Pub Date : 2020-03-01DOI: 10.1109/ICTAS47918.2020.233997
Obrain Murire, W. Chinyamurindi, L. Cilliers
Employers use social media to search for and connect with prospective employees. However, they face some challenges when they use social media for recruitment purposes. To enable employers to overcome these challenges, a systematic review was adopted to identify barriers for the use of social media by recruiters. Sixteen articles were included in the study. The study proposed five main critical success factors to overcome the challenges employers face when using social media for employment purposes: developing a human resource social media policy for recruiting applicants; compliance with existing laws; training the human resources personnel on how to use social media for recruitment purposes; identifying a social media champion in the organisation; and developing and implementing policies for social media recruitment in the organisation. There is a need for continued support from management to ensure that the Human Resource Department uses social media correctly to identify and recruit graduates for vacancies in the organisation.
{"title":"Challenges faced by employers when using social media for recruitment and selection purposes","authors":"Obrain Murire, W. Chinyamurindi, L. Cilliers","doi":"10.1109/ICTAS47918.2020.233997","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233997","url":null,"abstract":"Employers use social media to search for and connect with prospective employees. However, they face some challenges when they use social media for recruitment purposes. To enable employers to overcome these challenges, a systematic review was adopted to identify barriers for the use of social media by recruiters. Sixteen articles were included in the study. The study proposed five main critical success factors to overcome the challenges employers face when using social media for employment purposes: developing a human resource social media policy for recruiting applicants; compliance with existing laws; training the human resources personnel on how to use social media for recruitment purposes; identifying a social media champion in the organisation; and developing and implementing policies for social media recruitment in the organisation. There is a need for continued support from management to ensure that the Human Resource Department uses social media correctly to identify and recruit graduates for vacancies in the organisation.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127770152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICTAS47918.2020.234003
M. Kyselak, C. Vlcek
Global communication is inevitably accompanied by increasing the capacity of optical routes, which is one of the main goals of modern data network designers. Particular emphasis is placed on increasing the capacities while using the existing builtin optical infrastructures. Recently, the attention of network engineers has been focused on the polarization division multiplexing (PDM) technology that uses at least two independent data channels on a single wavelength with orthogonal polarization states. PDM is becoming the standard in most state-of-the-art telecommunications systems. Thus, existing technologies allow multiple polarization states to be used. However, the latest research points to the emergence of new advanced PDM techniques using dozens of polarization states. The paper deals with the analysis of the tolerance field of general polarization division multiplexing. It brings new results that can yield new methods that will open up new possibilities for exploiting the polarization properties of light in telecommunications.
{"title":"Analysis of Limit States and Tolerance Field of Polarization Multiplexing","authors":"M. Kyselak, C. Vlcek","doi":"10.1109/ICTAS47918.2020.234003","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.234003","url":null,"abstract":"Global communication is inevitably accompanied by increasing the capacity of optical routes, which is one of the main goals of modern data network designers. Particular emphasis is placed on increasing the capacities while using the existing builtin optical infrastructures. Recently, the attention of network engineers has been focused on the polarization division multiplexing (PDM) technology that uses at least two independent data channels on a single wavelength with orthogonal polarization states. PDM is becoming the standard in most state-of-the-art telecommunications systems. Thus, existing technologies allow multiple polarization states to be used. However, the latest research points to the emergence of new advanced PDM techniques using dozens of polarization states. The paper deals with the analysis of the tolerance field of general polarization division multiplexing. It brings new results that can yield new methods that will open up new possibilities for exploiting the polarization properties of light in telecommunications.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132661178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICTAS47918.2020.233973
A. Bayaga, M. Kyobe, Jacques Ophoff
Following the growing interest in the topic of e-government services’ adoption, which is believed to be obstructed by the multifaceted nature of lacking trust, the objective of the current research was to examine the adoption and role of trust in e-government services. The current research took the approach of a systematic review of previous work, which was positioned upon researching trust as an influencer of e-government services’ adoption. Guided by the theoretical framework, and based on the researched and reviewed findings, the conclusion reached as a potential for increasing trust in e-government services was first, to consider the various types of trust and their dimensions/requirements. The second recommendation was to test how these requirements influence e-government services such as e-voting (e-election), e-tax [e-filing], e-health (m-health), e-banking, e-commerce, and e-learning (m-learning). Another crucial attribute to be considered is (1) the best predictor(s) for these requirements, and (2) how the variation of continued use of e-government services could be explained by the types of trust and their dimensions.
{"title":"Criticism of the role of trust in e-government services","authors":"A. Bayaga, M. Kyobe, Jacques Ophoff","doi":"10.1109/ICTAS47918.2020.233973","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233973","url":null,"abstract":"Following the growing interest in the topic of e-government services’ adoption, which is believed to be obstructed by the multifaceted nature of lacking trust, the objective of the current research was to examine the adoption and role of trust in e-government services. The current research took the approach of a systematic review of previous work, which was positioned upon researching trust as an influencer of e-government services’ adoption. Guided by the theoretical framework, and based on the researched and reviewed findings, the conclusion reached as a potential for increasing trust in e-government services was first, to consider the various types of trust and their dimensions/requirements. The second recommendation was to test how these requirements influence e-government services such as e-voting (e-election), e-tax [e-filing], e-health (m-health), e-banking, e-commerce, and e-learning (m-learning). Another crucial attribute to be considered is (1) the best predictor(s) for these requirements, and (2) how the variation of continued use of e-government services could be explained by the types of trust and their dimensions.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121722027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICTAS47918.2020.234001
V. Rajah, Ezugwu E. Absalom
Cluster analysis is an essential tool in data mining. Several clustering algorithms have been proposed and implemented for which most are able to find the good quality or optimal clustering solutions. However, most of these algorithms still depend on the number of a cluster being provided a priori. In dealing with real-life problems, the number of clusters is unknown and determining the optimal number of clusters for a large density and high dimensionality dataset is quite a difficult task to handle. This paper, therefore, proposes five new hybrid symbiotic organism search algorithms to automatically partition datasets without any prior information regarding the number of clusters. Furthermore, the hybrid algorithms will be evaluated in terms of solution quality using the Davies–Bouldin clustering validity index. The simulation results show that the performance of the hybrid symbiotic organisms search particle swarm optimization algorithm is superior to the other proposed hybrid algorithms.
{"title":"Hybrid Symbiotic Organism Search algorithms for Automatic Data Clustering","authors":"V. Rajah, Ezugwu E. Absalom","doi":"10.1109/ICTAS47918.2020.234001","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.234001","url":null,"abstract":"Cluster analysis is an essential tool in data mining. Several clustering algorithms have been proposed and implemented for which most are able to find the good quality or optimal clustering solutions. However, most of these algorithms still depend on the number of a cluster being provided a priori. In dealing with real-life problems, the number of clusters is unknown and determining the optimal number of clusters for a large density and high dimensionality dataset is quite a difficult task to handle. This paper, therefore, proposes five new hybrid symbiotic organism search algorithms to automatically partition datasets without any prior information regarding the number of clusters. Furthermore, the hybrid algorithms will be evaluated in terms of solution quality using the Davies–Bouldin clustering validity index. The simulation results show that the performance of the hybrid symbiotic organisms search particle swarm optimization algorithm is superior to the other proposed hybrid algorithms.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126121492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICTAS47918.2020.234004
Simangaliso Mlangeni, Ezugwu E. Absalom, H. Chiroma
South Africa is currently facing an on-going energy crisis that seems to persist every year. Load shedding has become one of the country’s biggest challenge. This is because of energy consumption being at an all-time high and inconsistent in terms of supply. In this paper, we propose a deep learning framework (called Dense Neural Network) for the prediction of energy consumption for University buildings. The deep learning model is evaluated on an energy dataset (collected from the University of KwaZulu-Natal), to forecast the energy consumption of the buildings in the University of KwaZulu-Natal. Furthermore, we compared the performance of the proposed model with two classical algorithms (Support Vector Machine and Multiple Regression), and the deep learning model outperformed the classical algorithms. The forecasted energy consumption can be used by various University managements to assess where most of the energy is being consumed. It can provide an opportunity to devise strategies for optimal utilization of energy in Universities.
{"title":"Deep Learning Model for Forecasting Institutional Building Energy Consumption","authors":"Simangaliso Mlangeni, Ezugwu E. Absalom, H. Chiroma","doi":"10.1109/ICTAS47918.2020.234004","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.234004","url":null,"abstract":"South Africa is currently facing an on-going energy crisis that seems to persist every year. Load shedding has become one of the country’s biggest challenge. This is because of energy consumption being at an all-time high and inconsistent in terms of supply. In this paper, we propose a deep learning framework (called Dense Neural Network) for the prediction of energy consumption for University buildings. The deep learning model is evaluated on an energy dataset (collected from the University of KwaZulu-Natal), to forecast the energy consumption of the buildings in the University of KwaZulu-Natal. Furthermore, we compared the performance of the proposed model with two classical algorithms (Support Vector Machine and Multiple Regression), and the deep learning model outperformed the classical algorithms. The forecasted energy consumption can be used by various University managements to assess where most of the energy is being consumed. It can provide an opportunity to devise strategies for optimal utilization of energy in Universities.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125203131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICTAS47918.2020.233979
Vanitha Rajamany, J. V. Biljon, C. V. Staden
eModeration is an essential aspect of quality assurance in electronic learning, but eModeration systems are not a regular feature of assessment in educational institutions. One reason could be the lack of evidence-based requirements to guide the implementation and evaluation of eModeration systems. To ensure adoption, it is important that eModeration system requirements comply with technology acceptance requirements. The purpose of this paper is to determine the adoption requirements for the development of an eModeration system. We employ a critical literature review as methodology to extract an initial set of eModeration requirements from the literature. The initial set of eModeration requirements are then used as a basis for eliciting requirements from technology acceptance models. The lack of eModeration systems especially in the secondary school environment necessitated a focus on pre- adoption requirements, which was a challenge since most technology acceptance models assume the use of a system. The Human, Organisation and Technology model is useful in supporting pre-adoption requirements and was thus selected as the basis for synthesising the refined set of requirements. The contribution is a set of requirements that should be useful in the design and evaluation of eModeration systems towards ensuring adoption and use.
{"title":"eModeration adoption requirements for secondary school education: a critical literature review","authors":"Vanitha Rajamany, J. V. Biljon, C. V. Staden","doi":"10.1109/ICTAS47918.2020.233979","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233979","url":null,"abstract":"eModeration is an essential aspect of quality assurance in electronic learning, but eModeration systems are not a regular feature of assessment in educational institutions. One reason could be the lack of evidence-based requirements to guide the implementation and evaluation of eModeration systems. To ensure adoption, it is important that eModeration system requirements comply with technology acceptance requirements. The purpose of this paper is to determine the adoption requirements for the development of an eModeration system. We employ a critical literature review as methodology to extract an initial set of eModeration requirements from the literature. The initial set of eModeration requirements are then used as a basis for eliciting requirements from technology acceptance models. The lack of eModeration systems especially in the secondary school environment necessitated a focus on pre- adoption requirements, which was a challenge since most technology acceptance models assume the use of a system. The Human, Organisation and Technology model is useful in supporting pre-adoption requirements and was thus selected as the basis for synthesising the refined set of requirements. The contribution is a set of requirements that should be useful in the design and evaluation of eModeration systems towards ensuring adoption and use.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131607726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICTAS47918.2020.234000
Menzi Skhosana, Ezugwu E. Absalom
As commuters want to be informed about the current status of public transport vehicles, availability of real time information to commuters will make public transport more trustworthy and reliable. Having more people use public transport has good implications - not only will it result to less traffic congestion, but a greener environment too. In this paper we present Irenbus, a novel dynamic real-time information system that keeps commuters informed about buses currently in transit and other relevant information such as vehicle arrival time. The system is composed of three subsystems that cater for commuters, bus drivers and bus managers respectively. These are all developed using the Firebase Backend-as-a-Service (BaaS) platform. Several sophisticated automated tests on the mobile application component of the system were carried out to evaluate its device resource consumption. The results of the tests show that the proposed system is very efficient and suitable for use on low end devices.
{"title":"Irenbus: A Real-Time Public Transport Management System","authors":"Menzi Skhosana, Ezugwu E. Absalom","doi":"10.1109/ICTAS47918.2020.234000","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.234000","url":null,"abstract":"As commuters want to be informed about the current status of public transport vehicles, availability of real time information to commuters will make public transport more trustworthy and reliable. Having more people use public transport has good implications - not only will it result to less traffic congestion, but a greener environment too. In this paper we present Irenbus, a novel dynamic real-time information system that keeps commuters informed about buses currently in transit and other relevant information such as vehicle arrival time. The system is composed of three subsystems that cater for commuters, bus drivers and bus managers respectively. These are all developed using the Firebase Backend-as-a-Service (BaaS) platform. Several sophisticated automated tests on the mobile application component of the system were carried out to evaluate its device resource consumption. The results of the tests show that the proposed system is very efficient and suitable for use on low end devices.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115898604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICTAS47918.2020.233978
Tankiso Moletsane, P. Tsibolane
Higher education students live their lives through their mobile technology devices. The availability of broadband networks and the associated connectivity capabilities of modern mobile devices as well as the numerous mobile apps on offer enable students to be constantly connected. Consequently, large amounts of sensitive information is being stored and processed through a variety of mobile devices, making the individual students and their higher education institutions easy targets for cyberattacks. This study assesses factors that impact mobile security awareness of students (N=397) at a higher education institution in South Africa. It proposes a conceptual model of mobile information security awareness, which draws upon a combination of constructs from the Knowledge-Attitude-Behavior (KAB) model and the Theory of Planned Behavior (TPB) to measure mobile information security awareness. The results show a significant relationship between students’ knowledge and behavioral intentions about information security threats and their levels of security awareness. The study also shows the existence of the gap between knowing about security and the lack of concomitant safety behaviors. The study concludes with a discussion of the practical implications of the research outcomes.
高等教育学生通过他们的移动技术设备生活。宽带网络的可用性和现代移动设备的相关连接功能以及提供的众多移动应用程序使学生能够随时保持联系。因此,大量的敏感信息通过各种移动设备被存储和处理,使学生个人和他们的高等教育机构容易成为网络攻击的目标。本研究评估了影响南非一所高等教育机构学生(N=397)移动安全意识的因素。提出了一个移动信息安全意识的概念模型,该模型结合了知识-态度-行为(Knowledge-Attitude-Behavior, KAB)模型和计划行为理论(Theory of Planned Behavior, TPB)的结构来测量移动信息安全意识。结果表明,学生对信息安全威胁的认知、行为意愿与安全意识水平之间存在显著的相关关系。该研究还表明,了解安全与缺乏相应的安全行为之间存在差距。本研究最后讨论了研究结果的实际意义。
{"title":"Mobile Information Security Awareness Among Students in Higher Education : An Exploratory Study","authors":"Tankiso Moletsane, P. Tsibolane","doi":"10.1109/ICTAS47918.2020.233978","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233978","url":null,"abstract":"Higher education students live their lives through their mobile technology devices. The availability of broadband networks and the associated connectivity capabilities of modern mobile devices as well as the numerous mobile apps on offer enable students to be constantly connected. Consequently, large amounts of sensitive information is being stored and processed through a variety of mobile devices, making the individual students and their higher education institutions easy targets for cyberattacks. This study assesses factors that impact mobile security awareness of students (N=397) at a higher education institution in South Africa. It proposes a conceptual model of mobile information security awareness, which draws upon a combination of constructs from the Knowledge-Attitude-Behavior (KAB) model and the Theory of Planned Behavior (TPB) to measure mobile information security awareness. The results show a significant relationship between students’ knowledge and behavioral intentions about information security threats and their levels of security awareness. The study also shows the existence of the gap between knowing about security and the lack of concomitant safety behaviors. The study concludes with a discussion of the practical implications of the research outcomes.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122632590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ictas47918.2020.9082477
{"title":"ICTAS 2020 Committees","authors":"","doi":"10.1109/ictas47918.2020.9082477","DOIUrl":"https://doi.org/10.1109/ictas47918.2020.9082477","url":null,"abstract":"","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124913591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICTAS47918.2020.233984
Emmanuel Tuyishimire, A. Bagula
For the last decades, Internet of Things (IoT) applications have been in high demand with the objective of creating smart environments that could impact positively many aspects of our daily lives. The IoT uses smart objects which are embedded into the environment and interact by transmitting several messages which interference with other messages on receiving nodes. This can lead to inevitable sensors’ (nodes’) deterioration after transmitting a considerable number of messages. Interference mitigation In a complex network such as the IoT is still a subject of active research which could benefit many real-world applications. Collection trees algorithms and protocols can be used adopted to reduce the interference on the nodes/paths of an IoT network but but can not fully stop or avoid interference across an IoT network. Building upon a mapping between path interference on devices (nodes) and real life contamination of a disease that can move an individual from a susceptible (S) to infected (I) and replaced (R) statuses, this paper revisits the collection tree algorithms with the objective of studying the dynamics of the interference in IoT networks. In this study, the IoT network’s nodes are partitioned into mutually exclusive groups based on possible epidemic spread. For each group, an SIR model is proposed in a form of a system of difference equations. The model is analysed by studying the system stability and simulations are used to study the real time status of the interference across the network.
{"title":"Modelling and analysis of interference diffusion in the internet of things: an epidemic model","authors":"Emmanuel Tuyishimire, A. Bagula","doi":"10.1109/ICTAS47918.2020.233984","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233984","url":null,"abstract":"For the last decades, Internet of Things (IoT) applications have been in high demand with the objective of creating smart environments that could impact positively many aspects of our daily lives. The IoT uses smart objects which are embedded into the environment and interact by transmitting several messages which interference with other messages on receiving nodes. This can lead to inevitable sensors’ (nodes’) deterioration after transmitting a considerable number of messages. Interference mitigation In a complex network such as the IoT is still a subject of active research which could benefit many real-world applications. Collection trees algorithms and protocols can be used adopted to reduce the interference on the nodes/paths of an IoT network but but can not fully stop or avoid interference across an IoT network. Building upon a mapping between path interference on devices (nodes) and real life contamination of a disease that can move an individual from a susceptible (S) to infected (I) and replaced (R) statuses, this paper revisits the collection tree algorithms with the objective of studying the dynamics of the interference in IoT networks. In this study, the IoT network’s nodes are partitioned into mutually exclusive groups based on possible epidemic spread. For each group, an SIR model is proposed in a form of a system of difference equations. The model is analysed by studying the system stability and simulations are used to study the real time status of the interference across the network.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121789410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}