首页 > 最新文献

2014 IST-Africa Conference Proceedings最新文献

英文 中文
The potential benefits of mobile microwork services in developing nations: Research opportunities and challenges 发展中国家移动微工作服务的潜在好处:研究机遇与挑战
Pub Date : 2014-05-07 DOI: 10.1109/ISTAFRICA.2014.6880636
J. Mtsweni, L. Burge
Unemployment is one of the main hindrances to socio-economic development in developing nations. At the same time, the prominent adoption and use of digital technologies, especially mobile devices have changed the status quo in Africa with regard to digital divide, communication, and information access. Nevertheless, most parts of Africa and other developing countries are still lagging behind when it comes to the swiftness of implementing technologies that have the potential of addressing pressing issues such as unemployment. On-demand mobile microwork services, which are a subset of the crowdsourcing paradigm, are some of the initiatives that are under-explored, particularly for dealing with issues of unemployment. This research paper explores the potential benefits of such services as one possible contribution for dealing with joblessness in developing nations where mobile devices are easily accessible and used. Furthermore, the paper presents some of the pertinent research opportunities and challenges that need to be considered when dealing with mobile microwork services.
失业是发展中国家社会经济发展的主要障碍之一。与此同时,数字技术,特别是移动设备的广泛采用和使用,改变了非洲在数字鸿沟、通信和信息获取方面的现状。然而,非洲大部分地区和其他发展中国家在迅速实施有可能解决失业等紧迫问题的技术方面仍然落后。按需移动微工作服务是众包模式的一个子集,是一些未被充分探索的举措,特别是在处理失业问题方面。这篇研究论文探讨了这些服务的潜在好处,作为解决发展中国家失业问题的一项可能贡献,在这些国家,移动设备很容易获得和使用。此外,本文还提出了在处理移动微工作服务时需要考虑的一些相关研究机会和挑战。
{"title":"The potential benefits of mobile microwork services in developing nations: Research opportunities and challenges","authors":"J. Mtsweni, L. Burge","doi":"10.1109/ISTAFRICA.2014.6880636","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880636","url":null,"abstract":"Unemployment is one of the main hindrances to socio-economic development in developing nations. At the same time, the prominent adoption and use of digital technologies, especially mobile devices have changed the status quo in Africa with regard to digital divide, communication, and information access. Nevertheless, most parts of Africa and other developing countries are still lagging behind when it comes to the swiftness of implementing technologies that have the potential of addressing pressing issues such as unemployment. On-demand mobile microwork services, which are a subset of the crowdsourcing paradigm, are some of the initiatives that are under-explored, particularly for dealing with issues of unemployment. This research paper explores the potential benefits of such services as one possible contribution for dealing with joblessness in developing nations where mobile devices are easily accessible and used. Furthermore, the paper presents some of the pertinent research opportunities and challenges that need to be considered when dealing with mobile microwork services.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123806242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The development of a cyber security policy in developing regions and the impact on stakeholders 发展中地区网络安全政策的制定及其对利益相关方的影响
Pub Date : 2014-05-07 DOI: 10.1109/ISTAFRICA.2014.6880605
Ian Ellefsen
The development of cyber security policies is an area of keen worldwide interest. Many countries are actively creating cyber security policies to manage their critical information infrastructures and their critical systems. Many developed countries have created comprehensive cyber security policies aimed at establishing effective national cyber security structures and international partnerships. Developing countries are also in the process of creating their own cyber security policies and frameworks, and these countries are in the position where they can harness the lessons learnt in developed regions. In this paper we will outline and discuss the developing cyber security policy framework in South Africa as an example of cyber security policy developments occurring in developing regions and the implications on SMMEs as a component of the resulting protection structures.
网络安全政策的制定是全球关注的热点问题。许多国家正在积极制定网络安全政策,以管理其关键信息基础设施和关键系统。许多发达国家制定了全面的网络安全政策,旨在建立有效的国家网络安全结构和国际伙伴关系。发展中国家也在制定自己的网络安全政策和框架,这些国家可以借鉴发达地区的经验教训。在本文中,我们将概述和讨论南非正在发展的网络安全政策框架,作为发展中地区网络安全政策发展的一个例子,以及作为由此产生的保护结构组成部分的对中小企业的影响。
{"title":"The development of a cyber security policy in developing regions and the impact on stakeholders","authors":"Ian Ellefsen","doi":"10.1109/ISTAFRICA.2014.6880605","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880605","url":null,"abstract":"The development of cyber security policies is an area of keen worldwide interest. Many countries are actively creating cyber security policies to manage their critical information infrastructures and their critical systems. Many developed countries have created comprehensive cyber security policies aimed at establishing effective national cyber security structures and international partnerships. Developing countries are also in the process of creating their own cyber security policies and frameworks, and these countries are in the position where they can harness the lessons learnt in developed regions. In this paper we will outline and discuss the developing cyber security policy framework in South Africa as an example of cyber security policy developments occurring in developing regions and the implications on SMMEs as a component of the resulting protection structures.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125089271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Social simulation for optimization of emergency health services policy 优化应急卫生服务政策的社会模拟
Pub Date : 2014-05-07 DOI: 10.1109/ISTAFRICA.2014.6880612
M. Calado, Luís Antunes, Ana Ramos
Very often, public policies can only be evaluated after they have been implemented and deployed. The prior simulation of these policies can ensure several benefits: the design can be more accurately adjusted to the objectives of the policy makers; the policies can better reflect the motivations of the individuals involved in several roles (in the case of health services: users, doctors, nurses, civil servants, auditors, policy makers); the micro-macro connections and mediations are represented explicitly; the simulation may allow the successive improvement of the policies; the decision makers and stakeholders may get to know the territory of decision in such a way to better respond in contingency situations. We propose multi-agent-based simulation as a form of orienting the specification of policies. The multi-agent systems allow for the representation of heterogeneous rational agents and provide an approach to create complex dynamic models of social phenomena. This paper describes how we can tackle the problem of optimization of the policies of medical emergency services, in the case when there is a clear distinction between the design of these policies and the use that people give them. We present the scenario and a model for the simulation, identifying the actors involved, the connections and relationships between them, the measures needed to evaluate the multi-dimensional results of the simulation and how the policies can be fine-tuned and simulated before they are deployed in the real world.
通常,公共政策只能在实施和部署之后才能进行评估。事先对这些政策进行模拟可以确保以下几个好处:设计可以更准确地调整以适应政策制定者的目标;这些政策可以更好地反映从事若干工作的个人的动机(就保健服务而言:使用者、医生、护士、公务员、审计员、决策者);微观和宏观的联系和中介被明确地表示出来;模拟可能允许政策的连续改进;决策者和利益相关者可以通过这种方式了解决策的范围,以便更好地应对突发情况。我们提出基于多智能体的仿真作为一种定向策略规范的形式。多主体系统允许异质理性主体的表示,并提供了一种创建社会现象的复杂动态模型的方法。本文描述了在医疗应急服务政策的设计和人们给予政策的使用之间存在明显区别的情况下,如何解决医疗应急服务政策的优化问题。我们提出了模拟的场景和模型,确定了所涉及的参与者、它们之间的联系和关系、评估模拟的多维结果所需的措施,以及在将策略部署到现实世界之前如何对其进行微调和模拟。
{"title":"Social simulation for optimization of emergency health services policy","authors":"M. Calado, Luís Antunes, Ana Ramos","doi":"10.1109/ISTAFRICA.2014.6880612","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880612","url":null,"abstract":"Very often, public policies can only be evaluated after they have been implemented and deployed. The prior simulation of these policies can ensure several benefits: the design can be more accurately adjusted to the objectives of the policy makers; the policies can better reflect the motivations of the individuals involved in several roles (in the case of health services: users, doctors, nurses, civil servants, auditors, policy makers); the micro-macro connections and mediations are represented explicitly; the simulation may allow the successive improvement of the policies; the decision makers and stakeholders may get to know the territory of decision in such a way to better respond in contingency situations. We propose multi-agent-based simulation as a form of orienting the specification of policies. The multi-agent systems allow for the representation of heterogeneous rational agents and provide an approach to create complex dynamic models of social phenomena. This paper describes how we can tackle the problem of optimization of the policies of medical emergency services, in the case when there is a clear distinction between the design of these policies and the use that people give them. We present the scenario and a model for the simulation, identifying the actors involved, the connections and relationships between them, the measures needed to evaluate the multi-dimensional results of the simulation and how the policies can be fine-tuned and simulated before they are deployed in the real world.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"41 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120923429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SmartPrescription: A principled approach towards eliminating prescription errors in healthcare SmartPrescription:消除医疗保健中的处方错误的原则性方法
Pub Date : 2014-05-07 DOI: 10.1109/ISTAFRICA.2014.6880614
Paul M. Okanda, J. Kanyaru
While it might deceptively appear that the major issues in medication concern medicine prescription calculations and the subtleness of conversions between measuring units, research in healthcare shows that the key issues relate to the context in which medication is prescribed. For instance, calculation of dose for the elderly is particularly sensitive especially in cases of repeat prescriptions whereby monitoring is crucial to avoid misuse. Initial (UK-based) primary research among four primary care surgeries and interviews with paediatricians indicated the lack of custom functions within existing information systems in a way that exploits knowledge about drugs, past prescriptions and patients' medical history. This paper presents the research we carried out towards addressing these issues. In particular, the paper presents a prototype software system developed that illustrates the efficacy of addressing medicine calculation issues where contextual information about drug, illness, and patient history are used to reliably inform the prescription process.
虽然表面上看,药物治疗中的主要问题涉及药物处方计算和测量单位之间转换的微妙性,但医疗保健研究表明,关键问题与药物处方的背景有关。例如,老年人的剂量计算特别敏感,特别是在重复处方的情况下,监测对于避免误用至关重要。在四个初级保健手术中进行的初步(基于英国的)初步研究和对儿科医生的访谈表明,现有信息系统在利用药物知识、过去处方和患者病史方面缺乏定制功能。本文介绍了我们为解决这些问题所进行的研究。特别是,本文提出了一个原型软件系统,该系统说明了解决药物计算问题的有效性,其中使用有关药物、疾病和患者病史的上下文信息来可靠地告知处方过程。
{"title":"SmartPrescription: A principled approach towards eliminating prescription errors in healthcare","authors":"Paul M. Okanda, J. Kanyaru","doi":"10.1109/ISTAFRICA.2014.6880614","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880614","url":null,"abstract":"While it might deceptively appear that the major issues in medication concern medicine prescription calculations and the subtleness of conversions between measuring units, research in healthcare shows that the key issues relate to the context in which medication is prescribed. For instance, calculation of dose for the elderly is particularly sensitive especially in cases of repeat prescriptions whereby monitoring is crucial to avoid misuse. Initial (UK-based) primary research among four primary care surgeries and interviews with paediatricians indicated the lack of custom functions within existing information systems in a way that exploits knowledge about drugs, past prescriptions and patients' medical history. This paper presents the research we carried out towards addressing these issues. In particular, the paper presents a prototype software system developed that illustrates the efficacy of addressing medicine calculation issues where contextual information about drug, illness, and patient history are used to reliably inform the prescription process.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116106719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Direct desktop-repository deposits with SWORD 直接将桌面存储库存入SWORD
Pub Date : 2014-05-07 DOI: 10.1109/ISTAFRICA.2014.6880604
G. Mosweunyane, L. Carr
A repository is an institutional-scale collection, which feeds off individuals' document collections. Repositories provide interfaces for users to deposit items, and this involves uploading the document and filling-in the metadata. These interfaces have been criticised for requiring time and effort on the part of the user, especially with the filling-in of the metadata. This paper presents a repository publishing method that aims to counteract this problem. The users' document collections on the desktop are presented in a dynamic, similarity-based interface, allowing them to find, associate and select documents, which can then be uploaded with their exiting metadata to the institutional repository with minimal effort on the part of the user. The demonstration showcases a time and effort-saving method for depositing an item or a set of associated items with metadata to the repository. Adoption of the demonstrated method requires further research in provision of the integration interface and user acceptance.
存储库是一个机构规模的集合,它以个人的文档集合为基础。存储库为用户提供存储项的接口,这涉及到上传文档和填写元数据。这些界面因需要用户花费时间和精力而受到批评,特别是在填充元数据方面。本文提出了一种旨在解决此问题的存储库发布方法。用户在桌面上的文档集合呈现在一个动态的、基于相似性的界面中,允许他们查找、关联和选择文档,然后可以将这些文档与现有的元数据一起上传到机构存储库,而用户只需付出最小的努力。该演示展示了一种省时省力的方法,用于将带有元数据的项或一组相关项存储到存储库中。采用所演示的方法需要在提供集成接口和用户接受度方面进行进一步研究。
{"title":"Direct desktop-repository deposits with SWORD","authors":"G. Mosweunyane, L. Carr","doi":"10.1109/ISTAFRICA.2014.6880604","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880604","url":null,"abstract":"A repository is an institutional-scale collection, which feeds off individuals' document collections. Repositories provide interfaces for users to deposit items, and this involves uploading the document and filling-in the metadata. These interfaces have been criticised for requiring time and effort on the part of the user, especially with the filling-in of the metadata. This paper presents a repository publishing method that aims to counteract this problem. The users' document collections on the desktop are presented in a dynamic, similarity-based interface, allowing them to find, associate and select documents, which can then be uploaded with their exiting metadata to the institutional repository with minimal effort on the part of the user. The demonstration showcases a time and effort-saving method for depositing an item or a set of associated items with metadata to the repository. Adoption of the demonstrated method requires further research in provision of the integration interface and user acceptance.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127285140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Uncovering the competency gap of students employed in business process analyst roles — An employer perspective 揭示从事业务流程分析师角色的学生的能力差距——雇主视角
Pub Date : 2014-05-07 DOI: 10.1109/ISTAFRICA.2014.6880599
T. C. Chakabuda, Lisa F. Seymour, Francois I. Van Der Merwe
As organisations become more process oriented, there has been a significant increase in the demand for graduates and professionals with Business Process Management (BPM) expertise. Whilst there is an increase in BPM training and university related courses to try and address the demand for BPM expertise it has remained a constant challenge for organisations to acquire the appropriate skill set. Little research has been conducted to measure the extent to which graduates meet employer requirements within this field. The aim of this paper is assess the competency gaps of IS students employed in the emerging business process analyst role using the framework for business process analyst competencies as developed by Sonteya and Seymour. We find that competency gaps do exist, the greatest of which were organisation knowledge and the business process orchestration competency. Additionally, the study found that employers consider the business interpersonal competency as the most important for a business process analyst role.
随着组织变得更加面向流程,对具有业务流程管理(BPM)专业知识的毕业生和专业人员的需求显著增加。虽然有越来越多的BPM培训和大学相关课程试图解决对BPM专业知识的需求,但对于组织来说,获得适当的技能集仍然是一个持续的挑战。很少有研究来衡量毕业生在多大程度上满足雇主在这一领域的要求。本文的目的是利用Sonteya和Seymour开发的业务流程分析师能力框架,评估从事新兴业务流程分析师角色的is学生的能力差距。我们发现能力差距确实存在,其中最大的差距是组织知识和业务流程编排能力。此外,研究发现,雇主认为业务人际能力是业务流程分析师角色最重要的。
{"title":"Uncovering the competency gap of students employed in business process analyst roles — An employer perspective","authors":"T. C. Chakabuda, Lisa F. Seymour, Francois I. Van Der Merwe","doi":"10.1109/ISTAFRICA.2014.6880599","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880599","url":null,"abstract":"As organisations become more process oriented, there has been a significant increase in the demand for graduates and professionals with Business Process Management (BPM) expertise. Whilst there is an increase in BPM training and university related courses to try and address the demand for BPM expertise it has remained a constant challenge for organisations to acquire the appropriate skill set. Little research has been conducted to measure the extent to which graduates meet employer requirements within this field. The aim of this paper is assess the competency gaps of IS students employed in the emerging business process analyst role using the framework for business process analyst competencies as developed by Sonteya and Seymour. We find that competency gaps do exist, the greatest of which were organisation knowledge and the business process orchestration competency. Additionally, the study found that employers consider the business interpersonal competency as the most important for a business process analyst role.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129132188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Cattle monitoring system using wireless sensor network in order to prevent cattle rustling 牛群监控系统采用无线传感器网络,以防止牛群被沙沙作响
Pub Date : 2014-05-07 DOI: 10.1109/ISTAFRICA.2014.6880617
P. K. Mashoko Nkwari, S. Rimer, B. Paul
Stock theft is a major problem in the agricultural sector in South Africa and threatens both commercial and the emerging farming sectors in most of the country. Although there have been several techniques to identify cattle and combat stock theft, the scourge has not been eradicated in the farming sector. This paper investigates how we can model cow behaviour using global positioning wireless nodes to get the expected position of a cow. The objective of this research is to model the typical behaviour of a cow to determine anomalies in behaviour that could indicate the presence of the thieves. A wireless sensor node was designed to sense the position and speed of a cow. The position and the speed of the cow are collected for analysis. A random walk model is applied to the cow's position in order to determine the probability of the boundary condition where we assume there is an increased probability of a cow on the boundary position being stolen. The Continuous Time Markov Processes (CTMP) is applied to the movement pattern of an individual cow in order to find the probability that the cow will be at the boundary position. The value of 2.5 km/h has been found as our treshold to detect any agitation of the animal. The cow has less probability to be at the boundary position. The predictive model allows us to prevent stock theft in farms especially in South Africa and Africa in general.
牲畜盗窃是南非农业部门的一个主要问题,威胁到该国大部分地区的商业和新兴农业部门。虽然已经有几种技术来识别牛和打击牲畜盗窃,但这一祸害在农业部门尚未根除。本文研究了如何使用全球定位无线节点来模拟奶牛的行为以获得奶牛的预期位置。这项研究的目的是模拟奶牛的典型行为,以确定行为上的异常,这可能表明小偷的存在。设计了一个无线传感器节点来感知奶牛的位置和速度。收集奶牛的位置和速度进行分析。对奶牛的位置应用随机行走模型,以确定边界条件的概率,我们假设边界位置上的奶牛被偷的概率增加。将连续时间马尔可夫过程(CTMP)应用于单个奶牛的运动模式,以找到奶牛在边界位置的概率。我们发现2.5 km/h是检测动物躁动的阈值。母牛在边界位置的概率较小。预测模型使我们能够防止农场的牲畜盗窃,特别是在南非和整个非洲。
{"title":"Cattle monitoring system using wireless sensor network in order to prevent cattle rustling","authors":"P. K. Mashoko Nkwari, S. Rimer, B. Paul","doi":"10.1109/ISTAFRICA.2014.6880617","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880617","url":null,"abstract":"Stock theft is a major problem in the agricultural sector in South Africa and threatens both commercial and the emerging farming sectors in most of the country. Although there have been several techniques to identify cattle and combat stock theft, the scourge has not been eradicated in the farming sector. This paper investigates how we can model cow behaviour using global positioning wireless nodes to get the expected position of a cow. The objective of this research is to model the typical behaviour of a cow to determine anomalies in behaviour that could indicate the presence of the thieves. A wireless sensor node was designed to sense the position and speed of a cow. The position and the speed of the cow are collected for analysis. A random walk model is applied to the cow's position in order to determine the probability of the boundary condition where we assume there is an increased probability of a cow on the boundary position being stolen. The Continuous Time Markov Processes (CTMP) is applied to the movement pattern of an individual cow in order to find the probability that the cow will be at the boundary position. The value of 2.5 km/h has been found as our treshold to detect any agitation of the animal. The cow has less probability to be at the boundary position. The predictive model allows us to prevent stock theft in farms especially in South Africa and Africa in general.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115276491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A wireless sensor network framework for large-scale industrial water pollution monitoring 面向大规模工业水污染监测的无线传感器网络框架
Pub Date : 2014-05-07 DOI: 10.1109/ISTAFRICA.2014.6880619
Yohannes Derbew, M. Libsie
Design and implementation of Wireless Sensor Networks (WSNs) is a challenging task because WSN research is usually application specific and each application requirement brings with it a different set of constraints and design objectives. Effective use of WSNs in large scale and long-term monitoring of industrial water pollution requires satisfying two inherently contradicting requirements particular to this domain. On the one hand, it has to be time critical in order to provide early warning during compliance violations. On the other hand, it requires long-term data collection from a large number of distributed industrial sites for trend analysis for decision-making. We present the design of a comprehensive framework for using WSNs in industrial water pollution monitoring to assist environment authorities in decision-making regarding water pollution. The suitability and effectiveness of our proposed framework is verified with an experiment using the discrete-event simulator Castalia based on the OMNeT++ simulation platform.
无线传感器网络的设计和实现是一项具有挑战性的任务,因为无线传感器网络的研究通常是特定于应用的,每种应用需求都会带来一组不同的约束和设计目标。在工业水污染的大规模和长期监测中有效地使用WSNs需要满足该领域特定的两个内在矛盾的要求。一方面,它必须是时间关键的,以便在违反法规期间提供早期预警。另一方面,它需要从大量分布的工业场地中长期收集数据,进行趋势分析,为决策提供依据。我们提出了一个综合框架的设计,用于在工业水污染监测中使用WSNs,以协助环境当局做出有关水污染的决策。利用基于omnet++仿真平台的离散事件模拟器Castalia进行了实验,验证了该框架的适用性和有效性。
{"title":"A wireless sensor network framework for large-scale industrial water pollution monitoring","authors":"Yohannes Derbew, M. Libsie","doi":"10.1109/ISTAFRICA.2014.6880619","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880619","url":null,"abstract":"Design and implementation of Wireless Sensor Networks (WSNs) is a challenging task because WSN research is usually application specific and each application requirement brings with it a different set of constraints and design objectives. Effective use of WSNs in large scale and long-term monitoring of industrial water pollution requires satisfying two inherently contradicting requirements particular to this domain. On the one hand, it has to be time critical in order to provide early warning during compliance violations. On the other hand, it requires long-term data collection from a large number of distributed industrial sites for trend analysis for decision-making. We present the design of a comprehensive framework for using WSNs in industrial water pollution monitoring to assist environment authorities in decision-making regarding water pollution. The suitability and effectiveness of our proposed framework is verified with an experiment using the discrete-event simulator Castalia based on the OMNeT++ simulation platform.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Use of cloud computing platform for e-learning in institutions of higher learning in Kenya 肯尼亚高等院校使用云计算平台进行电子学习
Pub Date : 2014-05-07 DOI: 10.1109/ISTAFRICA.2014.6880638
Tabitha Kihara, D. Gichoya
The emerging cloud computing technology provides a compelling prospect for Institutions of Higher Learning to outsource their Information and Communications Technology (ICT). Although its reputation is escalating quickly, there are concerns that must be taken into account. The goal of this paper is to explore the potential of cloud computing in transforming and automating the operations of Higher Learning Institutions in Kenya, both public and private. Cloud computing technology offers many opportunities such disaster recovery, business continuity, data consolidation, availability, confidentiality and data integrity. This paper investigates the significant issues related to the Strengths, Weaknesses, Opportunities and Threats (SWOT) of cloud computing adoption in Institutions of Higher Learning for hosting their e-learning resources, e-library services and digital repositories. The paper adopts a SWOT analysis to assess the implementation level of this technology and presents a framework for adoption and realization of this technology in institutions of higher learning in Kenya. The impact of this paper can be seen in two folds; academic and practice. Its findings add to the body of knowledge in the area of cloud computing. Promotion and adoption of this technology by these institutions is of dire need to policy makers and regulators such as Communication Commission of Kenya (CCK), other stakeholders such as the government, service providers like Kenya Education Network (KENET), industry and research institutions.
新兴的云计算技术为高等院校外包其信息和通信技术(ICT)提供了令人信服的前景。尽管它的声誉正在迅速提升,但仍有一些担忧必须考虑在内。本文的目标是探索云计算在肯尼亚公立和私立高等教育机构转型和自动化运营方面的潜力。云计算技术提供了许多机会,如灾难恢复、业务连续性、数据整合、可用性、机密性和数据完整性。本文研究了高等院校采用云计算来托管电子学习资源、电子图书馆服务和数字存储的优势、劣势、机会和威胁(SWOT)相关的重要问题。本文采用SWOT分析来评估该技术的实施水平,并提出了肯尼亚高等院校采用和实现该技术的框架。本文的影响可以从两个方面看出;学术与实践。它的发现增加了云计算领域的知识体系。政策制定者和肯尼亚通信委员会(CCK)等监管机构、政府等其他利益相关者、肯尼亚教育网络(KENET)等服务提供商、行业和研究机构迫切需要这些机构推广和采用这项技术。
{"title":"Use of cloud computing platform for e-learning in institutions of higher learning in Kenya","authors":"Tabitha Kihara, D. Gichoya","doi":"10.1109/ISTAFRICA.2014.6880638","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880638","url":null,"abstract":"The emerging cloud computing technology provides a compelling prospect for Institutions of Higher Learning to outsource their Information and Communications Technology (ICT). Although its reputation is escalating quickly, there are concerns that must be taken into account. The goal of this paper is to explore the potential of cloud computing in transforming and automating the operations of Higher Learning Institutions in Kenya, both public and private. Cloud computing technology offers many opportunities such disaster recovery, business continuity, data consolidation, availability, confidentiality and data integrity. This paper investigates the significant issues related to the Strengths, Weaknesses, Opportunities and Threats (SWOT) of cloud computing adoption in Institutions of Higher Learning for hosting their e-learning resources, e-library services and digital repositories. The paper adopts a SWOT analysis to assess the implementation level of this technology and presents a framework for adoption and realization of this technology in institutions of higher learning in Kenya. The impact of this paper can be seen in two folds; academic and practice. Its findings add to the body of knowledge in the area of cloud computing. Promotion and adoption of this technology by these institutions is of dire need to policy makers and regulators such as Communication Commission of Kenya (CCK), other stakeholders such as the government, service providers like Kenya Education Network (KENET), industry and research institutions.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"31 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132167188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Survey of practical security frameworks for defending SIP based VoIP systems against DoS/DDoS attacks 基于SIP的VoIP系统抵御DoS/DDoS攻击的实用安全框架综述
Pub Date : 2014-05-07 DOI: 10.1109/ISTAFRICA.2014.6880664
Sheeba Armoogum, N. Mohamudally
Since its existence for the past ten years, the SIP-based Voice Over IP (VoIP) network is playing a key role in the current and future communication by utilising the existing broadband Internet access. Unfortunately, Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks can inflict harmful threats to various nodes (SIP proxy servers, User agents, etc) and may cause failure to the SIP system. This is one reason why over 40 proposals, addressing these problems, have been published. Regrettably, not many of these researchers have considered scalability, extensibility and other performance issues by testing their promising prevention techniques in a real network. We find that there are around eight practical frameworks and the aim of this paper is to revisit these countermeasures solutions. We propose a new way of evaluation criteria and a comparative study of the researchers' ideas are being addressed based on the models (if any) used, the network architectures and the results. We however do not judge any of these proposals; instead we give hints on how the attacks on VoIP networks could be further addressed.
基于sip协议的IP语音(VoIP)网络自诞生以来已有十年,利用现有的宽带互联网接入,在当前和未来的通信中发挥着关键作用。不幸的是,拒绝服务和分布式拒绝服务(DoS/DDoS)攻击会对各种节点(SIP代理服务器、用户代理等)造成有害的威胁,并可能导致SIP系统故障。这就是为什么已经发表了40多份解决这些问题的建议的原因之一。遗憾的是,这些研究人员中没有多少人考虑过可伸缩性、可扩展性和其他性能问题,并在真实网络中测试了他们有前途的预防技术。我们发现大约有八个实用框架,本文的目的是重新审视这些对策解决方案。我们提出了一种新的评估标准,并根据使用的模型(如果有的话)、网络架构和结果对研究人员的想法进行了比较研究。然而,我们对这些建议不予评判;相反,我们给出了如何进一步解决VoIP网络攻击的提示。
{"title":"Survey of practical security frameworks for defending SIP based VoIP systems against DoS/DDoS attacks","authors":"Sheeba Armoogum, N. Mohamudally","doi":"10.1109/ISTAFRICA.2014.6880664","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880664","url":null,"abstract":"Since its existence for the past ten years, the SIP-based Voice Over IP (VoIP) network is playing a key role in the current and future communication by utilising the existing broadband Internet access. Unfortunately, Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks can inflict harmful threats to various nodes (SIP proxy servers, User agents, etc) and may cause failure to the SIP system. This is one reason why over 40 proposals, addressing these problems, have been published. Regrettably, not many of these researchers have considered scalability, extensibility and other performance issues by testing their promising prevention techniques in a real network. We find that there are around eight practical frameworks and the aim of this paper is to revisit these countermeasures solutions. We propose a new way of evaluation criteria and a comparative study of the researchers' ideas are being addressed based on the models (if any) used, the network architectures and the results. We however do not judge any of these proposals; instead we give hints on how the attacks on VoIP networks could be further addressed.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127606758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2014 IST-Africa Conference Proceedings
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1