologies supporting the development of websites such as content management systems, JavaScript and ASP, thus numerous types of websites exist. Users access these websites through mobile devices and desktop systems. These users require access to websites that EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
ASSESSING THE READINESS OF STUDENTS TO USE MOBILE To improve student performance and retention rates, higher institutions of learning are constantly researching on the approaches, tools and techniques to use. In recent times, concepts such as mobile learning, electronic learning, collaborative learning, flipped classroom and deep learning have emerged. These describe the different approaches that institutions are using to improve student VIEW OF USE OF DATA MINING TECHNIQUES IN HUMAN RESOURCE Return to Article Details Use of Data Mining Techniques in Human Resource Management Download Download PDF Use of Data Mining Techniques in Human Resource Management VIEW OF DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH View of Design of Accented Character-based CAPTCHA with Usability Test for Online Transactions. Previous. ICT AS AN ENABLER TO ACADEMIC SUCCESS OF STUDENTS WITH While the World Health Organisation’s (WHO) benchmark is 15.6 percent, ‘Sim’ (pseudonym) University is way below that benchmark as only 0.001 percent are students classified as ‘disabled’ despite being in existence for more than 50 year. Within the 0.001, students with visually impaired (SwVI) are the majority estimated at70 percent.
DEVELOPING AN AUTOMATIC IDENTIFICATION AND EARLY WARNING To combat the fall Army worm (FAW-Spodoptera frugiperda) pest which has a negative impact on world food security, there is need to come up with methods that can be used alongside conventional methods of spraying. Therefore this paper proposes a machine learning based system for automatic identification and monitoring of Fall Army wormMoths.
EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN 2019). (, (, 2019). , 2019). , DESIGN AND CONTROL OF A GRID-CONNECTED SEVEN LEVEL ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 3 (Issue 1) (2019) Pages 21-27 Zambia (ICT) Journal, Volume 3 (Issue 1)(2019) 21
E-GOVERNANCE SYSTEMS: A CASE STUDY OF THE DEVELOPMENT OF A Use of enhanced Information Communication Technology is among the key targets set forth in the 7th National Development Plan. Absence of a rigorous approval process has seen an increase in the number of ghost farmers benefiting from the Farmer Input Support Programme. The lack of a single pool of farmer and marketing information for technocrats makes decision making a near MYTF: A JOOMLA TEMPLATE DESIGN PACKAGE FOR MOBILE DEVICES Websites are created using programming languages such as HTML or content management systems (CMS). There are various technologies supporting the development of websites such as content management systems, JavaScript and ASP, thus numerous types of websites exist. Users access these websites through mobile devices and desktop systems. These users require access to websites thatZAMBIA ICT JOURNAL
The Zambia ICT Journal (ISSN: 2616-2156) is published twice a year by the ICT Association of Zambia (ICTAZ) with technical support from the University of Zambia, Copperbelt University and Mulungushi University. The objective of Journal is to support and stimulate active productive research which could strengthen the technical foundations of engineers and scientists in the African continent TECHNOLOGICAL PARADOX OF HACKERS BEGETTING HACKERS: A CASE Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH USABILITY Websites serve as the primary interface on the Internet for transactions such as subscription, downloads, database access and storage. Websites are however, sources of security breaches to information systems that are attached to them. Several techniques have been developed to provide security on websites such as secured socket layer (ssl) and CAPTCHA systems. USING OPEN SOURCE TOOLS FOR ANALYSIS OF THE MUTATION RATE Popular tools used in studies in life sciences are often costly. This often pauses challenges to researchers in spite of the fact that research continues to be a key to the successful systematic development of new knowledge and a fundamental aspect to the usefulness of all higher education. Particularly, higher education also aims to advance, create and disseminate knowledge throughresearch.
ICT AS AN ENABLER TO ACADEMIC SUCCESS OF STUDENTS WITH While the World Health Organisation’s (WHO) benchmark is 15.6 percent, ‘Sim’ (pseudonym) University is way below that benchmark as only 0.001 percent are students classified as ‘disabled’ despite being in existence for more than 50 year. Within the 0.001, students with visually impaired (SwVI) are the majority estimated at70 percent.
DEMYSTIFYING RANSOMWARE ATTACKS Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. DEVELOPING AN AUTOMATIC IDENTIFICATION AND EARLY WARNING To combat the fall Army worm (FAW-Spodoptera frugiperda) pest which has a negative impact on world food security, there is need to come up with methods that can be used alongside conventional methods of spraying. Therefore this paper proposes a machine learning based system for automatic identification and monitoring of Fall Army wormMoths.
A COMPARATIVE STUDY OF NOSQL AND RELATIONAL DATABASE Relational Database and NoSQL are competing types of database models. The former has been in existence since 1979 and the latter since the year 2000. The demands of modern applications especially in web 2.0, 3.0 and big data have made NoSQL a popular database of choice. Choosing an appropriate database model to use is an important decision that developers must make based on the MYTF: A JOOMLA TEMPLATE DESIGN PACKAGE FOR MOBILE DEVICES Websites are created using programming languages such as HTML or content management systems (CMS). There are various technologies supporting the development of websites such as content management systems, JavaScript and ASP, thus numerous types of websites exist. Users access these websites through mobile devices and desktop systems. These users require access to websites thatZAMBIA ICT JOURNAL
The Zambia ICT Journal (ISSN: 2616-2156) is published twice a year by the ICT Association of Zambia (ICTAZ) with technical support from the University of Zambia, Copperbelt University and Mulungushi University. The objective of Journal is to support and stimulate active productive research which could strengthen the technical foundations of engineers and scientists in the African continent TECHNOLOGICAL PARADOX OF HACKERS BEGETTING HACKERS: A CASE Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH USABILITY Websites serve as the primary interface on the Internet for transactions such as subscription, downloads, database access and storage. Websites are however, sources of security breaches to information systems that are attached to them. Several techniques have been developed to provide security on websites such as secured socket layer (ssl) and CAPTCHA systems. USING OPEN SOURCE TOOLS FOR ANALYSIS OF THE MUTATION RATE Popular tools used in studies in life sciences are often costly. This often pauses challenges to researchers in spite of the fact that research continues to be a key to the successful systematic development of new knowledge and a fundamental aspect to the usefulness of all higher education. Particularly, higher education also aims to advance, create and disseminate knowledge throughresearch.
ICT AS AN ENABLER TO ACADEMIC SUCCESS OF STUDENTS WITH While the World Health Organisation’s (WHO) benchmark is 15.6 percent, ‘Sim’ (pseudonym) University is way below that benchmark as only 0.001 percent are students classified as ‘disabled’ despite being in existence for more than 50 year. Within the 0.001, students with visually impaired (SwVI) are the majority estimated at70 percent.
DEMYSTIFYING RANSOMWARE ATTACKS Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. DEVELOPING AN AUTOMATIC IDENTIFICATION AND EARLY WARNING To combat the fall Army worm (FAW-Spodoptera frugiperda) pest which has a negative impact on world food security, there is need to come up with methods that can be used alongside conventional methods of spraying. Therefore this paper proposes a machine learning based system for automatic identification and monitoring of Fall Army wormMoths.
A COMPARATIVE STUDY OF NOSQL AND RELATIONAL DATABASE Relational Database and NoSQL are competing types of database models. The former has been in existence since 1979 and the latter since the year 2000. The demands of modern applications especially in web 2.0, 3.0 and big data have made NoSQL a popular database of choice. Choosing an appropriate database model to use is an important decision that developers must make based on the MYTF: A JOOMLA TEMPLATE DESIGN PACKAGE FOR MOBILE DEVICES Websites are created using programming languages such as HTML or content management systems (CMS). There are various technologies supporting the development of websites such as content management systems, JavaScript and ASP, thus numerous types of websites exist. Users access these websites through mobile devices and desktop systems. These users require access to websites thatICICT ZAMBIA
Website is currently under maintenance. We'll be back shortly. EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
EMOTION RECOGNITION USING A MULTI-VIEW LEARNING METHOD The increasing use of computing devices and applications in human daily life triggers the need for natural human-computer interaction. Emotion Recognition using multiple features using a semi-serial fusion method is proposed. The study analyses the impact of the feature combinations in the enhancement of the recognition enhancement. The paper presents the use of the multi-view learning A COMPARATIVE STUDY OF NOSQL AND RELATIONAL DATABASE Relational Database and NoSQL are competing types of database models. The former has been in existence since 1979 and the latter since the year 2000. The demands of modern applications especially in web 2.0, 3.0 and big data have made NoSQL a popular database of choice. Choosing an appropriate database model to use is an important decision that developers must make based on the DEVELOPING AN AUTOMATIC IDENTIFICATION AND EARLY WARNING To combat the fall Army worm (FAW-Spodoptera frugiperda) pest which has a negative impact on world food security, there is need to come up with methods that can be used alongside conventional methods of spraying. Therefore this paper proposes a machine learning based system for automatic identification and monitoring of Fall Army wormMoths.
ICT AS AN ENABLER TO ACADEMIC SUCCESS OF STUDENTS WITH While the World Health Organisation’s (WHO) benchmark is 15.6 percent, ‘Sim’ (pseudonym) University is way below that benchmark as only 0.001 percent are students classified as ‘disabled’ despite being in existence for more than 50 year. Within the 0.001, students with visually impaired (SwVI) are the majority estimated at70 percent.
E-GOVERNANCE SYSTEMS: A CASE STUDY OF THE DEVELOPMENT OF A Use of enhanced Information Communication Technology is among the key targets set forth in the 7th National Development Plan. Absence of a rigorous approval process has seen an increase in the number of ghost farmers benefiting from the Farmer Input Support Programme. The lack of a single pool of farmer and marketing information for technocrats makes decision making a near A MODEL FOR AN ELECTRONIC HEALTH MANAGEMENT INFORMATION ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 2 (Issue 2) (2018) Pages 28-35 Zambia (ICT) Journal, Volume 2 (Issue 2)(2018) 28
MYTF: A JOOMLA TEMPLATE DESIGN PACKAGE FOR MOBILE DEVICES Websites are created using programming languages such as HTML or content management systems (CMS). There are various technologies supporting the development of websites such as content management systems, JavaScript and ASP, thus numerous types of websites exist. Users access these websites through mobile devices and desktop systems. These users require access to websites that VIEW OF DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH View of Design of Accented Character-based CAPTCHA with Usability Test for Online Transactions. Previous.ZAMBIA ICT JOURNAL
The Zambia ICT Journal (ISSN: 2616-2156) is published twice a year by the ICT Association of Zambia (ICTAZ) with technical support from the University of Zambia, Copperbelt University and Mulungushi University. The objective of Journal is to support and stimulate active productive research which could strengthen the technical foundations of engineers and scientists in the African continent TECHNOLOGICAL PARADOX OF HACKERS BEGETTING HACKERS: A CASE Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH USABILITY Websites serve as the primary interface on the Internet for transactions such as subscription, downloads, database access and storage. Websites are however, sources of security breaches to information systems that are attached to them. Several techniques have been developed to provide security on websites such as secured socket layer (ssl) and CAPTCHA systems. USING OPEN SOURCE TOOLS FOR ANALYSIS OF THE MUTATION RATE Popular tools used in studies in life sciences are often costly. This often pauses challenges to researchers in spite of the fact that research continues to be a key to the successful systematic development of new knowledge and a fundamental aspect to the usefulness of all higher education. Particularly, higher education also aims to advance, create and disseminate knowledge throughresearch.
ICT AS AN ENABLER TO ACADEMIC SUCCESS OF STUDENTS WITH While the World Health Organisation’s (WHO) benchmark is 15.6 percent, ‘Sim’ (pseudonym) University is way below that benchmark as only 0.001 percent are students classified as ‘disabled’ despite being in existence for more than 50 year. Within the 0.001, students with visually impaired (SwVI) are the majority estimated at70 percent.
DEMYSTIFYING RANSOMWARE ATTACKS Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. DEVELOPING AN AUTOMATIC IDENTIFICATION AND EARLY WARNING To combat the fall Army worm (FAW-Spodoptera frugiperda) pest which has a negative impact on world food security, there is need to come up with methods that can be used alongside conventional methods of spraying. Therefore this paper proposes a machine learning based system for automatic identification and monitoring of Fall Army wormMoths.
A COMPARATIVE STUDY OF NOSQL AND RELATIONAL DATABASE Relational Database and NoSQL are competing types of database models. The former has been in existence since 1979 and the latter since the year 2000. The demands of modern applications especially in web 2.0, 3.0 and big data have made NoSQL a popular database of choice. Choosing an appropriate database model to use is an important decision that developers must make based on the MYTF: A JOOMLA TEMPLATE DESIGN PACKAGE FOR MOBILE DEVICES Websites are created using programming languages such as HTML or content management systems (CMS). There are various technologies supporting the development of websites such as content management systems, JavaScript and ASP, thus numerous types of websites exist. Users access these websites through mobile devices and desktop systems. These users require access to websites thatZAMBIA ICT JOURNAL
The Zambia ICT Journal (ISSN: 2616-2156) is published twice a year by the ICT Association of Zambia (ICTAZ) with technical support from the University of Zambia, Copperbelt University and Mulungushi University. The objective of Journal is to support and stimulate active productive research which could strengthen the technical foundations of engineers and scientists in the African continent TECHNOLOGICAL PARADOX OF HACKERS BEGETTING HACKERS: A CASE Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH USABILITY Websites serve as the primary interface on the Internet for transactions such as subscription, downloads, database access and storage. Websites are however, sources of security breaches to information systems that are attached to them. Several techniques have been developed to provide security on websites such as secured socket layer (ssl) and CAPTCHA systems. USING OPEN SOURCE TOOLS FOR ANALYSIS OF THE MUTATION RATE Popular tools used in studies in life sciences are often costly. This often pauses challenges to researchers in spite of the fact that research continues to be a key to the successful systematic development of new knowledge and a fundamental aspect to the usefulness of all higher education. Particularly, higher education also aims to advance, create and disseminate knowledge throughresearch.
ICT AS AN ENABLER TO ACADEMIC SUCCESS OF STUDENTS WITH While the World Health Organisation’s (WHO) benchmark is 15.6 percent, ‘Sim’ (pseudonym) University is way below that benchmark as only 0.001 percent are students classified as ‘disabled’ despite being in existence for more than 50 year. Within the 0.001, students with visually impaired (SwVI) are the majority estimated at70 percent.
DEMYSTIFYING RANSOMWARE ATTACKS Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. DEVELOPING AN AUTOMATIC IDENTIFICATION AND EARLY WARNING To combat the fall Army worm (FAW-Spodoptera frugiperda) pest which has a negative impact on world food security, there is need to come up with methods that can be used alongside conventional methods of spraying. Therefore this paper proposes a machine learning based system for automatic identification and monitoring of Fall Army wormMoths.
A COMPARATIVE STUDY OF NOSQL AND RELATIONAL DATABASE Relational Database and NoSQL are competing types of database models. The former has been in existence since 1979 and the latter since the year 2000. The demands of modern applications especially in web 2.0, 3.0 and big data have made NoSQL a popular database of choice. Choosing an appropriate database model to use is an important decision that developers must make based on the MYTF: A JOOMLA TEMPLATE DESIGN PACKAGE FOR MOBILE DEVICES Websites are created using programming languages such as HTML or content management systems (CMS). There are various technologies supporting the development of websites such as content management systems, JavaScript and ASP, thus numerous types of websites exist. Users access these websites through mobile devices and desktop systems. These users require access to websites thatICICT ZAMBIA
Website is currently under maintenance. We'll be back shortly. EXPLORING LEARNING CULTURES OF DIGITAL IMMIGRANTS IN In this study, we interrogate the Learning Cultures of Peace Leadership and Conflict Resolution Postgraduate learners in their quest for higher education within the University of Zambia using the Learning Management System. The thrust of the study is on learning cultures of digital immigrants in technologically mediated postgraduate distance learning mode to inform the development oflearner
EMOTION RECOGNITION USING A MULTI-VIEW LEARNING METHOD The increasing use of computing devices and applications in human daily life triggers the need for natural human-computer interaction. Emotion Recognition using multiple features using a semi-serial fusion method is proposed. The study analyses the impact of the feature combinations in the enhancement of the recognition enhancement. The paper presents the use of the multi-view learning A COMPARATIVE STUDY OF NOSQL AND RELATIONAL DATABASE Relational Database and NoSQL are competing types of database models. The former has been in existence since 1979 and the latter since the year 2000. The demands of modern applications especially in web 2.0, 3.0 and big data have made NoSQL a popular database of choice. Choosing an appropriate database model to use is an important decision that developers must make based on the DEVELOPING AN AUTOMATIC IDENTIFICATION AND EARLY WARNING To combat the fall Army worm (FAW-Spodoptera frugiperda) pest which has a negative impact on world food security, there is need to come up with methods that can be used alongside conventional methods of spraying. Therefore this paper proposes a machine learning based system for automatic identification and monitoring of Fall Army wormMoths.
ICT AS AN ENABLER TO ACADEMIC SUCCESS OF STUDENTS WITH While the World Health Organisation’s (WHO) benchmark is 15.6 percent, ‘Sim’ (pseudonym) University is way below that benchmark as only 0.001 percent are students classified as ‘disabled’ despite being in existence for more than 50 year. Within the 0.001, students with visually impaired (SwVI) are the majority estimated at70 percent.
E-GOVERNANCE SYSTEMS: A CASE STUDY OF THE DEVELOPMENT OF A Use of enhanced Information Communication Technology is among the key targets set forth in the 7th National Development Plan. Absence of a rigorous approval process has seen an increase in the number of ghost farmers benefiting from the Farmer Input Support Programme. The lack of a single pool of farmer and marketing information for technocrats makes decision making a near A MODEL FOR AN ELECTRONIC HEALTH MANAGEMENT INFORMATION ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 2 (Issue 2) (2018) Pages 28-35 Zambia (ICT) Journal, Volume 2 (Issue 2)(2018) 28
MYTF: A JOOMLA TEMPLATE DESIGN PACKAGE FOR MOBILE DEVICES Websites are created using programming languages such as HTML or content management systems (CMS). There are various technologies supporting the development of websites such as content management systems, JavaScript and ASP, thus numerous types of websites exist. Users access these websites through mobile devices and desktop systems. These users require access to websites that VIEW OF DESIGN OF ACCENTED CHARACTER-BASED CAPTCHA WITH Enter the password to open this PDF file. Cancel OK. File name:- WEBSITE IS CURRENTLY UNDER MAINTENANCE. We'll be back shortly.Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0