Ishmael Mathebula, Bassey Isong, N. Gasela, A. Abu-Mahfouz
{"title":"Analysis of Energy-efficient Techniques for SDWSN Energy Usage Optimization","authors":"Ishmael Mathebula, Bassey Isong, N. Gasela, A. Abu-Mahfouz","doi":"10.1109/IMITEC50163.2020.9334084","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334084","url":null,"abstract":"Software-Defined Wireless Sensor Networks (SDWSN) has received significant attention in recent years due to its inherent challenges such as network security, trust management, inefficient energy consumption, and so on. In particular, inefficient energy utilization has remained a core critical challenge as sensor nodes are naturally resource constraint and mostly deployed in unattended environments. This challenge has a direct impact on SDWSN performance and reliability. Albeit, several techniques have been proposed and developed to address the challenge in the traditional WSN and few for SDWSN, optimal efficient energy utilization is yet to be achieved. Therefore, this paper survey some of the energy efficiency techniques reported in the literature. The goal is to gain insights into these techniques, strategies employed, their pros and cons which could be utilized to design an efficient-energy mechanism for SDWSN. The findings obtained show that the existing approach ensures efficient energy utilization and improve network performance. While some have routing protocol and security mechanisms, fault tolerance, and battery fault detector mechanisms are not incorporated.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132426231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-Driven Student Support for Academic Success by Developing Student Skill Profiles","authors":"Ritesh Ajoodha, S. Dukhan, Ashwini Jadhav","doi":"10.1109/IMITEC50163.2020.9334109","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334109","url":null,"abstract":"In this paper, we attempt to provide a data-driven solution to the data-congested environment of attributes related to student success and contribute towards preventing the increased dropout rates at South African higher education institutions. One of the most significant discussions in higher education is student attrition in their first year of study. Student career guidance is an area that requires investigation in light of high attrition rates at university. Recent developments in data analytics, and the analysis of large data sets have enabled the production of powerful predictive models. This paper highlights how a predictive model can assist students, with an interest in Science to develop a skill profile required to be successful in their undergraduate Science programme. This is achieved by identifying the difference between the necessary skills required to be successful in a science programme (derived using data driven approaches) from the current learner's skill profile (derived from the learners' performance in assessments). The learners' skill profile is used to predict success in four Science streamlines. Based on the prediction results, we gauge the improvement in skills required to succeed in that programme. We provide the following contributions: (a) a trained classifier able to calculate the distribution over learners' success in Science streamlines focused around the notion of skill profiles; (b) a ranking of these skill profiles according to their information gain (entropy); and (c) an interactive program to calculate the posterior probability over these skill profiles given learner's pre-university observations. We argue that it is crucial that students gauge the focus areas of skill improvement prior to enrolling for their degree so that they can consider streams in Science degrees that are suited to their academic strengths.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130410455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robotic Device Control Systems : A Comprehensive Survey of Inspiring Models","authors":"C. Chibaya","doi":"10.1109/IMITEC50163.2020.9334085","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334085","url":null,"abstract":"A survey of the different mechanisms in which robotic devices in swarms are designed, configured and coordinated is conducted. Two categories of design inspirations are noted. On one hand, non-interactive systems are dominant. Non-interactive systems comprise mathematics based, physics inspired, and intelligent elitist robotic devices. On the other hand, interactive systems are more practical. These are commonly built on biological systems. The survey, generally, presented grounds and baseline views which swarm intelligence systems developers may pursue upon making robotic device design choices. The views shared may assist when design avenues to take or avoid are considered.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129806404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Self-Adaption of Network Security Mechanisms for Dependable Distributed Systems","authors":"Fortune Mashonganyika, C. Chibaya, Taurayi Rupere","doi":"10.1109/IMITEC50163.2020.9334148","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334148","url":null,"abstract":"Use of complex encryption parameters to attain strong encryption results enhances data integrity during transfer between nodes in distributed environments. However, the benefit comes at a performance cost as it increases resource usage. Use of network-based intrusion detection systems allows intelligent interventions where complex encryption parameters are reduced. We propose a method for implementing adaptive adjustment of encryption parameters in the AES algorithm on a client and server platform. Precisely, an algorithm used to implement adaptive encryption is proposed for distributed systems, which optimizes both performance and dependability. In addition, we present an efficient decryption protocol to reverse adaptive encryption. Results show that the overall performance of the proposed algorithm can be monitored, keeping such performances at acceptable levels whilst security of data in transit is still maintained. System performance can also be increased when communication time differences between nodes in a distributed environment are captured as parameters to trigger adaptation of the algorithm to either use more or lesser number of encryption rounds.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124906175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online learning platforms and their roles in influencing pass rate in rural communities of South Africa: Massive Open Online Courses(MOOCs)","authors":"D. E. Fatumo, S. Ngwenya","doi":"10.1109/IMITEC50163.2020.9334135","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334135","url":null,"abstract":"Online learning is largely becoming an integral part of the modern teaching methods and it continues to gain its popularity due to the availability of free and open-source resources that make learning and teaching much more interactive than ever before. This paper presents findings obtained when conducting the effects of the use of MOOCs in fostering learning and teaching strategies in rural communities of South Africa. The survey research design of descriptive nature was adopted to evaluate the awareness and usage of Massive Open Online Course (MOOCs) in Alice community, Eastern Cape, South Africa. This study also employed a quantitative approach by using a self-structured questionnaire to evoke information from the respondents. We used the Statistical Package for Social Sciences (SPSS) to analyze the data collected. The study revealed, amongst others, the efficacy of MOOCs in fostering teaching and learning in marginalized rural areas. This study concludes that MOOCs is a veritable medium for busy or less privileged individual to acquire a degree or certification. Therefore, the study recommends MOOCs platform to be fully embraced by people in marginalized rural areas, awareness programs about its usefulness should be propagated across the municipalities nationwide.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130242047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A literature review of methodologies that can eliminate redundancy in software development","authors":"Kenneth Mangwane, M. Hattingh","doi":"10.1109/IMITEC50163.2020.9334137","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334137","url":null,"abstract":"Software development is an iterative process by which software is created using a specific programming language through the combination of interrelated logic and functionality. Several factors cause software to change. The methods being used to manage projects in some businesses is very unstructured and cluttered. This paper reports on a systematic review of literature of 38 papers that consider how redundancy can be reduced in software development by fixing project management redundancies. The researcher recommends that agile methodologies can possibly solve the redundancy issue, as the plausible solutions discussed in the paper is applied within the agile methodology.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130396371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heart Disease Risk Level Prediction: Knitting Machine Learning Classifiers","authors":"Kelibone Eva Mamabolo, Moeketsi Mosia","doi":"10.1109/IMITEC50163.2020.9334141","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334141","url":null,"abstract":"Contemporary medical diagnosis is a multifaceted process, requiring accurate patient data, clinical expertise acquired over several years and a philosophical perceptive of relevant medical literature. The numerous uncertainty risk factors which characterises heart disease mean that the diagnosis of this disorder is a complex task, even for the experts. In an effort to decrease both the time required for disease diagnosis as well as to enhance the accuracy of the diagnosis, clinical decision support systems (DSS) have been developed that incorporate data mining techniques to enhance the disease diagnosis accuracy. When literature is investigated, it has been observed that different researchers report the classifier's performance based on the overall accuracy of the classifier. That is, most researchers would evaluate the classifier's performance and choose the best classifier based on its overall accuracy. The question raised by this study is “What if the best classifier based on the overall accuracy is not a good predictor of a particular class in question within the dataset?” This paper thus presented the diagnosis of heart disease risk level using classification techniques under the data mining approach. A detailed comparative study focuses on how different classifiers predict each heart-disease class during the process of disease diagnosis. The comparative study is discussed using the confusion matrix of each classifier.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117115912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Njabulo S. Mtetwa, Nombuso Sibeko, Paul Tarwireyi, A. Abu-Mahfouz
{"title":"OTA Firmware Updates for LoRaWAN Using Blockchain","authors":"Njabulo S. Mtetwa, Nombuso Sibeko, Paul Tarwireyi, A. Abu-Mahfouz","doi":"10.1109/IMITEC50163.2020.9334108","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334108","url":null,"abstract":"LoRa WAn is one of the LPWAN technologies that has become popular in both industries and research. LoRaWAN aims to provide long-range communication and empowers low-powered devices to last for years in the field. LoRaWAN relies on the symmetric cryptography to provide end-to-end encryption. Even though LoRaWAN relies on symmetric cryptography, there are recent works that try to enhance security of LoRaWAN by incorporating technologies like Blockchain. Blockchain is a decentralized peer-to-peer network that provides tamperproof and immutability of data. This paper proposes a Blockchain-based firmware update mechanism to enhance firmware update in LoRaWAN as well as managing the update process. This mechanism aims to provide updates by ensuring authenticity, and integrity of the firmware. The mechanism focuses more on devices that are too constrained in resources, hence for that purpose we evaluated the cost involved in some cryptographic operations taken to ensure security during firmware updates. We conclude that the approach is feasible for constrained devices in LoRaWAN network by evaluating the memory usage of the cryptographic operation used by the end device.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133893619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of SDN-Based Controller Placement Problem","authors":"M. Mbodila, Bassey Isong, N. Gasela","doi":"10.1109/IMITEC50163.2020.9334130","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334130","url":null,"abstract":"Software Defined Networks (SDN) is a novel computing paradigm that decouples the control plane from the data plane. Its introduction has brought about great and innovative changes in the way the computer network is designed, managed, and operated. Currently, SDN architecture can be deployed with a single centralized controller or multiple controllers. However, deploying a single controller to manage a large area network such as wide area networks is ineffective and not ideal since network performance requirements and good quality of service can't be achieved. This challenge is solved by deploying multiple controllers to eliminate single-point-of-failure, controller overload, transmission delay, and so on. Despite these, multi-controllers deployments come with controller placement problem (CPP) and several approaches have been proposed and developed to address it. Therefore, this paper conducted a review of some of the CPP for SDN with a focus on capacitated and uncapacitated schemes. We analyzed the schemes, classified them, and provide few future research directions aimed at improving the CPP scheme.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134275798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of the Use of DNS for Malicious Payload Distribution","authors":"Ishmael Dube, G. Wells","doi":"10.1109/IMITEC50163.2020.9334104","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334104","url":null,"abstract":"The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abused by cybercriminals to conduct malicious activities. Previous research has shown that cybercriminals use different methods, including the DNS protocol, to distribute malicious content, remain hidden and avoid detection from various technologies that are put in place to detect anomalies. This allows botnets and certain malware families to establish covert communication channels that can be used to send or receive data and also distribute malicious payloads using the DNS queries and responses. Cybercriminals use the DNS to breach highly protected networks, distribute malicious content, and exfiltrate sensitive information without being detected by security controls put in place by embedding certain strings in DNS packets. This research undertaking analysed the use of the DNS in detecting domains and channels that are used for distributing malicious payloads. Passive DNS data which replicate DNS queries on name servers to detect anomalies in DNS queries was evaluated and analysed in order to detect malicious payloads. The research characterised the malicious payload distribution channels by analysing passive DNS traffic and modelled the DNS query and response patterns used during malicious payload distribution. The research found that it is possible to detect malicious payload distribution channels through the analysis of DNS TXT resource records.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128188734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}