2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)最新文献

筛选
英文 中文
Analysis of Energy-efficient Techniques for SDWSN Energy Usage Optimization SDWSN能源利用优化的节能技术分析
Ishmael Mathebula, Bassey Isong, N. Gasela, A. Abu-Mahfouz
{"title":"Analysis of Energy-efficient Techniques for SDWSN Energy Usage Optimization","authors":"Ishmael Mathebula, Bassey Isong, N. Gasela, A. Abu-Mahfouz","doi":"10.1109/IMITEC50163.2020.9334084","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334084","url":null,"abstract":"Software-Defined Wireless Sensor Networks (SDWSN) has received significant attention in recent years due to its inherent challenges such as network security, trust management, inefficient energy consumption, and so on. In particular, inefficient energy utilization has remained a core critical challenge as sensor nodes are naturally resource constraint and mostly deployed in unattended environments. This challenge has a direct impact on SDWSN performance and reliability. Albeit, several techniques have been proposed and developed to address the challenge in the traditional WSN and few for SDWSN, optimal efficient energy utilization is yet to be achieved. Therefore, this paper survey some of the energy efficiency techniques reported in the literature. The goal is to gain insights into these techniques, strategies employed, their pros and cons which could be utilized to design an efficient-energy mechanism for SDWSN. The findings obtained show that the existing approach ensures efficient energy utilization and improve network performance. While some have routing protocol and security mechanisms, fault tolerance, and battery fault detector mechanisms are not incorporated.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132426231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data-Driven Student Support for Academic Success by Developing Student Skill Profiles 数据驱动的学生通过发展学生技能档案支持学业成功
Ritesh Ajoodha, S. Dukhan, Ashwini Jadhav
{"title":"Data-Driven Student Support for Academic Success by Developing Student Skill Profiles","authors":"Ritesh Ajoodha, S. Dukhan, Ashwini Jadhav","doi":"10.1109/IMITEC50163.2020.9334109","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334109","url":null,"abstract":"In this paper, we attempt to provide a data-driven solution to the data-congested environment of attributes related to student success and contribute towards preventing the increased dropout rates at South African higher education institutions. One of the most significant discussions in higher education is student attrition in their first year of study. Student career guidance is an area that requires investigation in light of high attrition rates at university. Recent developments in data analytics, and the analysis of large data sets have enabled the production of powerful predictive models. This paper highlights how a predictive model can assist students, with an interest in Science to develop a skill profile required to be successful in their undergraduate Science programme. This is achieved by identifying the difference between the necessary skills required to be successful in a science programme (derived using data driven approaches) from the current learner's skill profile (derived from the learners' performance in assessments). The learners' skill profile is used to predict success in four Science streamlines. Based on the prediction results, we gauge the improvement in skills required to succeed in that programme. We provide the following contributions: (a) a trained classifier able to calculate the distribution over learners' success in Science streamlines focused around the notion of skill profiles; (b) a ranking of these skill profiles according to their information gain (entropy); and (c) an interactive program to calculate the posterior probability over these skill profiles given learner's pre-university observations. We argue that it is crucial that students gauge the focus areas of skill improvement prior to enrolling for their degree so that they can consider streams in Science degrees that are suited to their academic strengths.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130410455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Robotic Device Control Systems : A Comprehensive Survey of Inspiring Models 机器人设备控制系统:鼓舞人心的模型的综合调查
C. Chibaya
{"title":"Robotic Device Control Systems : A Comprehensive Survey of Inspiring Models","authors":"C. Chibaya","doi":"10.1109/IMITEC50163.2020.9334085","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334085","url":null,"abstract":"A survey of the different mechanisms in which robotic devices in swarms are designed, configured and coordinated is conducted. Two categories of design inspirations are noted. On one hand, non-interactive systems are dominant. Non-interactive systems comprise mathematics based, physics inspired, and intelligent elitist robotic devices. On the other hand, interactive systems are more practical. These are commonly built on biological systems. The survey, generally, presented grounds and baseline views which swarm intelligence systems developers may pursue upon making robotic device design choices. The views shared may assist when design avenues to take or avoid are considered.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129806404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Self-Adaption of Network Security Mechanisms for Dependable Distributed Systems 可靠分布式系统网络安全机制的实时自适应
Fortune Mashonganyika, C. Chibaya, Taurayi Rupere
{"title":"Real-Time Self-Adaption of Network Security Mechanisms for Dependable Distributed Systems","authors":"Fortune Mashonganyika, C. Chibaya, Taurayi Rupere","doi":"10.1109/IMITEC50163.2020.9334148","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334148","url":null,"abstract":"Use of complex encryption parameters to attain strong encryption results enhances data integrity during transfer between nodes in distributed environments. However, the benefit comes at a performance cost as it increases resource usage. Use of network-based intrusion detection systems allows intelligent interventions where complex encryption parameters are reduced. We propose a method for implementing adaptive adjustment of encryption parameters in the AES algorithm on a client and server platform. Precisely, an algorithm used to implement adaptive encryption is proposed for distributed systems, which optimizes both performance and dependability. In addition, we present an efficient decryption protocol to reverse adaptive encryption. Results show that the overall performance of the proposed algorithm can be monitored, keeping such performances at acceptable levels whilst security of data in transit is still maintained. System performance can also be increased when communication time differences between nodes in a distributed environment are captured as parameters to trigger adaptation of the algorithm to either use more or lesser number of encryption rounds.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124906175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online learning platforms and their roles in influencing pass rate in rural communities of South Africa: Massive Open Online Courses(MOOCs) 在线学习平台及其对南非农村社区通过率的影响:大规模在线开放课程(MOOCs)
D. E. Fatumo, S. Ngwenya
{"title":"Online learning platforms and their roles in influencing pass rate in rural communities of South Africa: Massive Open Online Courses(MOOCs)","authors":"D. E. Fatumo, S. Ngwenya","doi":"10.1109/IMITEC50163.2020.9334135","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334135","url":null,"abstract":"Online learning is largely becoming an integral part of the modern teaching methods and it continues to gain its popularity due to the availability of free and open-source resources that make learning and teaching much more interactive than ever before. This paper presents findings obtained when conducting the effects of the use of MOOCs in fostering learning and teaching strategies in rural communities of South Africa. The survey research design of descriptive nature was adopted to evaluate the awareness and usage of Massive Open Online Course (MOOCs) in Alice community, Eastern Cape, South Africa. This study also employed a quantitative approach by using a self-structured questionnaire to evoke information from the respondents. We used the Statistical Package for Social Sciences (SPSS) to analyze the data collected. The study revealed, amongst others, the efficacy of MOOCs in fostering teaching and learning in marginalized rural areas. This study concludes that MOOCs is a veritable medium for busy or less privileged individual to acquire a degree or certification. Therefore, the study recommends MOOCs platform to be fully embraced by people in marginalized rural areas, awareness programs about its usefulness should be propagated across the municipalities nationwide.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130242047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A literature review of methodologies that can eliminate redundancy in software development 对可以消除软件开发中冗余的方法的文献回顾
Kenneth Mangwane, M. Hattingh
{"title":"A literature review of methodologies that can eliminate redundancy in software development","authors":"Kenneth Mangwane, M. Hattingh","doi":"10.1109/IMITEC50163.2020.9334137","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334137","url":null,"abstract":"Software development is an iterative process by which software is created using a specific programming language through the combination of interrelated logic and functionality. Several factors cause software to change. The methods being used to manage projects in some businesses is very unstructured and cluttered. This paper reports on a systematic review of literature of 38 papers that consider how redundancy can be reduced in software development by fixing project management redundancies. The researcher recommends that agile methodologies can possibly solve the redundancy issue, as the plausible solutions discussed in the paper is applied within the agile methodology.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130396371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heart Disease Risk Level Prediction: Knitting Machine Learning Classifiers 心脏病风险水平预测:编织机器学习分类器
Kelibone Eva Mamabolo, Moeketsi Mosia
{"title":"Heart Disease Risk Level Prediction: Knitting Machine Learning Classifiers","authors":"Kelibone Eva Mamabolo, Moeketsi Mosia","doi":"10.1109/IMITEC50163.2020.9334141","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334141","url":null,"abstract":"Contemporary medical diagnosis is a multifaceted process, requiring accurate patient data, clinical expertise acquired over several years and a philosophical perceptive of relevant medical literature. The numerous uncertainty risk factors which characterises heart disease mean that the diagnosis of this disorder is a complex task, even for the experts. In an effort to decrease both the time required for disease diagnosis as well as to enhance the accuracy of the diagnosis, clinical decision support systems (DSS) have been developed that incorporate data mining techniques to enhance the disease diagnosis accuracy. When literature is investigated, it has been observed that different researchers report the classifier's performance based on the overall accuracy of the classifier. That is, most researchers would evaluate the classifier's performance and choose the best classifier based on its overall accuracy. The question raised by this study is “What if the best classifier based on the overall accuracy is not a good predictor of a particular class in question within the dataset?” This paper thus presented the diagnosis of heart disease risk level using classification techniques under the data mining approach. A detailed comparative study focuses on how different classifiers predict each heart-disease class during the process of disease diagnosis. The comparative study is discussed using the confusion matrix of each classifier.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117115912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OTA Firmware Updates for LoRaWAN Using Blockchain 使用区块链的LoRaWAN OTA固件更新
Njabulo S. Mtetwa, Nombuso Sibeko, Paul Tarwireyi, A. Abu-Mahfouz
{"title":"OTA Firmware Updates for LoRaWAN Using Blockchain","authors":"Njabulo S. Mtetwa, Nombuso Sibeko, Paul Tarwireyi, A. Abu-Mahfouz","doi":"10.1109/IMITEC50163.2020.9334108","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334108","url":null,"abstract":"LoRa WAn is one of the LPWAN technologies that has become popular in both industries and research. LoRaWAN aims to provide long-range communication and empowers low-powered devices to last for years in the field. LoRaWAN relies on the symmetric cryptography to provide end-to-end encryption. Even though LoRaWAN relies on symmetric cryptography, there are recent works that try to enhance security of LoRaWAN by incorporating technologies like Blockchain. Blockchain is a decentralized peer-to-peer network that provides tamperproof and immutability of data. This paper proposes a Blockchain-based firmware update mechanism to enhance firmware update in LoRaWAN as well as managing the update process. This mechanism aims to provide updates by ensuring authenticity, and integrity of the firmware. The mechanism focuses more on devices that are too constrained in resources, hence for that purpose we evaluated the cost involved in some cryptographic operations taken to ensure security during firmware updates. We conclude that the approach is feasible for constrained devices in LoRaWAN network by evaluating the memory usage of the cryptographic operation used by the end device.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133893619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review of SDN-Based Controller Placement Problem 基于sdn的控制器布局问题综述
M. Mbodila, Bassey Isong, N. Gasela
{"title":"A Review of SDN-Based Controller Placement Problem","authors":"M. Mbodila, Bassey Isong, N. Gasela","doi":"10.1109/IMITEC50163.2020.9334130","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334130","url":null,"abstract":"Software Defined Networks (SDN) is a novel computing paradigm that decouples the control plane from the data plane. Its introduction has brought about great and innovative changes in the way the computer network is designed, managed, and operated. Currently, SDN architecture can be deployed with a single centralized controller or multiple controllers. However, deploying a single controller to manage a large area network such as wide area networks is ineffective and not ideal since network performance requirements and good quality of service can't be achieved. This challenge is solved by deploying multiple controllers to eliminate single-point-of-failure, controller overload, transmission delay, and so on. Despite these, multi-controllers deployments come with controller placement problem (CPP) and several approaches have been proposed and developed to address it. Therefore, this paper conducted a review of some of the CPP for SDN with a focus on capacitated and uncapacitated schemes. We analyzed the schemes, classified them, and provide few future research directions aimed at improving the CPP scheme.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134275798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Analysis of the Use of DNS for Malicious Payload Distribution 利用DNS进行恶意负载分发的分析
Ishmael Dube, G. Wells
{"title":"An Analysis of the Use of DNS for Malicious Payload Distribution","authors":"Ishmael Dube, G. Wells","doi":"10.1109/IMITEC50163.2020.9334104","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334104","url":null,"abstract":"The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abused by cybercriminals to conduct malicious activities. Previous research has shown that cybercriminals use different methods, including the DNS protocol, to distribute malicious content, remain hidden and avoid detection from various technologies that are put in place to detect anomalies. This allows botnets and certain malware families to establish covert communication channels that can be used to send or receive data and also distribute malicious payloads using the DNS queries and responses. Cybercriminals use the DNS to breach highly protected networks, distribute malicious content, and exfiltrate sensitive information without being detected by security controls put in place by embedding certain strings in DNS packets. This research undertaking analysed the use of the DNS in detecting domains and channels that are used for distributing malicious payloads. Passive DNS data which replicate DNS queries on name servers to detect anomalies in DNS queries was evaluated and analysed in order to detect malicious payloads. The research characterised the malicious payload distribution channels by analysing passive DNS traffic and modelled the DNS query and response patterns used during malicious payload distribution. The research found that it is possible to detect malicious payload distribution channels through the analysis of DNS TXT resource records.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128188734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信