This conference provides an opportunity to academic researchers, industry professionals, government delegates and students to interact and share their experiences and knowledge on cutting-edge developments in the fields of Cloud Computing, Internetof- Things, Networked Systems, Data Communications, Computer Security, Multimedia, Computer Vision, Intelligent Computing, Robotics, Machine Vision, Signal Processing, Software Engineering, ICT4D and ICT in Education. Our main objective is to promote scientific and educational activities towards the advancement of knowledge by improving the theory and practice of various disciplines and areas of ICT Engineering.
Proceeding Downloads
Design and implementation of a low-cost home automation and monitoring IoT system using message que telemetry transport protocol: south africa context
Home automation is a fast and growing industry in South Africa, because in recent years almost everything home and office electrical and electronics appliances are been connected to the internet and human mobile devices. There is an increase in demand ...
Framework and architecture to assess viability of rain cloud platform cooling
Data center cooling constitutes a significant overhead in existing terrestrial cloud data centres and platforms. This paper addresses the challenges arising from the necessity of cooling data centres by leveraging on environment friendly free-cooling. ...
Scene detection and recognition by analysing deep features using PlacesCNN
Scene recognition is employed for recognizing images along with some other visual features to collect information from it. As a field, it has turned out to be useful for digital marketers. Digital marketers can identify a consumer's favorite hangout ...
Modified grasshopper optimisation algorithm
The grasshopper optimization algorithm (GOA) mimics the foraging behavior of grasshopper insects. It is one of the youngest and widespread algorithms for optimization. In GOA exploration and exploitation depends on coefficient c used in position update ...
The ease of use and intentions of use of cloud technology in higher education institutions
South Africa needs vital skills in engineering and technology to address future financial, environmental, educational and health challenges. In this era of the Fourth Industrial Revolution, it is even more important to use cloud technology in classrooms ...
Mobile crowdsourcing in crop production for farmers in rural areas of the south kivu (DRC)
A lack of an effective way to collect farm produce data, record farm input expenses, as well as expenditure on farm chemicals and receive information from other stakeholders (e.g. agriculture advisers) are some challenges encountered by farmers on their ...
A model for using geographical data combined with domain specific data to identify entities adversely affected by COVID-19 lockdowns: a south african perspective
COVID-19 has spread around the world. In efforts to protect their citizens, countries around the world have implemented various levels of rules and regulations in attempts to stem the spread of the disease. Some countries merely implemented behavioural ...
Educational data mining in higher education in sub-saharan africa: a systematic literature review and research agenda
The impact of the coronavirus disease (COVTD-19) will see an increase in data generated by higher education institutions (HEIs) in Sub-Saharan Africa as more institutions introduce online learning. HEIs are storing huge volumes of data since data ...
Opportunistic security architecture for osmotic computing paradigm in dynamic IoT-Edge's resource diffusion
Increased heterogeneity of physical resources has had positive and negative effects in Internet of Things (IoT) through the existence of edge computing. As a result, there has been a need for effective dynamic management of IoT, cloud and edge resources,...
Effects of membership functions for fuzzy logic controlled autonomous mobile robot
There is a growing trend in autonomous robotics research. A consistent collision avoidance and path following method is needed for an intelligent and operative mobile robot navigation. Usually robots are fitted with sensors for detecting the ...
Computer network quality of experience enriched analysis using fuzzy logic model
Two important Quality of Experience (QoE) parameters in computer networks service-related performance metrics are throughput and end-to-end delay. A slow delay indicates high network efficiency thus high throughput. Similarly, the entire four parameters ...
Assessing the challenges that are confronted rural-based SMEs on the implementation of cloud services
The increase of contemporary technologies such as cloud-based services has attracted various institutions, especially in developing countries. Many businesses have started to show interest in migrating to the cloud to expand their businesses, ...
A survey of contend-based filtering technique for personalized recommendations
The number of choices on the internet is devastating. In recent years, internet services have grown exponentially and it is unavoidable that a number of services suffer from information overload, which makes it difficult for users to find the ...
Policy implications on ICT integration in namibian basic education ecosystem
Education forms the integral growth of a nation and its delivery from the grassroots level demands equal and creative focus. One of the creative approaches is capitalizing on the use of Information and Communication Technologies (ICTs) as enablers in ...
A smart remote electrical geyser switching system
One of the many household appliances that consumes quite an amount of electricity in households, is the electrical Geyser System. It forms about 30% to 50% of residential electricity consumption and as a result, good geyser management can reduce ...
An internet of things (IoT) based solid waste monitoring system
The population growth in Windhoek has led to an increase in the number of people sharing resources around institutions and as well as habitational areas. This has led to difficulties in managing solid waste around these areas. Many entities such as ...
Investigating the usefulness of a micro high performance computing system as an educational tool
Access to High-Performance Computing (HPC) systems is an increasingly important problem in academia in emerging economies. Computer science curricula often offer courses that require an HPC system as an education supporting tool. This represents a ...
An artificial neural network and principle component analysis based model for methane level prediction in underground coal mines
High methane levels in underground coal mines interfere with mining activities and increase the risk of fires and explosions. Therefore, early warning and predicting systems are imperative in ongoing underground coal mining exploitation areas. In this ...
Educational gamification and artificial intelligence for promoting digital literacy
There is a need for promoting digital literacy and providing education for all especially women of the world to achieve the United Nations Sustainable Development Groups (UNSDGs) 4 and 5 quality education and gender equality. The field of education is ...
Programming language masterly challenges at the college of business education: students' creativity and innovation
Creativity and innovation are some of the skills that are essential in one's life especially for the students in different levels of education. These two terms are inborn or inherent but can be enhanced by encountering environment like in higher ...
Evaluating two security systems for mobile voting fortification
The developments in Information and Communication Technology transformed almost every aspect of everyday life. Modern societies are now fully dependent on ICT for commercial, labor, and leisure activities, excluding in the voting area. Using ICT for ...
Design and optimization of cross layer scheme: routing and medium access control for throughput in cognitive radio networks
Cognitive Radio (CR) is an intelligent technology that has become popular in wireless networks due to its ability to solve problems such as the underutilization and inefficient utilization of the spectrum. The CR can learn from experience, adapt its ...
Implementing computer-based assessments in higher educational institutions: students' perceptions
Assessment refers to the measurement of the knowledge, capability, skill and understanding of a student. Over the years, assessments have been undertaken by students with paper, pen and pencil (paper-based assessment or PBA). However, the dynamic nature ...
A review on vision-based vehicle identification using convolutional neural network
Vehicle Identification is a paradigm of Intelligent Traffic System (ITS) that is continuously being researched to improve current challenges on the road. As results, Intelligent Traffic Systems provides smarter and safer operational decisions with ...
Prevention of fraudulent activities against SIP-based flooding attacks using extended sorted quadratic algorithms
Voice over IP (VoIP) is gaining its popularity year by year due to the low cost of its service and its low investment cost. Unfortunately, this technology is vulnerable, firstly, due to the huge number of heterogeneous networks, secondly, due to the ...
The development of a sepedi text generation model using long-short term memory
Recurrent Neural Network (RNN) is a type of deep neural network that is developed to generate a set of text given the features to produce the output based on features provided to the model. RNN is difficult to train when dealing with long memory ...
Intelligent traffic management algorithm for wireless sensor networks
Wireless Sensor Networks (WSNs) are used to simplify various real-time applications which include traffic management, humidity, monitoring of the temperature, and pressure by using a wide range of sensor nodes. Sensor nodes are assigned through various ...
A data warehouse model for quicker and less expensive implementation
This article reports on research conducted in a South African telecommunications company that experienced a problem of answering critical business questions, while facing a limited budget for business intelligence. Companies in developing countries are ...
Virtual sensor forensics
Sensorial escalation, heterogeneity, pervasiveness, and increased connectivity have created a haven for cyber-criminals, where potential attacks are being exacerbated on a daily basis. In essence, most automated systems are not built to be able to ...
A permissioned blockchain approach to electronic health record audit logs
In recent years, electronic health records (EHRs) have been subject to data breaches; this indicates that the current EHR infrastructure is no longer suitable for safeguarding health records. Audit logs are one of the key processes in identifying ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
ICONIC '20 | 72 | 45 | 63% |
Overall | 72 | 45 | 63% |