Robert O. Oboko, E. Maina, Peter Waiganjo, E. Omwenga, R. Wario
{"title":"Designing adaptive learning support through machine learning techniques","authors":"Robert O. Oboko, E. Maina, Peter Waiganjo, E. Omwenga, R. Wario","doi":"10.1109/ISTAFRICA.2016.7530676","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530676","url":null,"abstract":"The use of web 2.0 technologies in web based learning systems has made learning more learner-centered. In a learner centered environment, there is need to provide appropriate support to learners based on individual learner characteristics in order to maximize learning. This requires a Web-based learning system to have an adaptive interface to suit individual learner characteristics in order to accommodate diversity of learner needs and abilities and to maintain an appropriate context for interaction and for achieving personalized learning. The purpose of this paper is to discuss how machine learning techniques can provide adaptive learning support in a Web-based learning system. In this research, two machine learning algorithms namely: Heterogeneous Value Difference Metric (HVDM) and Naive Bayes Classifier (NBC) were used. HVDM was used to determine those learners who were similar to the current learner while NBC was used to estimate the likelihood that the learner would need to use additional materials for the current concept. To demonstrate the concept we used a course in object oriented programming (OOP).","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126150419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved-Cross Layer Scheduling model for intelligent home networks","authors":"K’Obwanga M. Kevin, Okuthe P. Kogeda, M. Lall","doi":"10.1109/ISTAFRICA.2016.7530609","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530609","url":null,"abstract":"We daily add more devices and services into existing intelligent home networks. Consequently, various networking standards evolutions being experienced world over have not left home networks behind. These evolutions results in competition and depletion of the available limited resources. Consumers therefore, experience unavailable, unreliable and poor performing network both locally and remotely. In this paper, we present an Improved-Cross Layer Scheduling (CLS) model that optimizes performance of intelligent home networks. We have used Particle Swam Optimization (PSO) algorithm to dynamically schedule, align and prioritize network subnets, devices and services in the model. We have used Virtual Local Area Network (VLAN) protocol to classify home network into six subnets. Consequently, we have used weighing factor numbers to classify subnet devices. Further, we have used Differentiated Service Code Points (DSCP) to classify supported home network services into six classes. Moreover, we have increased number of packets transmitted per Class of Service (CoS) iteratively. We have optimized each subnet and used the output of the preceding subnet as input to subsequent subnet. Equally, we have reduced delay between consecutive transmitting CoSs in the media. We have simulated our model and realized average network throughput of 99.735%, packet loss of 1.59% and delay of 1.82 milliseconds.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131288988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nyasha Mukudu, N. Ventura, Joyce B. Mwangama, Asma Elmangoush, Ronald Steinke, T. Magedanz
{"title":"Prototyping Smart City applications over large scale M2M testbed","authors":"Nyasha Mukudu, N. Ventura, Joyce B. Mwangama, Asma Elmangoush, Ronald Steinke, T. Magedanz","doi":"10.1109/ISTAFRICA.2016.7530666","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530666","url":null,"abstract":"Many cities around the globe are adopting the use of Information and Communication Technology (ICT) as part of a strategy to transform into Smart Cities. These will allow cities in the developing world to cope with the ever increasing demand for services such as an effective electricity supply, healthcare and water management. Machine-to-Machine (M2M) communication standards play a vital role in enabling the development of Smart Cities by supporting new innovative services. Although Smart City services offer an exciting future, many challenges still have to be addressed in order to allow for mainstream adoption. This work focuses on issues related to prototyping Smart City services that utilize standardised M2M middleware platforms. In addition, the use of an inter-continental testbed for Smart City applications as an enabler for innovative, automated and interactive services is presented. The services developed will use an architecture which is based on the Smart City framework developed as part of the Testbeds for Reliable Smart City Machine-to-Machine Communication (TRESCIMO) project. These services will also serve as means to validate the use of Smart services within an African City's context. In addition, the architecture is validated by taking into account various real world use cases for Smart City applications.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121298550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A low cost laboratory for enhanced electrical engineering education","authors":"Ciira wa Maina, A. Muhia, James Opondo","doi":"10.1109/ISTAFRICA.2016.7530651","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530651","url":null,"abstract":"This paper presents low cost laboratories that aim to enhance the teaching of electrical and electronic engineering. The laboratories have been designed and developed based on the Raspberry Pi microprocessor system and are aimed at exposing students to the integration of software and hardware in electrical engineering in addition to ensuring that students appreciate the theoretical foundations of areas such as digital signal processing and instrumentation. The paper describes the laboratory exercises developed. Feedback from students was collected and analysed. The positive response shows the effectiveness of this approach in teaching electrical and electronic engineering.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Process as an element of UX in collecting Indigenous Knowledge: A case study in South Africa","authors":"Gugu Khalala, A. Botha, I. Makitla","doi":"10.1109/ISTAFRICA.2016.7530693","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530693","url":null,"abstract":"User Experience (UX) is understood as the experience that a person gains when interacting with a product in terms of how easy or pleasing it is to use such a product. Computer applications are the most common products evaluated for user experience. Based on primary data collected through a case study research strategy, this paper argues that a process is an important element of user experience that needs to be considered when collecting Indigenous Knowledge (IK) in rural communities in South Africa. Our research findings show that the defined IK recording process may be understood as having impact on usability if IK recorders have problems completing their tasks when following this process. The implications here are that the scope of applying UX evaluation should now be expanded to include processes; because processes describe how a task is to be accomplished; this is very similar to what the user interface of a computer application is meant to achieve. This is the key contribution of this paper to the user experience body of knowledge.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"51 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129416817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICT adoption and use in Zimbabwean SMEs","authors":"Peter J. Makiwa, Riana Steyn","doi":"10.1109/ISTAFRICA.2016.7530576","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530576","url":null,"abstract":"This paper analyses the key elements that affect the acceptance and effective utilisation of ICT, in Zimbabwean SMEs. The research employed a qualitative research approach and utilised the survey strategy to obtain reliable data and provide a tentative view of the SMEs in context. The data obtained from structured interviews with identified SMEs has practically identified key elements that affect ICT adoption and use in Zimbabwean SMEs. The findings obtained from the investigation revealed that the main barriers to ICT use and adoption in Zimbabwean SMEs were linked to a lack of ICT knowledge and skills, poor infrastructure, lack of Government support and the negative perception that SME managers and owners have towards ICT. The research also highlights how ICT enhances competitive advantage in SMEs and gives key recommendations on the use and adoption of ICT in Zimbabwean SMEs.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115464306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The extent to which the POPI act makes provision for patient privacy in mobile personal health record systems","authors":"Munyaradzi Katurura, L. Cilliers","doi":"10.1109/ISTAFRICA.2016.7530595","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530595","url":null,"abstract":"Health care providers are increasingly making use of m-health systems for data collection and maintenance of patients' health records, e.g. Mobile Personal Health Record Systems (MPHS). The privacy issues raised when making use of MPHRS include how information is collected, stored, and who has access to the collected information. These privacy concerns have not been investigated in the South African context before making use of the POPI Act. The Conceptual Framework for M-health was used as the foundation for evaluating the privacy principles relevant to MPHRS. The analysis found that while most privacy principles are regulated in the POPI Act, it does not make reference to a specific privacy management programme for MPHRS or anonymity of presence. This is problematic as health care providers will not have any guidance as to how to comply with the various privacy implementation principles. The recommendation of the study is then to develop these privacy management programmes in order to ensure compliance and information privacy of patients making use of MPHRS.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116178574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards the effect of external agencies on national information and communication technology policies development in developing countries: Case of Africa","authors":"G. Kunyenje, W. Chigona","doi":"10.1109/ISTAFRICA.2016.7530703","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530703","url":null,"abstract":"Information and Communication Technology (ICT) spearheads a country's social and economic development and studies have established that there is a relationship between ICTs and a country's social and economic development. Development of ICT policies in African countries has been through the adoption of prescribed models: blue print and an incremental approach based on the blue print approach. Despite the countries using these two frameworks, there are still indications that the gap in implementing ICTs in Africa is widening from the rest of the world. This research examines the effect of foreign agencies on national ICT policy development in developing countries. A case study approach will be used to compare two countries that adopted the NICI framework with other two that followed the incremental process. Secondary data from databases kept by international development agencies and policy documents from countries under study will be used in the research.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125965925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hosea Mpogole, Yohana Tweve, Neema Mwakatobe, Serijo Mlasu, Deo Sabokwigina
{"title":"Towards non-cash payments in Tanzania: The role of mobile phone money services","authors":"Hosea Mpogole, Yohana Tweve, Neema Mwakatobe, Serijo Mlasu, Deo Sabokwigina","doi":"10.1109/ISTAFRICA.2016.7530611","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530611","url":null,"abstract":"This study investigated the usage of non-cash payments through m-money services among students of the University of Iringa in Tanzania. A convenient sample of undergraduate students and business operators within and around the University campus was used. It was found that 80% of utility shops accepted noncash payments through m-money, business operators were optimistic about the service although there were challenges related to transaction costs and network/sending errors. Approximately 81% of respondents frequently received money from their sponsors/relatives through their m-money accounts. About 63% of respondents made regular savings deposits on their mobile phones unlike their bank accounts. Over 60% used m-money services for non-cash payments and savings deposits. This has a significant implication for the recent movement from predominantly cash to non-cash payments as subscribers directly pay for their purchased items through their mobile phones without necessarily having cash at hand. Practical recommendations and a direction for further study are provided.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132034650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A security algorithm for wireless sensor networks in the Internet of Things paradigm","authors":"Ts’itso Maphats’oe, M. Masinde","doi":"10.1109/ISTAFRICA.2016.7530646","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530646","url":null,"abstract":"In this paper we explore the possibilities of having an algorithm that can protect Zigbee wireless sensor networks from intrusion; this is done from the Internet of Things paradigm. This algorithm is then realised as part of an intrusion detection system for Zigbee sensors used in wireless networks. The paper describes the algorithm used, the programming process, and the architecture of the system developed as well as the results achieved.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115504500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}