Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601284
Herman Barnardt, M. Coetzee
Sophisticated mobile applications may require more resources than are readily available on mobile devices. Mobile device resources such as processing power and storage can be extended with cloud-based mobile augmentation. However, some resources, specifically battery life and bandwidth, cannot be augmented. This research identifies that it is important to be able to estimate the energy consumption of both offloaded and local tasks when making offloading decisions. Due to the fact that the energy consumption profile of mobile devices with diverse capabilities are not the same, this aspect needs to be considered. This research proposes the Switch framework to conserve the limited battery life on mobile devices using a device specific energy consumption profile. The evaluation of the framework suggests that Switch can successfully be used to conserve battery life on mobile devices by making intelligent offloading decisions.
{"title":"Switch: A Battery Conservation Framework for Mobile Devices","authors":"Herman Barnardt, M. Coetzee","doi":"10.1109/ICONIC.2018.8601284","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601284","url":null,"abstract":"Sophisticated mobile applications may require more resources than are readily available on mobile devices. Mobile device resources such as processing power and storage can be extended with cloud-based mobile augmentation. However, some resources, specifically battery life and bandwidth, cannot be augmented. This research identifies that it is important to be able to estimate the energy consumption of both offloaded and local tasks when making offloading decisions. Due to the fact that the energy consumption profile of mobile devices with diverse capabilities are not the same, this aspect needs to be considered. This research proposes the Switch framework to conserve the limited battery life on mobile devices using a device specific energy consumption profile. The evaluation of the framework suggests that Switch can successfully be used to conserve battery life on mobile devices by making intelligent offloading decisions.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127205141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601097
Elias Mbongeni Sibanda, T. Zuva
Recommendation systems for mobile phones are of great importance for mobile operators to achieve their desired profit targets. In a client inferred market, the number of contract users and contract phones is especially significant for mobile service operators. The tremendous growth in the number of available mobile cellular telephone contracts necessitates the need for a recommender system to assist users discover suitable contracts based on their usage patterns. This study used a hybrid of both collaborative and content-based filtering. A prototype of a mobile recommender system was developed and evaluated using precision and recall. The developed recommender system was able to successfully recommend packages to subscribers. A precision-recall curve was produced, and it showed good performance of the system. This study successfully showed that a hybrid system was able to recommend products to the mobile subscribers.
{"title":"Call Data Record Based Recommender Systems for Mobile Subscribers","authors":"Elias Mbongeni Sibanda, T. Zuva","doi":"10.1109/ICONIC.2018.8601097","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601097","url":null,"abstract":"Recommendation systems for mobile phones are of great importance for mobile operators to achieve their desired profit targets. In a client inferred market, the number of contract users and contract phones is especially significant for mobile service operators. The tremendous growth in the number of available mobile cellular telephone contracts necessitates the need for a recommender system to assist users discover suitable contracts based on their usage patterns. This study used a hybrid of both collaborative and content-based filtering. A prototype of a mobile recommender system was developed and evaluated using precision and recall. The developed recommender system was able to successfully recommend packages to subscribers. A precision-recall curve was produced, and it showed good performance of the system. This study successfully showed that a hybrid system was able to recommend products to the mobile subscribers.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125279470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601222
Duduzile Zamanhlane Masuku, M. Velempini, N. Gasela
Cognitive Radio networks (CR) is a new technique that uses available unlicensed spectrum band this is due to the limited number of fixed licensed spectrum bands [1]. The main features of the CR are spectrum sensing, management, sharing, and mobility [2]. This paper focuses on spectrum mobility for military systems often referred to as spectrum handoff for military systems, which is a process when the CR user changes its frequency of operation due to spectrum occupancy by the licensed user. Spectrum mobility is important in military networks since mission success may depend on reliable communications. In this paper, we propose the use of Fuzzy logic to come up with a decision making handoff scheme. The proposed scheme avoids interruptions caused by the movement of a secondary user and minimizes handoff latency if the SU selects a correct channel. It was observed through the analysis of literature that even though most of the existing schemes can perform handoff successfully, these existing schemes result in slow handoff and are complicated to implement.
认知无线电网络(Cognitive Radio networks, CR)是一种利用可用的未授权频谱频带的新技术,这是由于固定许可频谱频带数量有限[1]。CR的主要特征是频谱感知、管理、共享和移动性[2]。本文主要研究军事系统的频谱迁移,通常称为军事系统的频谱切换,即由于频谱被许可用户占用,CR用户改变其操作频率的过程。频谱移动性在军事网络中很重要,因为任务的成功可能取决于可靠的通信。在本文中,我们提出使用模糊逻辑来提出一个决策切换方案。该方案避免了由辅助用户移动引起的中断,并且在SU选择正确信道的情况下最大限度地减少了切换延迟。通过文献分析发现,虽然现有的方案大多数都能成功完成切换,但这些方案的切换速度较慢,并且实现起来比较复杂。
{"title":"A Survey on Spectrum Handoff Algorithm for Continuous Connectivity","authors":"Duduzile Zamanhlane Masuku, M. Velempini, N. Gasela","doi":"10.1109/ICONIC.2018.8601222","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601222","url":null,"abstract":"Cognitive Radio networks (CR) is a new technique that uses available unlicensed spectrum band this is due to the limited number of fixed licensed spectrum bands [1]. The main features of the CR are spectrum sensing, management, sharing, and mobility [2]. This paper focuses on spectrum mobility for military systems often referred to as spectrum handoff for military systems, which is a process when the CR user changes its frequency of operation due to spectrum occupancy by the licensed user. Spectrum mobility is important in military networks since mission success may depend on reliable communications. In this paper, we propose the use of Fuzzy logic to come up with a decision making handoff scheme. The proposed scheme avoids interruptions caused by the movement of a secondary user and minimizes handoff latency if the SU selects a correct channel. It was observed through the analysis of literature that even though most of the existing schemes can perform handoff successfully, these existing schemes result in slow handoff and are complicated to implement.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114173634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601298
Philani M. Khumalo, B. Nleya, A. Gomba, A. Mutsvangwa
5G wireless together with optical backbone networks are expected to be the main pillars of the envisaged next /future generation networking (N/FGN) infrastructures. This is an impetus to practical realization of an IoT network that will support and ensure relatively higher bandwidth as well as enhanced quality of service (QoS) in both access and core network sections. The high-speed wireless links at the network peripherals will serve as a conducive platform for device-to-device (D2D) communication. D2D driven applications and services can only be effective as well as secure assuming the associated machine type communication devices (MTCDs) have been successfully verified and authenticated. Typically, D2D type services and applications involve the interaction of several MTCDs in a group. As such, secure and effective D2D group-based authentication and key agreement (AKA) protocols are necessary. They need to inherently achieve efficacy in maintaining the group key unlink-ability as well as generate minimal signalling overheads that otherwise may lead to network congestion. In this paper we detail a secure and efficient Group AKA (Gr-AKA) protocol for D2D communication. Its performance is compared to that of existing similar protocols and is found to comparably lower both computational as well as signalling overhead requirements. Overall the analysis shows that the Gr-AKA protocol improves performance in terms of fulfilling D2D communication’s security requirements.
{"title":"Services and Applications Security in IoT Enabled Networks","authors":"Philani M. Khumalo, B. Nleya, A. Gomba, A. Mutsvangwa","doi":"10.1109/ICONIC.2018.8601298","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601298","url":null,"abstract":"5G wireless together with optical backbone networks are expected to be the main pillars of the envisaged next /future generation networking (N/FGN) infrastructures. This is an impetus to practical realization of an IoT network that will support and ensure relatively higher bandwidth as well as enhanced quality of service (QoS) in both access and core network sections. The high-speed wireless links at the network peripherals will serve as a conducive platform for device-to-device (D2D) communication. D2D driven applications and services can only be effective as well as secure assuming the associated machine type communication devices (MTCDs) have been successfully verified and authenticated. Typically, D2D type services and applications involve the interaction of several MTCDs in a group. As such, secure and effective D2D group-based authentication and key agreement (AKA) protocols are necessary. They need to inherently achieve efficacy in maintaining the group key unlink-ability as well as generate minimal signalling overheads that otherwise may lead to network congestion. In this paper we detail a secure and efficient Group AKA (Gr-AKA) protocol for D2D communication. Its performance is compared to that of existing similar protocols and is found to comparably lower both computational as well as signalling overhead requirements. Overall the analysis shows that the Gr-AKA protocol improves performance in terms of fulfilling D2D communication’s security requirements.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114196221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601237
S. Asare, P. Mbewe
Much discussion and research has been done on compression algorithms but not many have gone to the extent of developing an application that can test and compare various compression algorithms with each other. In this paper, we present an application known as the CMedia Compressor, that tests and compares various compression algorithms. The application shows that adaptive Huffman and Arithmetic Coding tend to outperform the others such as the Run-length encoding (RLE), Huffman coding, Arithmetic coding (AC) and Lempel-Ziv-Welch (LZW) methods. Results obtained from this study are discussed and also presented graphically. The study’s results indicates that Arithmetic coding yields higher space-savings than Huffman coding and Adaptive Huffman coding.
{"title":"CMedia Compressor: An Application to Graphically Compare General Compression Algorithms and Adaptive Huffman Compression Algorithm","authors":"S. Asare, P. Mbewe","doi":"10.1109/ICONIC.2018.8601237","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601237","url":null,"abstract":"Much discussion and research has been done on compression algorithms but not many have gone to the extent of developing an application that can test and compare various compression algorithms with each other. In this paper, we present an application known as the CMedia Compressor, that tests and compares various compression algorithms. The application shows that adaptive Huffman and Arithmetic Coding tend to outperform the others such as the Run-length encoding (RLE), Huffman coding, Arithmetic coding (AC) and Lempel-Ziv-Welch (LZW) methods. Results obtained from this study are discussed and also presented graphically. The study’s results indicates that Arithmetic coding yields higher space-savings than Huffman coding and Adaptive Huffman coding.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121944671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601229
M. Božanić, S. Sinha
Modern technology and the increasingly readily available access to the internet in recent years have initiated the paradigm shift from the "local student" to the "global and virtual student", which is evident in the increased numbers of students who are enrolling in the postgraduate (master’s and PhD) degrees offered through remote means. Such students are not necessarily even present in the town or the country of the university at which they have enrolled. Traditional walk-in universities such as the University of Johannesburg, South Africa, are consequently increasing the portfolio of online degrees, which is in line with the trend seen by many universities worldwide. Education in electronics traditionally requires a hands-on approach, and the laboratory component remains a requirement even at postgraduate level. In this paper, the fabless semiconductor manufacturing approach, already deployed by many microelectronic industry giants, is aligned as an enabling factor of establishing "virtual labs", used to fulfil the practical education component of both research-based and coursework microelectronic modules offered online. A case study involving postgraduate degrees with specialization in microelectronics from the University of Johannesburg is also presented.
{"title":"Fabless Semiconductor Implementation Model as an Enabling Factor for \"Virtual Labs\" in Online Postgraduate Degrees in Microelectronics","authors":"M. Božanić, S. Sinha","doi":"10.1109/ICONIC.2018.8601229","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601229","url":null,"abstract":"Modern technology and the increasingly readily available access to the internet in recent years have initiated the paradigm shift from the \"local student\" to the \"global and virtual student\", which is evident in the increased numbers of students who are enrolling in the postgraduate (master’s and PhD) degrees offered through remote means. Such students are not necessarily even present in the town or the country of the university at which they have enrolled. Traditional walk-in universities such as the University of Johannesburg, South Africa, are consequently increasing the portfolio of online degrees, which is in line with the trend seen by many universities worldwide. Education in electronics traditionally requires a hands-on approach, and the laboratory component remains a requirement even at postgraduate level. In this paper, the fabless semiconductor manufacturing approach, already deployed by many microelectronic industry giants, is aligned as an enabling factor of establishing \"virtual labs\", used to fulfil the practical education component of both research-based and coursework microelectronic modules offered online. A case study involving postgraduate degrees with specialization in microelectronics from the University of Johannesburg is also presented.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123539451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601261
K. E. Adetunji, C. E. Ngene
The agriculture sector is important to the economic growth of agriculture-inclined countries like South Africa. Issues regarding agriculture may not only directly affect consumers, but cause the increase in food price. This may further affect the price control policy on food. This paper discusses soil manuring as one of the problems faced in optimum food productivity. Since leaves droppings could be decomposed to fertilize the soil, the need to understand the factors that may affect the process or outcome is important, hence our project. We designed a compact monitoring circuit using the Redboard and GSM/GPRS module. Three TCS3200 color sensors were used to detect leaves droppings, giving a large coverage area. The colors detected were categorized to numbers, for possible data analysis. Other sensors were used to collect parameters for possible factors that may affect decomposition. We measured soil moisture, soil temperature, ambient temperature, relative humidity, and dew point. Our Heroku-deployed developed cloud platform was synced to the monitoring circuit for remote monitoring. Our whole project embraced a continuous real-time monitoring from the site to the cloud platform.
{"title":"Design of a Cloud-based Monitoring System for Potential Leaves Decomposition for Manures","authors":"K. E. Adetunji, C. E. Ngene","doi":"10.1109/ICONIC.2018.8601261","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601261","url":null,"abstract":"The agriculture sector is important to the economic growth of agriculture-inclined countries like South Africa. Issues regarding agriculture may not only directly affect consumers, but cause the increase in food price. This may further affect the price control policy on food. This paper discusses soil manuring as one of the problems faced in optimum food productivity. Since leaves droppings could be decomposed to fertilize the soil, the need to understand the factors that may affect the process or outcome is important, hence our project. We designed a compact monitoring circuit using the Redboard and GSM/GPRS module. Three TCS3200 color sensors were used to detect leaves droppings, giving a large coverage area. The colors detected were categorized to numbers, for possible data analysis. Other sensors were used to collect parameters for possible factors that may affect decomposition. We measured soil moisture, soil temperature, ambient temperature, relative humidity, and dew point. Our Heroku-deployed developed cloud platform was synced to the monitoring circuit for remote monitoring. Our whole project embraced a continuous real-time monitoring from the site to the cloud platform.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115387600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601208
Hope Mogale, M. Esiefarienrhe, Lucia Letlonkane
In this paper we present Web based highly secure Authentication Security system that uses Image Steganography and 128-bit Advanced Encryption Standard algorithm. Our developed web authentication system encrypts users passwords with an AES encryption that takes octillion years to decrypt and is coupled with face identification photograph which is used as a stegoimage to hide the encrypted password for more robust security. When put to test our Web Authentication Security systems shows positive results which outstand advanced steganalysis attacks such as the chi-squared attack and neighbourhood histogram. We recommend this security for prospective web applications of the future that will be handling sensitive user information.
{"title":"Web Authentication Security Using Image Steganography and AES Encryption","authors":"Hope Mogale, M. Esiefarienrhe, Lucia Letlonkane","doi":"10.1109/ICONIC.2018.8601208","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601208","url":null,"abstract":"In this paper we present Web based highly secure Authentication Security system that uses Image Steganography and 128-bit Advanced Encryption Standard algorithm. Our developed web authentication system encrypts users passwords with an AES encryption that takes octillion years to decrypt and is coupled with face identification photograph which is used as a stegoimage to hide the encrypted password for more robust security. When put to test our Web Authentication Security systems shows positive results which outstand advanced steganalysis attacks such as the chi-squared attack and neighbourhood histogram. We recommend this security for prospective web applications of the future that will be handling sensitive user information.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123633966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601256
Tsholofelo M. Malatji, C. Willers, M. S. Willers
Infrared guided missiles pose a threat to both military and civilian aircraft, and as such, the development of effective countermeasures against this threat remains vital. The effectiveness of various jamming code signals on the tracking performance of a second generation frequency modulation, conical-scan man portable air defence missile seeker is evaluated in a comprehensive simulation system. The simulation comprises accurate scene geometrical and radiometric models, as well as detailed seeker and kinematic models of the missile. The study investigated the effect a jam signal has on the signal processing circuitry of the conical-scan seeker and compared an effective and non-effective jam signal. It was found that the processor produces a large error if the jam signal oscillates at a frequency that is well suited to the automatic gain control time constant used in the seeker.
{"title":"Propagation of a jam code signal in the conical-scan seeker processor","authors":"Tsholofelo M. Malatji, C. Willers, M. S. Willers","doi":"10.1109/ICONIC.2018.8601256","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601256","url":null,"abstract":"Infrared guided missiles pose a threat to both military and civilian aircraft, and as such, the development of effective countermeasures against this threat remains vital. The effectiveness of various jamming code signals on the tracking performance of a second generation frequency modulation, conical-scan man portable air defence missile seeker is evaluated in a comprehensive simulation system. The simulation comprises accurate scene geometrical and radiometric models, as well as detailed seeker and kinematic models of the missile. The study investigated the effect a jam signal has on the signal processing circuitry of the conical-scan seeker and compared an effective and non-effective jam signal. It was found that the processor produces a large error if the jam signal oscillates at a frequency that is well suited to the automatic gain control time constant used in the seeker.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126323479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601209
Nikodemus Angula, N. Dlodlo
Wikipedia’s definition of semantic interoperability is about two or more computer systems having the ability to be able to communicate and exchange data in a meaningful way, which means data exchanged from different source can be understood by the other computer systems. Protocols specify interactions between the communicating entities. In this research, a protocol is developed as an interpreter of disease surveillance data from heterogeneous health information systems (HIS) in Namibian public health institutions for data semantic interoperability. This enables the District Health Information System (DHIS-2) and other health information silo systems to exchange health data and information, and specifically disease surveillance data. The study has produced a new interlink protocol which acts as a converter of data coming from multiple silo systems. Therefore, the interlink protocol has the capability to aggregate disease surveillance data from different data sources. This interlink protocol is based on JSON format.
{"title":"Towards the Development of an Interlink Protocol for Disease Surveillance Data Aggregation: A Namibian Context","authors":"Nikodemus Angula, N. Dlodlo","doi":"10.1109/ICONIC.2018.8601209","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601209","url":null,"abstract":"Wikipedia’s definition of semantic interoperability is about two or more computer systems having the ability to be able to communicate and exchange data in a meaningful way, which means data exchanged from different source can be understood by the other computer systems. Protocols specify interactions between the communicating entities. In this research, a protocol is developed as an interpreter of disease surveillance data from heterogeneous health information systems (HIS) in Namibian public health institutions for data semantic interoperability. This enables the District Health Information System (DHIS-2) and other health information silo systems to exchange health data and information, and specifically disease surveillance data. The study has produced a new interlink protocol which acts as a converter of data coming from multiple silo systems. Therefore, the interlink protocol has the capability to aggregate disease surveillance data from different data sources. This interlink protocol is based on JSON format.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125742575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}