Computer Sciences
Permanent URI for this collection
Browse
Recent Submissions
Item A Lightweight Authentication Architecture for Unsupervised Internet of Things (IoT) in Smart Home Applications(Namibia University of Science and Technology, 2018-11) Gamundani, Attlee, MThe Smart Home environment is made up of different objects that have sensing capabilities and have the potential to interact with each other seamlessly. This brings a lot of convenience to the control and monitoring of the surroundings around the home environment. This reality is brought about as a result of the Internet of Things (IoT) phenomenon. The potential benefits presented by IoT technologies around the Smart Home environment can and are hampered by security issues that are yet to be resolved both at the perception layer and the transmission layer. A simulated Smart Home environment that modelled critical application requirements for Assisted Ambient Living (AAL) spaces and Energy Saving Solutions (ESS) was used to evaluate the proposed lightweight authentication architecture’s efficiency, which was tested against existing similar solutions around the same functionality. The lightweight authentication architecture presented in this submission was tested using the SCYTHER tool, which allowed verification, falsification and security testing by checking on various classes of attacks and possible architecture behaviour. The architecture turned out secure for tested threats, guided by the Dolev-Yao model. The contribution of this research, is its pragmatic approach to the security design for unsupervised constrained things. Key findings from this work highlight two important aspects for proper security advancement, which are identity management of things in the IoT space and the scalability of using agent based models to reduce resource demands at the device level. As an envisaged future relevance of this work, the vision of smart cities can be realisedItem Designing a mobile application to increase open data awareness and consumption in Namibia: A best practice example of public transportation in Windhoek(Namibia University of Science and Technology, 2016-09-16) Amugongo, Lameck, M.Over the past few years, we have witnessed a paradigm shift in the way public data is administered. The need to effectively manage public data has led to an increased adoption of open data initiatives by many governments. Open data is an initiative that advocates for public data to be freely available for all to use and redistribute without restrictions. However, lack of awareness about opportunities and the benefits of open data among citizens, as well as the steadfastness of governments to control certain public data are some of the challenges facing open data initiatives. Nevertheless, high mobile internet penetration and the effectiveness of persuasive computing present an opportunity to alleviate these challenges and unleash open data potential. Furthermore, the power of persuasive technologies such as mobile applications to influence and change user behaviours present even greater opportunities to create awareness on a larger scale. This study proposes a mobile application as a best practice example to increase awareness, persuade both government and citizens to change their attitudes towards open data and therefore increase the use of public data in Namibia. The developed mobile application using public bus stops geolocation data aims at improving access to public transportation services within the City of Windhoek. The obtained results show that the application could extract stops and routes, and schedule information from the database as well as display them to the user. However, the application could not track buses in real time.Item A Mobile Application for Health Information Dissemination: a Namibian Context(IEEE, 2016) Angula, Nikodemus; Dlodlo, NomusaMobile devices have become the most powerful tool to disseminate information across communities in today’s world. The current method of disseminating health-related information to the communities in Namibia is a manual system which is not efficient and effective. This study sought to identify an efficient and effective way to disseminate health information. The first phase of the study was qualitative, applying an interpretive approach and a qualitative multi-case study research design. Two hospitals, the Ministry of Health and Social Services (MoHSS), the Centre for Disease Control (CDC) and members of the community participated in this study. Face-to-face interviews, focus group interviews, questionnaires and document sampling were used as data collection methods to identify the requirements for a mobile application. Through laboratory experimentation, the second phase of the study led to the development of a prototype mobile application that will enable anyone to install the application on their phones in order to access general diseases information from the CDC.The first phase of the research concluded that a large number of Namibians own cellphones hence a mobile application would suffice. The most prevalent diseases from the research are malaria, diabetes, cancer and HIV, hence the initial application should concentrate on information dissemination for such. The mobile application content covers the common diseases in Namibia, their definition, the causes of the disease, the symptoms of the disease, how to prevent the disease and whom to contact.In the research conducted, the majority of the population is literate hence the application can support text-based information in addition to graphics. The research also found that a large number of people visit clinics and hospitals hence the mobile application will benefit both even those who visit clinics and hospitals as well provided they have smartphone.Item A framework to enable semantic interoperability of data in heterogeneous health information systems: a case of Namibia(Springer International Publishing, 2018) Angula, Nikodemus; Dlodlo, NomusaThe District Health Information System (DHIS) is an information system that is hosted in the Khomas regional office of the Ministry of Health and Social Services (MoHSS) in Namibia. Parallel to the DHIS, the MoHSS runs silo information systems in the 14 regions of Namibia which were donated by non-governmental organisations in addition to a regional DHIS. The DHIS and silo systems currently work in isolation from one another, hence this study is on finding a framework to enable semantic interoperability of data in these heterogeneous health information systems (HIS) so that the DHIS and these silo systems in the Namibian public hospitals can act as an integrated platform to share and exchange health- related information with each other. Thus, a protocol called Interlink protocol is developed in this research to enable integration. The DHIS and silo- interfaced system that will be developed in this research should be able to link or connect all the public hospitals in Namibia to the central database at the MoHSS for health information feed. The system would allow public hospitals to interlink with each other through a technology integrated platform. The study therefore seeks to interface DHIS and silo systems at a data level. The aim of this research therefore is to design and develop a framework for data semantic interoperability of DHIS and these other health information silo systems so that they can exchange health data and information.Item Factors affecting user experience with security features: A case study of an academic institution in Namibia(IEEE, 2013) Shava, Fungai Bhunu; Greunen, Darelle VanThe widespread use of personal computers and other devices based on Information and Comm unication Technology (ICT) for networking and communication vi a the Internet exposes the end users to cybercriminals. Security systems and security features that interact with users via alerts, dialogue boxes and action buttons (such as update notices and other warnings) are embedded in operating systems and application programs in order to protect electronic in formation. Human behaviour and attitudes towards security features determine the user experience during the implementation of Information Security. Cyber criminals are primarily targeting the human aspect of security, since end users are easier to manipulate. In order to effectively secure information, the fields of Usable security and User experience should be integrated in the design and use of security features. This paper presents the findings of an online survey carried out to investigate attit udes towards, behaviour with and experience of embedded security features among members of staff in a tertiary education institution. User experience was measured by enumerating general security awareness, policy awareness and implementation, as well as user behaviour and emotions associated with security interaction. This paper reports on the findings of this survey. The researchers envisage that the findings can lead to the practical development and implementation of a framework for secure user experience .Item Customer support design considerations for an information system. Paper presented at the 1st Namibia Customer Service Awards & Conference, 2014.(NUST, 2014) Lazarus, Victoria; Nggada, Shawulu Hunira; Dheedan, AmerThe efficiency of an information system could be traced to its design. Typically, information systems are designed with immense focus on the business logic and direct users of such systems, and not the customers who may be the indirect users of the system. The problem associated with such design is that it is not customer inclusive and this deficiency would over time lead to customer dissatisfaction. In safety-critical systems, the users and customers are both taken into account while designing the system. This practice is less pronounced in the design of information systems. This paper identifies the similarities and dissimilarities between a user and a customer, investigates an approach to designing information systems that supports the needs of customers and finally develops an architectural framework in line with a customer-centred design for an information system.Item Online business marketing for SMMEs in low-resource communities: A step by step process for setting up an online interactive environment. Paper presented at the 1st Namibia Customer Service Awards & Conference, 2014.(2014) Jere, NorbertThe rise of entrepreneurship has led to the development of small businesses. These developments have also been witnessed in low resource areas. As a result, the continuous increase of small business creates stiff competition among businesses. Some entrepreneurs have opted to utilise ICTs to improve their businesses. The use of ICTs has enabled the application of e-business services such as e-commerce, e-marketing and online negotiation. In this paper we used the rural entrepreneurs as the case study. The main challenge that these entrepreneurs face is to reach the customers and sell widely. An online business platform is developed to satisfy the needs of the entrepreneurs. The proposed application offers the following functionalities: shop owners to upload products online, customers to get points for buying online and to negotiate by making offers online. The paper presents a step by step process of setting up an online platform. The paper educates the existing and emerging entrepreneurs on the online marketing technical process and functionalities.Item Factors contributing to technology-enabled distractions in the classrom: A case study of students at the NUST.(NUST, Department of Communication, 2014) Muyingi, Hippolyte N.Classroom access to computers and the Internet may be indispensable for teaching and research both for the student and the teacher. Yet, these technologies can also be an impediment to learning as students may engage in actions unrelated to classwork such as texting, web browsing, e-mailing, online gaming, online shopping or a myriad of other activities. This paper examines the extent of this behavior by college students and the factors that may contribute to this behavior. The factors that were studied include the student's addiction to the Internet, learning style, classroom environment, and other individual student factors (gender, age, etc.). Data for this research were gathered using a questionnaire from 213 NUST students. The results show that the level of Internet addiction, the degree of mismatch between learning and instructional styles, and some individual factors have significant impact on the degree to which students engage in distractive activities. The paper also discusses the pedagogical and classroom management implications both for educators and administrators.Item Reliable sources for indigenous knowledge: Dissecting Wikipedia's Catch-22.(2013) Gallert, Peter; Van der Velden, MajaItem Why tertiary students largely fail beginning computer programming courses at the NUST: Different perceptions, common recommendations.(NUST, Department of Communication, 2010) Kiekebusch, Bernd; Nghipangelwa, Aina TulimekondjoResults for beginning computer-programming courses at the NUST show high failure rates. This study explores perceived reasons by lecturers and students, in particular with regard to the impact of the chosen first programming language. Based on pilot studies under similar circumstances documented elsewhere, the authors recommend that the computer language be adapted to fit the students' capacities rather than the industry-desired final outcome. Based on the background of beginner students at the NUST it is suggested to use LOGO in the first semester and continue afterwards with industrial-strength languages.Item Developing a visualized cultural knowledge transfer prototype: An in situ evaluation in Rural Namibia(IKTC, 2011) Rodil, Kasper; Eskildsen, Søren; Rehm, MatthiasYouth in Sub-Saharan Africa suffers from a loss of valuable cultural knowledge, which has been a foundation for the coming generations’ survival and cultural self-awareness. By transferring cultural knowledge contexts into 3D visualizations, we prototyped and evaluated a system to bridge the gap between elders and urban youth in Namibia. The findings from the field experiment indicate that designers together with rural elders and children can reach a shared design platform by communicating visually.Item Welcome to the first Indigenous Knowledge Technology Conference(IKTC, 2011) Winschiers-Theophilus, HeikeI have great pleasure in welcoming you to the first Indigenous Knowledge Technology Conference (IKTC2011) in Windhoek, Namibia. It is so exciting to see the realization of, what was, just a vague idea borne from the desire to bring together a critical mass of people engaged in studying indigenous knowledge systems and designing new and different technologies to support the representation and dissemination of indigenous knowledge.Item Demonstration of a cultural indigenous knowledge transfer prototype(IKTC, 2011) Rodil, Kasper; Eskildsen, Søren; Rehm, MatthiasWe present our prototype 3D visualization that enables people to place video recordings of their traditional knowledge. We demonstrate the process of developing and evaluating the prototype. We show how our prototype might combat a cultural gap between youths and elders and also hope to ignite ideas about how such a system can be used rurally and how further testing can be optimized to avoid a cultural gap in the test methods.Item IPR for IK and the survival of IK in the emerging global village.(IKTC, 2011) Muyingi, Hippolyte N.This panel discusses the intellectual property rights of indigenous and traditional knowledge (IK) as currently billed by relevant international bodies and organisations. We focus on their relevance to communities in Sub-Saharan Africa as may be seen by researchers in IK as well as the communities under investigation. We highlight a few approaches from experts and indigenous people that should be considered in the bourgeoning of global research and public exposure of IK valueItem Can IK be communicated through foreign languages without losing its authenticity?(IKTC2011, 2011) Muyingi, Hippolyte N.In this paper, we present an open issue for panel discussion on the relation between the language of knowledge transfer and the contextual and peculiar nature of indigenous, traditional or local Knowledge itself. We highlight intriguing opinions from language education experts, linguistics researchers and other stakeholders, that raise a number of concerns to be considered at this early stage of research development in indigenous knowledge technology. If language is entwined with the knowledge system itself can IK then ever be transferred across languages? In other words does IK lose its authenticity and values through translations and foreign language media?Item Determining requirements within an indigenous knowledge system of African rural communities.(SAICSIT, 2010) Chivuno-Kuria, Shilumbe; Kapuire, Gereon Koch; Bidwell, Nicola J.; Winschiers-Theophilus, HeikeEliciting and analyzing requirements within knowledge systems, which fundamentally differ so far from technology supported systems represent particular challenges. African rural communities’ life is deeply rooted in an African Indigenous knowledge system manifested in their practices such as Traditional Medicine. We describe our endeavors to elicit requirements to design a system to support the accumulation and sharing of traditional local knowledge within two rural Herero communities in Namibia. We show how our method addressed various challenges in eliciting and depicting intangible principles arising because African communities do not dichotomize theoretical and practical know-how or privilege a science of abstraction and generalization. Ethnography provided insights into etiology, or causal interrelationships between social values, spiritual elements and everyday life. Participatory methods, involving youth and elders, revealed nuances in social relations and pedagogy pertinent to the transfer of knowledge from generation to generation. Researcher and participant-recorded audio-visual media revealed that interactions prioritize speech, gesture and bodily interaction, above visual context. Analysis of the performed and narrated structures reveal some of the ways that people tacitly transfer bodily and felt-experiences and temporal patterns in storytelling. Experiments using digital and paperbased media, in situ rurally showed the ways that people in rural settings encounter and learn within their everyday experiences of the land. These analyses also demonstrate that own ontological and representational biases can constrain eliciting local meanings and analyzing transformations in meaning as we introduce media. Reflections on our method are of value to others who need to elicit requirements in communities whose literacy, social and spiritual logic and values profoundly differ from those in the knowledge systems that typify ICT design.Item Using information and communication technology at the University of Zimbabwe: Challenges, successes and recommendations.(NUST of Namibia, Department of Communication., 2008) Kachepa, AdmireInformation and Communication Technology (ICT) is now an essential service for the effective administration of businesses including colleges and universities. The same technology finds use in the teaching and learning activities. This study looks at how this technology is being used at the University of Zimbabwe as an administrative tool and as a teaching and learning tool. Three faculties from which, ten departments, fourteen lecturers and ten students were used as participants in the research as source of studied information. Further to that students were observed as they used the service at the Library, Economics computer laboratory and Commerce computer laboratory. Technical people responsible for day-today operations of the ICT infrastructure were also interviewed. The study shows that while use of the technology is now widespread, there is no policy framework at department and faculty level to ensure its effective use. Teaching staff proved to be competent in the use of the Internet and e-mail, however students did not comprehend some of the ICT terminology. It also emerged that the ICT services were not fully exploited. The study recommends the setting up of faculty and department ICT co-ordinators or committees with specific roles that champion the effective use of ICT services. Further to that ICT should be part and parcel of a general curriculum for all university students. ICT is a dynamic area needing research and updating all the time. Further research is needed in all the faculties to see how staff and students are coping.Item The importance of soft skills: Education beyond academic knowledge.(NUST of Namibia, Department of Communication., 2008) Schulz, BerndThis paper makes a survey of the importance of soft skills in students’ lives both at college and after college. It discusses how soft skills complement hard skills, which are the technical requirements of a job the student is trained to do. The paper exhorts educators to take special responsibility regarding soft skills, because during students’ university time, educators have major influence on the development of their students’ soft skills. Embedding the training of soft skills into hard skills courses is a very effective and efficient method of achieving both an attractive way of teaching a particular content and an enhancement of soft skills. Soft skills fulfil an important role in shaping an individual’s personality. It is of high importance for every student to acquire adequate skills beyond academic or technical knowledge.