The purpose of this research is to implement interactive and reliable attendance management using GSM/GPRS signal to transfer and retrieve data from remote locations in Ghana tested with alert and management functionality on real time. It also discussed the technological approach in automating subject and attendance administration in the schools and also ascertained the business success with attendance management systems for Ghana education service. Rapid application development (RAD) software development methodology was deployed to build the Biometric Attendance System (BAS). The BAS was designed and implemented. The system provides users with an efficient way of generating reports and retrieving of attendance information of a teacher in
specific districts. It supports unified access and management through a simple standard web browser interface. It is recommended that evaluation of the system be carried out in future works to ascertain the success of the system.
This proposal is for a formative evaluation of the educational support programs run by Buffelshoek Trust for orphans and vulnerable children (OVCs) in Bushbuckridge, South Africa. The evaluation will focus specifically on how effective the programs are in reaching Mozambican migrant children aged 13-18. It will assess the programs' relevance, effectiveness, equity, ethical soundness, and sustainability using qualitative data collection methods like interviews and focus groups with learners, caregivers, educators, and Buffelshoek Trust staff. The goal is to understand how well the needs of migrant children are being met and identify ways to improve program design and implementation for the next phase.
The document analyzes the impact of Nikumbuke Health by Motorbike's Stars Scholarship Program, which provides scholarships to cover school fees for 27 Maasai girls in Lunga Lunga, Kenya. Education access is limited in rural Kenya, especially for girls from the Maasai community. The scholarships aim to address this by promoting girls' education. However, the study finds the Maasai girls face discrimination at boarding school and cultural barriers that may prevent them from returning to their village. It recommends establishing after-school forums for the girls and considering building a local school.
Influence of Pupil-teacher Ratio on Performance in Kenya Certificate of Prima...inventionjournals
Â
The purpose of this study was to investigate the influence pupil-teacher ratio on KCPE performance in Kitise Division, Makueni County. The study used descriptive survey design. The target population comprised of 24 head teachers and 172 teachers. The sample for the study was 24 head teachers and 119 teachers. This study used questionnaires to collect data while descriptive statistics were used to analyze data. Findings revealed that high pupil-teacher ratio in the schools affected KCPE performance. Based on the findings of the study it is recommended that the government should employ more teachers to counteract the high number of pupils in schools so that performance can be improved. It is also recommended that the government should build more primary schools to decongest existing ones in Makueni County.
Assessment of Premarital Sexual Practices and Associated Factors among Privat...AI Publications
Â
Background Sexual activity among adolescent has been reported to be on the increasing worldwide. Globally, puberty is occurring earlier for both boys and girls, and the age at which people marry is rising. These leave a widening gap of time during which young adults can potentially engaged in premarital sexual activity. Therefore this study was done to assess pre-marital sexual practices and associated factors among private college students in Bahir Dar city, Northwest Ethiopia.
Method: An institution based cross-sectional study was employed in private college, Bahr Dar, North west Amhara, Ethiopia from July to December 2016. The sample size to each college was allocated using probability proportional to size (number of student) allocation, and study participants were selected by systematic sampling technique. A total of 402 students were included in the study. Pre-testing of the questionnaire was undertaken. Data was collected using a pre-tested structured questionnaire through self administration. Data entry and analyses were performed using SPSS statistical packages (version 20 for Windows). Bivariate and Multivariable analysis were computed.
Result: : A total of 344 students took part in the survey. More than one fifth of survey respondents (23.3%) reported that they have had premarital sex. Multi--âvariate logistic regression analysis showed that male respondents were two times more likely to be have premarital sexual intercourse as compared to female respondents (AOR: 2.3,95% CI:1.4-4.1). Students who watch video, movies or other entertainment programs were more than five times more likely to start pre-marital sexual debut than those not watching video, movies or other entertainment programs (AOR: 5.5, 95%CI: 2.7-11.2).similarly work to earn money was found to be positively associated with premarital sex in this study (AOR: 3.2, 95% CI:1.8-5.7).
Conclusion and recommendation: A significant number of students had started pre marital sexual activity that might predispose them to varied sexual and reproductive health problems. Hence, sex education & targeted behavioural change interventions are recommended.
Promoting affirmative action in higher education a case study of the universi...Alexander Decker
Â
The document summarizes a case study on the University for Development Studies' Bridging Programme for girls in Ghana, which aims to promote gender equity in higher education. Some key points:
1) Before the program, there was a large gender gap in university enrollment favoring males; after the program was implemented, the gender gap was reduced.
2) The program provides admissions to female students from poorer backgrounds and rural areas who have weaker academic qualifications than normal admissions requirements.
3) Once enrolled through the program, the female students were able to compete favorably with students admitted through the normal process.
4) The program has helped increase female representation in university enrollment, but support from local governments could help sponsor
The Perception of Stakeholdersâ on Academic Performance of Junior high Schoo...AI Publications
Â
The study investigated stakeholdersâ perception and academic performance of students in Junior High Schools (JHS), with hard evidence from the Choggu Circuit in the Sanarigu District. Simple stratified, proportional random sampling was used to select a sample size of 191, representing 20 percent of the total population of 36 teachers and the entire seven member School Management Committee (SMC) and Parent Teachers Association (PTA) executives of the schools involved. Questionnaire and interview schedule were the main instruments used to elicit responses. Data analysis and interpretation indicated that academic performance of JHS is perceived by stakeholders to be hampered by quality teacher delivery and inadequate / unavailability of educational resources. In the light of these findings, suggestions for improvement in the quality of teaching and learning were made.
This document summarizes what is known about access to education for refugee children based on an analysis of UNHCR country reports from 2011-2014. It finds that while refugee enrollment has increased overall, fluctuations in refugee populations make planning challenging. Few opportunities for post-primary education can discourage primary enrollment. Funding and resources are insufficient to meet needs. Host country engagement supports access when refugees can integrate into national education systems, though data collection challenges make it difficult to understand trends over time. Progress includes education becoming a higher priority for UNHCR and improved collaboration between UNHCR and host governments.
This proposal is for a formative evaluation of the educational support programs run by Buffelshoek Trust for orphans and vulnerable children (OVCs) in Bushbuckridge, South Africa. The evaluation will focus specifically on how effective the programs are in reaching Mozambican migrant children aged 13-18. It will assess the programs' relevance, effectiveness, equity, ethical soundness, and sustainability using qualitative data collection methods like interviews and focus groups with learners, caregivers, educators, and Buffelshoek Trust staff. The goal is to understand how well the needs of migrant children are being met and identify ways to improve program design and implementation for the next phase.
The document analyzes the impact of Nikumbuke Health by Motorbike's Stars Scholarship Program, which provides scholarships to cover school fees for 27 Maasai girls in Lunga Lunga, Kenya. Education access is limited in rural Kenya, especially for girls from the Maasai community. The scholarships aim to address this by promoting girls' education. However, the study finds the Maasai girls face discrimination at boarding school and cultural barriers that may prevent them from returning to their village. It recommends establishing after-school forums for the girls and considering building a local school.
Influence of Pupil-teacher Ratio on Performance in Kenya Certificate of Prima...inventionjournals
Â
The purpose of this study was to investigate the influence pupil-teacher ratio on KCPE performance in Kitise Division, Makueni County. The study used descriptive survey design. The target population comprised of 24 head teachers and 172 teachers. The sample for the study was 24 head teachers and 119 teachers. This study used questionnaires to collect data while descriptive statistics were used to analyze data. Findings revealed that high pupil-teacher ratio in the schools affected KCPE performance. Based on the findings of the study it is recommended that the government should employ more teachers to counteract the high number of pupils in schools so that performance can be improved. It is also recommended that the government should build more primary schools to decongest existing ones in Makueni County.
Assessment of Premarital Sexual Practices and Associated Factors among Privat...AI Publications
Â
Background Sexual activity among adolescent has been reported to be on the increasing worldwide. Globally, puberty is occurring earlier for both boys and girls, and the age at which people marry is rising. These leave a widening gap of time during which young adults can potentially engaged in premarital sexual activity. Therefore this study was done to assess pre-marital sexual practices and associated factors among private college students in Bahir Dar city, Northwest Ethiopia.
Method: An institution based cross-sectional study was employed in private college, Bahr Dar, North west Amhara, Ethiopia from July to December 2016. The sample size to each college was allocated using probability proportional to size (number of student) allocation, and study participants were selected by systematic sampling technique. A total of 402 students were included in the study. Pre-testing of the questionnaire was undertaken. Data was collected using a pre-tested structured questionnaire through self administration. Data entry and analyses were performed using SPSS statistical packages (version 20 for Windows). Bivariate and Multivariable analysis were computed.
Result: : A total of 344 students took part in the survey. More than one fifth of survey respondents (23.3%) reported that they have had premarital sex. Multi--âvariate logistic regression analysis showed that male respondents were two times more likely to be have premarital sexual intercourse as compared to female respondents (AOR: 2.3,95% CI:1.4-4.1). Students who watch video, movies or other entertainment programs were more than five times more likely to start pre-marital sexual debut than those not watching video, movies or other entertainment programs (AOR: 5.5, 95%CI: 2.7-11.2).similarly work to earn money was found to be positively associated with premarital sex in this study (AOR: 3.2, 95% CI:1.8-5.7).
Conclusion and recommendation: A significant number of students had started pre marital sexual activity that might predispose them to varied sexual and reproductive health problems. Hence, sex education & targeted behavioural change interventions are recommended.
Promoting affirmative action in higher education a case study of the universi...Alexander Decker
Â
The document summarizes a case study on the University for Development Studies' Bridging Programme for girls in Ghana, which aims to promote gender equity in higher education. Some key points:
1) Before the program, there was a large gender gap in university enrollment favoring males; after the program was implemented, the gender gap was reduced.
2) The program provides admissions to female students from poorer backgrounds and rural areas who have weaker academic qualifications than normal admissions requirements.
3) Once enrolled through the program, the female students were able to compete favorably with students admitted through the normal process.
4) The program has helped increase female representation in university enrollment, but support from local governments could help sponsor
The Perception of Stakeholdersâ on Academic Performance of Junior high Schoo...AI Publications
Â
The study investigated stakeholdersâ perception and academic performance of students in Junior High Schools (JHS), with hard evidence from the Choggu Circuit in the Sanarigu District. Simple stratified, proportional random sampling was used to select a sample size of 191, representing 20 percent of the total population of 36 teachers and the entire seven member School Management Committee (SMC) and Parent Teachers Association (PTA) executives of the schools involved. Questionnaire and interview schedule were the main instruments used to elicit responses. Data analysis and interpretation indicated that academic performance of JHS is perceived by stakeholders to be hampered by quality teacher delivery and inadequate / unavailability of educational resources. In the light of these findings, suggestions for improvement in the quality of teaching and learning were made.
This document summarizes what is known about access to education for refugee children based on an analysis of UNHCR country reports from 2011-2014. It finds that while refugee enrollment has increased overall, fluctuations in refugee populations make planning challenging. Few opportunities for post-primary education can discourage primary enrollment. Funding and resources are insufficient to meet needs. Host country engagement supports access when refugees can integrate into national education systems, though data collection challenges make it difficult to understand trends over time. Progress includes education becoming a higher priority for UNHCR and improved collaboration between UNHCR and host governments.
The document summarizes the Ghana Education Programme 2015 run by Connect4Change, a consortium of Dutch development organizations. The program aims to improve quality of teaching, learning, and school management in Ghanaian primary and secondary schools by integrating information and communication technology (ICT). It discusses several projects that work with schools and teachers to enhance ICT skills, pedagogy, and school administration. Key activities include teacher training, ICT skills development for administrators, and establishing the C4C Education Ghana Alliance. Results showed improved exam scores, increased number of students, teachers, and schools reached across the various projects.
In a fast- paced digitized world, equal access to quality education can be achieved through Safe and Inclusive Learning Environment (SILE) that values diversity and uniqueness of each student in the classroom. Despite their background, students in a safe and inclusive environment always feel respected, happy and valued. A safe and inclusive learning environment provides a positive educational space that considers colour scheme, lighting, heating, cooling and ventilation, furniture and equipment in its construction. It enhances studentsâ critical thinking, creativity, problem- solving techniques and improves their comfort, well- being and possibly, attitude. In Ghana, the Ministry of Education has set out an inclusive education policy that allows all children to learn regardless of differences in age, gender, ethnicity, language and disability and design educational structures that addresses the needs of all these children. Nevertheless, some researchers are of the view that these literature surveys consider the surroundings of the school system without its effects on teaching and learning. This paper therefore aims to optimize safe and inclusive learning environment in promoting sustainable quality education in Africa.
A Study on Mlearning Implementation in AfricaWandeOwolabi
Â
Mlearning refers to education or training done using portable devices like smartphones, tablets, and laptops. It can increase access to education and reduce inequality. The document discusses benefits of mlearning like being accessible anywhere and anytime, personalized learning experiences, and cost efficiencies. It also outlines challenges in African education from UNESCO reports, such as many children not attending school, especially girls. UNESCO guidelines advise creating mlearning policies and tools. Examples of mlearning tools deployed in Africa are discussed, including Eneza Education, Ubongo, and Sterio.me. Governments are urged to set enabling environments and policies to support mlearning.
A Study on Mlearning Implementation in Africaomololasalami
Â
This is a project titled, UNESCO Mlearning Implementation in Africa, which addresses the stakeholders on policy formulation in Africa and the need to provide an enabling environment and encourage supportive policies that would enhance literacy, increase access to learning materials and reduce the number of children that are out of school.
Education is the yardstick for every countryâs political and socio-economic development; which acts as a basis of reducing poverty and inequality by enabling the use of new technologies, creating and spreading knowledge. Despite the large inflows of donor financing and the Government of Uganda through the Ministry of Education and Sports; the sector for the last 29 years is still grappling to balance the increasing access with quality education in secondary schools. Therefore, the main objective of this article is to explore the new strategies the Ministry of Education and Sports can employ to increase access while improving the quality education in the country. The article is based on literature review and the authorâs experience in education. The article examines the advantages of open schooling and reveals that the programme provides the fast-track options for retaining students; bringing dropouts and over-aged learners to school; reducing administrative costs and enabling young people to be effective in life. Furthermore, the researcher discusses the likely challenges of the programme and gives practical working solutions aimed at overcoming the challenges of implementing the programme in Uganda.
Key words: Open Schooling, Access to Education, Quality Education, Dropouts
Over 60% of girls in the Rukungiri District of Uganda miss at least one day of school per month due to lack of access to feminine hygiene products and sanitary facilities. As the new Global Advocacy Adviser for Girls Empowered International, you have been tasked with developing a 5-year, $2 million proposal to address this issue. Your proposal must include objectives, strategies, budgets, timelines, and plans for sustainability, education, product distribution, and addressing cultural stigma. It should leverage local partnerships and resources to create an intervention that is effective, culturally appropriate, and feasible for improving menstrual health and education in the Rukungiri District.
The impact of evidence- based research and mentorship as effective response to future epidemics and disruptions in any sector of the worldâs economy, including educational sector have been remarkable. Research and Mentorship seek to identify knowledge gaps in education and motivate individuals to effectively handle those deficiencies. In the last triennial, research and mentorship have grown in importance as it seeks to build students and institutionâs confidence, improves communication, critical thinking and problem- solving skills and helps us to better understand the evolving educational needs. In Ghana, the Ministry of Education through evidence- based research strategies is enhancing continuity of safe and inclusive schools by building new STEAM schools and providing good water. Nevertheless, the issue of inconsistent methodological practices and varied definitions for the same topic coupled with the risk of being bias, time consuming and cost- involving makes it difficult to quantify its influence on individuals, institutions and communities. This paper therefore seeks to understand the role of research and mentorship in promoting sustainable quality education in Africa
1. This document discusses a final year project that aims to use GIS to map primary schools in Kebbi State, Nigeria. It outlines challenges in the education system including a lack of infrastructure and analyzes factors like the teacher to pupil ratio.
2. GIS and GPS technologies are introduced as tools to efficiently collect, store, and analyze spatial data on school locations and facilities. This data can help inform planning and management decisions around educational resources.
3. The project seeks to create an interactive school map to identify issues related to school placement and infrastructure, in order to assist decision makers in improving education quality and access.
An empirical investigation of viability of alternative approachesAlexander Decker
Â
This document summarizes a study that investigated the viability of alternative approaches to basic education among nomadic pastoralists in Samburu County, Kenya. The study found that government policies were viewed as lacking by 69.1% of respondents. 91.1% viewed the approaches used as inappropriate and 80% acknowledged nomadic lifestyle affected success. Additionally, 62.7% indicated centers were too far away at over 2.5 km and 73.4% said resource input was inadequate. The study recommended a multi-faceted policy approach addressing problems like water, medical facilities, livelihoods and conflicts to improve enrollment and literacy.
This case study examines the challenges of implementing distance education in Uganda. It outlines five key challenges: poor infrastructure like lack of reliable electricity and poor roads, the high cost of education, an outdated curriculum, inadequate expertise in distance education among lecturers, and poor attitudes towards distance learning. It recommends interventions like collaboration between institutions to build resource centers, government investment in infrastructure, curriculum reform, training lecturers, and sensitizing students and the public about distance education.
CHILD RIGHTS INTERNATIONAL EMPOWERS CIDLDREN IN COCOA- GROWING COMMUNITIESKweku Zurek
Â
Child Rights International (CRI) has launched new initiatives to support and empower children in cocoa-growing communities in Ghana. CRI has provided vocational training and apprenticeships for 25 children across 3 districts, as well as school supplies for 113 more children across 5 districts. CRI has also refurbished 5 nursery schools, is renovating 2 kindergarten schools, and will provide textbooks and supplies to 4,000 junior high school students in 35 districts. Additionally, CRI awarded 31 students scholarships and has partnered with 8 organizations to educate 1,250 communities on eliminating child labor. CRI's goal is to improve children's lives through education and ensuring their rights are protected.
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...Challenge:Future
Â
The Mashujaa Team in Kenya aims to address girls missing school or dropping out due to lack of access to sanitary pads during menstruation. Their vision is for marginalized girls to have access to adequate sanitation for an empowered future. Their project involves distributing sanitary pads, using sports to promote girls' education, and providing mentorship on life and career skills. They will partner with schools and organizations to implement recreational afternoon sessions combining sports and mentorship, distributing pads daily to participating girls.
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...Challenge:Future
Â
The Mashujaa Team in Kenya aims to address girls missing school due to lack of access to sanitary pads. Their vision is for marginalized girls to have access to adequate sanitation for an empowered future. Their plan involves distributing pads and using sports to promote girls' education, demystify menstruation, and provide mentorship. They will partner with schools and organizations to advocate for girls' reproductive rights and hold the government accountable for implementing laws on sanitary pad distribution.
This document presents a study assessing the effectiveness of open source tools to promote sustainable academic libraries in Africa from the Ghanaian perspective. It provides background on open source systems for research and how the Ghanaian government supports their use. The study distributed surveys to 300 faculty members at Akenten Appiah- Menka University of Skill Training and Entrepreneurial Development to understand open source use and satisfaction. Results showed faculty widely use open source and are satisfied with it. The conclusion is that open source effectively promotes sustainable academic libraries in Africa, specifically in Ghana. Further work should consider perceptions of open source in other African academic libraries.
This proposal explores the effects of socioeconomic factors on antenatal care service utilization among expectant mothers in Burao, Somaliland. The study aims to examine how financial state, access to healthcare facilities, knowledge, and attitudes influence utilization of antenatal care services. A cross-sectional survey will collect data from 341 expectant mothers across four maternal and child health centers. The results could help health planners improve antenatal care and reduce maternal mortality.
In todayâs era of digitization, libraries across Africa are gradually shifting from piles of books to becoming digital, making it more effective, efficient, usable, accessible, quality and ensuring user satisfaction. Electronic library is a digital setting that keeps and organizes electronic books and their associated documents. Electronic libraries present a new and better platform for providing 24/7 access to latest and updated library materials, improving research and sharing knowledge. In well- developed economies, virtual library is the main source for preserving information and disseminating knowledge. In Ghana, the government through its agency, Ghana Library Authority has setup a digital library contents where students, including those in the health sector can read, watch and listen to eBook, video and audiobook collections aimed at optimizing responsible use of time for children whilst ensuring quality education. Nevertheless, some traditional librarians are of the view that electronic library has challenges which could limit its services, including intermittent power supply, limited access to internet services, poor and sufficient bandwidth. This paper therefore determines the impact of e- library on the performance of health students in institutions of higher education in Africa.
Masibo Chelongo Minos has over 15 years of experience in social work, research, and community development in Kenya. He holds a diploma in social work and community development and is currently pursuing a degree in development studies. His professional experience includes roles managing field operations, data collection, behavior change communication, and project assistance for organizations such as Innovation for Poverty Action and International Child Support. He has strong skills in community mobilization, training, and monitoring and evaluation.
A secure web based universal basic educational administrativeAlexander Decker
Â
1) The document discusses the design and implementation of a secure web-based universal basic educational administrative management system for Nigeria to deal with problems of managing student, teacher, and curriculum data.
2) Currently most schools use database systems but only administrators have access, wasting resources. The proposed system uses a three-tier architecture with web access for all users.
3) The goal is to improve education capacity, reliability, and quality in Nigeria by providing a centralized system for the Universal Basic Education Commission to efficiently manage all primary and junior secondary school data.
A secure web based universal basic educational administrativeAlexander Decker
Â
1) The document discusses the design and implementation of a secure web-based universal basic educational administrative management system for Nigeria to deal with problems of managing student, teacher, and curriculum data.
2) Currently most schools use database systems but only administrators have access, wasting resources. The proposed system uses a three-tier architecture with web access for all users.
3) The goal is to improve education capacity, reliability, and quality in Nigeria by providing a centralized system for the Universal Basic Education Commission to efficiently manage all primary and junior secondary school data.
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
This document discusses clickjacking attacks, which hijack users' clicks to perform unintended actions. It provides an overview of clickjacking, describes different types of attacks, and analyzes vulnerabilities that make websites susceptible. Experiments are conducted on a sample social networking site, applying various clickjacking techniques. Potential defenses are tested, including X-Frame-Options headers and frame busting code. A proposed solution detects transparent iframes to warn users and check for hidden mouse pointers to mitigate cursorjacking. Analysis of top Jammu and Kashmir websites found most were vulnerable, while browser behavior studies showed varying support for defenses.
More Related Content
Similar to A Proposed GSM Biometric Attendance Management System for Ghana Education
The document summarizes the Ghana Education Programme 2015 run by Connect4Change, a consortium of Dutch development organizations. The program aims to improve quality of teaching, learning, and school management in Ghanaian primary and secondary schools by integrating information and communication technology (ICT). It discusses several projects that work with schools and teachers to enhance ICT skills, pedagogy, and school administration. Key activities include teacher training, ICT skills development for administrators, and establishing the C4C Education Ghana Alliance. Results showed improved exam scores, increased number of students, teachers, and schools reached across the various projects.
In a fast- paced digitized world, equal access to quality education can be achieved through Safe and Inclusive Learning Environment (SILE) that values diversity and uniqueness of each student in the classroom. Despite their background, students in a safe and inclusive environment always feel respected, happy and valued. A safe and inclusive learning environment provides a positive educational space that considers colour scheme, lighting, heating, cooling and ventilation, furniture and equipment in its construction. It enhances studentsâ critical thinking, creativity, problem- solving techniques and improves their comfort, well- being and possibly, attitude. In Ghana, the Ministry of Education has set out an inclusive education policy that allows all children to learn regardless of differences in age, gender, ethnicity, language and disability and design educational structures that addresses the needs of all these children. Nevertheless, some researchers are of the view that these literature surveys consider the surroundings of the school system without its effects on teaching and learning. This paper therefore aims to optimize safe and inclusive learning environment in promoting sustainable quality education in Africa.
A Study on Mlearning Implementation in AfricaWandeOwolabi
Â
Mlearning refers to education or training done using portable devices like smartphones, tablets, and laptops. It can increase access to education and reduce inequality. The document discusses benefits of mlearning like being accessible anywhere and anytime, personalized learning experiences, and cost efficiencies. It also outlines challenges in African education from UNESCO reports, such as many children not attending school, especially girls. UNESCO guidelines advise creating mlearning policies and tools. Examples of mlearning tools deployed in Africa are discussed, including Eneza Education, Ubongo, and Sterio.me. Governments are urged to set enabling environments and policies to support mlearning.
A Study on Mlearning Implementation in Africaomololasalami
Â
This is a project titled, UNESCO Mlearning Implementation in Africa, which addresses the stakeholders on policy formulation in Africa and the need to provide an enabling environment and encourage supportive policies that would enhance literacy, increase access to learning materials and reduce the number of children that are out of school.
Education is the yardstick for every countryâs political and socio-economic development; which acts as a basis of reducing poverty and inequality by enabling the use of new technologies, creating and spreading knowledge. Despite the large inflows of donor financing and the Government of Uganda through the Ministry of Education and Sports; the sector for the last 29 years is still grappling to balance the increasing access with quality education in secondary schools. Therefore, the main objective of this article is to explore the new strategies the Ministry of Education and Sports can employ to increase access while improving the quality education in the country. The article is based on literature review and the authorâs experience in education. The article examines the advantages of open schooling and reveals that the programme provides the fast-track options for retaining students; bringing dropouts and over-aged learners to school; reducing administrative costs and enabling young people to be effective in life. Furthermore, the researcher discusses the likely challenges of the programme and gives practical working solutions aimed at overcoming the challenges of implementing the programme in Uganda.
Key words: Open Schooling, Access to Education, Quality Education, Dropouts
Over 60% of girls in the Rukungiri District of Uganda miss at least one day of school per month due to lack of access to feminine hygiene products and sanitary facilities. As the new Global Advocacy Adviser for Girls Empowered International, you have been tasked with developing a 5-year, $2 million proposal to address this issue. Your proposal must include objectives, strategies, budgets, timelines, and plans for sustainability, education, product distribution, and addressing cultural stigma. It should leverage local partnerships and resources to create an intervention that is effective, culturally appropriate, and feasible for improving menstrual health and education in the Rukungiri District.
The impact of evidence- based research and mentorship as effective response to future epidemics and disruptions in any sector of the worldâs economy, including educational sector have been remarkable. Research and Mentorship seek to identify knowledge gaps in education and motivate individuals to effectively handle those deficiencies. In the last triennial, research and mentorship have grown in importance as it seeks to build students and institutionâs confidence, improves communication, critical thinking and problem- solving skills and helps us to better understand the evolving educational needs. In Ghana, the Ministry of Education through evidence- based research strategies is enhancing continuity of safe and inclusive schools by building new STEAM schools and providing good water. Nevertheless, the issue of inconsistent methodological practices and varied definitions for the same topic coupled with the risk of being bias, time consuming and cost- involving makes it difficult to quantify its influence on individuals, institutions and communities. This paper therefore seeks to understand the role of research and mentorship in promoting sustainable quality education in Africa
1. This document discusses a final year project that aims to use GIS to map primary schools in Kebbi State, Nigeria. It outlines challenges in the education system including a lack of infrastructure and analyzes factors like the teacher to pupil ratio.
2. GIS and GPS technologies are introduced as tools to efficiently collect, store, and analyze spatial data on school locations and facilities. This data can help inform planning and management decisions around educational resources.
3. The project seeks to create an interactive school map to identify issues related to school placement and infrastructure, in order to assist decision makers in improving education quality and access.
An empirical investigation of viability of alternative approachesAlexander Decker
Â
This document summarizes a study that investigated the viability of alternative approaches to basic education among nomadic pastoralists in Samburu County, Kenya. The study found that government policies were viewed as lacking by 69.1% of respondents. 91.1% viewed the approaches used as inappropriate and 80% acknowledged nomadic lifestyle affected success. Additionally, 62.7% indicated centers were too far away at over 2.5 km and 73.4% said resource input was inadequate. The study recommended a multi-faceted policy approach addressing problems like water, medical facilities, livelihoods and conflicts to improve enrollment and literacy.
This case study examines the challenges of implementing distance education in Uganda. It outlines five key challenges: poor infrastructure like lack of reliable electricity and poor roads, the high cost of education, an outdated curriculum, inadequate expertise in distance education among lecturers, and poor attitudes towards distance learning. It recommends interventions like collaboration between institutions to build resource centers, government investment in infrastructure, curriculum reform, training lecturers, and sensitizing students and the public about distance education.
CHILD RIGHTS INTERNATIONAL EMPOWERS CIDLDREN IN COCOA- GROWING COMMUNITIESKweku Zurek
Â
Child Rights International (CRI) has launched new initiatives to support and empower children in cocoa-growing communities in Ghana. CRI has provided vocational training and apprenticeships for 25 children across 3 districts, as well as school supplies for 113 more children across 5 districts. CRI has also refurbished 5 nursery schools, is renovating 2 kindergarten schools, and will provide textbooks and supplies to 4,000 junior high school students in 35 districts. Additionally, CRI awarded 31 students scholarships and has partnered with 8 organizations to educate 1,250 communities on eliminating child labor. CRI's goal is to improve children's lives through education and ensuring their rights are protected.
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...Challenge:Future
Â
The Mashujaa Team in Kenya aims to address girls missing school or dropping out due to lack of access to sanitary pads during menstruation. Their vision is for marginalized girls to have access to adequate sanitation for an empowered future. Their project involves distributing sanitary pads, using sports to promote girls' education, and providing mentorship on life and career skills. They will partner with schools and organizations to implement recreational afternoon sessions combining sports and mentorship, distributing pads daily to participating girls.
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...Challenge:Future
Â
The Mashujaa Team in Kenya aims to address girls missing school due to lack of access to sanitary pads. Their vision is for marginalized girls to have access to adequate sanitation for an empowered future. Their plan involves distributing pads and using sports to promote girls' education, demystify menstruation, and provide mentorship. They will partner with schools and organizations to advocate for girls' reproductive rights and hold the government accountable for implementing laws on sanitary pad distribution.
This document presents a study assessing the effectiveness of open source tools to promote sustainable academic libraries in Africa from the Ghanaian perspective. It provides background on open source systems for research and how the Ghanaian government supports their use. The study distributed surveys to 300 faculty members at Akenten Appiah- Menka University of Skill Training and Entrepreneurial Development to understand open source use and satisfaction. Results showed faculty widely use open source and are satisfied with it. The conclusion is that open source effectively promotes sustainable academic libraries in Africa, specifically in Ghana. Further work should consider perceptions of open source in other African academic libraries.
This proposal explores the effects of socioeconomic factors on antenatal care service utilization among expectant mothers in Burao, Somaliland. The study aims to examine how financial state, access to healthcare facilities, knowledge, and attitudes influence utilization of antenatal care services. A cross-sectional survey will collect data from 341 expectant mothers across four maternal and child health centers. The results could help health planners improve antenatal care and reduce maternal mortality.
In todayâs era of digitization, libraries across Africa are gradually shifting from piles of books to becoming digital, making it more effective, efficient, usable, accessible, quality and ensuring user satisfaction. Electronic library is a digital setting that keeps and organizes electronic books and their associated documents. Electronic libraries present a new and better platform for providing 24/7 access to latest and updated library materials, improving research and sharing knowledge. In well- developed economies, virtual library is the main source for preserving information and disseminating knowledge. In Ghana, the government through its agency, Ghana Library Authority has setup a digital library contents where students, including those in the health sector can read, watch and listen to eBook, video and audiobook collections aimed at optimizing responsible use of time for children whilst ensuring quality education. Nevertheless, some traditional librarians are of the view that electronic library has challenges which could limit its services, including intermittent power supply, limited access to internet services, poor and sufficient bandwidth. This paper therefore determines the impact of e- library on the performance of health students in institutions of higher education in Africa.
Masibo Chelongo Minos has over 15 years of experience in social work, research, and community development in Kenya. He holds a diploma in social work and community development and is currently pursuing a degree in development studies. His professional experience includes roles managing field operations, data collection, behavior change communication, and project assistance for organizations such as Innovation for Poverty Action and International Child Support. He has strong skills in community mobilization, training, and monitoring and evaluation.
A secure web based universal basic educational administrativeAlexander Decker
Â
1) The document discusses the design and implementation of a secure web-based universal basic educational administrative management system for Nigeria to deal with problems of managing student, teacher, and curriculum data.
2) Currently most schools use database systems but only administrators have access, wasting resources. The proposed system uses a three-tier architecture with web access for all users.
3) The goal is to improve education capacity, reliability, and quality in Nigeria by providing a centralized system for the Universal Basic Education Commission to efficiently manage all primary and junior secondary school data.
A secure web based universal basic educational administrativeAlexander Decker
Â
1) The document discusses the design and implementation of a secure web-based universal basic educational administrative management system for Nigeria to deal with problems of managing student, teacher, and curriculum data.
2) Currently most schools use database systems but only administrators have access, wasting resources. The proposed system uses a three-tier architecture with web access for all users.
3) The goal is to improve education capacity, reliability, and quality in Nigeria by providing a centralized system for the Universal Basic Education Commission to efficiently manage all primary and junior secondary school data.
Similar to A Proposed GSM Biometric Attendance Management System for Ghana Education (20)
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
This document discusses clickjacking attacks, which hijack users' clicks to perform unintended actions. It provides an overview of clickjacking, describes different types of attacks, and analyzes vulnerabilities that make websites susceptible. Experiments are conducted on a sample social networking site, applying various clickjacking techniques. Potential defenses are tested, including X-Frame-Options headers and frame busting code. A proposed solution detects transparent iframes to warn users and check for hidden mouse pointers to mitigate cursorjacking. Analysis of top Jammu and Kashmir websites found most were vulnerable, while browser behavior studies showed varying support for defenses.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
Â
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled âHome Appâ which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
Â
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
childrenâs who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Â
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Â
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPAâs KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
Â
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Â
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expertâs opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
Â
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
Â
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networksâ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
Â
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
Â
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
Â
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Â
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
Â
In todayâs world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Â
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
Â
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Â
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as âkeysâ). In fact, itâs unlikely youâll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, theyâll also be making use of the Split-Merge Block functionality.
Youâll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Â
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Â
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Â
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
Â
An English đŹđ§ translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech đšđż version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
Â
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power gridâs behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
What is an RPA CoE? Session 1 â CoE VisionDianaGray10
Â
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
âą The role of a steering committee
âą How do the organizationâs priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
Â
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
Â
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
Â
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Â
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Â
A Proposed GSM Biometric Attendance Management System for Ghana Education
1. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290
3421
A Proposed GSM Biometric Attendance
Management System for Ghana Education
Charles Antoh-Baffoe
School of Technology, GIMPA
Email : Charles.antoh-baffoe@gimpa.edu.gh
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
The purpose of this research is to implement interactive and reliable attendance management using GSM/GPRS
signal to transfer and retrieve data from remote locations in Ghana tested with alert and management
functionality on real time. It also discussed the technological approach in automating subject and attendance
administration in the schools and also ascertained the business success with attendance management systems for
Ghana education service. Rapid application development (RAD) software development methodology was
deployed to build the Biometric Attendance System (BAS). The BAS was designed and implemented. The system
provides users with an efficient way of generating reports and retrieving of attendance information of a teacher in
specific districts. It supports unified access and management through a simple standard web browser interface. It
is recommended that evaluation of the system be carried out in future works to ascertain the success of the system.
Keywords - Biometric System, GSM, Education, Cellular System.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Oct 10, 2017 Date of Acceptance: Nov 04, 2017
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Organizations have become concerned with the issue of
absenteeism in their various organizations. Employers
across the UK have become significantly more concerned
over the levels of sickness absence in their workforce
(Bevan, 2003) as Ghana ranks first in teacher absenteeism
in West Africa; reports from the World Bank and
the United Nations International Childrenâs
Emergency Fund (UNICEF) have revealed
(http://www.dailyguideghana.com). The latter case was
mentioned by Mr Alex Kyeremeh, a Deputy Minister of
Education, who made this known at a stakeholdersâ forum
on education at Dormaa- Ahenkro, in the Brong Ahafo
Region of Ghana (www.dailyguideghana.com, 2014). The
Northern Network for Education Development (NNED)
conducted a research to find the extent of absenteeism in
public schools by surveying â30 schools sampled out of
the lot in two of the three northern regions and found out
that there was an average of 30 percent absenteeism.
Among this percentage, 48 percent were caused by
unpreventable factors such as pregnancy, malaria or lack
of accommodationâ (www.nnedghana.org). That means
there is a large proportion unexplained. The Government
has taken some measures to address this issue and has
succeeded to some extent. âWe carried out surprise visits
at 11,594 schools at the basic levels and are happy to
announce that teacher absenteeism in Ghana has declined
from 27 percent to 11â (www.thebftonline.com, 2014).
The Government has even further gone on to establish a
committee to design modalities with the aim of achieving
Zero Absenteeism in Ghana.
âThe Ghana Education Service (GES) was established as
part of the Ministry of Education of Ghana under the Civil
Service Law 327 and under the PNDC Law 1993 with the
mandate to provide relevant education to all Ghanaians. It
is responsible for instituting the national education
curriculum, appointing and managing the work and issues
of teachers and other educational workers. The Ghana
Education Service (GES) is mandated among others to
maintain high standards of education at the first and
second cycle levels. To ensure the achievement of its
mandate, GES employed its own workers who are
categorized into teaching and non-teaching staffâ
(www.moe.gov.gh). The Director of GES, Mr Enoch
Cobbinah accompanied the Minister of Education, Prof.
Naana Jane Opoku-Agyemang to pay unannounced visits
to the Dangbe West District of the Greater Accra Region
and found many teachers and heads absent from their
posts. It decided to sanction them as a measure to curb the
act or its future occurrence (www. graphic.com.gh, 2014).
In 2003, the Nkoranza District Directorate of the Ghana
Education Service (GES) has established some measures
to check absenteeism and malingering among students and
teachers by residing district circuit supervisors close to the
schools to establish more frequent checks on teachers and
students alike. They also provided some bicycles to the
teachers who lived far from the schools to enable commute
quicker to the schools (www.modernghana.com, 2003). In
2014, Vice President of Ghana Mr. Kwesi Bekoe
Amissah-Arthur voiced his displeasure among others at
the issue absenteeism by teachers in public schools at the
World Teachers Day Celebration in Cape Coast. He
condemned the behavior as inexcusable and unacceptable
(www.regional.citifmonline.com). The issue has been
bothering all stakeholders within the country and can be
has attracted views from governmental as well as non-
governmental agencies/organizations. In government,
views have been expressed from even the top hierarchy
and this problem remains a grass-root problem. It is the
teachers and other educational workers who have been
indulging in these acts. It can be inferred even at this point
that the current mechanisms and proposed or attempted
solutions have not yielded the desired results and impact.
2. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290
3422
II. LITERATURE REVIEW
Organizations have become concerned with the issue of
absenteeism in their various organizations. Employers
across the UK have become significantly more concerned
over the levels of sickness absence in their workforce
(Bevan, 2003) as Ghana ranks first in teacher absenteeism
in West Africa; reports from the World Bank and
the United Nations International Childrenâs
Emergency Fund (UNICEF) have revealed
(http://www.dailyguideghana.com). The latter case was
mentioned by Mr Alex Kyeremeh, a Deputy Minister of
Education, who made this known at a stakeholdersâ forum
on education at Dormaa- Ahenkro, in the Brong Ahafo
Region of Ghana (www.dailyguideghana.com, 2014). The
Northern Network for Education Development (NNED)
conducted a research to find the extent of absenteeism in
public schools by surveying â30 schools sampled out of
the lot in two of the three northern regions and found out
that there was an average of 30 percent absenteeism.
Among this percentage, 48 percent were caused by
unpreventable factors such as pregnancy, malaria or lack
of accommodationâ (www.nnedghana.org). That means
there is a large proportion unexplained. The Government
has taken some measures to address this issue and has
succeeded to some extent. âWe carried out surprise visits
at 11,594 schools at the basic levels and are happy to
announce that teacher absenteeism in Ghana has declined
from 27 percent to 11â (www.thebftonline.com, 2014).
The Government has even further gone on to establish a
committee to design modalities with the aim of achieving
Zero Absenteeism in Ghana.
âThe Ghana Education Service (GES) was established as
part of the Ministry of Education of Ghana under the Civil
Service Law 327 and under the PNDC Law 1993 with the
mandate to provide relevant education to all Ghanaians. It
is responsible for instituting the national education
curriculum, appointing and managing the work and issues
of teachers and other educational workers. The Ghana
Education Service (GES) is mandated among others to
maintain high standards of education at the first and
second cycle levels. To ensure the achievement of its
mandate, GES employed its own workers who are
categorized into teaching and non-teaching staffâ
(www.moe.gov.gh). The Director of GES, Mr Enoch
Cobbinah accompanied the Minister of Education, Prof.
Naana Jane Opoku-Agyemang to pay unannounced visits
to the Dangbe West District of the Greater Accra Region
and found many teachers and heads absent from their
posts. It decided to sanction them as a measure to curb the
act or its future occurrence (www. graphic.com.gh, 2014).
In 2003, the Nkoranza District Directorate of the Ghana
Education Service (GES) has established some measures
to check absenteeism and malingering among students and
teachers by residing district circuit supervisors close to the
schools to establish more frequent checks on teachers and
students alike. They also provided some bicycles to the
teachers who lived far from the schools to enable commute
quicker to the schools (www.modernghana.com, 2003). In
2014, Vice President of Ghana Mr. Kwesi Bekoe
Amissah-Arthur voiced his displeasure among others at
the issue absenteeism by teachers in public schools at the
World Teachers Day Celebration in Cape Coast. He
condemned the behavior as inexcusable and unacceptable
(www.regional.citifmonline.com). The issue has been
bothering all stakeholders within the country and can be
has attracted views from governmental as well as non-
governmental agencies/organizations. In government,
views have been expressed from even the top hierarchy
and this problem remains a grass-root problem. It is the
teachers and other educational workers who have been
indulging in these acts. It can be inferred even at this point
that the current mechanisms and proposed or attempted
solutions have not yielded the desired results and impact.
III. METHODOLOGY
The biometric attendance was designed and developed
with the Rapid Application Development (RAD) model.
The RAD model would enable us to create this solution
without the need to carry out prolonged planning activities
since the specifications are well known.
3.1 Business Modeling Phase
Business Modeling Phase seeks to understand the
workflow as required under the project. It involves the
studying of the attendance system as it currently exists
with GES to understand how their mechanism operates by
observing the workflows and interviewing of the relevant
entities. It also includes the analysis of factors that are
necessary for the smooth flow of information.
3.2 Data Modeling Phase
The second phase to analyze the information gathered in
the business modeling phase from a data point of view.
Each flow is analyzed carefully with the objective of
finding out what data is required, how it is used and how
and where it flows to. The attributes that define the data
objects are clearly defined as well as the establishment of
relationships between the various data objects.
3.3 Process Modeling Phase
The data objects model created in the Data Modeling
phase are extended to show the processes that each object
is processed on. These may include adding, retrieving,
modifying or even deletion of data or parts of its attributes
(www.tutorialspoint.com).
3.4 Application Generation Phase
The fourth phase of the RAD system development model
involves the conversion of the process model and data
model into a solution. These include the coding of the
software using established automation tools to create the
application and database. It also involves the integration
and configuration of the biometric devices. This prototype
is then taken through the final step that involves testing
and turnover
3.5 Testing and Turnover Phase
Testing and Turnover Phase requires that a systematic and
thorough search is done to. It is worth noting that, even
though the previous phase where programming was done
would have come along with some sort of unit testing, it is
3. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290
3423
still important to carry out this form of comprehensive
testing.
Figure 1: Rapid Application Development Model
The RAD allows changing requirements to be considered.
Iteration is quicker as there is drastic reduction in
development time. It encourages the flow of feedback
from the customer/client. Also, it accommodates
integration of component and modules from the very
beginning to solve the issues of unpredictability that might
occur as a result of integration. RAD however requires
highly skilled developers/designers. Its dependency on
model is immense and it implies that careful care and
expertise be taken to prepare this. Its lifecycle is such that
it would require involvement as it scaled or evolves with
time (www.tutorialspoint.com).
Start
Final DFDs
Drafted DFDs
Sequence
Diagrams
Drafted Class
Diagrams
Final Use Cases
Initial Use Case
Models and
Scenarios
Context Diagrams
Observations
Reports
Interview Reports
Final Software
Prototype
Database
Entity Relationship
Diagrams
Attendance Management
System
Biometric device
Application
Interface
Connected device
Carry out interviews
Final Class
Diagrams
Review Drafted Class Diagrams
Draft Class Diagrams
Review Initial Use Cases
Draft Use Cases
Draft Use Cases
Review DFDs
Create Context Diag.
Draft DFDs
Create Sequence Diag.
Create Databases
Create ER
Diag
Create ER Diag.
Create ER Diag.
Test software
Connect Database
to Application
Write Codes
Design Forms
Design Forms
Integrate with
SMS systems
Configure GSM
Integrate with Application
Observe Systems
Timetable
Load with basedata
Installbiometric device
Figure 2: Product Flow Diagram
Fig. 2 offers a different approach to the planning of the
project into distinguishable components that would allow
easy identification and tracking. This approach is based on
the model (RAD) chosen its management approach as
well. It enables level categorization of products under each
level with the aim of identifying the products that are to be
delivered under each phase and stage. The items that are
not broken down at any point in time are the low-level
items of interest.
BiometricAttendance
ManagementSystem
Specialistproducts
Management
products
BusinessModel DataModel ProcessModel Application Testing
Observationand
interviewreports
Classdiagrams
UsecasemodelSequenceDiagrams
ContextDiagram
System
requirements
specifications
E-Rdiagrams
Database Webapplication Integratedsystems
ConfiguredSMS Biometricdevice
PrototypeUserManuals
Figure 3: Product Breakdown Structure
IV. THE PROPOSED SYSTEM
The new systems proposed to introduce an automated
teacher attendance management system that would serve
as a real-time mechanism to deal with the issue of
absenteeism. It affords some good opportunities that
would add value to the attendance management process.
Figure 4: Architecture of the Proposed System
Fig. 4 presents a general overview of how the system is to
work. Several biometric devices sited at various schools
would be used by the teachers for recording their
attendance to school at the stipulated time. These
biometric devices would send attendance data in real time
to the central server. The GES staff who reside in the
district offices and the headquarters and are interested in
these data as part of their work would have access to the
stored data in different forms for use in other functions.
The data generated would reach the server via a modem
4. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290
3424
that is attached to it. This modem would also have a SIM
card in it to facilitate easy communication using the GSM
network for which both SIMs are compatible. In an
expanded view, all the sites that have the biometric
devices would all use GSM as to communicate with the
central server.
4.1.1 Key Features of the System and System
Components
ï· The biometric devices that have been chosen
possess SIM card slots that ensures that they are
compatible with mobile network technologies
such as GSM, GPRS, and EDGE etc. This
capability means that there would not be a need
to acquire two or more separate devices for
enabling connection.
ï· The GSM network chosen offers relatively lower
cost as compared to other. This is readily
available as there are network providers who
offer such services. There would be no need to
create a dedicated network as the cost and time
for this would be very large considering the wide
geographical bounds.
ï· The centralization of database would ensure that
there would be no need to install databases or
storage media at the various sites to store or
retrieve data. When a user is to be authenticated,
the GSM network would enable connection to the
server and this also happens when attendance is
being clocked.
ï· In the current system it takes time for data to be
prepared and even longer to reach to transform or
reach its intended target. This new system would
ensure that the data generated would be in real
time.
ï· The application that is to be used by the circuit
supervisors and other administrative workers,
who use the attendance management system,
would be designed using web technologies. This
means the users would require only a connection
and basic web browser on their client machines to
gain access.
ï· Reports required by the various administrative
workers would be pre-configured and would be
available for use âat the click of a buttonâ. This
means all reports formats would be considered by
during designing and development.
ï· Unlike the current system that is mostly paper-
based and unidirectional, this new system would
incorporate a feedback mechanism to give
feedback to the teachers at certain times.
ï· The system would incorporate an access-rights
mechanism for checking abuse or unauthorized
use of the system.
4.1.2 Functional requirements of the new system
The analyses of the current and new system based on the
proposed architecture have helped in the identification of
the following functional requirements:
ï· The system should allow the administrator to add
and manage teacher details. They should also be
able to add and manage courses and the times
they are supposed to be taught by the respective
teachers. This would create a prepopulated list for
use within the system.
ï· The biometric device should enable one-time
registration of teachers. This should be done with
the database enabled. This would be done against
the prepopulated data of teachers within the
system.
ï· The biometric device should be used by the
teacher to clock attendance and have data
generated and sent to the server in real time.
ï· The biometric device should verify the individual
who is attempting to clock in by checking for the
essential elements within the centralized
database. The response should be matched by the
matcher and indicate successful/unsuccessful
authentication to the user. A successful
authentication would automatically indicate
attendance clocked within the system database.
ï· The database should maintain proper data on
teachers from various schools within various
districts within the country such that it can
support easy searching and transformation.
ï· The accompanying application should be such
that every user would require a set of security
login credentials to gain access.
ï· The application should be preconfigured with
formatted reports that would be generated upon
minimal user interaction.
ï· The feedback mechanism should send
information to teachers when prompted as well
send predefined feedback at specific periods.
4.1.3 Non-Functional Requirements of the New System
In trying to assess what non-functional requirements this
system holds we consider some work done by Kotonya
and Sommerville (1998) who provide a three-item
categorization of information systems. These are product
requirements, organizational requirements and external
requirements. They further go on to breakdown these three
items into several sub items that even though granular are
still generic and can be adapted for use in different
information systems projects. For the purposes of this
project, we only consider those that are essential and
relevant.
ï· Usability: The system should be streamlined in
such a way as to rid of unwanted steps. This
would ensure that very simple flows exist. The
system should be user-friendly, self-intuitive and
easy to remember.
ï· Reliability: The system should produce output as
expected and in a timely manner at an
appreciable amount of time. It should not be
compromised or open to manipulation by users.
ï· Availability: The system should always be
available to the user at any time and from
anywhere.
5. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290
3425
ï· Standards: The system should perform at
acceptable levels of standard to be compared to
any similar software and make it easy for
evaluation of performance.
ï· Safety: The biometric devices used for
attendance clocking should be safe to use. They
should be mounted at safe locations in the
schools and contain components that would not
cause any damage to any user or individual near
it. The GSM communication should not interfere
with any other communication setup.
ï· Privacy: Data gathered and stored must be
properly secured with appropriate access control
policies in place to prevent unauthorized access
or use. The communication medium should not
give way to any interception of data at any point
in time.
User
-StaffID
-Last Name
-First Name
-Telephone
-Role
+Login()
Admin
+RegisterUser()
+Enroll courses()
+SetTimetable()
+View Reports()
Headmaster
+View Reports()
+Check Attendance
CircuitSupervisor
+Check Attendance()
+Send SMS()
+View Reports()
Teacher
-biometricdata
+Capturebiodata()
+Clock Attendance()
Courses
-CourseID
-Course Name
-Course date
-Course Time
+Add course ()
+Assign Timetable()
Timetable
-ID
-Details
+Create Timetable()
+View Timetable()
Report
-Reportname
+Generate report()
+Printreport()
Biometric data
-StaffID
-Biometricimage
+Registerdetails()
+Verify details()
SMS
-SMStitle
-SMS message
-Date
-Time
-Sender
-Recipient
+Prepare SMS()
+Send SMS()
Attendance
-ID
-Date
-Time
+Record Attendance()
1
*
1..*
1
*
1..*
1
*
1
1..*
1
1..*
1
1..*
1
1..*
1 1..*
1
1
1
1
1 *
Figure 5: Class Diagram
The class diagram shown in Fig. 5 views various users and
artefacts as objects that possess set of attributes as well as
operations that they perform or can be performed on them.
The class diagram also shows the relationships between
the various the various objects. The users who would use
the web application all have similar attributes and thus
have been generalized but their operations differ. The
teacher as a user has additional attribute that make it differ
from other users because of the biometric data that is
captured in addition to the other attribute. The lower level
of the diagram contains various objects of interest as seen
within the application. These together with the user classes
can be used as the building blocks for database tables as it
relationships. Also, the operations contained within the
classes coupled with the relationships shown can assist in
the coding phase of the application development as well as
the integration.
Various Unified Modeling Language (UML) approaches
have given us the opportunity to prepare designs as
required by the business, data and data modelling phases
of the system. These designs have all led to the
development of a good application database as well as a
good functioning application interface that is also
functional. The technicalities that one would have
considered to be sophisticated were made very clear using
the widely accepted specification documents. The
systematic manner of the documents went a long way to
aid in the development and integration of the system.
V. CONCLUSION AND FURTHER RESEARCH
The objective of the GSM-based biometric attendance
system was to create a highly reliable platform for both
teachers and educational administrators in their attempt to
track, monitor and record teacher attendance respectively.
At the end the project has achieved the following
objectives initially discussed and outline below:
ï· Gathering of information and analyses of the current
system to better understand its mechanisms and
associated pros and cons.
ï· Designing and developing a robust and centralized
database that stores data regarding subject been taught
as well as profiles of teachers.
ï· Designing and developing a web application interface
integrated with the database to allow supervisors have
access to stored data created by teachersâ attendances,
confirm attendances, print reports, send feedback to
teachers etc.
Gathering information from the various stakeholders took
a little longer than estimated. The channels that were in
place at the GES required that some high level of approval
had to be given before the relevant people could offer
assistance. Information gathered was always pointing to
manual systems and forms of attendance management.
Some artefacts were shown to give further clarity on the
various explanations and insights given. The next
objective was to design and develop a robust and
centralized solution. This objective was broken down into
two parts but from a developmental point-of-view this
discussion has been merged into one. The system
development model chosen was the Rapid Application
Development (RAD) model. The model requires that very
refined designs be made produced to speed up the actual
development. The design of the system came up from the
second (Data Modelling) and third (Process Modelling)
phases of the RAD model. The designs involved the use of
standard UML approaches to ensure that consistency is
achieved. Diagrams such as the class diagram eased the
consideration that went into the creation of the database
while the use of use cases and sequence diagrams depicted
the flow of the application design.
5.1 Challenges
The system was not tested at other remote locations where
GSM/GPRS has weak signal strength. It was tested at
Akuapim south district where GSM/GPRS has strong
signal strength. This limitation is due to lack of funds to
travel to other areas within the country. The system can be
viewed via a mobile browser, it is not responsive to
varying screen sizes. The system is best viewed on 800 by
600 screen resolution. It is not adaptable to other screen
resolutions. It was also difficult to get willing GES-
6. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290
3426
enrolled teachers and other staff whose data could be used
for use in this project.
5.2 Recommendations for Further Work
The research has shown to hold very good prospect for the
management of attendance of teachers employed by the
GES. It uses could be adapted for other public as well as
private institution as well. The availability of the system is
very dependent on the strength and speed of the GSM
network technology adopted. That infers that its use can be
limited in this regard. As a recommendation, other forms
of network connectivity that spans wide geographical
areas should be researched into.
The third point is to have a system that offers an adaptive
or alternative form of biometric attendance clocking.
There could be instances where someone may have injured
the required finger or for some unfortunate reason may
have lost it. This should not mean the person cannot clock
attendance. Other forms of biometry should be explored to
ensure that electronic attendance clocking is always
available. The systems justification would be further
enhanced if its use is not limited only to its primary
objective of effectively managing attendance. It can be
integrated with other systems such as payroll systems,
appraisal systems, Learning Management Systems (LMS)
or even Enterprise Resource Planning systems to provide
data or enable functional use.
REFERENCES
1. Bevan, S., 2003, Absence Management, The
Work Foundation, retrieved from
http://www.theworkfoundation.com
2. Chapman W. David (1994). Reducing teacher
absenteeism and attrition: causes, consequences
and responses. Paris, France: International
Institute for Educational Planning, UNESCO.
3. Chaudhury Nazmul, Hammer Jeffrey, Kremer
Michael, Muralidharan Karthik, and Rogers F.
Halsey. (2005) Missing in Action: Teacher and
Health Worker Absence in Developing Countries
Revised JEP version.
4. Citi FM Online. (2014). VEEP clashes with
teachers over absenteeism. Retrieved from
http://www.regional.citifmonline.com
5. Clotfelter CT, Ladd HF, Vigdor JL (2009) Are
teacher absences worth worrying about in the
U.S.? CALDER Working Paper No. 24.
Retrieved from www.caldercenter.org
6. Daily Guide. (2014).Ghana Tops Teacher
Absenteeism in West Africa. Retrieved from
http://www.dailyguideghana.com
7. Das, Jishnu, Stefan Dercon, James Habyarimana,
and Pramila Krishnan. 2007. ÊșTeacher Shocks
and Student Learning: Evidence from Zambia.Êș
Journal of Human Resources, 42 4, pp. 820â 62.
8. Davenport, T.H., and Short, J.E. (1990) âThe
New Industrial Engineering: Information
Technology and Business Process Redesignâ In A
study of the impact of information technology on
business processes using discrete even
simulation: a reprise. Department of Information
Systems and Computing, Brunel University,
Middlesex, United Kingdom.
9. Gaur Shweta, Shah V.A. and Thakker Manish.
(2012). Biometric Recognition Techniques: A
Review. International Journal of Advanced
Research in Electrical, Electronics and
Instrumentation Engineering Vol. 1, Issue 4,
ISSN 2278 â 8875.
10. Graphic Online. (2014). Minister commissions
committee to tackle teacher absenteeism
Retrieved from http://www. graphic.com.gh
11. Hammer, M., and Champy, J. (1993).
âReengineering the Corporationâ In A study of
the impact of information technology on business
processes using discrete even simulation: a
reprise. Department of Information Systems and
Computing, Brunel University, Middlesex,
United Kingdom.
12. International Journal of Science and Research
(IJSR). ISSN (Online): 2319-7064 Volume 2
Issue 10.
13. Jain A. K., Bolle R., and Pankanti S., Biometrics:
Personal Identification in Networked Society.
14. Josphineleela R. and Ramakrishnan M. (2012).
An Efficient Automatic Attendance System Using
Fingerprint Reconstruction Technique (IJCSIS).
International Journal of Computer Science and
Information Security, Vol. 10, No. 3.
15. Konsbruck Robert Lee. (2014). Impacts of
Information Technology on Society in the new
Century CH-1007 Lausanne-Vidy, Switzerland.
P3.
16. Kotonya G. and Sommerville I., (1998).
Processes and Techniques, Requirements
Engineering â Wiley.
17. Kroeker, B. (2000). Changing Roles in
Information Dissemination and Education in G.
D. Garson Social Dimensions of Information
Technology: Issues for the New Millennium.
(pp.141 â 159) Hershey, PA: IDEA Group.
18. Malone, T.W., Crowston, K. (1994). âThe
Interdisciplinary Study of Coordinationâ In The
Impact of Information and Communication
Technology on Interorganizational Coordination:
Guidelines from Theory by Mariëlle den Hengst
and Henk G. Sol. (2001). Delft University of
Technology, the Netherlands.
19. Maltoni Davide. (2003). Biometrics:
Authentication and recognition, DEIS, University
of Bologna, Italy.
20. Ministry of Education. About MOE. Retrieved
from http://www.moe.gov.gh
21. Modern Ghana. (2003). Nkoranza GES adopts
measures to check absenteeism among teachers.
Retrieved from http://www.modernghana.com
22. Modern Ghana. (2014). Ghana Tops Teacher
Absenteeism in West Africa. Retrieved from
http://www.modernghana.com
7. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290
3427
23. Mouly M. and Pautet M-B. (1992). The GSM
system for Mobile Communication.
24. NITA. (2014). Mission Vision. Retrieved from
http://www.nita.gov.gh/Mission-Vision
25. Northern Network for Education Development,
Teacher Absenteeism. Retrieved from
http://www.nnedghana.org
26. Painter, M.K., Fernades, R., Padmanaban, N., and
Mayer, R.J. (1996). âA Methodology for
Integrating Business Process and Information
Infrastructure Modelsâ In A study of the impact of
information technology on business processes
using discrete even simulation: a reprise.
Department of Information Systems and
Computing, Brunel University, Middlesex,
United Kingdom.
27. Patel Rajan, Patel Nimisha, Gajjar Mona. (2012).
Online Studentsâ Attendance Monitoring System
in Classroom Using Radio Frequency
Identification Technology: A Proposed System
Framework, International Journal of Emerging
Technology and Advanced Engineering Volume
2, Issue 2
28. Rajasekar L., Vivek S. (2012). Wireless
Fingerprint Attendance System using ZigBee
Technology International Journal of Power
Control Signal and Computation (IJPCSC), Vol
3. No1.
29. Rogers F. Halsey and Vegas Emiliana. (2009).
No More Cutting Class? Reducing Teacher
Absence and Providing Incentives for
Performance. The World Bank Development
Research Group Human Development and Public
Services Team Human Development Network
Education Team. Policy Research Working Paper
4847
30. Sumhr.com. (2014). What is a Biometric
Fingerprint Reader and RFID machine? Retrieved
from http://www.sumhr.com
31. The Business Financial Times. (2014). Teacher
absenteeism reduces to 11%. Retrieved from
http://thebftonline.com
32. TutorialsPoint. SDLC â RAD Model. Retrieved
from http://www.tutorialspoint.com
33. Venkateswarlu T. and Naresh K. An automatic
frequency planning of GSM networks using
evolutionary algorithms. International Journal of
Engineering Research and Applications (IJERA).
Vol. 1, Issue 3, ISSN: 2248-9622
34. Verma Pallavi and Gupta Namit. (2013).
Fingerprint Based Student Attendance System
Using GSM
35. Wiredu G. (). âUser appropriation of mobile
technologies: Motives, conditions and design
propertiesâ, Information Systems and Innovation
Group, Department of Management, The London
School of Economics and Political Science,
London, UK. p24.
36. Boateng S. M. (2012). âThe Role of Information
and Communication Technologies in Ghanaâs
Rural Developmentâ. University of Nebraska â
Lincoln.
37. Frempong, G.K. and Atubra, W.H. (2001).
âLiberalisation of TELECOMS: the Ghanaian
experienceâ. Telecommunication Policy, 25, p.
197-210.
38. Cobbinah, J.R. (2003). âEnhancing strategic
competitiveness in information and
communication technology (ICT) Ghana Country
Paperâ. Telematics and Informatics, 20,p.1-9.
39. M. Zhang and Richard S. Wolff. (2004). âUsing
Multiâ hop for Broadband Fixed Wireless Access
in Rural Areasâ, Wireless 2004, Calgary, CA.
40. Qiang C. Z. W. and Rossotto C. M. (2009).
Information and Communications for
Development: Extending Reach and Increasing
impact. The World Bank, Washington DC.
41. Gartner.com. (2007). Gartner Says Number of
Identity Theft Victims Has Increased More Than
50 Percent Since 2003. Retrieved from
http://www.gartner.com/it/page.jsp?id=501912.
42. Shiboleth. (1995). An Introduction to Role-Based
Access Control. Retrieved from
http://csrc.nist.gov/rbac/NIST-ITL-RBAC-
bulletin.html
43. Gutterman, B., Rahman S. Supelano J. Thies L.
Yang Mai. (2009). âWhite Paper â ICT in
Education for Developmentâ. Global Alliance for
ICT and Development.
44. Martey Alfred (2004). ICT in distance education
in Ghana. Library High Tech News Vol. 21 Iss.
5, pp 16-18, University of Cape Coast.