Journal of ICT Systems https://jicts.udsm.ac.tz/index.php/udsm <p><span class="selectable-text copyable-text">JICTS is a refereed open access journal that disseminates original research on the design, development, implementation, management and evaluation of ICT systems. <a href="https://jicts.udsm.ac.tz/index.php/udsm/about">Read more.</a></span></p> University of Dar es Salaam en-US Journal of ICT Systems 2953-2590 Assessment of Vulnerabilities in Student Records Web-Based Systems for Public and Private Higher Learning Institutions in Tanzania https://jicts.udsm.ac.tz/index.php/udsm/article/view/52 <p>In spite that HLIs in Tanzania use web-based systems for managing, storing and processing of HLIs information and data such as website contents, academic results and financial records. The HLIs web-based system have been compromised by attackers due to presence of vulnerabilities. The main objective of this study is to assess the vulnerabilities of Students Records Web-based Systems (SRWBS) for private and public Higher Learning Institutions (HLIs) in Tanzania using black-box testing methodology by employing two automatic vulnerability scanners namely OWASP ZAP (Open Webs Application Security Project Zed Attack Proxy; open-source tool) and Acunetix (proprietary tool). This study assesses the vulnerability of SRWBS for 3 private HLIs and 5 public HLIs in Tanzania. The results reveal the total of 29 vulnerabilities which include but are not limited to Broken Authentication and Session Management, Broken Access Control, Security Misconfiguration, Sensitive Data Exposure, Vulnerable JS (Java Script) Libraries, CSRF (Cros Site Request Forgery), Using Components with Known Vulnerabilities, XSS (Cross Site Script), DOM (Document Object Model) based XSS and Reflected XSS. SRWBS of public HLIs were found more vulnerable by average 44.2% than the SRWBS of private HLIs which were vulnerable by average of 37%. Based on these results, this study provides some recommendations for mitigating vulnerabilities and improving the security of SRWBS for private and public HLIs in Tanzania.</p> Wilbard G. Masue Daniel Ngondya Tabu S. Kondo Copyright (c) 2024 Wilbard G Masue, Daniel Ngondya, Tabu S. Kondo https://creativecommons.org/licenses/by-nc-nd/4.0 2024-08-23 2024-08-23 2 2 1 28 10.56279/jicts.v2i2.52 Advancing Face Recognition Technologies: The Role of Decision Trees in Classifying Complex Image Pairs https://jicts.udsm.ac.tz/index.php/udsm/article/view/89 <p>The advancement of face recognition technologies has been pivotal in various applications, from security systems to personalized user experiences. There are significant efforts already devoted to solving challenges of multimodality and pose variation in face recognition. Some studies focus on multimodality but pose-invariant, and other studies focus on pose variation but single modality. Despite significant progress, various face recognition algorithms do not consider both multimodality and pose variation constraints in their proposed methods. Recognizing face images presented both in a different modality and in a different pose presents serious challenges to current algorithms. This paper proposes an algorithm that combines the strengths of deep learning with decision trees to improve face recognition performance across modalities and poses in constrained and unconstrained environments. This hybrid approach leverages the representational power of deep learning and the interpretability and simplicity of decision trees. The findings indicate significant improvements over existing methodologies, particularly in challenging conditions like when multimodality and pose variation constraints are compounded together in the input face images in both constrained and unconstrained environments. The proposed algorithm not only addresses the limitations of current face recognition systems but also offers scalable, efficient solutions suitable for real-world applications.</p> Francis Kakula Jimmy Mbelwa Hellen Maziku Copyright (c) 2024 Francis Kakula, Jimmy Mbelwa, Hellen Maziku https://creativecommons.org/licenses/by-nc-nd/4.0 2024-09-25 2024-09-25 2 2 29 41 10.56279/jicts.v2i2.89 Spark: A Statistical Comparison and Evaluation of Classification Algorithms for Fault Prediction in Electrical Secondary Distribution Network https://jicts.udsm.ac.tz/index.php/udsm/article/view/91 <p>Managing faults in the electrical secondary distribution network is a challenging task given the nature, size, and complexity. Predicting faults early before they occur helps in increasing the safety and reliability of the power distribution system. Various statistical and machine learning techniques are being used to predict different types of faults. This study applies classification algorithms available in the big data framework Apache Spark through its python interface PySpark to predict electrical secondary distribution network faults. The study evaluates and compares nine algorithms: Decision tree, Gradient-boosted tree, Logistic regression, Naïve Bayes, Multilayer perceptron, Random forest, Linear Support Vector Machine, One-versus-rest and Factorization machines. The research uses Friedman’s test followed by the Nemenyi post hoc test to find the significance of performance differences among the algorithms. The results show significant differences among the algorithms. Gradient-boosted tree and One-versus-rest with Gradient-boosted tree had the best performance for binary and multiclass classification, respectively, while Naïve Bayes had the worst performance.</p> David Makota Naiman Shililiandumi Hashim Iddi Copyright (c) 2024 David Makota, Naiman Shililiandumi, Hashim Iddi https://creativecommons.org/licenses/by-nc-nd/4.0 2024-10-30 2024-10-30 2 2 42 54 10.56279/jicts.v2i2.91