Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer and Systems Architecture

A Social Profile-Based E-Learning Model, Xola Ntlangula Sep 2023

A Social Profile-Based E-Learning Model, Xola Ntlangula

African Conference on Information Systems and Technology

Many High Education Institutions (HEIs) have migrated to blended or complete online learning to cater for less interruption with learning. As such, there is a growing demand for personalized e-learning to accommodate the diversity of students' needs. Personalization can be achieved using recommendation systems powered by artificial intelligence. Although using student data to personalize learning is not a new concept, collecting and identifying appropriate data is necessary to determine the best recommendations for students. By reviewing the existing data collection capabilities of the e-learning platforms deployed by public universities in South Africa, we were able to establish the readiness of …


E-Wild Life Alert: Tackling The Human-Wildlife Conflict Problem, Eliel Kundai Zhuwankinyu, Sibonile Moyo, Catherine Chivasa, Smart Ncube Sep 2023

E-Wild Life Alert: Tackling The Human-Wildlife Conflict Problem, Eliel Kundai Zhuwankinyu, Sibonile Moyo, Catherine Chivasa, Smart Ncube

African Conference on Information Systems and Technology

Depletion of resources meant for both human and animal survival leads to competition for these. Human-wildlife conflict (HWC) occurs when these two parties compete for resources such as space, water, and food. If not properly managed, HWC can lead to loss of livelihoods and even loss of life. This paper discusses the design and development of an E-Wildlife Alert application that uses machine learning to detect dangerous animals. Using the Design Science Research method, a convolutional neural network is trained to build an artifact that detects five dangerous animals from an African context. The artifact is mounted on a robot …


A Customized Artificial Intelligence Based Career Choice Recommender System For A Rural University, Nosipho Carol Mavuso, Nobert Jere, Darelle Vangreunen Sep 2023

A Customized Artificial Intelligence Based Career Choice Recommender System For A Rural University, Nosipho Carol Mavuso, Nobert Jere, Darelle Vangreunen

African Conference on Information Systems and Technology

Rapid technological developments have enabled users to be supported and guided in decision-making. An example of this is the ability of tertiary students to use technology to explore different career options and make informed decisions about their future. Notwithstanding the increasing use of technology in general, the technology for career guidance and personalized career recommendations in South Africa is still limited. There are some limiting factors such as the ever-looming challenge of limited access to technology, language barriers and cultural differences that are prevalent in rural areas. With this premise, this study collected quantitative data from students at an Eastern …


Using Design Science Research To Create A Virtual Environment For Nursing Students, Benjamin Botha, Lizette De Wet Aug 2022

Using Design Science Research To Create A Virtual Environment For Nursing Students, Benjamin Botha, Lizette De Wet

African Conference on Information Systems and Technology

This paper aims to provide insight into the design science research approach followed during a transdisciplinary research study between computer scientists and professional nurses. The researchers used a design science research approach to create a virtual environment where nursing students could practice managing a patient with a foreign object in the right lung. The virtual environment underwent multiple changes as it progressed through the different cycles of design science research. Within these cycles, namely the relevance, design, and rigor cycle, various iterations of each of the cycles took place. Presented in this paper the design science approach followed will be …


Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle Jul 2020

Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle

African Conference on Information Systems and Technology

Most researches have been conducted to develop models, algorithms and systems to detect intrusions. However, they are not plausible as intruders began to attack systems by masking their features. While researches continued to various techniques to overcome these challenges, little attention was given to use data mining techniques, for development of intrusion detection. Recently there has been much interest in applying data mining to computer network intrusion detection, specifically as intruders began to cheat by masking some detection features to attack systems. This work is an attempt to propose a model that works based on semi-supervised collective classification algorithm. For …