首页 > 最新文献

2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)最新文献

英文 中文
An Assessment of the Independence Gap in the Zimbabwean ICT Regulatory Framework 津巴布韦ICT监管框架中独立性差距的评估
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045846
Casper Chigwedere, Sam Takavarasha, B. Chisaka
This Regulatory environments are judged by their independence from both the state and from stakeholders. This paper investigates the gaps in the independence of the ICT regulatory systems in Zimbabwe using Heeks’ [1] Design Reality Gap (DRG) under an interpretivist paradigm. Data collection used in-depth interviews with purposively selected stakeholders and the analysed using NVivo (release 1.6.1 (1136)) for a thematic analysis based on DRG constructs against regulatory independence. The results show a gap of 9 emanating from a private sector which perceived it as non-independent and stateowned enterprises that saw a partially independent regulatory system. This lack of independence from the state was however believed to be the norm both in Zimbabwe and in the region. The study makes its contribution by applying the DRG for assessing and evaluating the regulatory independence gaps in developing countries like Zimbabwe.
这种监管环境是由它们独立于国家和利益相关者来判断的。本文采用Heeks[1]在解释主义范式下的设计现实差距(DRG)研究津巴布韦ICT监管系统独立性的差距。数据收集使用有目的地选择的利益相关者进行深度访谈,并使用NVivo (release 1.6.1(1136))进行分析,基于DRG结构对监管独立性的专题分析。结果显示,私营部门认为自己不独立,国有企业认为自己的监管体系部分独立,两者之间的差距为9。然而,这种不独立于国家的情况被认为是津巴布韦和该地区的常态。本研究的贡献在于运用DRG来评估和评价津巴布韦等发展中国家的监管独立性差距。
{"title":"An Assessment of the Independence Gap in the Zimbabwean ICT Regulatory Framework","authors":"Casper Chigwedere, Sam Takavarasha, B. Chisaka","doi":"10.1109/ZCICT55726.2022.10045846","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045846","url":null,"abstract":"This Regulatory environments are judged by their independence from both the state and from stakeholders. This paper investigates the gaps in the independence of the ICT regulatory systems in Zimbabwe using Heeks’ [1] Design Reality Gap (DRG) under an interpretivist paradigm. Data collection used in-depth interviews with purposively selected stakeholders and the analysed using NVivo (release 1.6.1 (1136)) for a thematic analysis based on DRG constructs against regulatory independence. The results show a gap of 9 emanating from a private sector which perceived it as non-independent and stateowned enterprises that saw a partially independent regulatory system. This lack of independence from the state was however believed to be the norm both in Zimbabwe and in the region. The study makes its contribution by applying the DRG for assessing and evaluating the regulatory independence gaps in developing countries like Zimbabwe.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132719532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding E-learning Adoption and Acceptance during the Covid 19 Pandemic: The Influence of Self Efficacy 新冠肺炎疫情期间在线学习的采用和接受:自我效能感的影响
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10046037
Fine Masimba, Kudakwashe Maguraushe
The world wide outbreak of the COVID-19 pandemic reconfigured various landscapes in higher education as various institutions, lecturers and students were forced to adopt e-learning. However, the successful adoption and acceptance of e-learning by both lecturers and students involved has not been discussed and measured. This study seeks to investigate the influence of both the lecturer and student self efficacy on behavoral intention to use e-learning during the pandemic in the context of the Technology Acceptance Model (TAM). Lecturer Self-Efficacy (LSE) and Student Self-Efficacy (SSE) were hypothesized to have a correlation with the perceived usefullness and perceived ease of use of e-learning systems as well as the attitude towards using those e-learning systems which resultantly influence the behavoural intention to use e-learning systems. A total of 362 questionnaires were received from both students and lecturers in Zimbabwe’s two universities and two polytechnics. Structural Equation Modelling was utilized to test the hypothesized conceptual model. Reliability and validity checks were done to the model instrument. Results indicated that both LSE and SSE have a positive influence on perceived ease of use but however, both LSE and SSE revealed a negative influence on perceived usefullness. Results also indicated that both LSE and SSE have a positive influence on attitude towards use of e-learning systems. The findings of the study contribute to the literature by highlighting the influence of LSE and SSE in the adoption and acceptance of e-learning systems in higher education.
2019冠状病毒病(COVID-19)大流行在全球范围内爆发,改变了高等教育的各种格局,各种机构、讲师和学生被迫采用电子学习。然而,讲师和学生对电子学习的成功采用和接受尚未得到讨论和衡量。本研究旨在探讨在技术接受模型(TAM)的背景下,讲师和学生自我效能感对大流行期间使用电子学习的行为意愿的影响。讲师自我效能感(LSE)和学生自我效能感(SSE)与电子学习系统的感知有用性和感知易用性以及使用这些电子学习系统的态度存在相关性,从而影响使用电子学习系统的行为意愿。从津巴布韦两所大学和两所理工学院的学生和讲师共收到362份调查表。利用结构方程模型对假设的概念模型进行检验。对模型仪器进行了信度和效度检验。结果表明,LSE和SSE对感知易用性有正向影响,而LSE和SSE对感知有用性有负向影响。结果还表明,LSE和SSE对使用电子学习系统的态度都有积极的影响。该研究的发现通过强调LSE和SSE在高等教育中采用和接受电子学习系统方面的影响,为文献做出了贡献。
{"title":"Understanding E-learning Adoption and Acceptance during the Covid 19 Pandemic: The Influence of Self Efficacy","authors":"Fine Masimba, Kudakwashe Maguraushe","doi":"10.1109/ZCICT55726.2022.10046037","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046037","url":null,"abstract":"The world wide outbreak of the COVID-19 pandemic reconfigured various landscapes in higher education as various institutions, lecturers and students were forced to adopt e-learning. However, the successful adoption and acceptance of e-learning by both lecturers and students involved has not been discussed and measured. This study seeks to investigate the influence of both the lecturer and student self efficacy on behavoral intention to use e-learning during the pandemic in the context of the Technology Acceptance Model (TAM). Lecturer Self-Efficacy (LSE) and Student Self-Efficacy (SSE) were hypothesized to have a correlation with the perceived usefullness and perceived ease of use of e-learning systems as well as the attitude towards using those e-learning systems which resultantly influence the behavoural intention to use e-learning systems. A total of 362 questionnaires were received from both students and lecturers in Zimbabwe’s two universities and two polytechnics. Structural Equation Modelling was utilized to test the hypothesized conceptual model. Reliability and validity checks were done to the model instrument. Results indicated that both LSE and SSE have a positive influence on perceived ease of use but however, both LSE and SSE revealed a negative influence on perceived usefullness. Results also indicated that both LSE and SSE have a positive influence on attitude towards use of e-learning systems. The findings of the study contribute to the literature by highlighting the influence of LSE and SSE in the adoption and acceptance of e-learning systems in higher education.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121135139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ZCICT 2022 Cover Page ZCICT 2022封面
Pub Date : 2022-11-09 DOI: 10.1109/zcict55726.2022.10045968
{"title":"ZCICT 2022 Cover Page","authors":"","doi":"10.1109/zcict55726.2022.10045968","DOIUrl":"https://doi.org/10.1109/zcict55726.2022.10045968","url":null,"abstract":"","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128956118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection System for IoT environments using Machine Learning Techniques 使用机器学习技术的物联网环境入侵检测系统
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045992
Shammah Chishakwe, Nesisa Moyo, Belinda Mutunhu Ndlovu, Sibusisiwe Dube
The Internet of Things (IoT) is fast becoming the new normal in our everyday lives. The communication of connected devices without requiring human intervention has led to the advent of smart ecosystems or environments. Smart ecosystems are an environment where smart devices or ‘things” are trying to improve the quality of life for their inhabitants by determining the inhabitant’s intent without explicit input. This technological advancement brings with it security concerns concerning confidentiality, integrity, and availability as large data volumes are processed by smart devices. Mainstream security solutions may not work in IoT environments due to their unique nature whereby IoT has different protocols, and they have computational resource limitations. This project seeks to develop an intrusion detection system for IoT environments in an IoT network utilizing a machine learning technique whereby a user is alerted if an anomaly has been detected.
物联网(IoT)正迅速成为我们日常生活中的新常态。不需要人为干预的连接设备的通信导致了智能生态系统或环境的出现。智能生态系统是一种环境,在这种环境中,智能设备或“事物”试图通过在没有明确输入的情况下确定居民的意图来改善居民的生活质量。随着智能设备处理大量数据,这种技术进步带来了有关机密性、完整性和可用性的安全问题。主流安全解决方案可能无法在物联网环境中工作,因为物联网具有不同的协议,并且它们具有计算资源限制。该项目旨在利用机器学习技术为物联网网络中的物联网环境开发一种入侵检测系统,如果检测到异常情况,则会向用户发出警报。
{"title":"Intrusion Detection System for IoT environments using Machine Learning Techniques","authors":"Shammah Chishakwe, Nesisa Moyo, Belinda Mutunhu Ndlovu, Sibusisiwe Dube","doi":"10.1109/ZCICT55726.2022.10045992","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045992","url":null,"abstract":"The Internet of Things (IoT) is fast becoming the new normal in our everyday lives. The communication of connected devices without requiring human intervention has led to the advent of smart ecosystems or environments. Smart ecosystems are an environment where smart devices or ‘things” are trying to improve the quality of life for their inhabitants by determining the inhabitant’s intent without explicit input. This technological advancement brings with it security concerns concerning confidentiality, integrity, and availability as large data volumes are processed by smart devices. Mainstream security solutions may not work in IoT environments due to their unique nature whereby IoT has different protocols, and they have computational resource limitations. This project seeks to develop an intrusion detection system for IoT environments in an IoT network utilizing a machine learning technique whereby a user is alerted if an anomaly has been detected.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130702465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blended Learning Approach: Students’ versus Lecturers’ Views from a South African Rural University 混合式学习方法:来自南非农村大学的学生与教师的观点
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045969
Nosipho Mavuso, N. Jere
There is a current paradigm shift within institutions of higher learning in terms of how teaching and learning take place. This radical transition has been forced globally as a result of the Covid-19 pandemic, which saw the higher education sector implementing drastic changes in terms of remote learning. It seems there is a misunderstanding of the term blended learning based on the students’ and lecturers’ views from a selected South African university. A mixed method approach was used to collect both qualitative and quantitative data. An online questionnaire was distributed to learners to get quantitative data. On the other hand, lecturers were engaged through interviews within a workshop. An experimental approach using the university’s learning management system known as WiseUp was used. Both traditional and online modes of deliverables are common within a case. Findings show different understanding of the term blended learning and the differences in preferred activities within the blended mode. The paper provides some examples of good applications of blended learning. As higher education institutions try to embrace blended learning techniques, there is a need to engage and improve awareness of the meaning of this approach.
目前,高等院校在如何进行教与学方面正在发生范式转变。由于2019冠状病毒病(Covid-19)大流行,高等教育部门在远程学习方面实施了重大变革,这一根本性转变在全球范围内被迫实施。从一所选定的南非大学的学生和讲师的观点来看,似乎对混合式学习这个词存在误解。采用混合方法收集定性和定量数据。我们向学员发放了一份在线调查问卷,以获得定量数据。另一方面,讲师是通过讲习班内的面试来聘用的。实验采用了一种名为WiseUp的大学学习管理系统。在一个案例中,传统交付模式和在线交付模式都很常见。研究结果表明,在混合学习模式下,学生对混合学习的理解不同,对学习活动的偏好也不同。本文提供了一些混合学习的良好应用实例。随着高等教育机构尝试采用混合学习技术,有必要参与并提高对这种方法意义的认识。
{"title":"Blended Learning Approach: Students’ versus Lecturers’ Views from a South African Rural University","authors":"Nosipho Mavuso, N. Jere","doi":"10.1109/ZCICT55726.2022.10045969","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045969","url":null,"abstract":"There is a current paradigm shift within institutions of higher learning in terms of how teaching and learning take place. This radical transition has been forced globally as a result of the Covid-19 pandemic, which saw the higher education sector implementing drastic changes in terms of remote learning. It seems there is a misunderstanding of the term blended learning based on the students’ and lecturers’ views from a selected South African university. A mixed method approach was used to collect both qualitative and quantitative data. An online questionnaire was distributed to learners to get quantitative data. On the other hand, lecturers were engaged through interviews within a workshop. An experimental approach using the university’s learning management system known as WiseUp was used. Both traditional and online modes of deliverables are common within a case. Findings show different understanding of the term blended learning and the differences in preferred activities within the blended mode. The paper provides some examples of good applications of blended learning. As higher education institutions try to embrace blended learning techniques, there is a need to engage and improve awareness of the meaning of this approach.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134377409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Snake Identification System Using Convolutional Neural Networks 基于卷积神经网络的蛇识别系统
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10046005
S. Dube, Admire Bhuru
Computer vision has recently been dominated by Convolutional Neural Networks (CNNs), these are a kind of Artificial Neural Networks (ANNs) mostly employed for image classification and object detection. Identifying a snake species is important when interacting with the species as well as when treating injuries due to envenoming. This task however proves to be a hurdle for the general public. This paper, therefore, sought to solve the problem of misidentification of snake species which often leads to envenoming, and mishandling of snake species by harnessing the power of CNNs together with the portability of mobile devices in developing a mobile application that identifies snake species from images almost in real-time. In implementing this system, the CNN model was trained in Google Collab on a custom-tailored dataset. The images in the dataset were sourced from the internet, and were divided into eight classes which represented eight different snake species. The images were annotated using MakeSense.ai, an online data annotation tool. After annotation the images were piped into the YOLOv5 CNN model on Google Collab for model training. The training process yielded an accuracy of 71% for all the eight classes. After training, the model was converted to a Tensorflow Lite model and exported to Android Studio IDE wherein the rest of the application was developed using Java programming language.
卷积神经网络(Convolutional Neural Networks, cnn)是近年来计算机视觉领域的主流,它是一种主要用于图像分类和目标检测的人工神经网络。识别蛇的种类是很重要的,当与该物种互动时,以及在治疗因中毒而受伤时。然而,事实证明,这项任务对公众来说是一个障碍。因此,本文试图通过利用cnn的力量和移动设备的可移植性,开发一种几乎实时地从图像中识别蛇种的移动应用程序,来解决蛇种的错误识别问题,这种问题经常导致蛇种的出现和处理不当。在实现该系统的过程中,CNN模型在谷歌Collab中进行了定制数据集的训练。数据集中的图像来自互联网,并被分为8类,代表8种不同的蛇种。使用MakeSense对图像进行注释。一个在线数据注释工具。注释后,将图像导入谷歌Collab上的YOLOv5 CNN模型中进行模型训练。训练过程对所有8个类别产生了71%的准确率。训练结束后,将模型转换为Tensorflow Lite模型并导出到Android Studio IDE,其中应用程序的其余部分使用Java编程语言开发。
{"title":"Snake Identification System Using Convolutional Neural Networks","authors":"S. Dube, Admire Bhuru","doi":"10.1109/ZCICT55726.2022.10046005","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046005","url":null,"abstract":"Computer vision has recently been dominated by Convolutional Neural Networks (CNNs), these are a kind of Artificial Neural Networks (ANNs) mostly employed for image classification and object detection. Identifying a snake species is important when interacting with the species as well as when treating injuries due to envenoming. This task however proves to be a hurdle for the general public. This paper, therefore, sought to solve the problem of misidentification of snake species which often leads to envenoming, and mishandling of snake species by harnessing the power of CNNs together with the portability of mobile devices in developing a mobile application that identifies snake species from images almost in real-time. In implementing this system, the CNN model was trained in Google Collab on a custom-tailored dataset. The images in the dataset were sourced from the internet, and were divided into eight classes which represented eight different snake species. The images were annotated using MakeSense.ai, an online data annotation tool. After annotation the images were piped into the YOLOv5 CNN model on Google Collab for model training. The training process yielded an accuracy of 71% for all the eight classes. After training, the model was converted to a Tensorflow Lite model and exported to Android Studio IDE wherein the rest of the application was developed using Java programming language.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134419678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Queue Modelling and Jitter Control in Mobile Ad Hoc Networks 移动自组织网络中的队列建模与抖动控制
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10046032
B. Nyambo, G. Janssens, Hillary Marufu, M. Munyaradzi, Bernard Mapako, Kaitano Dzinavatonga
Jitter in multimedia traffic is mainly introduced by variations in network characteristics. Ifjitter is so significant in the application that is receiving, this can result in a degraded performance in real-time multimedia communications applications. Jitter causes inaudible audio or unclear video which can be undesirable and uncomfortable to the user. Buffers are often employed to temporarily to store arriving packets before playing them at equal intervals to curb and minimize jitter. Jitter for voice packets should not exceed 20-50 milliseconds within a given stream. This paper proposes a method to reducejitter in intermediate nodes is proposed, such that when the packets arrive at the receiving end, there would be little or nojitter to process in the de-jitter buffer. We analyze M/G/1 nonpreemptive and pre-emptive resume priority queuing in the intermediate node and analyze how these models will affect delay and jitter. We found out that preemptive priority queuing performs better but almost the same to non-preemptive priority queuing. Both Priority based queues performed much better than the First in First out queue.
多媒体业务中的抖动主要是由网络特性的变化引起的。在接收的应用程序中,抖动非常明显,这可能导致实时多媒体通信应用程序的性能下降。抖动会导致听不清的音频或不清晰的视频,这对用户来说是不希望的和不舒服的。缓冲区通常用于临时存储到达的数据包,然后以相等的间隔播放它们,以抑制和最小化抖动。在给定的流中,语音数据包的抖动不应超过20-50毫秒。本文提出了一种减少中间节点抖动的方法,使得当数据包到达接收端时,消除抖动缓冲区中几乎没有抖动需要处理。分析了中间节点的M/G/1非抢占式和抢占式恢复优先队列,并分析了这些模型对延迟和抖动的影响。我们发现,抢占式优先级队列性能更好,但与非抢占式优先级队列几乎相同。两个基于优先级的队列的性能都比先进先出队列好得多。
{"title":"Queue Modelling and Jitter Control in Mobile Ad Hoc Networks","authors":"B. Nyambo, G. Janssens, Hillary Marufu, M. Munyaradzi, Bernard Mapako, Kaitano Dzinavatonga","doi":"10.1109/ZCICT55726.2022.10046032","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046032","url":null,"abstract":"Jitter in multimedia traffic is mainly introduced by variations in network characteristics. Ifjitter is so significant in the application that is receiving, this can result in a degraded performance in real-time multimedia communications applications. Jitter causes inaudible audio or unclear video which can be undesirable and uncomfortable to the user. Buffers are often employed to temporarily to store arriving packets before playing them at equal intervals to curb and minimize jitter. Jitter for voice packets should not exceed 20-50 milliseconds within a given stream. This paper proposes a method to reducejitter in intermediate nodes is proposed, such that when the packets arrive at the receiving end, there would be little or nojitter to process in the de-jitter buffer. We analyze M/G/1 nonpreemptive and pre-emptive resume priority queuing in the intermediate node and analyze how these models will affect delay and jitter. We found out that preemptive priority queuing performs better but almost the same to non-preemptive priority queuing. Both Priority based queues performed much better than the First in First out queue.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115415229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Technologies for Tourism Promotion in Zimbabwe 津巴布韦旅游推广的虚拟技术
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10046006
Wellington Tatenda Gwavava, David I. Fadaraliki, Prudence Kadebu
Virtual Technologies can provide information visualisation and manipulation, and coupling such technology with virtual mapping can provide a promotional tool for geographic locations. Interest levels of particular historical and tourist sites are low as they lack the necessary promotion to become viable destinations, thus lowering employment and revenue potential. A high number of promotional tools exist and have been employed to create awareness of tourists, however, most have not quite grasped the imagination or attention of potential tourists. This paper aims to discuss the benefits of Virtual Reality to tourism promotion and go on to analyse and formulate a model framework for how to employ virtual technologies for geographic information through Webbased services that network millions of people together can promote tourism in Zimbabwe.
虚拟技术可以提供信息可视化和操作,并且将这种技术与虚拟映射相结合可以提供地理位置的推广工具。某些历史和旅游景点的兴趣水平较低,因为它们缺乏必要的宣传,无法成为可行的目的地,从而降低了就业和收入潜力。存在大量的宣传工具,并已被用来提高游客的认识,然而,大多数都没有完全抓住潜在游客的想象力或注意力。本文旨在讨论虚拟现实对旅游推广的好处,并继续分析和制定一个模型框架,说明如何通过基于网络的服务利用虚拟技术获取地理信息,使数百万人共同促进津巴布韦的旅游业。
{"title":"Virtual Technologies for Tourism Promotion in Zimbabwe","authors":"Wellington Tatenda Gwavava, David I. Fadaraliki, Prudence Kadebu","doi":"10.1109/ZCICT55726.2022.10046006","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046006","url":null,"abstract":"Virtual Technologies can provide information visualisation and manipulation, and coupling such technology with virtual mapping can provide a promotional tool for geographic locations. Interest levels of particular historical and tourist sites are low as they lack the necessary promotion to become viable destinations, thus lowering employment and revenue potential. A high number of promotional tools exist and have been employed to create awareness of tourists, however, most have not quite grasped the imagination or attention of potential tourists. This paper aims to discuss the benefits of Virtual Reality to tourism promotion and go on to analyse and formulate a model framework for how to employ virtual technologies for geographic information through Webbased services that network millions of people together can promote tourism in Zimbabwe.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115559497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative analysis of the effectiveness of feature engineering techniques on thyroid disease prediction 特征工程技术在甲状腺疾病预测中的有效性对比分析
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045927
Aidah Mashonga, Leslie KudzaiNyandoro, Kudakwashe Zvarevashe
The thyroid gland’s edge experiences an abnormal proliferation of thyroid tissue, which causes thyroid illness. The two primary types of thyroid disorders are hypothyroidism and hyperthyroidism which typically result when this gland releases excessive amounts of hormones. To identify and diagnose thyroid disease, this study suggests employing effective classifiers and feature selection strategies that consider accuracy and other performance evaluation measures. This study offers a thorough examination of various classifiers that includes the support vector machine, logistic regression, and extreme gradient boosting algorithms. The algorithms use three feature removal strategies that is recursive feature elimination, Pearson’s correlation and chi-squared statistics. To determine thyroid illness, thyroid data from the Kaggle datasets were used. Numerous aspects of the experiment have been evaluated and analyzed, including accuracy, precision, and the receiver operating curve’s area under the curve. The outcome showed that classifiers that use feature selection have a greater overall accuracy(Xtreme Gradient Boost 98%and support vector machine 95%) compared to without feature selection technique (support vector machine 89%). Logistics regression performed better without at 95% than 94% with feature selection.
甲状腺边缘经历异常增生的甲状腺组织,这导致甲状腺疾病。甲状腺疾病的两种主要类型是甲状腺功能减退和甲状腺功能亢进,这两种疾病通常是由甲状腺释放过多的激素引起的。为了识别和诊断甲状腺疾病,本研究建议采用有效的分类器和特征选择策略,考虑准确性和其他性能评估指标。本研究提供了各种分类器的全面检查,包括支持向量机,逻辑回归和极端梯度增强算法。该算法使用三种特征去除策略,即递归特征消除、Pearson相关和卡方统计。为了确定甲状腺疾病,使用了Kaggle数据集的甲状腺数据。对实验的许多方面进行了评估和分析,包括准确性、精密度和接收器工作曲线下的面积。结果表明,与不使用特征选择技术(支持向量机89%)相比,使用特征选择的分类器具有更高的整体准确性(Xtreme Gradient Boost 98%和支持向量机95%)。在没有特征选择的情况下,物流回归的表现优于94%的特征选择。
{"title":"A comparative analysis of the effectiveness of feature engineering techniques on thyroid disease prediction","authors":"Aidah Mashonga, Leslie KudzaiNyandoro, Kudakwashe Zvarevashe","doi":"10.1109/ZCICT55726.2022.10045927","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045927","url":null,"abstract":"The thyroid gland’s edge experiences an abnormal proliferation of thyroid tissue, which causes thyroid illness. The two primary types of thyroid disorders are hypothyroidism and hyperthyroidism which typically result when this gland releases excessive amounts of hormones. To identify and diagnose thyroid disease, this study suggests employing effective classifiers and feature selection strategies that consider accuracy and other performance evaluation measures. This study offers a thorough examination of various classifiers that includes the support vector machine, logistic regression, and extreme gradient boosting algorithms. The algorithms use three feature removal strategies that is recursive feature elimination, Pearson’s correlation and chi-squared statistics. To determine thyroid illness, thyroid data from the Kaggle datasets were used. Numerous aspects of the experiment have been evaluated and analyzed, including accuracy, precision, and the receiver operating curve’s area under the curve. The outcome showed that classifiers that use feature selection have a greater overall accuracy(Xtreme Gradient Boost 98%and support vector machine 95%) compared to without feature selection technique (support vector machine 89%). Logistics regression performed better without at 95% than 94% with feature selection.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122058587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake News Detection using 5L-CNN 使用5L-CNN进行假新闻检测
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045981
Demo Rangarirai Collen, Leslie Kudzai Nyandoro, Kudakwashe Zvarevashe
With the advent of websites and social media technologies, the internet has been a great method of transmitting news and information around the globe. However, due to lack of editorial scrutiny and monitoring by the media authorities, the news distribution has been seriously abused leading to the fast spreading of fake news. Fake news involves misleading broadcasting of information from sources that target to intentionally manipulate the way how people view some events or statements. This study seeks to develop a fake news detection model which will be able to analyze the title and text information attached to the news articles. From the researches done by previous scholars, it showed that the models did not perform very well because of the lack of sufficient feature extraction and fine tuning of the classification of the text. This research will therefore, articulate the gap by employing 5L-CNN deep learning model which will use inbuilt tokenizers for word embedding and will show better accuracy compared to the traditional machine learning models. In this paper, we compare machine learning algorithms (Decision trees, Random Forest, Logistic Regression & Naive Bayes) and deep learning algorithms (RNN, 5L-CNN & LSTM) to classify the authenticity of news articles. The model developed in this paper attained the best accuracy with 5L-CNN which had a result of 99.99%.
随着网站和社交媒体技术的出现,互联网已经成为在全球范围内传播新闻和信息的绝佳方式。然而,由于缺乏媒体当局的编辑审查和监督,新闻发行被严重滥用,导致假新闻迅速传播。假新闻包括误导性地传播来自消息来源的信息,目的是故意操纵人们对某些事件或陈述的看法。本研究旨在开发一个假新闻检测模型,该模型将能够分析新闻文章附带的标题和文本信息。从以往学者的研究来看,由于缺乏足够的特征提取和对文本分类的微调,模型的表现并不好。因此,本研究将通过采用5L-CNN深度学习模型来阐明这一差距,该模型将使用内置的标记器进行词嵌入,与传统的机器学习模型相比,将显示出更好的准确性。在本文中,我们比较了机器学习算法(决策树、随机森林、逻辑回归和朴素贝叶斯)和深度学习算法(RNN、5L-CNN和LSTM)来分类新闻文章的真实性。本文所建立的模型在5L-CNN下准确率最高,达到99.99%。
{"title":"Fake News Detection using 5L-CNN","authors":"Demo Rangarirai Collen, Leslie Kudzai Nyandoro, Kudakwashe Zvarevashe","doi":"10.1109/ZCICT55726.2022.10045981","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045981","url":null,"abstract":"With the advent of websites and social media technologies, the internet has been a great method of transmitting news and information around the globe. However, due to lack of editorial scrutiny and monitoring by the media authorities, the news distribution has been seriously abused leading to the fast spreading of fake news. Fake news involves misleading broadcasting of information from sources that target to intentionally manipulate the way how people view some events or statements. This study seeks to develop a fake news detection model which will be able to analyze the title and text information attached to the news articles. From the researches done by previous scholars, it showed that the models did not perform very well because of the lack of sufficient feature extraction and fine tuning of the classification of the text. This research will therefore, articulate the gap by employing 5L-CNN deep learning model which will use inbuilt tokenizers for word embedding and will show better accuracy compared to the traditional machine learning models. In this paper, we compare machine learning algorithms (Decision trees, Random Forest, Logistic Regression & Naive Bayes) and deep learning algorithms (RNN, 5L-CNN & LSTM) to classify the authenticity of news articles. The model developed in this paper attained the best accuracy with 5L-CNN which had a result of 99.99%.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129194035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1