{"title":"Improving Network Management with Software Defined Networking using OpenFlow Protocol","authors":"Koketso Molemane Rodney Mokoena, Ramahlapane Lerato Moila, Prof Mthulisi Velempini","doi":"10.1109/icABCD59051.2023.10220519","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220519","url":null,"abstract":"With the advancement of network-based devices, resulting in communication networks also growing rapidly and becoming more complex, resulting in large and heterogeneous network architecture has brought a lot of challenges in network management. Therefore, managing the network has become an increasingly a challenge given the existing network architectures. In this study, we have investigated how network operators operate, maintain and secure telecommunications networks. The study has also investigated the effectiveness of Software Defined Networking (SDN) in improving network management. The study has also investigated how the architecture minimizes the challenges users face. To improve network management with SDN using the OpenFlow protocol, we created network topologies and configured devices using the graphical network simulator 3, Oracle VM VirtualBox Manager, and Mininet VM. Our approach implemented both Git and Ansible in a centralized network architecture to solve the problems facing existing network architectures with the rapid growth of network-based devices on the Internet. This research paper has shown how to use Ansible playbooks to manage your network and overcome the challenges you face. The simulation results shows that the proposed scheme performs better in terms of efficiency and flexibility than the traditional OpenFlow protocol. These improvements have been achieved through the separation of the control and data planes, allowing for more centralized network management and easier implementation of network policies.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"33 1","pages":"1-5"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87963992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Big DataPub Date : 2023-08-03DOI: 10.1109/icABCD59051.2023.10220553
T. Sefara, Mapitsi Rangata
{"title":"Topic Classification of Tweets in the Broadcasting Domain using Machine Learning Methods","authors":"T. Sefara, Mapitsi Rangata","doi":"10.1109/icABCD59051.2023.10220553","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220553","url":null,"abstract":"Twitter is one of the microblogging sites with millions of daily users. Broadcast companies use Twitter to share short messages to engage or share opinions about a particular topic or product. With a large number of conversations available on Twitter, it is difficult to identify the category of topics in the broadcasting domain. This paper proposes the use of unsupervised learning to generate topics from unlabelled tweet data sets in the broadcasting domain using the latent Dirichlet allocation (LDA) method. Approximately six groups of topics were generated and each group was assigned a label or category. These labels were used to label the data by finding the dominating label in each tweet as the main category. Supervised learning was conducted to train six machine learning models which are multinomial logistic regression, XGBoost, decision trees, random forest, support vector machines, and multilayer perceptron (MLP). The models were able to learn from the data to predict the category of each tweet from the testing data. The models were evaluated using accuracy and the f1 score. Linear support vector machine and MLP obtained better classi-fication results compared to other trained models.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"61 1","pages":"1-6"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74084993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Big DataPub Date : 2023-08-03DOI: 10.1109/icABCD59051.2023.10220556
Makhabane Molapo, Chunling Tu, Deao Du Plessis, Shengzhi Du
{"title":"Management and Monitoring of Livestock in the Farm Using Deep Learning","authors":"Makhabane Molapo, Chunling Tu, Deao Du Plessis, Shengzhi Du","doi":"10.1109/icABCD59051.2023.10220556","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220556","url":null,"abstract":"Livestock management and monitoring system play a crucial role in farm operations. This paper proposes a system for the management and monitoring of livestock on a farm using deep learning techniques. Traditional methods of monitoring livestock involve manual observation, which can be time-consuming and unreliable. Various systems have been developed, however, there are still challenges existing in present livestock classification and counting, including occlusion, animal overlapping, shadow, etc. To improve all these challenges, this paper presents a monitoring system of livestock under different conditions by the end-to-end deep learning model of You Only Look Once version 5 (YOLOv5). The suggested model conducts feature extraction on the original image with the original YOLOv5 backbone network and detects livestock of different sizes for counting on each anchor frame. Additionally, this model identifies and tracks individual animals The Kaggle dataset collected in real-time containing different animals is used as YOLOv5 relies heavily on data augmentation to improve its detection and tracking performance and validate the proposed system. The scaling, resizing, and manipulation of the splitting dataset are done by the Roboflow application. Additionally, this paper seeks to demonstrate the latest research in utilizing Faster Regional convolutional neural networks (R-CNN) and compare its backbones with the original YOLOv5 backbone. The tensor board graphs from Colab show that this proposed system outperformed other R-CNN, achieving an accuracy of 93% on mAP@_0.5%, making it a promising option for intelligent farm monitoring and managing.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"6 1","pages":"1-6"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79674554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Big DataPub Date : 2023-08-03DOI: 10.1109/icABCD59051.2023.10220542
Fati Tahiru, Steven. Parbanath
{"title":"Using an Exploratory Analytical Approach to Distinguish the Habits of Graduating and Non-Graduating Students in a Virtual Learning Environment","authors":"Fati Tahiru, Steven. Parbanath","doi":"10.1109/icABCD59051.2023.10220542","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220542","url":null,"abstract":"Understanding student behaviour is crucial for creating personalised learning and other interventions. Educational stakeholders continue investigating diverse solutions to improve student learning behaviour in higher educational institutions. One solution that stands out is to gain insights and identify the trends and patterns in data about students learning behaviour for decision-making. Exploratory Data Analysis (EDA) is a method for analysing and summarising data in order to get insights and recognise patterns or trends about an entity. This study seeks to utilise Exploratory Data Analysis to analyse students' logs in the virtual learning environment to distinguish the characteristics/habits of students who graduate and students who do not graduate from higher educational institutions. The process flow for implementing EDA can act as a helpful guide for educational stakeholders. The study findings indicate that the revision trend of graduated students is much more frequent than that of non-graduated students. However, there were no differences in habits in the early access to the learning materials before the start of the program. Academic stakeholders can utilise the approach to enable them to make better decisions when assessing students' behaviour and trends in the virtual environment.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"187 1","pages":"1-8"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80670616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Big DataPub Date : 2023-08-03DOI: 10.1109/icABCD59051.2023.10220467
Patrick Mwansa, Boniface Kabaso
{"title":"Blockchain Electoral Vote Counting Solutions: A Comparative Analysis of Methods, Constraints, and Approaches","authors":"Patrick Mwansa, Boniface Kabaso","doi":"10.1109/icABCD59051.2023.10220467","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220467","url":null,"abstract":"Blockchain technology in electronic voting has emerged as an alternative to other electronic and paper-based voting systems to minimize inconsistencies and redundancies. However, past experiences indicate limited success due to scalability, speed, and privacy issues. This systematic literature review examines the methods, constraints, and approaches in the existing literature on blockchain-based electoral vote-counting solutions. A thorough search of pertinent databases was performed, and selected studies were assessed based on predefined inclusion and exclusion criteria. The review's findings reveal that most existing solutions employ smart contracts and various cryptographic algorithms to create secure and transparent voting systems. However, the study also pinpoints areas that require improvement, such as scalability, privacy, and accessibility. The review recommends exploring different combinations of blockchain platforms, cryptographic algorithms, and programming languages to develop secure and transparent voting systems. Additionally, future research could investigate the potential benefits and challenges of incorporating Internet of Things (IoT) devices, consensus mechanisms, and other technologies into the voting process. The review concludes that more research is needed to enhance the security and transparency of blockchain-based voting systems.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"1 1","pages":"1-10"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77640701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Big DataPub Date : 2023-08-03DOI: 10.1109/icABCD59051.2023.10220503
Z. C. Khan, Thulile Mkhwanazi, M. Masango
{"title":"A Model for Cyber Threat Intelligence for Organisations","authors":"Z. C. Khan, Thulile Mkhwanazi, M. Masango","doi":"10.1109/icABCD59051.2023.10220503","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220503","url":null,"abstract":"As cyber attacks are increasing in South Africa, organisations need to strengthen cyber security controls. Cyber Threat Intelligence is an essential component of a Cybersecurity program but is often overlooked. It can assist to identify future and potential cyber threats. Organisations process large volumes of data containing Cyber Threat Intelligence, but this is often not collected, processed, or considered as Cyber Threat Intelligence. South African organizations will continue to feel the repercussions of cyber-attacks if actions are not taken. To bring clarity and allow South African organizations to leverage on Cyber Threat Intelligence, this work aims to categorize Cyber Threat Intelligence for organizations. Several characteristics of Cyber Threat Intelligence are discussed, and thereafter a model is presented. The applicability of this model is demonstrated by a short use-case.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"47 1","pages":"1-7"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73718574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Big DataPub Date : 2023-08-03DOI: 10.1109/icABCD59051.2023.10220551
Steven Lububu, Boniface Kabaso
{"title":"A Systematic Literature Review on Machine Learning and Laboratory Techniques for the Diagnosis of African swine fever (ASF)","authors":"Steven Lububu, Boniface Kabaso","doi":"10.1109/icABCD59051.2023.10220551","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220551","url":null,"abstract":"African swine fever (ASF) is a virulent infectious disease of pigs. It can infect domestic and wild pigs, causing severe economic and production losses. The virus can be spread through live or dead pigs and through pork products. Since there is currently no vaccine or treatment method, it poses a major challenge and threat to the pig industry once it breaks out. The results of the investigation show that most existing solutions use laboratory tests to diagnose possible ASF cases. In addition, various machine learning (ML) techniques have been used in the past to diagnose ASF. However, historical review of recent years shows that laboratories have difficulty diagnosing ASF with the required accuracy due to a lack of correlation between causes and effects. Lack of accuracy and incorrect ASF diagnoses by laboratories have proven to be a major problem for pig welfare. Consequently, misdiagnosis of ASF disease can result in severe direct and indirect economic losses to farmers, especially farmers whose income is derived primarily from pig production. While several other researchers have proposed the use of ML for ASF diagnosis, the application of cause-effect relationships between specific viruses and symptoms for ASF diagnosis is still missing. In this systematic literature review, we examine the methods, limitations, and approaches in the existing literature from ML and laboratories for ASF diagnosis. In this review, we evaluate the performance of ML and laboratory techniques for ASF diagnosis. In addition, we compare the performance of the techniques of ML with other statistical approaches such as causal ML and computer vision for ASF diagnosis. In addition, the strengths and weaknesses of ML and laboratory techniques for ASF diagnosis were summarized. A thorough search of relevant databases was performed, and the selected studies were examined using predefined inclusion and exclusion criteria. Nevertheless, the study also indicates an area for improvement, such as the accuracy of ASF diagnosis. The study recommends the use of Causal Reasoning with ML to develop a causal ML model capable of establishing relationships between viruses and symptoms to improve the accuracy of the ASF disease. The application of causal ML is presented as an alternative solution for laboratory diagnosis of ASF, which contributes to the field of the study. In addition, further research could investigate the possible characteristics of ASF, including virus variants originating from the ASF family. The review could provide essential information on ASF datasets based on the interpretation of results obtained from the use of appropriate samples and validated tests in combination with the information from laboratory tests of ASF disease epidemiology, scenario, clinical signs, and lesions produced by different virulence. This review concludes that more studies are needed for improving the accuracy and implementation of the causal ML model for ASF diagnosis in real-time surveill","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"35 1","pages":"1-8"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81080721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Big DataPub Date : 2023-08-03DOI: 10.1109/icABCD59051.2023.10220485
Isaiah O. Adebayo, M. Adigun, P. Mudali
{"title":"Neighbourhood Centality Based Algorithms for Switch-to-Controller Allocation in SD-WANs","authors":"Isaiah O. Adebayo, M. Adigun, P. Mudali","doi":"10.1109/icABCD59051.2023.10220485","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220485","url":null,"abstract":"The advent of artificial intelligence and big data makes it nearly impossible for large scale networks to be managed manually. To this end, software-defined networking (SDN) was introduced to provide network operators with the infrastructure for achieving greater flexibility and fine-grained control over networks. However, a critical issue to consider when incorporating SDN technology over large-scale networks like wide area networks (WANs) is the allocation of switches to controllers. In this paper, we address the switch-to-controller allocation problem that considers the heterogeneity of controller capacities. Specifically, we propose two neighbourhood centrality-based algorithms for addressing the problem with the aim of minimizing switch-to-controller latency. We also introduce a weighted centrality function that enables fair distribution of load across capacitated controllers. The proposed algorithms utilize centrality-based measures and heuristics to determine the ideal switch-to-controller allocations that consider the propagating capacity of suitable controller nodes. We evaluate the performance of the proposed algorithms on the internet2 topology. The results show that considering the heterogeneity of controller capacities reduces load imbalance significantly. Moreover, by limiting the exploration of the local centrality for each node to a maximum of two-step neighbours the complexity of the proposed algorithm is reduced. Thus, making it suitable for implementation in real-world SD-WANs.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"1 1","pages":"1-6"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76735105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Big DataPub Date : 2023-08-03DOI: 10.1109/icABCD59051.2023.10220478
Sithembiso Dyubele, S. Soobramoney, D. Heukelman
{"title":"Factors Affecting the use of Smartphones for Learning: A Proposed Model","authors":"Sithembiso Dyubele, S. Soobramoney, D. Heukelman","doi":"10.1109/icABCD59051.2023.10220478","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220478","url":null,"abstract":"Increased functionalities of smartphones, such as providing easy access to the internet, have offered multiple learning opportunities, especially in a world surrounded by unprecedented periods like COVID'19. Despite the benefits of smartphones mentioned above, academics still have significant concerns about the effective utilisation of these technological devices by students for learning purposes. This paper aims to examine the factors affecting the use of smartphones for learning. The study utilised a quantitative method to pursue its aim and objectives. Data were gathered from 80 academic staff members from five Departments under the Faculty of Accounting & Informatics. A stratified sampling approach was applied to ensure a more realistic and accurate estimation of the population had been used. After applying the above approach, a simple random sampling method was used for this population according to the number of academic staff members in the above-mentioned departments. The data were analysed to ensure reliability and validity, and descriptive statistics were applied, and correlations identified to develop the proposed model. The outcomes indicate that academic staff members believe that Attitudes towards Smartphones, Facilitating Conditions, Perceived Ease of Use, Perceived Usefulness, and Performance Expectations significantly impact the use of smartphones for learning. This study was limited to academic staff from five departments of a single faculty at a South African University of Technology.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"1 1","pages":"1-7"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79004119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Big DataPub Date : 2023-08-03DOI: 10.1109/icABCD59051.2023.10220492
Bh Chiloane, S. Akilimalissiga, N. Sukdeo, I. Ohiomah
{"title":"Evaluating the Readiness of Integrating loT into the South African Retail Industry","authors":"Bh Chiloane, S. Akilimalissiga, N. Sukdeo, I. Ohiomah","doi":"10.1109/icABCD59051.2023.10220492","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220492","url":null,"abstract":"As the world changes with technological innovation, the retail industry strives to keep up with emerging technologies to remain relevant in the market. Most industries are shifting towards a more automated environment framed by loT applications. Hence, the retail industry is not immune to these innovative applications in order to meet consumers' ever-changing needs and preferences. The South African retail industry is expected to upgrade its systems and advance to technologically advanced retail systems, which have already been implemented in various countries globally. With the implementation of loT technologies around the world, South African retailers are expected to follow suit with the new changes and face the challenges that may arise as a result of the implementation. loT technologies through digital transformation have been portrayed worldwide as an advantageous practice and competition-leveraging tool to promote business agility and capabilities, improve business processes, and, ultimately, enhance customer satisfaction. The purpose of this paper is to assess the level of readiness of the South African retail industry when it comes to moving away from a conventional functional system to a system mainly dominated by advanced technology-based practices. This paper will also examine the specifics and challenges of adopting loT applications from the South African retail industry's standpoint. Hence, the analysis of the acquired results revealed that the South African retail's readiness still has ground to cover to execute loT integration, and this state is orchestrated by various factors.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"81 1","pages":"1-6"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90944031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}