The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper demonstrates functionalities of a smart irrigation system using low-cost communications and control systems. In the proposed system, field information is collected by various sensors and is consequently exchanged, using Zigbee and the GSM (Global System for Mobile) communication, between the microcontroller, the farmers and a remote server. The centralized microcontroller uses the sensing...
Malnutrition contributes to over one half of the deaths of children under age of five years in developing countries and is the single greatest cause of child mortality in Tanzania. Investigations reveal that the issue of malnutrition is aggravated by lack of nutritional information especially in rural communities. Absence of proper tools makes collection, management and access to nutrition information...
Sudanese primary and secondary level school education is conducted in the Arabic language. Mathematics education is conducted in Hindi-Arabic numerals (???) until university level where it is subsequently conducted in Arabic numerals (1234567890). According to UNESCO's 2010/2011 World Data on Education report, Sudan's scheme of basic primary education puts more weighting on religion, Arabic, and English...
Issues, such as fraud and corruption, emanating from lack of transparency and accountability in public administration are receiving considerable attention. Public funds management is an area of concern as public funds are prone to misuse if proper control mechanisms are not in place. A number of suggestions are found in the literature on how to prevent or reduce public funds misuse including curbing...
Authentication is one of the key aspects of securing applications and systems alike. While in most existing systems this is achieved using usernames and passwords it has been continuously shown that this authentication method is not secure. Studies that have been conducted have shown that these systems have vulnerabilities which lead to cases of impersonation and identity theft thus there is need...
The state of national security is an evolving concern, as entities and organizations may be aware of the security of their information and their asset — the same can unfortunately not be said about the risks they may face. These risks are not only limited to the non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies,...
Radio frequency identification (RFID) is becoming more significant in many aspects of modern life. The application of RFID technology in various domain has contributed to the development of innovative systems such as vehicle and animal tracking system, employee access control and supply chain automation systems, used in large-scale organisations. However, the widespread adoption of RFID by large-scale...
This paper reports on a survey conducted to determine the readiness of organisations in South Africa to comply with personal data protection or privacy legislation and regulations. Issues addressed include employee knowledge of personal data classification, policies, the POPI Act, standards, and training or awareness campaigns within organisations. The study also looked at the significance of viewing...
The culmination of the digital world has been the need for computer networks increasing daily, because they enable communication between two or more connected peripheral devices and sharing of resources. However, the increasing demand of computer networks may be chaotic and a bit challenging at times, and that can affect the rate of performance of the network. When such chaotic events occur on the...
Traffic Congestion Management (TCM) in a megacity like Kinshasa, capital of the DR Congo, is a knowledge and real life problem of complex nature. Here, the authors describe the TCM problem through 9 phases of the layer 1 of the COMPRAM methodology. TCM is a worldwide complex societal problem and specifically in Kinshasa where it presents a set of characteristics such as ‘chaotic’ driver behaviour,...
Radio frequency spectrum resources play a crucial role as enabler in future wireless ICT infrastructure and development of affordable broadband services. Activities by research organisations such as the CSIR and regulators such as the FCC of the USA, Of com of UK and ICASA of South Africa are promoting innovation-based spectrum sharing technologies to improve the effective utilisation of national...
With the ubiquity of social media platforms, individuals and organisations, including government are increasingly making use of social media in aspects of their day-to-day activities. This paper explore how the City of Johannesburg's Facebook and Twitter platforms are perceived by its young adults. This was done by means of distributing quantitative and qualitative questionnaires. The target population...
Many ICT4E projects fail once the implementation team withdraws. Although there are multiple reasons for this, the problem often lies with integration of the project into the day-to-day institutional arrangements of the education system. This puts pressure on the school environment, since schools are unable to sustain the change introduced without support from their formal support systems. Although...
From cyber-security to cyber safety and security, the new paradigm, a risk based approach that extends the interest of cyber technologies to safety and security in general. This means that we will not deal with cyber-security, law enforcement and critical infrastructure protection, these topics deserve entire chapters each. The second section outlines recent developments of research and solutions...
Current learning management systems such as Moodle and WebCT are considered as linear systems that provide e-learning material in a fixed-sequence, delivering the same content to learners regardless of their differences in background knowledge. For learners engaged in self-study online distance learning, this may result in material being presented at either too high or too low cognitive levels. According...
The demand for data-for-development to support and monitor a country's progress in line with the Sustainable Development Goals (SDGs) is a rising global need. Mechanisms to avail Open Government Data (OGD) have faced challenges because of weak or non-existent statistical systems in most developing countries. Key contributors to the weaknesses include lack of technical capacity to curate and upload...
Computational creativity is a multi-disciplinary area of research that investigates what aspects of computing can be considered as an analogue to the human creative process. One premise is that humans come up with new concepts or creative ideas by combining two or more other concepts together. Conceptual blending is one of the creativity theories that has been modelled by computer programs attempting...
Electronic voting is rapidly gaining momentum and offers more advantages than the paper-based voting system. The field of e-voting is an undiscovered sphere and its true extensity is mostly uncharted. Very few countries have successfully implemented e-voting and diminutive research has been conducted to investigate the factors that influence the successful implementation of e-voting. This paper documents...
This paper presents initial findings from a project in Malawi to develop and implement a simple application for making league tables in the health sector. League tables, sometimes also called scorecards, are tables that compare various entities according to several indicators, and rank them from best to worst performers. Prior work in Malawi has suggested that these tables would be useful at both...
Given the increasing role of financial inclusion in Africa, a number of stakeholders are advocating for pathways to sustainable financial inclusion mechanisms among the formal and informal sectors. With the current technology supported strategies, the mobile money service has become utterly popular across all sectors of the Ugandan social structure as well as economic structures. A number of studies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.