Godfrey Luwemba - Academia.edu (original) (raw)
Uploads
Papers by Godfrey Luwemba
Tanzania Journal of Science
A resource sharing in power line communications (PLC) for the home network is restricted by the c... more A resource sharing in power line communications (PLC) for the home network is restricted by the channel assignment techniques which decide who has the right to gain access to send data. The channel assignment techniques include contention-free and contention-based. The former requires high synchronization due to the deterministic round-trip time. Besides, contention-based utilizes CSMA/CA techniques that allow stations in a network to compete for channel access and are suitable for decentralized network topology. However, a trade-off exists between the number of stations required to gain access versus system efficiency. Whilst some research has been carried out on CSMA/CA resource sharing techniques that allow only one user to transmit, there is very little work done on multiuser access to optimize system efficiency and reduce collisions in a network. The purpose of the current study was to review the CSMA/CA techniques for resource sharing to improve system efficiency in power line...
European Journal of Information Technologies and Computer Science
Clean water is a scarce resource for the human life and is subject to wastage due to leakage of t... more Clean water is a scarce resource for the human life and is subject to wastage due to leakage of the distribution pipes in large cities. Water pipe leakage is a big problem around the world of which most of the water distribution authorities faces difficulties to detect the location of the fault. This problem of leakage can be caused by several factors such as breakage of the pipelines due to aging or ongoing constructions in urban cities like Dar es salaam, consequently due to that case, the distribution authorities face hardship to identify the cause and enable them to take action. Therefore, the aim of this project was to develop an IoT-based system for water leakage detection. The prototype was developed comprising two sensors embedded at the source and destination points to measure the flow rate of water. The result indicated that the volume of water generated at the start point can be compared with the other end to determine if there is any leakage. A greater focus on distan...
European Journal of Engineering Research and Science
The primary purpose of this research was to assess the adequacy and effectiveness of security con... more The primary purpose of this research was to assess the adequacy and effectiveness of security control of the Supervisory Control and Data Acquisition (SCADA) communication network used by infrastructure companies. Initially, the SCADA networks were physically separated from other networks connected to the internet and hence assumed secure. However, the modern SCADA are now integrated with other network resulting in new security vulnerabilities and attacks similar to those found in traditional IT. Thus, it is important to reassess the security controls of the SCADA because it is operated in an open network environment. In this research, a case of the SCADA security controls in the power sector in Tanzania was assessed, whereby a specific SCADA implementation was studied. The data were gathered using observation, testing, interviews, questionnaire and documentation reviews. The results were analyzed using the Cyber Security Evaluation Tool (CSET) and checked for compliance based on th...
Tanzania Journal of Science
A resource sharing in power line communications (PLC) for the home network is restricted by the c... more A resource sharing in power line communications (PLC) for the home network is restricted by the channel assignment techniques which decide who has the right to gain access to send data. The channel assignment techniques include contention-free and contention-based. The former requires high synchronization due to the deterministic round-trip time. Besides, contention-based utilizes CSMA/CA techniques that allow stations in a network to compete for channel access and are suitable for decentralized network topology. However, a trade-off exists between the number of stations required to gain access versus system efficiency. Whilst some research has been carried out on CSMA/CA resource sharing techniques that allow only one user to transmit, there is very little work done on multiuser access to optimize system efficiency and reduce collisions in a network. The purpose of the current study was to review the CSMA/CA techniques for resource sharing to improve system efficiency in power line...
European Journal of Information Technologies and Computer Science
Clean water is a scarce resource for the human life and is subject to wastage due to leakage of t... more Clean water is a scarce resource for the human life and is subject to wastage due to leakage of the distribution pipes in large cities. Water pipe leakage is a big problem around the world of which most of the water distribution authorities faces difficulties to detect the location of the fault. This problem of leakage can be caused by several factors such as breakage of the pipelines due to aging or ongoing constructions in urban cities like Dar es salaam, consequently due to that case, the distribution authorities face hardship to identify the cause and enable them to take action. Therefore, the aim of this project was to develop an IoT-based system for water leakage detection. The prototype was developed comprising two sensors embedded at the source and destination points to measure the flow rate of water. The result indicated that the volume of water generated at the start point can be compared with the other end to determine if there is any leakage. A greater focus on distan...
European Journal of Engineering Research and Science
The primary purpose of this research was to assess the adequacy and effectiveness of security con... more The primary purpose of this research was to assess the adequacy and effectiveness of security control of the Supervisory Control and Data Acquisition (SCADA) communication network used by infrastructure companies. Initially, the SCADA networks were physically separated from other networks connected to the internet and hence assumed secure. However, the modern SCADA are now integrated with other network resulting in new security vulnerabilities and attacks similar to those found in traditional IT. Thus, it is important to reassess the security controls of the SCADA because it is operated in an open network environment. In this research, a case of the SCADA security controls in the power sector in Tanzania was assessed, whereby a specific SCADA implementation was studied. The data were gathered using observation, testing, interviews, questionnaire and documentation reviews. The results were analyzed using the Cyber Security Evaluation Tool (CSET) and checked for compliance based on th...