The Art of Data Hiding with Reed-Solomon Error Correcting Codes

Published in International Journal of Computer Applications (IJCA). 11/2014; 106(14):28-31. DOI: 10.5120/18590-9902

Abstract 

With the tremendous advancements in technology and the Internet, data security has become a major issue around the globe. To guarantee that data is protected and does not go to an unintended endpoint, the art of data hiding (steganography) emerged. Steganography is the art of hiding information such that it is not detectable to the naked eye. Various techniques have been proposed for hiding a secret message in a carrier document. In this paper, we present a novel design that applies Reed-Solomon (RS) error correcting codes in steganographic applications. The model works by substituting the redundant RS codes with the steganographic message. The experimental results show that the proposed design is satisfactory with the percentage of decoded information 100% and percentage of decoded secret message 97. 36%. The proposed model proved that it could be applied in various steganographic applications.

Citation:
  Fredrick R. Ishengoma, “The Art of Data Hiding with Reed-Solomon Erasure Correcting Codes ”, International Journal of Computer Applications (IJCA), ISSN: 0975-8887, Volume 106 - Number 14, PP: 28-31, DOI: 10.5120/18590-9902, November 2014.

Link: http://www.ijcaonline.com/archives/volume106/number14/18590-9902

3D Printing: Developing Countries Perspectives

Published in International Journal of Computer Applications (IJCA). 10/2014; 104(11):30-34. DOI: 10.5120/18249-9329


Abstract

For the past decade, 3D printing (3DP) has become popular due to availability of low-cost 3D printers such as RepRap and Fab@Home; and better software, which offers a broad range of manufacturing platform that enables users to create customizable products. 3DP offers everybody with the power to convert a digital design into a three dimensional physical object. While the application of 3DP in developing countries is still at an early stage, the technology application promises vast solutions to existing problems. This paper presents a critical review of the current state of art of 3DP with a particular focus on developing countries. Moreover, it discusses the challenges, opportunities and future insights of 3DP in developing countries. This paper will serve as a basis for discussion and further research on this area.

Citation:
Fredrick R. Ishengoma and Adam B. Mtaho, “3D Printing: The Developing Countries Perspectives”, International Journal of Computer Applications (IJCA), ISSN: 0975-8887, Volume 104 - Number 11, PP: 30-34, DOI: 10.5120/18249-9329, October 2014.

Link: http://dx.doi.org/10.5120/18249-9329

Online Social Network as a Tool for Facilitating e-Learning in Tanzania


Published in International Journal of Open Information Technologies ISSN: 2307-8162 Volume 2, Number 10, October 2014.

Abstract

The main delivery system in Tanzanian education has been face-to-face approach relying on printed educational materials. High cost of books and insufficient teaching materials are still the major challenges. Recently, Online Social Networks (OSN) have gained popularity across the world and they are used for sharing information, news, chatting, messaging, and keeping in touch with friends. Studies have shown that OSNs can be used as tools for facilitating learning, supplementing face-to-face approach. Currently, there is an increase in the number of local OSN sites and subscribers in Tanzania. This paper examines to what extent are local OSNs in Tanzania exploited as e-learning platforms. Moreover, it addresses the student’s perceived challenges and discusses the opportunities of using local OSNs towards fostering students' academic development

Citation:   Fredrick R. Ishengoma and Adam B. Mtaho, “ Online Social Network as a Tool for Facilitating e-Learning in Tanzania”, International Journal of Open Information Technologies ISSN: 2307-8162 Volume 2, Number 10, October 2014.

Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies

Published in CiiT International Journal of Programmable Device Circuits and Systems; 6(6):.162 – 16, 08/2014

Abstract
 
With the rapid advancement in technology, smart homes have become applicable and so the need arise to solve the security challenges that are accompanied with its operation. Passwords and identity cards have been used as traditional authentication mechanisms in home environments, however, the rise of misuse of these mechanisms are proving them to be less reliable. For instance, ID cards can be misplaced, copied or counterfeited and being misused. Conversely, studies have shown that biometrics authentication systems particularly Iris Recognition Technology (IRT) and Fingerprint Recognition Technology (FRT) have the most reliable mechanisms to date providing tremendous accuracy and speed. As the technology becomes less expensive, application of IRT& FRT in smart-homes becomes more reliable and appropriate solution for security challenges. In this paper, we present our approach to design an authentication system for smart homes based on IRT, FRT and ARM7TDMI-S.The system employs two biometrics mechanisms for high reliability whereby initially, system users must enroll their fingerprints and eyes into the camera. Iris and fingerprint biometrics are scanned and the images are stored in the database. In the stage of authentication, FRT and IRT fingerprint scan and analyze points of the user's current input iris and fingerprint and match with the database contents. If one or more captured images do not match with the one in the database, then the system will not give authorization.

Citation: Fredrick R. Ishengoma, “Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies”, CiiT International Journal of Programmable Device Circuits and Systems, Print: ISSN 0974 – 973X & Online: ISSN 0974 – 9624, Vol. 6 – Issue 6, pp.162 – 167, August 2014.

Link:  http://ciitresearch.org/dl/index.php/pdcs/issue/view/643 

Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies

Published in International Journal of Computer Science and Network Solutions (ISSN: 2345 - 3397) volume 4 issue 2, April , 2014.

Abstract

Quality of service (QoS) in cellular communication system is a topic that recently has raised much interest for many researchers. This paper presents the findings obtained from the study on factors affecting QoS in Tanzania cellular networksThe study was carried out in Dodoma Municipal, Tanzania. The study employed cross-sectional research design. Information was gathered from structured questionnaire of 240 subscribers during the study of quality of service for the four leading cellular networks in Tanzania (Vodacom, Airtel, Tigo and Zantel). Both qualitative and quantitative data from field survey were collected and analyzed using Statistical Package for Social Sciences (SPSS-version 11) and Excel software. The study findings show that the major factors that degrade QoS in Tanzania cellular networks are inadequate network infrastructure, lack of fairness from service providers and little efforts taken by the government in enforcing the national agreed standards. Other factors are lack of reliable end-to-end systems, geographical terrain, low quality handsets, poor government monitoring on standards and lack of subscriber’s skills and training.

Citation:
Adam B. Mtaho and Fredrick R. Ishengoma, “Factors Affecting QoS in Tanzania Cellular Networks”, International Journal of Computer Science and Network Solutions (IJCSNS) Volume 2 – Issue 4, April, 2014, ISSN 2345-3397, pp.29 - 36.

Link: http://www.ijcsns.com/Journallist.aspx?ID=113

A Novel Design of IEEE 802.15.4 and Solar Based Autonomous Water Quality Monitoring Prototype using ECHERP


Published in International Journal of Computer Science and Network Solutions (ISSN: 2345 - 3397) volume 2, Issue - 1
 
Abstract
The recently advancement in Wireless Sensor Networks (WSN) has brought new distributed sensing applications such as water quality monitoring. With sensing capabilities, using parameters such as pH, conductivity and temperature, the quality of water can be known. This paper proposes a novel design based on IEEE 802.15.4 (Zig-Bee protocol) and solar energy for autonomous water quality monitoring prototype (AWQMP). The prototype is designed to use ECHERP routing protocol and Adruino Mega 2560, an open-source electronic prototyping platform for data acquisition. AWQMP is expected to reduce the cost of manual water quality monitoring due to its autonomous characteristic. Moreover, it will help to study the behavior of aquatic animals in deployed water bodies.

Citation:
Fredrick R. Ishengoma, “A Novel Design of IEEE 802.15.4 and Solar Based Autonomous Water Quality Monitoring Prototype using ECHERP”, International Journal of Computer Science and Network Solutions (IJCSNS) Volume 2 – Issue 1, January 2014, ISSN 2345-3397, pp.24 - 36.
 
Link: http://www.ijcsns.com//january.2014-Volume.2-No.1//Article03.pdf

Online Social Networks and Terrorism 2.0 in Developing Countries

Abstract

The advancement in technology has brought a new era in terrorism where Online Social Networks (OSNs) have become a major platform of communication with wide range of usage from message channelling to propaganda and recruitment of new followers in terrorist groups. Meanwhile, during the terrorist attacks people use OSNs for information exchange, mobilizing and uniting and raising money for the victims. This paper critically analyses the specific usage of OSNs in the times of terrorisms attacks in developing countries. We crawled and used Twitter’s data during Westgate shopping mall terrorist attack in Nairobi, Kenya. We then analysed the number of tweets, ge-location of tweets, demographics of the users and whether users in developing countries tend to tweet, retweet or reply during the event of a terrorist attack. We define new metrics (reach and impression of the tweet) and present the models for calculating them. The study findings show that, users from developing countries tend to tweet more at the first and critical times of the terrorist occurrence. Moreover, large number of tweets originated from the attacked country (Kenya) with 73% from men and 23% from women where original posts had a most number of tweets followed by replies and retweets.    

This research work was published  in International Journal of Computer Science and Network Solutions (ISSN: 2345 - 3397)Volume 1 issue 4.