2019 IST-Africa Week Conference (IST-Africa)最新文献

筛选
英文 中文
IoT based Appliances Identification Techniques with Fog Computing for e-Health 基于物联网的电子医疗设备识别技术与雾计算
2019 IST-Africa Week Conference (IST-Africa) Pub Date : 2019-05-08 DOI: 10.23919/ISTAFRICA.2019.8764818
Amleset Kelati, I. Dhaou, Aron Kondoro, D. Rwegasira, H. Tenhunen
{"title":"IoT based Appliances Identification Techniques with Fog Computing for e-Health","authors":"Amleset Kelati, I. Dhaou, Aron Kondoro, D. Rwegasira, H. Tenhunen","doi":"10.23919/ISTAFRICA.2019.8764818","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764818","url":null,"abstract":"To improve the living standard of urban communities and to render the healthcare services sustainable and efficient, e-health system is experiencing a paradigm shift. Patients with cognitive discrepancies can be monitored and observed through the analyses of power consumption of home appliances. This paper surveys recent trends in home-based e-health services using metered energy consumption data. It also analyses and summarizes the constant impedance, constant current and constant power (ZIP) approaches for load modelling. The analysis briefly recaptures both non-intrusive and intrusive techniques. The work reports an architecture using IoT technologies for the design of a smart-meter, and fog-computing paradigm for raw processing of energy dataset. Finally, the paper describes the implementation platform based on GirdLAB-D simulation to construct accurate models of household appliances and test the machine-learning algorithm for the detection of abnormal behaviour.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133583196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Annotation Framework for Hate Speech Identification in Tweets: Case Study of Tweets During Kenyan Elections 推文中仇恨言论识别的注释框架:肯尼亚选举期间推文的案例研究
2019 IST-Africa Week Conference (IST-Africa) Pub Date : 2019-05-08 DOI: 10.23919/ISTAFRICA.2019.8764868
Edward Ombui, Moses Karani, Lawrence Muchemi
{"title":"Annotation Framework for Hate Speech Identification in Tweets: Case Study of Tweets During Kenyan Elections","authors":"Edward Ombui, Moses Karani, Lawrence Muchemi","doi":"10.23919/ISTAFRICA.2019.8764868","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764868","url":null,"abstract":"Considering the colossal amount of user-generated content on social media, it has become increasingly difficult to monitor hateful content being published on public online spaces, especially during the electioneering periods, particularly in Kenya. In this regard, it is crucial to automate the identification of hate speech in order to manage the volume, variety, veracity and velocity of this content. In this research, we postulate a supervised machine learning approach whereby annotation of the training data set is critical in determining the performance of the trained classifier. Therefore, we develop an annotation framework based on Sternberg’s (2003) hate theory and test its performance in classifying about 5k tweets using 3 human annotators per tweet. Preliminary results indicate an intercoder reliability score of 0.5027 based on Krippendorff’s alpha.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134536594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Generic Framework for eLearning Adoption 采用电子学习的通用框架
2019 IST-Africa Week Conference (IST-Africa) Pub Date : 2019-05-08 DOI: 10.23919/ISTAFRICA.2019.8764857
Zebiba Ali Abegaz, E. Ngassam
{"title":"A Generic Framework for eLearning Adoption","authors":"Zebiba Ali Abegaz, E. Ngassam","doi":"10.23919/ISTAFRICA.2019.8764857","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764857","url":null,"abstract":"The significant relevance of eLearning in the 21st century gives room to proliferate eLearning platforms and frameworks in the digital world. The selection and adoption of an appropriate framework tailored to the intrinsic challenge of a learning institution becomes cumbersome. This may be attributed to the lack of a formal approach for the classification and evaluation of existing eLearning frameworks and selection of a framework for eLearning adoption. This paper seeks to alleviate the foregoing problems by developing a generic eLearning framework aimed at enabling learning institution to make informed selection without loss of generality. The proposed generic framework consists of well-defined building blocks that are considered fundamentals for the translation of the framework into an automated working eLearning Platform. Each building block in the proposed generic framework was surveyed in the context of Ethiopian higher learning institutions. A questionnaire based online survey was conducted on about 100 participants (students, teachers and administrators). The data were analyzed using descriptive statistics (mean and standard deviation) in SPSS V-25 to investigate to what extent the building blocks are relevant to the implementation of an eLearning system. The study found that the generic framework in general and the building blocks of the generic framework namely institution, culture, technology, pedagogy, management, evaluation and ethics in particular are significant for eLearning implementation. As a matter of future work, this will be used as a basis for taxonomy development of eLearning frameworks. Furthermore, the full description of components and elements of the building blocks should be investigated as basis for the maturity assessment of eLearning frameworks in real-life contexts.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Conceptual Model for Measuring and Supporting Self-Regulated Learning using Educational Data Mining on Learning Management Systems 基于学习管理系统的教育数据挖掘测量和支持自主学习的概念模型
2019 IST-Africa Week Conference (IST-Africa) Pub Date : 2019-05-08 DOI: 10.23919/ISTAFRICA.2019.8764852
Eric Araka, E. Maina, Rhoda Gitonga, Robert O. Oboko
{"title":"A Conceptual Model for Measuring and Supporting Self-Regulated Learning using Educational Data Mining on Learning Management Systems","authors":"Eric Araka, E. Maina, Rhoda Gitonga, Robert O. Oboko","doi":"10.23919/ISTAFRICA.2019.8764852","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764852","url":null,"abstract":"Self-Regulated Learning (SRL) is a field in educational psychology that as attracted tremendous research studies from various communities including ICTs. Recent studies and meta-analysis have greatly contributed to the domain knowledge that the use SRL strategies boost academic performance for learners. Despite these developments in SRL, our understanding on the tools and instruments to measure SRL in online learning environments is limited as the use of traditional tools developed for face-to-face classroom settings are still used to measure SRL on e-learning systems. Additionally, most of these studies focus on SRL on Massive Open Online Course (MOOC) environments and only analyse SRL strategies with limited attention to the scaffolds or interventions employed to stimulate growth of SRL skills in learners. The modern Learning Management Systems (LMS) such as Moodle allow storage of datasets on student activities. Consequently, it is possible to use Educational Data Mining (EDM) to extract learner patterns which can be used to support SRL and explore how SRL strategies change over time and inform the instructor. In view of this, the research examines the current SRL measurement and promotion tools for e-learning environments and proposes a conceptual model grounded on EDM for implementation as a solution to measuring and promoting SRL strategies for learners within LMS.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"47 44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124718718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Review of Mobile Learning Considerations in Open Distance Learning and Access to Higher Education 开放远程教育与高等教育可及性中的移动学习思考综述
2019 IST-Africa Week Conference (IST-Africa) Pub Date : 2019-05-08 DOI: 10.23919/ISTAFRICA.2019.8764821
P. Wainaina, E. Maina, D. Nzuki
{"title":"A Review of Mobile Learning Considerations in Open Distance Learning and Access to Higher Education","authors":"P. Wainaina, E. Maina, D. Nzuki","doi":"10.23919/ISTAFRICA.2019.8764821","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764821","url":null,"abstract":"The advent of the ubiquitous mobile technology, the ever-changing interactive multimedia resources, and the mobility nature of the adult learners has galvanized the world-wide synergy of working towards the establishment of a global knowledge economy. This paper was informed by review of wide collection of literature that established how the mobile learning considerations in Open and Distance Learning influence access to higher education. The paper explains what; the everpresent nature of mobile learning characteristics, the andragogical factors, the organizational considerations, and the regulatory framework in Open and Distance Learning influence the access to higher education. The paper establishes that higher education institutions must consider improving technological infrastructure and incompatibility of mobile devices with learning management systems, provide modern mobile devices, improve instructors’ andragogical skills on m-learning, deal with instructors and students concerns and provide motivations incentives for m-learning.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126837500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review of Security Techniques against Black hole Attacks in Mobile Ad hoc Networks 移动自组织网络黑洞攻击安全技术综述
2019 IST-Africa Week Conference (IST-Africa) Pub Date : 2019-05-08 DOI: 10.23919/ISTAFRICA.2019.8764862
E. G. Mwangi, G. M. Muketha, Gabriel Kamau Ndungu
{"title":"A Review of Security Techniques against Black hole Attacks in Mobile Ad hoc Networks","authors":"E. G. Mwangi, G. M. Muketha, Gabriel Kamau Ndungu","doi":"10.23919/ISTAFRICA.2019.8764862","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764862","url":null,"abstract":"Mobile ad hoc network (MANET) is a special type of a wireless network formed by nodes that communicate without any fixed infrastructure or centralised management. Nodes in MANET act as a router and a host. These nodes are free to join and leave the network. Routes are established by use of special routing protocols. Mobility of nodes makes the network topology dynamic at any given time. These unique features together with unsecured boundaries make the security of MANETs a challenging endeavor. MANETs are prone to attacks such black hole among others. Sometimes the black hole nodes cooperate forming cooperative black hole attack that drop or redirecting data packets. This paper reviews various security techniques and routing protocols against black hole attacks and establishes their limitations. The identified knowledge gaps will be used as a foundation for the development of a resilient security technique against collaborative black hole attacks.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123088496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Framework for Technology Enriched Active Class Learning of Physics in Secondary Schools in Kenya 技术丰富肯尼亚中学物理课堂主动学习的框架
2019 IST-Africa Week Conference (IST-Africa) Pub Date : 2019-05-08 DOI: 10.23919/ISTAFRICA.2019.8764831
Elijah Owuor Okono, F. Awuor, E. Abenga, Victor Kimeli, Sarah Otanga
{"title":"Framework for Technology Enriched Active Class Learning of Physics in Secondary Schools in Kenya","authors":"Elijah Owuor Okono, F. Awuor, E. Abenga, Victor Kimeli, Sarah Otanga","doi":"10.23919/ISTAFRICA.2019.8764831","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764831","url":null,"abstract":"Active learning transforms the learning process and activities from tutor focused to learner-centred and is driven by the learner’s learning ability. In other words, active learning provides an opportunity for self-directed learning that enables the learners to engage with the learning materials at personal level and pace. Thus, this paper argues that active learning can provide equal learning opportunities for both introvert and extrovert learners irrespective of the differences in their personality traits that would otherwise affect how they learning. Hence, this paper proposes a framework for technology-enriched active learning for young learners that provides a personalized learning that deviates from the traditional “fit-for-all” classroom setups that tends to favour only the extrovert students. The proposed framework leverages advancement in technology such as personal learning network, virtual physics labs, massive open online courses, and crowd-sourced expert opinions to provide the learners with just-in-time active learning opportunity.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127946208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of an Upper Extremity {Stroke Rehabilitation mHealth Application for sub-Saharan Africa: A Usability Study 撒哈拉以南非洲上肢卒中康复移动健康应用开发:可用性研究
2019 IST-Africa Week Conference (IST-Africa) Pub Date : 2019-05-08 DOI: 10.23919/ISTAFRICA.2019.8764867
C. Hughes, T. Mariscal, Moges Baye, Gashaw Jember Belay, Amy Hintze, Alejandra Padilla, S. Warner, Michael Sera, Chloe Gordon-Murer
{"title":"Development of an Upper Extremity {Stroke Rehabilitation mHealth Application for sub-Saharan Africa: A Usability Study","authors":"C. Hughes, T. Mariscal, Moges Baye, Gashaw Jember Belay, Amy Hintze, Alejandra Padilla, S. Warner, Michael Sera, Chloe Gordon-Murer","doi":"10.23919/ISTAFRICA.2019.8764867","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764867","url":null,"abstract":"There is unambiguous evidence that post-stroke rehabilitation facilitates motor recovery and improves quality of life and functional independence. However, there are vast differences in the approach to stroke rehabilitation within sub-Saharan Africa, which are primarily driven by the availability of resources and access to rehabilitation services. The recent global explosion of the adoption of internet communication technologies (ICT), particularly in the case of mobile phones, in subSaharan Africa presents an exciting opportunity to address this need. In this study we co-designed and evaluated the usability of a community-based mHealth application (the outREACH system) for the delivery of personalizable upper extremity stroke assessment and rehabilitation for patients who live in low-resource settings without access to standard rehabilitation services. The results of this work will be used to develop a fully functional system that can be used in clinical rehabilitation of stroke.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127410653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Noticeboard Application Using Context Aware Services: Case of Strathmore University, Kenya 使用上下文感知服务的布告栏应用程序:以肯尼亚斯特拉斯莫尔大学为例
2019 IST-Africa Week Conference (IST-Africa) Pub Date : 2019-05-08 DOI: 10.23919/ISTAFRICA.2019.8764863
Eugene Odanga Masinde, Bernard Shibwabo Kasamani
{"title":"A Noticeboard Application Using Context Aware Services: Case of Strathmore University, Kenya","authors":"Eugene Odanga Masinde, Bernard Shibwabo Kasamani","doi":"10.23919/ISTAFRICA.2019.8764863","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764863","url":null,"abstract":"The dissemination of information in large organizations using noticeboards is both inefficient and ineffective due to the static, unreliable and limiting nature of the boards. Noticeboards are constrained in terms of reach, poor feedback mechanisms and a general lack of security. Posts can be tampered with by malicious people or even removed by competitors. Due to their fixed nature, noticeboards also do not cater for context, meaning that a lot of posts are consumed outside of their actionable spaces. This research proposes a context aware noticeboard in which subscribers are able to receive, store or share notices based on their context and be in a better position to react or act on them accordingly. Object Oriented Analysis and Agile development methodologies were applied to develop a robust and dynamic, context aware Android-based noticeboard application with an analytical backend for visualizations. The final prototype was tested for usability and functionality with usability and acceptance rates of more than 90%. Furthermore, we recommend that more services being hinged on BLE and context awareness should be explored due to the success of the proposed solution. Additionally, it is imperative that institutions migrate towards smart solutions for communication.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129255060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Sensitive Data Leakage through Android Applications in a Bring Your Own Device (BYOD) Workplace 在自带设备(BYOD)工作场所中通过Android应用程序泄露敏感数据的审查
2019 IST-Africa Week Conference (IST-Africa) Pub Date : 2019-05-08 DOI: 10.23919/ISTAFRICA.2019.8764833
M. Morolong, Attlee M. Gamundani, F. Bhunu Shava
{"title":"Review of Sensitive Data Leakage through Android Applications in a Bring Your Own Device (BYOD) Workplace","authors":"M. Morolong, Attlee M. Gamundani, F. Bhunu Shava","doi":"10.23919/ISTAFRICA.2019.8764833","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764833","url":null,"abstract":"Researchers reveal that personal computers are not exclusively liable to attacks. Mobile devices have become the very best target due to the fact that, they are largely accustomed to performing numerous activities. Email communication, sending and receiving text messages, installation of monetary applications (apps) such as mobile banking apps and Bring Your Own Device (BYOD) adoption in enterprises for work-related functions are among others. Literature review establishes that attackers of mobile devices gather sensitive user and enterprise data, which they use for blackmailing or for amerceable monetary gains. As the subsequent result of mobile app protection and Android vulnerability concerns, researchers and practitioners are evaluating the impact the security of android mobile device has on enterprise and personal data. This paper reviews the extent of data leakage through android devices in a BYOD enabled environment, android application security model and BYOD benefits and risks using desktop review as the methodology.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115986169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信