{"title":"The Importance of ICTs on Service Delivery at MTC, Namibia","authors":"Ndahafa Eline Namene, Nikodemus Angula","doi":"10.54646/bijscit.008","DOIUrl":"https://doi.org/10.54646/bijscit.008","url":null,"abstract":"The purpose of the study was to examine the effect of information and communication technology on service delivery in the Telecommunications industry. A descriptive survey research method was used as it helped the researcher to determine how the use of ICTs can improve service delivery at MTC, Namibia. Findings showed that variables of information and communication technology have positive effect on service delivery. Therefore, the study concluded that training collectively with changes in corporate policies and support, can result in better service delivery. It was recommended that employees have to acquire skills on how to use computers and communication software in order to offer efficient services. It is vital for the Telecommunications sector to foster digital opportunities by enhancing the use of ICTs to improve service delivery. Barriers to be overcome are no longer only technological but also educational, cultural and linguistic in nature. With that in mind, neglecting to invest sufficiently in human capacity may result in clientele dissatisfaction.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114434391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A case study: Grid services for satellite image processing","authors":"R. Patil, Mane Siddhi","doi":"10.54646/bijscit.20","DOIUrl":"https://doi.org/10.54646/bijscit.20","url":null,"abstract":"Satellite image processing is an intricate task that requires vast computation and data processing, which cannot be handled by a single computer. Furthermore, the processing of the massive amount of data accumulated by the satellite is a huge challenge for the end user. Hence, grid computing is the essential platform to provide high computing performance at the user end. This article reviews the grid services used for satellite image processing and significant data processing.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122131296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling Semantic Interoperability of Regional Trends of Disease Surveillance Data for Namibia Through a Health-Standards-Based Approach","authors":"Nikodemus Angula, N. Dlodlo, Progress Mtshali","doi":"10.54646/bijscit.005","DOIUrl":"https://doi.org/10.54646/bijscit.005","url":null,"abstract":"The Ministry of Health and Social Services in Namibia under the division of epidemiology uses a manual paper-based approach to capture disease surveillance data through 5 levels of reporting which include the community level, the health facility level, the district level, and the national level. As a result, this method of communicating and exchanging disease surveillance information is cost and time consuming, which delay disease surveillance information from reaching the head office on time. The current method that is being used to exchange and communicate disease surveillance data is a manual process which very time consuming due to the fact that surveillance officers have to organise and store the files and hunt down the information when it is needed and this can take time. Therefore, the study developed a prototype that aggregates disease surveillance data from the 14 regions in Namibia and can thus enable the disease service office to capture disease surveillance data through the use of mobile devices. The functionality of the prototype would allow a disease surveillance office in one regional office to access disease surveillance data of other regional office in real time. The method used to communicate disease surveillance data is through the excel spreadsheet (IDSR) which is called the integrated disease surveillance and response. Furthermore, the excel file will be sent to the relevant authority through email. However, we still do not have a web based system to report cases of diseases, instead this is a process starting from the intermediate hospital disease surveillance data which is captured then sent to the regional office and from the regional office the information is sent to the district office and then sent to the national office and from the national office the information is further sent to the WHO and other development partners as well as to the top management or to the highest authority. So it does not end at the national level but goes to management such as the Permanent Secretary, and the data is used to inform the development partners and the national surveillance office prepares official letters to the management as a form of reporting disease surveillance data. The symphonic surveillance office helps to detect a particular disease. The doctors send an investigation case form to the laboratory for testing the disease that has been identified.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114992469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Intelligence Approach to Handling Data Leakage Risks in the Corporate Information Security Process","authors":"K. T, V. A, S. M","doi":"10.54646/bijscit.17","DOIUrl":"https://doi.org/10.54646/bijscit.17","url":null,"abstract":"onfidentialinformationisofgreatinteresttocompetingfirms.Thiscausesaggressionandattacks.Many people underestimate the importance of the threat, and as a result, it can lead to collapse and bankruptcy for the company. Even a single case of malpractice can result in millions in damages and the loss of customer trust. Threats are subject to data on organization structure, status, and operations. Sources of such threats are its competitors, corruptofficials,andcriminals.Theyareintroducedwithcertainvalue-protectedinformationandmodifiedinorder to cause financial damage. Even 20% of such a decision can result in information leakage. Sometimes the loss of companysecretscanbeduetotheinexperienceofemployeesoralackofsecuritysystems.Inthispaper,animproved intelligence approach to handling data leakage risks in the corporate information security process is proposed. Accounting automatically calculates weighted relative class systems through a complete, complex security of the most important processes and technical and organizational measures. Their combination is an antivirus system, a firewall, and protection from electromagnetic radiation. Systems protect information on electronic media sent through communication channels, access exemptions for various documents, create backup copies, and recover confidential information after damage.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128322787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Large Semi Primes Factorization with Its Implications to RSA Cryptosystems","authors":"R. Omollo, Arnold Okoth","doi":"10.54646/bijscit.011","DOIUrl":"https://doi.org/10.54646/bijscit.011","url":null,"abstract":"RSA’s strong cryptosystem works on the principle that there are no trivial solutions to integer factorization. Furthermore, factorization of very large semi primes cannot be done in polynomial time when it comes to the processing power of classical computers. In this paper, we present the analysis of Fermat’s Last Theorem and Arnold’s Theorem. Also highlighted include new techniques such as Arnold’s Digitized Summation Technique (A.D.S.T.) and a top-to-bottom, bottom-to-top approach search for the prime factors. These drastically reduce the time taken to factorize large semi primes as for the case in RSA Cryptosystem.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124567721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy clustering and energy resourceful routing protocol (FCER2P) for smart dust","authors":"R. D, Rajanna G. S.","doi":"10.54646/bijscit.22","DOIUrl":"https://doi.org/10.54646/bijscit.22","url":null,"abstract":"Sensor nodes in smart dust are used to track and identify data that is being transferred to a sink. The accessibility of node energy poses a significant challenge for smart dust and may have an impact on the long-term viability of the network. As a result, constructing smart dust must take into account the need for algorithms and techniques that enable the most use of scarce resources, especially energy resources. For instance, routing algorithms are distinctive algorithms because they have a clear and direct connection with network longevity and energy. The offered routing techniques use clustering each round and single-hop data delivery to the sink. A Fuzzy Clustering and Energy Resourceful Routing Protocol (FCER2P) that reduces smart dust energy consumption and lengthens lifespan of the network is proposed in this research. Using a specified threshold, FCER2P proposes a new cluster-based fuzzy routing mechanism that can make use of clustering and multiple hop routing capabilities simultaneously. This research is innovative in that it adjusts multi-hop connectivity by anticipating the optimum intermediate node for aggregating and the sink, eliminates clustering each round while taking a fixed threshold into account, and eliminates clustering per round altogether. When choosing the intermediary node to employ, some fuzzy parameters, including residual energy, the number of neighbors, and the distance to the sink, are taken into account.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125462694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Translator from Portuguese (Voice and Text) to Portuguese Sign Language","authors":"Ma¨eva de Brito, N. Domingues","doi":"10.54646/bijscit.014","DOIUrl":"https://doi.org/10.54646/bijscit.014","url":null,"abstract":"One of the major focuses of technology, engineering and computer science is to solve problems and improve the quality of life in health. The relationship between health and technology has made great advances in the last decades, and many cooperations are foreseen. Some citizens still have to deal with many obstacles daily to cope with the society as it is designed. One of the obstacles citizens deal with is deaf and hearing impairment. In Portugal, there are about 100,000 to 150,000 people with some level of hearing loss, and of these, around 30,000 people use Portuguese Sign Language as their mother tongue ([3]; National Institute for Rehabilitation, 1996). The greatest difficulties are appropriate or amend if necessary. encountered by them are poor communication with hearing people and the need of a translator person. Communication became even more complicated with the mandatory use of face mask, respect for the maximum number of people per division and social distancing due to the COVID-19 pandemic. To diminish or even solve this issue, the authors developed an automatic voice and text translation system to Portuguese sign language with captions. Sign language will be very useful for deaf and hearing impairment citizens, and captions will be useful for deaf and hearing impairment citizens who don’t understand sign language. For that, programming language tools were developed to create a translator with those requests. This article describes the developments and achievements. For the proof of concept, the translator started with 16 images in the database and reached a confidence level between 70 and 90%. This is an incentive to further developments that authors are continuing to produce more improvements in the developed tool.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133490072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ofoegbunam Emmanuel Izuchukwu, Chigbo Paul Amalu, Ajao Saheed
{"title":"A novel intrusion detection system for IIoT using inception convolutional neural network","authors":"Ofoegbunam Emmanuel Izuchukwu, Chigbo Paul Amalu, Ajao Saheed","doi":"10.54646/bijscit.23","DOIUrl":"https://doi.org/10.54646/bijscit.23","url":null,"abstract":"The purpose of this study is to compare the accuracy of several deep-learning models for the identification of rice weed. In this study, 1500 datasets of local rice and 1000 datasets of weed were resized and applied to the input size of the network, respectively. A total of 70% of the data were used for training, and the remaining 30% were used for validation. MATLAB R2018a was used to construct the AlexNet pre-trained model using a transfer learning strategy, and by changing the AlexNet model, RiceWeedNet, a convolutional neural network, was created. Metrics such as network accuracy, recognition accuracy, precision, and recall were used to assess both models’ performances. While the test set’s identification accuracy is 97.713415%, its precision is 0.9776, and its recall value is 0.9803. The RiceWeedNet model achieved a network accuracy of 100%. A network accuracy of 90% and a recognition accuracy of 73.780488% were reported by the AlexNet model, respectively. The created model may be used instead of conventional weed detectors.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123217481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector Machine","authors":"Gajendra Sharma","doi":"10.54646/bijscit.010","DOIUrl":"https://doi.org/10.54646/bijscit.010","url":null,"abstract":"Fault tolerance is an important issue in the field of cloud computing which is concerned with the techniques or mechanism needed to enable a system to tolerate the faults that may encounter during its functioning. Fault tolerance policy can be categorized into three categories viz. proactive, reactive and adaptive. Providing a systematic solution the loss can be minimized and guarantee the availability and reliability of the critical services. The purpose and scope of this study is to recommend Support Vector Machine, a supervised machine learning algorithm to proactively monitor the fault so as to increase the availability and reliability by combining the strength of machine learning algorithm with cloud computing.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124717935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Algorithm to Extract the Costume’s Size by Fuzzy Logic","authors":"Thi Nguyen Mong Hien, Tran Thi Minh Hieu","doi":"10.54646/bijscit.012","DOIUrl":"https://doi.org/10.54646/bijscit.012","url":null,"abstract":"This study presents the algorithm to extract the size of the ready-to-wear clothing, which is men's T-shirts with f. house branding. The table has four sizes, and the size labels are signed by S, M, L, and XL. Authors use fuzzy logic to establish the algorithm model. In this model, the input variables have three inputs, which are the body height, weight, and bust girth measurements. In the output variables are the results of size coding. From this size chart table, the authors choose the primary dimensions to be the input variables of the algorithm. The first dimension is a vertical dimension, and the other two dimensions are horizontal dimensions. The vertical dimension is height. Two horizontal dimensions are weight and bust girth. The sizes in the table are encoded to be used for the algorithm results, and the output is the encoded sequence number, which is also the size to be searched. After running this simulation program, measurements of three primary dimensions in size are tested on customers using two methods for two objects. An algorithm for extracting the size of ready-to-wear clothes by the fuzzy logic method reduces the time it takes to choose the size that fits body measurements. In addition, this research direction is consistent with the trend of digital development.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127573334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}