2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)最新文献

筛选
英文 中文
Shrinking the digital divide in online learning beyond the COVID-19 pandemic: A Systematic Literature Review 在COVID-19大流行之后缩小在线学习中的数字鸿沟:系统文献综述
2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT) Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10046024
Kudakwashe Maguraushe, Fine Masimba, Meshack Muderedzwa
{"title":"Shrinking the digital divide in online learning beyond the COVID-19 pandemic: A Systematic Literature Review","authors":"Kudakwashe Maguraushe, Fine Masimba, Meshack Muderedzwa","doi":"10.1109/ZCICT55726.2022.10046024","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046024","url":null,"abstract":"The emergence of the COVID-19 pandemic disrupted many businesses, including the education sector. As the World Health organization (WHO) urged numerous countries worldwide to implement lockdowns and social distancing laws to curb the spread of the pandemic, higher education institutions responded by embarking on online learning. This article aims to use the systematic literature review to review articles on reducing the digital divide in online learning during the COVID-19 pandemic. Using the technology-organisationenvironment (TOE) model, the benefits and challenges profiled will aid in proffering a way forward in handling and managing the digital divide beyond the COVID-19 pandemic in online learning. Using the keywords: digital divide, COVID-19 and online learning to search from online databases, the inclusion criteria resulted in 10 articles being reviewed. The articles revealed that: students faced many technological challenges in connecting to online learning during the COVID-19 epidemic, students need to be properly trained to be able to use online learning systems and they need to subside data packages for many students to afford the data. The study concludes and recommends that the TOE model can be used to elucidate the effects of the digital divide in online learning. The technological, organisational and environmental factors can help proffer a sustainable online learning model for the future, beyond COVID-19 pandemic.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115076025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Precision Fish Farming Systems: A Mapping Study 精准养鱼系统:地图研究
2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT) Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045996
Siqabukile Ndlovu, Sibonile Moyo, S. Nleya, S. Dube
{"title":"Precision Fish Farming Systems: A Mapping Study","authors":"Siqabukile Ndlovu, Sibonile Moyo, S. Nleya, S. Dube","doi":"10.1109/ZCICT55726.2022.10045996","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045996","url":null,"abstract":"Smart agriculture is one of the recognized practices to food security. Also known as precision agriculture, smart agriculture is largely deployed over the Internet through the use of connected sensors and intelligent devices. Smart agriculture has been implemented in a number of forms to include smart crop farming, smart animal farming in general and recently has been adopted in smart fish farming. Fish farming is a complex process as several variables have to be controlled to ensure optimum conditions for healthy fish production. Ensuring an optimum water environment requires skilled labour and resources which may not always be available. To solve this problem, researchers have turned to precision fish farming as a means of ensuring maximum fish production. This paper reviews existing literature to identify primary studies discussing IoT web-based fish farming systems, with the aim of creating a systematic map of the studies. Peer reviewed studies published through conferences and journals were identified through database search and snowballing. Analysis of the identified papers shows that researchers in these environments have used various techniques and technologies to implement IoT based smart fish farming systems. The most popular approach being the use of sensors to monitor the pH, temperature, dissolved oxygen content and turbidity of the water. Majority of the studies reviewed report effectiveness of their methods in improving fish quality, and lowering of production costs. This systematic map would be useful to fish farmers as it shows successful IoT based implementations, hence serving as a guide to existing and new farmers. It would also be useful to IoT technology designers as it shows gaps and shortcomings in these technologies probing for more research in the area.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122739247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insurance Fraud Detection using Machine Learning 利用机器学习进行保险欺诈检测
2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT) Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10046034
Machinya Tongesai, Godfrey Mbizo, Kudakwashe Zvarevashe
{"title":"Insurance Fraud Detection using Machine Learning","authors":"Machinya Tongesai, Godfrey Mbizo, Kudakwashe Zvarevashe","doi":"10.1109/ZCICT55726.2022.10046034","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046034","url":null,"abstract":"Many insurance companies today deal with the issue of fraudulent insurance claims, which results in significant yearly financial loss. Since the losses are covered by raising policyholders’ premium costs, these frauds have a negative impact on society. The traditional claim investigation procedure has also been blamed for producing unreliable conclusions because it is time-consuming and laborious. Therefore, using machine learning and the XGBoost method, we construct an automated fraud detection application framework in this study. Accurately identifying fraud claims in a shorter amount of time is the goal. Data analysis is utilized throughout the process to validate, sanitize, and extract the pertinent data. As a result, the insurance firm can retain its reputation outside by employing this structure and has a reliable relationship with clients that they can share.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modelling Lanchester Style DDOS Attack and Defense Lanchester式DDOS攻击与防御建模
2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT) Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045998
S. Nleya, M. Velempini, T. T. Gotora
{"title":"Modelling Lanchester Style DDOS Attack and Defense","authors":"S. Nleya, M. Velempini, T. T. Gotora","doi":"10.1109/ZCICT55726.2022.10045998","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045998","url":null,"abstract":"This paper aims to analyze the DDOS problem and describe it using differential equations. Using two armies engaged in conflict according to Lanchester’s Square Law. The other army protects itself when one army attacks it. Applying the generalized Lanchester Square Law to the DDOS problem. Our present 5G Software Defined Network security network technologies act as the army that must defend itself against hackers employing a Bot network. According to numerical simulation, the defense mechanism also grows as the attack strength does.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Rice varieties using DMLP-PCA inspired features with MVE Classifier 基于MVE分类器的DMLP-PCA特征的水稻品种分类
2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT) Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10046040
Jerita Chibhabha, Kudakwashe Zvarevashe, Leslie Kudzai Nyandoro, T. Matekenya, B. Mapako
{"title":"Classification of Rice varieties using DMLP-PCA inspired features with MVE Classifier","authors":"Jerita Chibhabha, Kudakwashe Zvarevashe, Leslie Kudzai Nyandoro, T. Matekenya, B. Mapako","doi":"10.1109/ZCICT55726.2022.10046040","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046040","url":null,"abstract":"The classification of varieties of rice from images is one of the most difficult tasks in computer vision. This complex process is normally applied in automating packaging systems used in production companies. Most companies opt for this option because the alternative way of doing it manually is time consuming, monotonous and prone to expensive errors. To refine the process, there is need to interrogate the features because a classification algorithm is as good as the features used. Therefore, this paper presents Deep Multi-Layer Perceptron generated features. In addition, the paper also introduces the Majority Voting Ensemble (MVE) classifier. The technique was evaluated against CNN (Convolution Neural Network) generated features as well as other traditional classifiers. The proposed solution performed better than the other methods including end-to-end deep learning models.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122518881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Challenges in the Adoption of Artificial Intelligence and Machine Learning in Zimbabwe’s Insurance industry 津巴布韦保险业采用人工智能和机器学习的挑战
2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT) Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045910
Judith Moyo, Noreen Watyoka, F. Chari
{"title":"Challenges in the Adoption of Artificial Intelligence and Machine Learning in Zimbabwe’s Insurance industry","authors":"Judith Moyo, Noreen Watyoka, F. Chari","doi":"10.1109/ZCICT55726.2022.10045910","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045910","url":null,"abstract":"This study sought to investigate the challenges in the adoption of AI and ML in the Zimbabwean insurance industry. The TechnologyOrganisation-Environment (TOE) model was selected as the base theory underpinning the study. The study adopted a pragmatic research philosophy and a census was carried out on twenty insurance companies. Questionnaires were administered on operations managers representing their insurance companies. Interviews were used to collect data from 12 operation managers. NVivo version 16 was used to analyse the data thematically. The study results show that adoption of AI by the insurance sector in Zimbabwe is hindered by shortage of resources, lack of expertise and high cost of AI compliant products. These researchers recommend resource allocation, training of employees, culture change, and updated technological environment to ensure effective adoption of AI. This study will contribute to the body of knowledge, be significant to insurance practitioners and policy makers whilst giving direction for future studies.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127597948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of BYOD security awareness among mobile device users within Namibian enterprises 纳米比亚企业移动设备用户BYOD安全意识评估
2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT) Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10046002
Ester Shihepo, Fungai Bhunu Shava, Mercy Chitauro
{"title":"Assessment of BYOD security awareness among mobile device users within Namibian enterprises","authors":"Ester Shihepo, Fungai Bhunu Shava, Mercy Chitauro","doi":"10.1109/ZCICT55726.2022.10046002","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046002","url":null,"abstract":"The Bring Your Own Device (BYOD) concept refers to employers allowing their employees to bring their personal digital devices to workplaces and use them for work related purposes. Enterprises are enjoying the benefits of BYOD, which allow them to cut operational costs as they do not need to purchase computers for their employees. Employees are enjoying the comfort and convenience offered by BYOD; however, this can also expose organisations to security breaches as BYOD implementation can present positive opportunities as well as security challenges. The main objective of this paper is to present an assessment of BYOD security awareness within Namibian enterprises. A case study was carried out at one Namibian enterprise as it was considered by the researcher as a suitable site in meeting the research objectives. Data was collected through interviews and questionnaires. Based on the findings, it was observed that the use of personal mobile devices is prevalent within the enterprise. It was further observed that the enterprise suffers from access control challenges and the BYOD concept is not formally implemented with the enterprise because there are no policies in place among other issues. The findings confirmed that if appropriate security measures/controls are implemented, increase in BYOD security awareness among the mobile device users can be anticipated.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116575725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inadvertent Use of ICTs in the South African Higher Education Sector During the Pandemic: Benefits and Challenges 大流行期间南非高等教育部门无意中使用信息通信技术:利益与挑战
2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT) Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045876
D. T. Risinamhodzi, G. P. Dzvapatsva, Courage Matobobo
{"title":"Inadvertent Use of ICTs in the South African Higher Education Sector During the Pandemic: Benefits and Challenges","authors":"D. T. Risinamhodzi, G. P. Dzvapatsva, Courage Matobobo","doi":"10.1109/ZCICT55726.2022.10045876","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045876","url":null,"abstract":"Globally, higher education (HE) is under pressure to include more diverse groups of students and produce the skills needed to adapt to a rapidly changing world. One of the key catalysts which has been touted to drive the changes is information communication and technologies (ICTs) but the uptake has not been to the optimum levels especially in developing countries. However, after the COVID-19 pandemic, HE sectors, in South Africa particularly, have experienced an increase in ICT uptake for the purpose of responding to educational needs. This paper examines how harnessing the positives of ICT’s could benefit the higher education sector in the post-COVID-19 era. In particular, the paper explores the benefits and challenges of ICTs in catering for educational needs within higher education during the COVID-19 pandemic. We used information systems (IS) continuation theory to move from academic theorising about inadvertent use of ICT tools toward harnessing their continued successful implementation. Documents were analysed using thematic analysis. The results showed several positive potentials from ICT uptake such as self-regulated learning and the saving of the academic calendar as well as student lives in the face of any future pandemics. This paper suggests a continued maintenance of the infrastructure growth model necessitated by the pandemic. Furthermore, we propose that the Department of Higher Education and Training must regulate establishment of ICT infrastructure funding in institutions of higher education.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"68 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134190253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using design thinking for social innovation: Undergraduate students’ experiences when developing mobile application prototypes 运用设计思维进行社会创新:大学生开发移动应用原型的经验
2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT) Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045961
Fazlyn Petersen, Monique Philander
{"title":"Using design thinking for social innovation: Undergraduate students’ experiences when developing mobile application prototypes","authors":"Fazlyn Petersen, Monique Philander","doi":"10.1109/ZCICT55726.2022.10045961","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045961","url":null,"abstract":"Information and communication technology can be used in social innovation to solve societal challenges, such as access to quality education. Despite the increasing number of South Africans with mobile phones, there are still barriers to online learning for students. The barriers include the lack of technological skills, lack of digital access and inequitable learning environments. This exploratory case study examined 26 third-year university students’ experiences when using design thinking to design mobile application prototypes to support education. Sustainable Development Goal (SDG) 4 was used as a scenario as it focuses on providing quality education for all. An online survey was used to collect qualitative and quantitative data. Qualitative data were analysed using content analysis. Quantitative data were analysed using descriptive statistics. The results demonstrate that students had a positive experience when using design thinking. Each of the five stages in design thinking received positive feedback. Improvements can be made to provide more training to use the tool, Justinmind, to develop mobile application prototypes.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128773064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Seeking ABET Accreditation for Computing Programmes in Africa: A Case Study of UNAM’s BSc in Computer Science 寻求非洲计算机课程的ABET认证:以墨西哥国立自治大学计算机科学学士学位为例
2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT) Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10046007
R. Greenlaw, Tulimevava K. Mufeti
{"title":"Seeking ABET Accreditation for Computing Programmes in Africa: A Case Study of UNAM’s BSc in Computer Science","authors":"R. Greenlaw, Tulimevava K. Mufeti","doi":"10.1109/ZCICT55726.2022.10046007","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046007","url":null,"abstract":"ABET is the worldwide leader in accrediting pro-grams in computing, engineering, applied and natural sciences, and engineering technology. Only four of 54 countries in Africa have programmes which achieved ABET accreditation. During COVID-19 and in times of intense competition, it has become especially important for institutions to distinguish their programs as having high quality. Using the University of Namibia’s Bachelor of Science in Computer Science as a case study, we use a systematic methodology to evaluate and analyse the programme in a detailed, step-by-step, easy-to-understand manner. We evaluate this program with respect to ABET’s General Criteria and then examine how well it does against ABET’s Program Criteria in computer science. Our aim is to pinpoint shortcomings and solutions. The results for the selected program, despite ticking positives for a number of criterion, show the need for considerable work to meet ABET accreditation. Our research stands to inspire university programs in Africa to strive for ABET accreditation as a way of distinguishing themselves.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131250860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信