ABSTRACT Asterisk is a Private Branch Exchange (PBX) software used to connect telephony applications such as Voice over Internet Protocol (VoIP). In the Department of Computer Science at the University of Namibia (DCS-UNAM), Asterisk is currently set up to provide basic VoIP services to staff and students. However, this system currently has limited accessibility because it can only be accessed with VoIP clients such as hard and soft phones. Alternatively, Browser-based VoIP clients (BBVCs) c...
Abstract Point cloud classification has been shown to effectively classify points in 3D scans, and can accelerate manual tasks like the removal of unwanted points from cultural heritage scans. However, a classifier’s performance depends on which classifier and feature set is used, and choosing these is difficult since previous approaches may not generalise to new domains. Furthermore, when choosing training scans for campaign-based classification, it is important to identify a descriptive s...
Dynamic Bayesian Networks (DBNs) are temporal probabilistic models for reasoning over time. They often formulate the core reasoning component of intelligent systems in the field of machine learning. Recent studies have focused on the development of some DBNs such as Hidden Markov Models (HMMs) and their variants, which are explicitly represented by highly skilled users and have gained popularity in speech recognition. These varieties of HMMs represented as DBNs have contributed to the baselin...
The performance of an enterprise is determined by its strategic objectives, and the strategic plan it adopts through some form of strategic analysis in order to meet these objectives. However, strategic analysis is currently only supported through unsystematic and informal processes such as SWOT analysis and the Five Forces Model. This thesis proposes conceptual goal modeling as a systematic approach to strategic analysis and shows through a comparative study how this analysis can be conducte...
ABSTRACT This work is based on performance Analysis of DES and RSA suitability for different system applications. The rationale behind the work was to find out how suitable DES (Data Encryption Standard) and RSA (Rivest, Shamir and Adleman) are for different application systems under different systems requirements. In order to achieve these objectives, an application that implements DES and RSA was developed using an object-oriented analysis and design (OOAD) approach and was implemented in...
Abstract In recent times, wireless communication has witnessed unprecedented growth due mainly to advances in instrumentation and computer science. Substantial research efforts have been devoted to exploring the application of Intelligent Transportation Systems (ITS) within the context of vehicular ad hoc networks (VANETs) to ensure safety and for an efficient and integrated transport network. Vehicle-to-vehicle (V2V) communication in VANETs poses many challenges. In sparse as well as in den...
ABSTRACT This study investigated laptop battery lifespan as affected by users charging practices. Laptop battery lifespan is the average length of life a laptop battery has or the duration if its effectiveness. Battery charging practices means the frequency by which a user plugs the machine in the electric source. The main purpose of the study was to investigate the two different laptop charging practices on how they affect the lifespan. The two laptop charging practices that concerned this ...
Abstract There has been tremendous growth in the amount of user generated content on the Internet. This is due to rise in social networks and the embrace of web 2.0 or technologies. The Internet is no longer a place for consumption of information only, but a melting point of users interacting on various interests. This project concentrates on a specific type of content – opinionated content. Several review sites exist where users can comment on their experience about a movie, product or se...
ABSTRACT Recently, deep learning techniques have been used significantly for large scale image classification targeting wildlife prediction. This research adopted a deep convolutional neural network (CNN) and proposed a deep scalable CNN. Our research essentially modifies the network layers (scalability) dynamically in a multitasking system and enables real-time operations with minimum performance loss. It suggests a straightforward technique to access the performance gains of the network wh...
Abstract Timetabling presents an NP-hard combinatorial optimization problem which requires an efficient search algorithm. This research aims at designing a genetic algorithm for timetabling real-world school resources to fulfil a given set of constraints and preferences. It further aims at proposing a parallel algorithm that is envisaged to speed up convergence to an optimal solution, given its existence. The timetable problem is modeled as a constraint satisfaction problem (CSP) and a theor...
Abstract We propose DEVS-Driven Modeling Language (DDML), a graphical notation for DEVS [1] modeling and an Eclipse-based graphical editor, Eclipse-DDML. DDML attempts to bridge the gap between expert modelers and domain experts making it easy to model systems, and capture the static, dynamic, and functional aspects of a system. At the same time, it unifies CDEVS and P-DEVS models. DDML integrates excellent modeling concepts from powerful formalisms and glues them in one unique consistent fr...
ABSTRACT Breast cancer is a prevalent disease that affects mostly women, an early diagnosis will expedite the treatment of this ailment. In recent times, Machine Learning (ML) techniques have been employed in biomedical and informatics to help fight breast cancer. This research work proposed an ML model for the classification of breast cancer. To achieve this we employed logistic regression (LR) and also compared our model’s performance with other extant ML models namely, Support Vector Ma...
ABSTRACT We propose a framework for formal analysis of DEVS Driven Modeling Language (DDML) models in order to assess and evaluate the properties of DDML models. This framework semantically maps the hierarchical levels of DDML: Input Output system (IOS), Input Output Relation Observation (IORO) and Coupled Network (CN) levels to corresponding formal methods: Labeled Transition System (LTS), Linear Temporal Logic (LTL) and Computation Tree Logic (CTL), and Communicating Sequential Processes (C...
ABSTRACT Malicious user requests pose a vicious threat to backend devices which execute them; more so, could result in the compromise of other user accounts, exposing them to theft and blackmail. It becomes imperative to sanitize such requests before they are treated by the servers as access to a single malicious request is enough to cause a disaster. A number of authors suggest that sanitizing models built on support vector machines guarantee optimum classification of malicious from non-mal...
Abstract Current advancement in VLSI technology allows more circuit to be integrated on a single chip forming a System on Chip (SoC). The state of art in on-chip intermodule connection of using a shared bus with a common arbiter poses scalability problems and become a performance bottleneck as the number of modules increase. Network on Chip (NoC) has been proposed as a viable solution to this problem. The possibility of occurrence of deadlocks and livelocks in a NoC requires that their desig...