{"title":"The ease of use and intentions of use of cloud technology in higher education institutions","authors":"N. Madhav, M. Joseph","doi":"10.1145/3415088.3415093","DOIUrl":"https://doi.org/10.1145/3415088.3415093","url":null,"abstract":"South Africa needs vital skills in engineering and technology to address future financial, environmental, educational and health challenges. In this era of the Fourth Industrial Revolution, it is even more important to use cloud technology in classrooms in Higher Educational Institutions (HEIs) in the South African context. This paper looks at uses of cloud technology, ease of use and intentions of using cloud technology in the classroom in a South African HEI. Questionnaires were given to students at an HEI for collecting data about the study. The research was undertaken to determine how cloud technologies can be used within HEIs particularly engineering education to support teaching and learning functions. The research is unique because many institutions have adopted the use of Learning Management Systems such as Blackboard, whereas in this study we explored the use of a cloud-integrated approach that requires no extra cost to the university or the student. A quantitative approach was used and regression analysis was performed to predict the possible outcome based on the variable. The Pearson product-moment correlation coefficient shows that there was a statistically significant relationship between the perceived ease of use and the intentions to use cloud technology.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Suresh, Anton Limbo, V. Hashiyana, Martin Mabeifam Ujakpa, Chawezi Nyirenda
{"title":"An internet of things (IoT) based solid waste monitoring system","authors":"N. Suresh, Anton Limbo, V. Hashiyana, Martin Mabeifam Ujakpa, Chawezi Nyirenda","doi":"10.1145/3415088.3415104","DOIUrl":"https://doi.org/10.1145/3415088.3415104","url":null,"abstract":"The population growth in Windhoek has led to an increase in the number of people sharing resources around institutions and as well as habitational areas. This has led to difficulties in managing solid waste around these areas. Many entities such as institutions make use of manual ways of collecting waste. In this case, a waste management company collects garbage on a specific day of the week. This, in turn, leads to overflowing of some of the main bins around the areas, as people still tend to use the garbage bins despite being full. Overflowing of the waste bins might have a significant impact on the health and comfortability of the individuals around the area. This is due to the production of bad odor and air pollution from the toxic gases produced. This research proposes the development of an Internet of Things (IoT) based Solid Waste Monitoring prototype that detects the level of the garbage in the bin in real-time and notifies relevant authorities with the bin location when the garbage is full. The prototype contains an An Arduino microcontroller is placed on the bin together with a sensor that monitors the garbage level in the bin, a Global Positioning System (GPS) module to identify the bin location and a Short Message Service (SMS) module to aid in sending an SMS. A webpage to monitor the real-time garbage bin levels can be accessed remotely by an authorized user. The Design Science Research Methodology (DSRM) aids the development of the proposed prototype. This therefore, suggests a smart way of monitoring solid waste around the institution and providing notifications if the bins are ready for collection and the location. The solution in turn, prevents the overflowing of bins, therefore, maintaining a clean and safe environment.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122329133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual sensor forensics","authors":"V. Kebande, R. Ikuesan","doi":"10.1145/3415088.3415117","DOIUrl":"https://doi.org/10.1145/3415088.3415117","url":null,"abstract":"Sensorial escalation, heterogeneity, pervasiveness, and increased connectivity have created a haven for cyber-criminals, where potential attacks are being exacerbated on a daily basis. In essence, most automated systems are not built to be able to dynamically detect potential security incidents or to provide digital forensic evidence that could be used for forensic hypothesis formation. Consequently, several ISO standards have also been proposed, however, they present a very generic view on investigation. Notably, in the recent past, sensorial proliferation has seen the increased usage of virtual sensors that have extended the functionalities and utilization of physical sensors-where sensing can be done using an abstraction/logical layers, which allows streamed sensor data to be collected dynamically in a proactive approach. The usage of virtual sensors has proved to be threat driven and the vulnerable threat landscape keeps being exploited. In this position paper, the author proposes a Virtual Sensor Forensic (VSF) architecture that may accurately give insights on event response processes, as a reactive technique. The proposed VSF architecture has dimensions that are application-specific, which shows that during the collection of streamed sensor data, post-event response may be of importance towards the detection of potential security incidents. The effort that has been put across in this position has presented the agenda of virtual sensor forensics based on a novel approach, that can be used as a post-event mechanism with a degree of acceptability.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"33 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114122321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing the challenges that are confronted rural-based SMEs on the implementation of cloud services","authors":"Sithembiso Dyubele, Noxolo Pretty Cele, Lubabalo Mbangata","doi":"10.1145/3415088.3415100","DOIUrl":"https://doi.org/10.1145/3415088.3415100","url":null,"abstract":"The increase of contemporary technologies such as cloud-based services has attracted various institutions, especially in developing countries. Many businesses have started to show interest in migrating to the cloud to expand their businesses, particularly in urban areas. However, it has become challenging for rural-based Small and Medium Enterprises (SMEs) to integrate themselves with ICT innovations such as cloud services as they are facing various challenges like poor development of ICT infrastructure. It is these difficulties that are facing SMEs located in rural areas that are at the core of this study, whose aim is to assess the challenges that rural-based SMEs are facing on the implementation of cloud services. A literature review from the previous studies was used to identify these challenges, which were later transformed into variables that ended up being tested in this paper. These variables include independent variables such as Security, Compatibility, Perceived usefulness, Perceived ease of use, and dependent variable, which are cloud services. A Likert-scale questionnaire-based survey of small business employees was conducted from a small town called Elliotdale, Eastern Cape, South Africa, to assess whether the challenges mentioned above, according to them, have an impact on the implementation of cloud services by SMEs. The data were analyzed to test the reliability and validity of the data-gathering instrument(questionnaires) and inferential statistics such as correlations between independent and dependent constructs, and Regression (predictor). The results indicate that the participants agreed that the challenges mentioned above, such as Security, Compatibility, Perceived Usefulness, Perceived Ease of Use, have a significant impact on the implementation of cloud services by rural-based SMEs.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127176253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A smart fish feeding system for internet of things based aquariums","authors":"Rufaida Auliar, Girish Bekaroo","doi":"10.1145/3415088.3415119","DOIUrl":"https://doi.org/10.1145/3415088.3415119","url":null,"abstract":"Effective fish feeding within aquarium environments is essential for proper health and growth of fishes. However, due to busy lifestyles, maintaining proper feeding cycles is a key challenge for aquarium owners. With the emergence of technologies including Internet of Things, various smart aquarium solutions have emerged. However, within existing solutions and published literature, limited work has been done to automate fish feeding for smart aquariums. As such, this paper extends literature on automated fish feeding within IoT-based aquariums through the implementation and evaluation of such a fish-feeding algorithm and system. In this study, a fish feeding algorithm that computes various aspects related to fish feeding (e.g. feeding time and number of pellets) is presented, based on aquarium environmental parameters (e.g. temperature and pH) along with aquarium characteristics (e.g. fish species and density). Based upon the proposed algorithm, a smart fish feeding solution was designed and implemented. For evaluation, the algorithm and system were tested within five aquariums to determine their effectiveness in feeding fish within different aquarium settings. Results showed that precision and recall reduce with increased number of fish species. Based on these limitations, recommendations have been made to enhance the implementation of such systems.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126857704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile crowdsourcing in crop production for farmers in rural areas of the south kivu (DRC)","authors":"Emmanuella Iranga Kahasha, T. Zuva","doi":"10.1145/3415088.3415094","DOIUrl":"https://doi.org/10.1145/3415088.3415094","url":null,"abstract":"A lack of an effective way to collect farm produce data, record farm input expenses, as well as expenditure on farm chemicals and receive information from other stakeholders (e.g. agriculture advisers) are some challenges encountered by farmers on their daily basis [1]. Gaining access to information and communication technologies can alleviate some of their problems and allow them to benefit from earlier unexploited opportunities [2]. In this research, we studied the factors that influenced farmers in the adoption of mobile crowdsourcing portals for agriculture purposes. A model was used to measure the perception of farmers about the technology after having used the technology for one season. The results showed that there is a strong relationship between the multiple independent factors in the model find the dependent variable \"intention to use\" for mobile crowdsourcing portals for agriculture. We conclude that mobile crowdsourcing application is perceived highly in enhancing the agricultural development in remote areas with regards to data accessibility, agriculture development in crop production and providing support in decision-making processes.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129413232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using high-performance computing artifacts as a learning intervention: a systematic literature review","authors":"N. M. Mwasaga, M. Joy","doi":"10.1145/3415088.3415130","DOIUrl":"https://doi.org/10.1145/3415088.3415130","url":null,"abstract":"High-Performance Computing (HPC) artifacts provide opportunities for students to improve their understanding of parallel computing, which is important for students who study computer science. In line with that, many computing departments are integrating HPC systems into their curricula. However, there is a need to investigate HPC artifacts that have been used as learning interventions. This study has employed a systematic literature review to investigate published papers on HPC education from 1988 to 2018. The findings of our investigation of a stratified sample of 211 papers reveal the state of the practice of application of HPC artifacts in computing education in terms of the contexts, themes, nature and topics of the publications. The study revealed that a majority of publications reported the usage of Beowulf and other clusters as the pedagogical tools. Furthermore, the study discovered gaps in research on the application of HPC artifacts in ability and aptitude, teaching and learning, teaching and learning techniques, curriculum, parallel programming, and parallel processing. This study contributes to our understanding of what HPC artifacts are used in computer science education.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130984846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Hashiyana, Martin Mabeifam Ujakpa, N. Suresh, C. Nyambe
{"title":"A smart remote electrical geyser switching system","authors":"V. Hashiyana, Martin Mabeifam Ujakpa, N. Suresh, C. Nyambe","doi":"10.1145/3415088.3415103","DOIUrl":"https://doi.org/10.1145/3415088.3415103","url":null,"abstract":"One of the many household appliances that consumes quite an amount of electricity in households, is the electrical Geyser System. It forms about 30% to 50% of residential electricity consumption and as a result, good geyser management can reduce household energy consumption of about 16% to 21%, and this eventually lead to overall load reduction, nationally and in urban distribution networks. As a result, some Institutions and scholars have recommended that geysers be switched off when households' members or owners are travelling on holiday or going on an extended trip or even during peak electricity consumption hours. To overcome the challenge of some household members forgetting to switch off their electrical geysers, this research project designed and developed a mobile remote controlled electrical geyser Application (App) by applying the agile programming software development methodology, Extreme Programming (XP). Gathering requirement from 20 household owners through interviews and observations, the research project team used an Arduino IDE, to code and uploads the codes onto an Arduino and released the App prototype in different phases, enabling the household owners to continually give feedback for incremental development of the App. Using the developed App, household owners are able to remotely switch their geysers on and off through their mobile phones. Future work on the development of a mobile remote switching geyser App, should take into consideration meter readings before and after the app introduction and also not to enable household owners to comparisons.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124213761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and optimization of cross layer scheme: routing and medium access control for throughput in cognitive radio networks","authors":"Miyelani Silence Madiba, M. Velempini","doi":"10.1145/3415088.3415110","DOIUrl":"https://doi.org/10.1145/3415088.3415110","url":null,"abstract":"Cognitive Radio (CR) is an intelligent technology that has become popular in wireless networks due to its ability to solve problems such as the underutilization and inefficient utilization of the spectrum. The CR can learn from experience, adapt its internal states and modify its transmission parameters. Radio Frequency is a costly resource, which must be administrated and coordinated wisely in order to plan for future transformations. Cross layer design (CLD) is best characterized as a transformation from the reference design model that does not permit direct communication between non-adjacent layers or the sharing of information. CLD focusses on the system performance enhancement by empowering various layers of the communication stack to share state data or to facilitate cross layer communication to enhance the system performance. Therefore, the idea of CLD must be contrasted with the traditional layered approach. This paper compares the throughput performance of the three schemes; the Cognitive Ad Hoc On Demand Distance Vector, Cognitive Cross-layer Multipath Probabilistic Routing, and the Optimized Cognitive Cross-layer Multipath Probabilistic Routing of the CLD routing and Media Access Control protocols in Cognitive Radio Networks.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123106186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prevention of fraudulent activities against SIP-based flooding attacks using extended sorted quadratic algorithms","authors":"Sheeba Armoogum, N. Mohamudally","doi":"10.1145/3415088.3415113","DOIUrl":"https://doi.org/10.1145/3415088.3415113","url":null,"abstract":"Voice over IP (VoIP) is gaining its popularity year by year due to the low cost of its service and its low investment cost. Unfortunately, this technology is vulnerable, firstly, due to the huge number of heterogeneous networks, secondly, due to the availability of service which is too flexible and finally, due to lack of transparency. Attackers find a variety of possibilities to penetrate a system and harm its users and servers. The single source and the multiple source flooding attacks are considered as the worst threat ever. In this paper, we present three mitigation techniques to counteract these malicious messages, based on statistical models developed using a modified quadratic search with sorting algorithms. In addition to flood behaviors, the models can resist two unpredictable behavioral patterns. The experiment has shown that the two models give very good performance with a detection rate of more than 98% and with a zero percent false alarm rate.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123786806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}