E-Infrastructure and e-Services for Developing Countries: 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing AG
2018
|
Schriftenreihe: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Ser.
v.250 |
Schlagworte: | |
Online-Zugang: | HWR01 |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (387 pages) |
ISBN: | 9783319988276 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047693703 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220119s2018 |||| o||u| ||||||eng d | ||
020 | |a 9783319988276 |9 978-3-319-98827-6 | ||
035 | |a (ZDB-30-PQE)EBC6283210 | ||
035 | |a (ZDB-30-PAD)EBC6283210 | ||
035 | |a (ZDB-89-EBL)EBL6283210 | ||
035 | |a (OCoLC)1050392817 | ||
035 | |a (DE-599)BVBBV047693703 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s | ||
082 | 0 | |a 303.4833091724 | |
100 | 1 | |a Odumuyiwa, Victor |e Verfasser |4 aut | |
245 | 1 | 0 | |a E-Infrastructure and e-Services for Developing Countries |b 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings |
264 | 1 | |a Cham |b Springer International Publishing AG |c 2018 | |
264 | 4 | |c ©2018 | |
300 | |a 1 online resource (387 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Ser. |v v.250 | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Intro -- Preface -- Organization -- Contents -- e-Government -- A Model for Designing, Implementing and Evaluating Citizen-Centric e-Government in Namibia -- Abstract -- 1 Introduction -- 1.1 Citizen-Centric e-Government -- 1.2 Theories on Public Sector Reform -- 2 Literature Review -- 3 Namibia's e-Government Initiatives -- 4 Methodology -- 5 The Proposed Model for Citizen-Centric e-Government -- 5.1 The e-Government Design and Implementation Component -- 5.2 Factors of e-Government Evaluation -- 6 Conclusion -- References -- Towards an Interoperability e-Government Framework for Uganda -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Analysis and Design Phase -- 3.2 Framework Design and Evaluation -- 4 The Framework -- 4.1 e-Government Ontology -- 4.2 Services Architecture -- 4.3 Business Process Architecture -- 4.4 Data Architecture -- 4.5 Organization Architecture -- 5 Framework Evaluation -- 5.1 Results from the Evaluation -- 5.2 Discussion -- 6 Conclusion -- References -- The State of e-Government Security in South Africa: Analysing the National Information Security Policy -- Abstract -- 1 Introduction -- 2 e-Government Research -- 3 National Information Security -- 4 Information Security Linked Legislation -- 5 National Information Security Policy Constructs -- 6 Methodology -- 7 Findings -- 8 Alignment with DPSA Guidelines -- 9 Discussion of Findings -- 10 Implications for Practice -- 11 Conclusion -- References -- Network and Load Management -- A Priority Load-Aware Scheduling Algorithm for Wireless Broadband Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 The Proposed PLAS Algorithm -- 4 Performance Evaluation -- 5 Conclusions -- Acknowledgement -- References -- Scheduling Cloud Workloads Using Carry-On Weighted Round Robin -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach | |
505 | 8 | |a 3.1 Algorithm 1: CWRR -- 3.2 System Process Flow -- 4 Performance Evaluation -- 5 Results -- 6 Contributions -- 7 Conclusion -- References -- Performance Analysis of a Collaborative DSA-Based Network with Malicious Nodes -- 1 Introduction -- 2 System Model -- 2.1 Assumptions -- 2.2 Performance Metrics -- 3 Results and Discussions -- 4 Conclusion -- References -- Digital Inclusion -- Digital Inclusion: A Model for e-Infrastructure and e-Services in Developing Countries -- Abstract -- 1 Introduction -- 2 The Siyakhula Living Lab -- 3 The Model: e-Infrastructure -- 3.1 The Network: The Broadband Island -- 3.2 The 'Large ICT' Installation: The Digital Access Node -- 4 The Model: e-Services -- 4.1 TeleWeaver: The Business Model -- 4.2 TeleWeaver: System Architecture -- 5 Discussion -- 6 Conclusion -- References -- SV4D Architecture: Building Sustainable Villages for Developing Countries -- Abstract -- 1 Introduction -- 2 SV4D Architecture -- 2.1 Communication for Development (Comm4Dev) Infrastructure -- 2.2 Framework for Occasional Connectivity - Postbox Sync -- 3 SV4D Testbed Preliminary Performance Evaluation -- 3.1 Testing Link Capability -- 3.2 Supporting Different Access Technologies -- 3.3 Dealing with Intermittent Connectivity -- 4 Conclusions and Future Work -- Acknowledgments -- References -- Design and Implementation of a Smart Meter -- Abstract -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Objectives -- 2 Related Work and Background -- 2.1 Conventional Electricity Meter Design -- 2.2 Smart Electricity Meter Design -- 2.3 Requirements and Challenges in the Design and Implementation of Smart Meters -- 3 Design of the Proposed System -- 3.1 Control and Management System -- 3.2 Display System -- 3.3 Communication System -- 3.4 Database System -- 4 Implementation and Demonstration -- 4.1 Circuit Design and Implementation | |
505 | 8 | |a 4.2 Circuit Software Implementation -- 4.3 Database Implementation -- 4.4 Case Study -- 5 Discussion -- 6 Conclusion -- References -- Towards a Persuasive Technology for Electricity Theft Reduction in Uganda -- Abstract -- 1 Introduction -- 2 Persuasive Techniques -- 3 Design of Persuasion Technologies -- 3.1 Fogg's Eight Steps -- 3.2 Persuasive System Design (PSD) -- 3.3 Unified-Framework for Analysing, Designing and Evaluating Persuasion Systems -- 3.4 Selecting the Persuasive Design Method -- 4 Adaptation of Fogg's Eight Steps -- 4.1 Step 1: Identify Target Behaviour/Attitude -- 4.2 Step 2: Choose Audience -- 4.3 Step 3: Selecting Persuasion Techniques -- 4.4 Step 4: Selection of Technology -- 4.5 Step 5: Requirements Specification -- 4.6 Step 6: Design Basing on Similar/Successful Technologies -- 5 Discussion -- 6 Conclusion -- Acknowledgements -- References -- The Role of Culture in the Design of Effective Cybersecurity Training and Awareness Programmes. A Case Study of the United Arab Emirates (UAE) -- Abstract -- 1 Introduction -- 2 Study Background -- 3 Case Study -- 4 Discussions -- 5 Conclusion -- References -- Knowledge Extraction, Representation and Sharing -- Development of Collaborative Customer Service Officer Knowledge Sharing System (CCSOKSS) -- Abstract -- 1 Introduction -- 2 Knowledge -- 2.1 Knowledge Management -- 2.2 Knowledge Sharing -- 2.3 Review of Existing Knowledge Management in Organizations -- 2.3.1 Banking Knowledge Management Model (BKMM) -- 2.3.2 Comparison of Knowledge Sharing Systems in Organizations -- 2.3.3 Overview of Customer Service in the Nigerian Banking Industry -- 3 Methodology -- 3.1 Knowledge Acquisition from Existing Officers After Mergers/Acquisitions -- 3.2 Architecture of Collaborative Customer Service Officer Knowledge Sharing System (CCSOKSS) -- 3.2.1 User Access -- 3.2.2 Creation -- 3.2.3 Filtering | |
505 | 8 | |a 3.2.4 Sharing -- 3.2.5 Retention -- 3.2.6 Exploitation -- 3.2.7 Utilization -- 4 Discussion of Findings -- 5 Conclusion and Recommendation -- References -- Towards Building a Knowledge Graph with Open Data - A Roadmap -- Abstract -- 1 Introduction -- 1.1 Open Data -- 1.2 Knowledge Graph -- 2 Related Work -- 3 Proposed Architecture of the Knowledge Graph System -- 4 Conclusions -- References -- A Secured Preposition-Enabled Natural Language Parser for Extracting Spatial Context from Unstructured Data -- Abstract -- 1 Introduction -- 2 Formal Theory/Concept -- 3 Methodology -- 4 PeNLP Implementation and Evaluation -- 4.1 The PeNLP Algorithm -- 4.2 Evaluation Mechanism -- 5 Conclusion -- References -- Networks and Communications -- Implementation and Performance Analysis of Trellis Coded Modulation in Additive White Gaussian Noise -- Abstract -- 1 Introduction -- 1.1 Areas of Application -- 2 TCM Encoder -- 3 TCM Decoder Using Maximum Likelihood Soft Decision Decoding -- 3.1 Fading Channels -- 4 Results and Analysis -- 4.1 Simulation Results -- 5 Conclusion and Further Work -- References -- Spectrum Utilization Assessment of Wi-Fi Network Using Qualcomm/Atheros 802.11 Wireless Chipset -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 3 Literature Review -- 4 Proof of Concept Solution Model -- 4.1 Spectral Sample Processing Module -- 4.2 MaxHold-RMS and Percentage Count Ratio Approaches -- 4.3 Multi-variable Decision-Making Module -- 4.4 Ranking Module -- 5 Experimental Performance Evaluation and Analysis -- 5.1 Capability of Qualcomm/Atheros Chipset to Detect Narrowband Signals Such as Radar Signal with Good Power Sensitivity and Precision -- 5.2 Finding the Best Channel -- 5.3 Evaluation of MaxHold-RMS Approach -- 5.4 Percentage Ratio Count Approach -- 5.5 Scan Duration Required for Wireless Signal Detection on 5 GHz Spectrum | |
505 | 8 | |a 5.6 Detection of Non-IEEE802.11 Wireless Signal -- 6 Conclusion and Recommendation -- References -- Resource Efficient Algorithm for D2D Communications Between Adjacent and Co-channel Cells of LTE Networks -- Abstract -- 1 Introduction -- 2 D2D Communication Based on Adjacent and Co-channel Cells in LTE Networks -- 3 Related Works -- 4 Proposed D2D Algorithm Design -- 4.1 Flowchart Representation of the Proposed Algorithm -- 4.2 Proposed Algorithm -- 5 Simulation Results and Analysis -- 6 Conclusion and Further Works -- References -- 5G Dilemma of Supporting Contrasting Narrowband and Broadband Services -- 1 Introduction -- 2 Requirements for Realizing 5G Systems -- 2.1 Enhanced Data Rates -- 2.2 Ultra-reliable and Low Latency -- 2.3 Very High Bandwidth Density -- 2.4 Very High Connection Density -- 2.5 Very High Mobility -- 2.6 Evolution or Revolution in the RAN -- 3 Enabling Technologies for Broadband and Narrowband -- 3.1 Small Cells and Millimetre-Wave Band -- 3.2 Massive Multiple-Input, Multiple-Output and Beamforming -- 4 Current Development and Challenges -- 4.1 Current Development -- 4.2 Challenges Toward 5G Realization -- 5 Conclusion -- References -- Design of Novel High Density, Fault Tolerant Protocol for Cluster Based Routing in Ad-Hoc Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Models, Parameter Metrics and Clustering Algorithm -- 3.1 Proposed Model -- 3.2 Proposed Flowcharts -- 3.3 Parameter Metrics -- 3.4 Clustering Algorithms -- 4 Analysis of Simulation Results -- 5 Conclusion and Future Works -- References -- ICT Applications for Development -- SafeTransit: A Transit Safety Information Gathering Decision System -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 LA Metro Transit Watch -- 2.2 Matserve Msafiri -- 3 Methodology -- 4 SafeTransit Model and System Design | |
505 | 8 | |a 4.1 System Design and Implementation | |
650 | 4 | |a Information technology-Developing countries-Congresses | |
700 | 1 | |a Adegboyega, Ojo |e Sonstige |4 oth | |
700 | 1 | |a Uwadia, Charles |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Odumuyiwa, Victor |t E-Infrastructure and e-Services for Developing Countries |d Cham : Springer International Publishing AG,c2018 |z 9783319988269 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033077695 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=6283210 |l HWR01 |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804183180228427776 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Odumuyiwa, Victor |
author_facet | Odumuyiwa, Victor |
author_role | aut |
author_sort | Odumuyiwa, Victor |
author_variant | v o vo |
building | Verbundindex |
bvnumber | BV047693703 |
collection | ZDB-30-PQE |
contents | Intro -- Preface -- Organization -- Contents -- e-Government -- A Model for Designing, Implementing and Evaluating Citizen-Centric e-Government in Namibia -- Abstract -- 1 Introduction -- 1.1 Citizen-Centric e-Government -- 1.2 Theories on Public Sector Reform -- 2 Literature Review -- 3 Namibia's e-Government Initiatives -- 4 Methodology -- 5 The Proposed Model for Citizen-Centric e-Government -- 5.1 The e-Government Design and Implementation Component -- 5.2 Factors of e-Government Evaluation -- 6 Conclusion -- References -- Towards an Interoperability e-Government Framework for Uganda -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Analysis and Design Phase -- 3.2 Framework Design and Evaluation -- 4 The Framework -- 4.1 e-Government Ontology -- 4.2 Services Architecture -- 4.3 Business Process Architecture -- 4.4 Data Architecture -- 4.5 Organization Architecture -- 5 Framework Evaluation -- 5.1 Results from the Evaluation -- 5.2 Discussion -- 6 Conclusion -- References -- The State of e-Government Security in South Africa: Analysing the National Information Security Policy -- Abstract -- 1 Introduction -- 2 e-Government Research -- 3 National Information Security -- 4 Information Security Linked Legislation -- 5 National Information Security Policy Constructs -- 6 Methodology -- 7 Findings -- 8 Alignment with DPSA Guidelines -- 9 Discussion of Findings -- 10 Implications for Practice -- 11 Conclusion -- References -- Network and Load Management -- A Priority Load-Aware Scheduling Algorithm for Wireless Broadband Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 The Proposed PLAS Algorithm -- 4 Performance Evaluation -- 5 Conclusions -- Acknowledgement -- References -- Scheduling Cloud Workloads Using Carry-On Weighted Round Robin -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach 3.1 Algorithm 1: CWRR -- 3.2 System Process Flow -- 4 Performance Evaluation -- 5 Results -- 6 Contributions -- 7 Conclusion -- References -- Performance Analysis of a Collaborative DSA-Based Network with Malicious Nodes -- 1 Introduction -- 2 System Model -- 2.1 Assumptions -- 2.2 Performance Metrics -- 3 Results and Discussions -- 4 Conclusion -- References -- Digital Inclusion -- Digital Inclusion: A Model for e-Infrastructure and e-Services in Developing Countries -- Abstract -- 1 Introduction -- 2 The Siyakhula Living Lab -- 3 The Model: e-Infrastructure -- 3.1 The Network: The Broadband Island -- 3.2 The 'Large ICT' Installation: The Digital Access Node -- 4 The Model: e-Services -- 4.1 TeleWeaver: The Business Model -- 4.2 TeleWeaver: System Architecture -- 5 Discussion -- 6 Conclusion -- References -- SV4D Architecture: Building Sustainable Villages for Developing Countries -- Abstract -- 1 Introduction -- 2 SV4D Architecture -- 2.1 Communication for Development (Comm4Dev) Infrastructure -- 2.2 Framework for Occasional Connectivity - Postbox Sync -- 3 SV4D Testbed Preliminary Performance Evaluation -- 3.1 Testing Link Capability -- 3.2 Supporting Different Access Technologies -- 3.3 Dealing with Intermittent Connectivity -- 4 Conclusions and Future Work -- Acknowledgments -- References -- Design and Implementation of a Smart Meter -- Abstract -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Objectives -- 2 Related Work and Background -- 2.1 Conventional Electricity Meter Design -- 2.2 Smart Electricity Meter Design -- 2.3 Requirements and Challenges in the Design and Implementation of Smart Meters -- 3 Design of the Proposed System -- 3.1 Control and Management System -- 3.2 Display System -- 3.3 Communication System -- 3.4 Database System -- 4 Implementation and Demonstration -- 4.1 Circuit Design and Implementation 4.2 Circuit Software Implementation -- 4.3 Database Implementation -- 4.4 Case Study -- 5 Discussion -- 6 Conclusion -- References -- Towards a Persuasive Technology for Electricity Theft Reduction in Uganda -- Abstract -- 1 Introduction -- 2 Persuasive Techniques -- 3 Design of Persuasion Technologies -- 3.1 Fogg's Eight Steps -- 3.2 Persuasive System Design (PSD) -- 3.3 Unified-Framework for Analysing, Designing and Evaluating Persuasion Systems -- 3.4 Selecting the Persuasive Design Method -- 4 Adaptation of Fogg's Eight Steps -- 4.1 Step 1: Identify Target Behaviour/Attitude -- 4.2 Step 2: Choose Audience -- 4.3 Step 3: Selecting Persuasion Techniques -- 4.4 Step 4: Selection of Technology -- 4.5 Step 5: Requirements Specification -- 4.6 Step 6: Design Basing on Similar/Successful Technologies -- 5 Discussion -- 6 Conclusion -- Acknowledgements -- References -- The Role of Culture in the Design of Effective Cybersecurity Training and Awareness Programmes. A Case Study of the United Arab Emirates (UAE) -- Abstract -- 1 Introduction -- 2 Study Background -- 3 Case Study -- 4 Discussions -- 5 Conclusion -- References -- Knowledge Extraction, Representation and Sharing -- Development of Collaborative Customer Service Officer Knowledge Sharing System (CCSOKSS) -- Abstract -- 1 Introduction -- 2 Knowledge -- 2.1 Knowledge Management -- 2.2 Knowledge Sharing -- 2.3 Review of Existing Knowledge Management in Organizations -- 2.3.1 Banking Knowledge Management Model (BKMM) -- 2.3.2 Comparison of Knowledge Sharing Systems in Organizations -- 2.3.3 Overview of Customer Service in the Nigerian Banking Industry -- 3 Methodology -- 3.1 Knowledge Acquisition from Existing Officers After Mergers/Acquisitions -- 3.2 Architecture of Collaborative Customer Service Officer Knowledge Sharing System (CCSOKSS) -- 3.2.1 User Access -- 3.2.2 Creation -- 3.2.3 Filtering 3.2.4 Sharing -- 3.2.5 Retention -- 3.2.6 Exploitation -- 3.2.7 Utilization -- 4 Discussion of Findings -- 5 Conclusion and Recommendation -- References -- Towards Building a Knowledge Graph with Open Data - A Roadmap -- Abstract -- 1 Introduction -- 1.1 Open Data -- 1.2 Knowledge Graph -- 2 Related Work -- 3 Proposed Architecture of the Knowledge Graph System -- 4 Conclusions -- References -- A Secured Preposition-Enabled Natural Language Parser for Extracting Spatial Context from Unstructured Data -- Abstract -- 1 Introduction -- 2 Formal Theory/Concept -- 3 Methodology -- 4 PeNLP Implementation and Evaluation -- 4.1 The PeNLP Algorithm -- 4.2 Evaluation Mechanism -- 5 Conclusion -- References -- Networks and Communications -- Implementation and Performance Analysis of Trellis Coded Modulation in Additive White Gaussian Noise -- Abstract -- 1 Introduction -- 1.1 Areas of Application -- 2 TCM Encoder -- 3 TCM Decoder Using Maximum Likelihood Soft Decision Decoding -- 3.1 Fading Channels -- 4 Results and Analysis -- 4.1 Simulation Results -- 5 Conclusion and Further Work -- References -- Spectrum Utilization Assessment of Wi-Fi Network Using Qualcomm/Atheros 802.11 Wireless Chipset -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 3 Literature Review -- 4 Proof of Concept Solution Model -- 4.1 Spectral Sample Processing Module -- 4.2 MaxHold-RMS and Percentage Count Ratio Approaches -- 4.3 Multi-variable Decision-Making Module -- 4.4 Ranking Module -- 5 Experimental Performance Evaluation and Analysis -- 5.1 Capability of Qualcomm/Atheros Chipset to Detect Narrowband Signals Such as Radar Signal with Good Power Sensitivity and Precision -- 5.2 Finding the Best Channel -- 5.3 Evaluation of MaxHold-RMS Approach -- 5.4 Percentage Ratio Count Approach -- 5.5 Scan Duration Required for Wireless Signal Detection on 5 GHz Spectrum 5.6 Detection of Non-IEEE802.11 Wireless Signal -- 6 Conclusion and Recommendation -- References -- Resource Efficient Algorithm for D2D Communications Between Adjacent and Co-channel Cells of LTE Networks -- Abstract -- 1 Introduction -- 2 D2D Communication Based on Adjacent and Co-channel Cells in LTE Networks -- 3 Related Works -- 4 Proposed D2D Algorithm Design -- 4.1 Flowchart Representation of the Proposed Algorithm -- 4.2 Proposed Algorithm -- 5 Simulation Results and Analysis -- 6 Conclusion and Further Works -- References -- 5G Dilemma of Supporting Contrasting Narrowband and Broadband Services -- 1 Introduction -- 2 Requirements for Realizing 5G Systems -- 2.1 Enhanced Data Rates -- 2.2 Ultra-reliable and Low Latency -- 2.3 Very High Bandwidth Density -- 2.4 Very High Connection Density -- 2.5 Very High Mobility -- 2.6 Evolution or Revolution in the RAN -- 3 Enabling Technologies for Broadband and Narrowband -- 3.1 Small Cells and Millimetre-Wave Band -- 3.2 Massive Multiple-Input, Multiple-Output and Beamforming -- 4 Current Development and Challenges -- 4.1 Current Development -- 4.2 Challenges Toward 5G Realization -- 5 Conclusion -- References -- Design of Novel High Density, Fault Tolerant Protocol for Cluster Based Routing in Ad-Hoc Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Models, Parameter Metrics and Clustering Algorithm -- 3.1 Proposed Model -- 3.2 Proposed Flowcharts -- 3.3 Parameter Metrics -- 3.4 Clustering Algorithms -- 4 Analysis of Simulation Results -- 5 Conclusion and Future Works -- References -- ICT Applications for Development -- SafeTransit: A Transit Safety Information Gathering Decision System -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 LA Metro Transit Watch -- 2.2 Matserve Msafiri -- 3 Methodology -- 4 SafeTransit Model and System Design 4.1 System Design and Implementation |
ctrlnum | (ZDB-30-PQE)EBC6283210 (ZDB-30-PAD)EBC6283210 (ZDB-89-EBL)EBL6283210 (OCoLC)1050392817 (DE-599)BVBBV047693703 |
dewey-full | 303.4833091724 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 303 - Social processes |
dewey-raw | 303.4833091724 |
dewey-search | 303.4833091724 |
dewey-sort | 3303.4833091724 |
dewey-tens | 300 - Social sciences |
discipline | Soziologie |
discipline_str_mv | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11212nmm a2200481zcb4500</leader><controlfield tag="001">BV047693703</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220119s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319988276</subfield><subfield code="9">978-3-319-98827-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6283210</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6283210</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6283210</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1050392817</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047693703</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">303.4833091724</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Odumuyiwa, Victor</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">E-Infrastructure and e-Services for Developing Countries</subfield><subfield code="b">9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing AG</subfield><subfield code="c">2018</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (387 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Ser.</subfield><subfield code="v">v.250</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Preface -- Organization -- Contents -- e-Government -- A Model for Designing, Implementing and Evaluating Citizen-Centric e-Government in Namibia -- Abstract -- 1 Introduction -- 1.1 Citizen-Centric e-Government -- 1.2 Theories on Public Sector Reform -- 2 Literature Review -- 3 Namibia's e-Government Initiatives -- 4 Methodology -- 5 The Proposed Model for Citizen-Centric e-Government -- 5.1 The e-Government Design and Implementation Component -- 5.2 Factors of e-Government Evaluation -- 6 Conclusion -- References -- Towards an Interoperability e-Government Framework for Uganda -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Analysis and Design Phase -- 3.2 Framework Design and Evaluation -- 4 The Framework -- 4.1 e-Government Ontology -- 4.2 Services Architecture -- 4.3 Business Process Architecture -- 4.4 Data Architecture -- 4.5 Organization Architecture -- 5 Framework Evaluation -- 5.1 Results from the Evaluation -- 5.2 Discussion -- 6 Conclusion -- References -- The State of e-Government Security in South Africa: Analysing the National Information Security Policy -- Abstract -- 1 Introduction -- 2 e-Government Research -- 3 National Information Security -- 4 Information Security Linked Legislation -- 5 National Information Security Policy Constructs -- 6 Methodology -- 7 Findings -- 8 Alignment with DPSA Guidelines -- 9 Discussion of Findings -- 10 Implications for Practice -- 11 Conclusion -- References -- Network and Load Management -- A Priority Load-Aware Scheduling Algorithm for Wireless Broadband Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 The Proposed PLAS Algorithm -- 4 Performance Evaluation -- 5 Conclusions -- Acknowledgement -- References -- Scheduling Cloud Workloads Using Carry-On Weighted Round Robin -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.1 Algorithm 1: CWRR -- 3.2 System Process Flow -- 4 Performance Evaluation -- 5 Results -- 6 Contributions -- 7 Conclusion -- References -- Performance Analysis of a Collaborative DSA-Based Network with Malicious Nodes -- 1 Introduction -- 2 System Model -- 2.1 Assumptions -- 2.2 Performance Metrics -- 3 Results and Discussions -- 4 Conclusion -- References -- Digital Inclusion -- Digital Inclusion: A Model for e-Infrastructure and e-Services in Developing Countries -- Abstract -- 1 Introduction -- 2 The Siyakhula Living Lab -- 3 The Model: e-Infrastructure -- 3.1 The Network: The Broadband Island -- 3.2 The 'Large ICT' Installation: The Digital Access Node -- 4 The Model: e-Services -- 4.1 TeleWeaver: The Business Model -- 4.2 TeleWeaver: System Architecture -- 5 Discussion -- 6 Conclusion -- References -- SV4D Architecture: Building Sustainable Villages for Developing Countries -- Abstract -- 1 Introduction -- 2 SV4D Architecture -- 2.1 Communication for Development (Comm4Dev) Infrastructure -- 2.2 Framework for Occasional Connectivity - Postbox Sync -- 3 SV4D Testbed Preliminary Performance Evaluation -- 3.1 Testing Link Capability -- 3.2 Supporting Different Access Technologies -- 3.3 Dealing with Intermittent Connectivity -- 4 Conclusions and Future Work -- Acknowledgments -- References -- Design and Implementation of a Smart Meter -- Abstract -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Objectives -- 2 Related Work and Background -- 2.1 Conventional Electricity Meter Design -- 2.2 Smart Electricity Meter Design -- 2.3 Requirements and Challenges in the Design and Implementation of Smart Meters -- 3 Design of the Proposed System -- 3.1 Control and Management System -- 3.2 Display System -- 3.3 Communication System -- 3.4 Database System -- 4 Implementation and Demonstration -- 4.1 Circuit Design and Implementation</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.2 Circuit Software Implementation -- 4.3 Database Implementation -- 4.4 Case Study -- 5 Discussion -- 6 Conclusion -- References -- Towards a Persuasive Technology for Electricity Theft Reduction in Uganda -- Abstract -- 1 Introduction -- 2 Persuasive Techniques -- 3 Design of Persuasion Technologies -- 3.1 Fogg's Eight Steps -- 3.2 Persuasive System Design (PSD) -- 3.3 Unified-Framework for Analysing, Designing and Evaluating Persuasion Systems -- 3.4 Selecting the Persuasive Design Method -- 4 Adaptation of Fogg's Eight Steps -- 4.1 Step 1: Identify Target Behaviour/Attitude -- 4.2 Step 2: Choose Audience -- 4.3 Step 3: Selecting Persuasion Techniques -- 4.4 Step 4: Selection of Technology -- 4.5 Step 5: Requirements Specification -- 4.6 Step 6: Design Basing on Similar/Successful Technologies -- 5 Discussion -- 6 Conclusion -- Acknowledgements -- References -- The Role of Culture in the Design of Effective Cybersecurity Training and Awareness Programmes. A Case Study of the United Arab Emirates (UAE) -- Abstract -- 1 Introduction -- 2 Study Background -- 3 Case Study -- 4 Discussions -- 5 Conclusion -- References -- Knowledge Extraction, Representation and Sharing -- Development of Collaborative Customer Service Officer Knowledge Sharing System (CCSOKSS) -- Abstract -- 1 Introduction -- 2 Knowledge -- 2.1 Knowledge Management -- 2.2 Knowledge Sharing -- 2.3 Review of Existing Knowledge Management in Organizations -- 2.3.1 Banking Knowledge Management Model (BKMM) -- 2.3.2 Comparison of Knowledge Sharing Systems in Organizations -- 2.3.3 Overview of Customer Service in the Nigerian Banking Industry -- 3 Methodology -- 3.1 Knowledge Acquisition from Existing Officers After Mergers/Acquisitions -- 3.2 Architecture of Collaborative Customer Service Officer Knowledge Sharing System (CCSOKSS) -- 3.2.1 User Access -- 3.2.2 Creation -- 3.2.3 Filtering</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.2.4 Sharing -- 3.2.5 Retention -- 3.2.6 Exploitation -- 3.2.7 Utilization -- 4 Discussion of Findings -- 5 Conclusion and Recommendation -- References -- Towards Building a Knowledge Graph with Open Data - A Roadmap -- Abstract -- 1 Introduction -- 1.1 Open Data -- 1.2 Knowledge Graph -- 2 Related Work -- 3 Proposed Architecture of the Knowledge Graph System -- 4 Conclusions -- References -- A Secured Preposition-Enabled Natural Language Parser for Extracting Spatial Context from Unstructured Data -- Abstract -- 1 Introduction -- 2 Formal Theory/Concept -- 3 Methodology -- 4 PeNLP Implementation and Evaluation -- 4.1 The PeNLP Algorithm -- 4.2 Evaluation Mechanism -- 5 Conclusion -- References -- Networks and Communications -- Implementation and Performance Analysis of Trellis Coded Modulation in Additive White Gaussian Noise -- Abstract -- 1 Introduction -- 1.1 Areas of Application -- 2 TCM Encoder -- 3 TCM Decoder Using Maximum Likelihood Soft Decision Decoding -- 3.1 Fading Channels -- 4 Results and Analysis -- 4.1 Simulation Results -- 5 Conclusion and Further Work -- References -- Spectrum Utilization Assessment of Wi-Fi Network Using Qualcomm/Atheros 802.11 Wireless Chipset -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 3 Literature Review -- 4 Proof of Concept Solution Model -- 4.1 Spectral Sample Processing Module -- 4.2 MaxHold-RMS and Percentage Count Ratio Approaches -- 4.3 Multi-variable Decision-Making Module -- 4.4 Ranking Module -- 5 Experimental Performance Evaluation and Analysis -- 5.1 Capability of Qualcomm/Atheros Chipset to Detect Narrowband Signals Such as Radar Signal with Good Power Sensitivity and Precision -- 5.2 Finding the Best Channel -- 5.3 Evaluation of MaxHold-RMS Approach -- 5.4 Percentage Ratio Count Approach -- 5.5 Scan Duration Required for Wireless Signal Detection on 5 GHz Spectrum</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.6 Detection of Non-IEEE802.11 Wireless Signal -- 6 Conclusion and Recommendation -- References -- Resource Efficient Algorithm for D2D Communications Between Adjacent and Co-channel Cells of LTE Networks -- Abstract -- 1 Introduction -- 2 D2D Communication Based on Adjacent and Co-channel Cells in LTE Networks -- 3 Related Works -- 4 Proposed D2D Algorithm Design -- 4.1 Flowchart Representation of the Proposed Algorithm -- 4.2 Proposed Algorithm -- 5 Simulation Results and Analysis -- 6 Conclusion and Further Works -- References -- 5G Dilemma of Supporting Contrasting Narrowband and Broadband Services -- 1 Introduction -- 2 Requirements for Realizing 5G Systems -- 2.1 Enhanced Data Rates -- 2.2 Ultra-reliable and Low Latency -- 2.3 Very High Bandwidth Density -- 2.4 Very High Connection Density -- 2.5 Very High Mobility -- 2.6 Evolution or Revolution in the RAN -- 3 Enabling Technologies for Broadband and Narrowband -- 3.1 Small Cells and Millimetre-Wave Band -- 3.2 Massive Multiple-Input, Multiple-Output and Beamforming -- 4 Current Development and Challenges -- 4.1 Current Development -- 4.2 Challenges Toward 5G Realization -- 5 Conclusion -- References -- Design of Novel High Density, Fault Tolerant Protocol for Cluster Based Routing in Ad-Hoc Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Models, Parameter Metrics and Clustering Algorithm -- 3.1 Proposed Model -- 3.2 Proposed Flowcharts -- 3.3 Parameter Metrics -- 3.4 Clustering Algorithms -- 4 Analysis of Simulation Results -- 5 Conclusion and Future Works -- References -- ICT Applications for Development -- SafeTransit: A Transit Safety Information Gathering Decision System -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 LA Metro Transit Watch -- 2.2 Matserve Msafiri -- 3 Methodology -- 4 SafeTransit Model and System Design</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.1 System Design and Implementation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology-Developing countries-Congresses</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Adegboyega, Ojo</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Uwadia, Charles</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Odumuyiwa, Victor</subfield><subfield code="t">E-Infrastructure and e-Services for Developing Countries</subfield><subfield code="d">Cham : Springer International Publishing AG,c2018</subfield><subfield code="z">9783319988269</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033077695</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=6283210</subfield><subfield code="l">HWR01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047693703 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:57:26Z |
indexdate | 2024-07-10T09:19:21Z |
institution | BVB |
isbn | 9783319988276 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033077695 |
oclc_num | 1050392817 |
open_access_boolean | |
owner | DE-2070s |
owner_facet | DE-2070s |
physical | 1 online resource (387 pages) |
psigel | ZDB-30-PQE ZDB-30-PQE HWR_PDA_PQE |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Springer International Publishing AG |
record_format | marc |
series2 | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Ser. |
spelling | Odumuyiwa, Victor Verfasser aut E-Infrastructure and e-Services for Developing Countries 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings Cham Springer International Publishing AG 2018 ©2018 1 online resource (387 pages) txt rdacontent c rdamedia cr rdacarrier Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Ser. v.250 Description based on publisher supplied metadata and other sources Intro -- Preface -- Organization -- Contents -- e-Government -- A Model for Designing, Implementing and Evaluating Citizen-Centric e-Government in Namibia -- Abstract -- 1 Introduction -- 1.1 Citizen-Centric e-Government -- 1.2 Theories on Public Sector Reform -- 2 Literature Review -- 3 Namibia's e-Government Initiatives -- 4 Methodology -- 5 The Proposed Model for Citizen-Centric e-Government -- 5.1 The e-Government Design and Implementation Component -- 5.2 Factors of e-Government Evaluation -- 6 Conclusion -- References -- Towards an Interoperability e-Government Framework for Uganda -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Analysis and Design Phase -- 3.2 Framework Design and Evaluation -- 4 The Framework -- 4.1 e-Government Ontology -- 4.2 Services Architecture -- 4.3 Business Process Architecture -- 4.4 Data Architecture -- 4.5 Organization Architecture -- 5 Framework Evaluation -- 5.1 Results from the Evaluation -- 5.2 Discussion -- 6 Conclusion -- References -- The State of e-Government Security in South Africa: Analysing the National Information Security Policy -- Abstract -- 1 Introduction -- 2 e-Government Research -- 3 National Information Security -- 4 Information Security Linked Legislation -- 5 National Information Security Policy Constructs -- 6 Methodology -- 7 Findings -- 8 Alignment with DPSA Guidelines -- 9 Discussion of Findings -- 10 Implications for Practice -- 11 Conclusion -- References -- Network and Load Management -- A Priority Load-Aware Scheduling Algorithm for Wireless Broadband Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 The Proposed PLAS Algorithm -- 4 Performance Evaluation -- 5 Conclusions -- Acknowledgement -- References -- Scheduling Cloud Workloads Using Carry-On Weighted Round Robin -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach 3.1 Algorithm 1: CWRR -- 3.2 System Process Flow -- 4 Performance Evaluation -- 5 Results -- 6 Contributions -- 7 Conclusion -- References -- Performance Analysis of a Collaborative DSA-Based Network with Malicious Nodes -- 1 Introduction -- 2 System Model -- 2.1 Assumptions -- 2.2 Performance Metrics -- 3 Results and Discussions -- 4 Conclusion -- References -- Digital Inclusion -- Digital Inclusion: A Model for e-Infrastructure and e-Services in Developing Countries -- Abstract -- 1 Introduction -- 2 The Siyakhula Living Lab -- 3 The Model: e-Infrastructure -- 3.1 The Network: The Broadband Island -- 3.2 The 'Large ICT' Installation: The Digital Access Node -- 4 The Model: e-Services -- 4.1 TeleWeaver: The Business Model -- 4.2 TeleWeaver: System Architecture -- 5 Discussion -- 6 Conclusion -- References -- SV4D Architecture: Building Sustainable Villages for Developing Countries -- Abstract -- 1 Introduction -- 2 SV4D Architecture -- 2.1 Communication for Development (Comm4Dev) Infrastructure -- 2.2 Framework for Occasional Connectivity - Postbox Sync -- 3 SV4D Testbed Preliminary Performance Evaluation -- 3.1 Testing Link Capability -- 3.2 Supporting Different Access Technologies -- 3.3 Dealing with Intermittent Connectivity -- 4 Conclusions and Future Work -- Acknowledgments -- References -- Design and Implementation of a Smart Meter -- Abstract -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Objectives -- 2 Related Work and Background -- 2.1 Conventional Electricity Meter Design -- 2.2 Smart Electricity Meter Design -- 2.3 Requirements and Challenges in the Design and Implementation of Smart Meters -- 3 Design of the Proposed System -- 3.1 Control and Management System -- 3.2 Display System -- 3.3 Communication System -- 3.4 Database System -- 4 Implementation and Demonstration -- 4.1 Circuit Design and Implementation 4.2 Circuit Software Implementation -- 4.3 Database Implementation -- 4.4 Case Study -- 5 Discussion -- 6 Conclusion -- References -- Towards a Persuasive Technology for Electricity Theft Reduction in Uganda -- Abstract -- 1 Introduction -- 2 Persuasive Techniques -- 3 Design of Persuasion Technologies -- 3.1 Fogg's Eight Steps -- 3.2 Persuasive System Design (PSD) -- 3.3 Unified-Framework for Analysing, Designing and Evaluating Persuasion Systems -- 3.4 Selecting the Persuasive Design Method -- 4 Adaptation of Fogg's Eight Steps -- 4.1 Step 1: Identify Target Behaviour/Attitude -- 4.2 Step 2: Choose Audience -- 4.3 Step 3: Selecting Persuasion Techniques -- 4.4 Step 4: Selection of Technology -- 4.5 Step 5: Requirements Specification -- 4.6 Step 6: Design Basing on Similar/Successful Technologies -- 5 Discussion -- 6 Conclusion -- Acknowledgements -- References -- The Role of Culture in the Design of Effective Cybersecurity Training and Awareness Programmes. A Case Study of the United Arab Emirates (UAE) -- Abstract -- 1 Introduction -- 2 Study Background -- 3 Case Study -- 4 Discussions -- 5 Conclusion -- References -- Knowledge Extraction, Representation and Sharing -- Development of Collaborative Customer Service Officer Knowledge Sharing System (CCSOKSS) -- Abstract -- 1 Introduction -- 2 Knowledge -- 2.1 Knowledge Management -- 2.2 Knowledge Sharing -- 2.3 Review of Existing Knowledge Management in Organizations -- 2.3.1 Banking Knowledge Management Model (BKMM) -- 2.3.2 Comparison of Knowledge Sharing Systems in Organizations -- 2.3.3 Overview of Customer Service in the Nigerian Banking Industry -- 3 Methodology -- 3.1 Knowledge Acquisition from Existing Officers After Mergers/Acquisitions -- 3.2 Architecture of Collaborative Customer Service Officer Knowledge Sharing System (CCSOKSS) -- 3.2.1 User Access -- 3.2.2 Creation -- 3.2.3 Filtering 3.2.4 Sharing -- 3.2.5 Retention -- 3.2.6 Exploitation -- 3.2.7 Utilization -- 4 Discussion of Findings -- 5 Conclusion and Recommendation -- References -- Towards Building a Knowledge Graph with Open Data - A Roadmap -- Abstract -- 1 Introduction -- 1.1 Open Data -- 1.2 Knowledge Graph -- 2 Related Work -- 3 Proposed Architecture of the Knowledge Graph System -- 4 Conclusions -- References -- A Secured Preposition-Enabled Natural Language Parser for Extracting Spatial Context from Unstructured Data -- Abstract -- 1 Introduction -- 2 Formal Theory/Concept -- 3 Methodology -- 4 PeNLP Implementation and Evaluation -- 4.1 The PeNLP Algorithm -- 4.2 Evaluation Mechanism -- 5 Conclusion -- References -- Networks and Communications -- Implementation and Performance Analysis of Trellis Coded Modulation in Additive White Gaussian Noise -- Abstract -- 1 Introduction -- 1.1 Areas of Application -- 2 TCM Encoder -- 3 TCM Decoder Using Maximum Likelihood Soft Decision Decoding -- 3.1 Fading Channels -- 4 Results and Analysis -- 4.1 Simulation Results -- 5 Conclusion and Further Work -- References -- Spectrum Utilization Assessment of Wi-Fi Network Using Qualcomm/Atheros 802.11 Wireless Chipset -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 3 Literature Review -- 4 Proof of Concept Solution Model -- 4.1 Spectral Sample Processing Module -- 4.2 MaxHold-RMS and Percentage Count Ratio Approaches -- 4.3 Multi-variable Decision-Making Module -- 4.4 Ranking Module -- 5 Experimental Performance Evaluation and Analysis -- 5.1 Capability of Qualcomm/Atheros Chipset to Detect Narrowband Signals Such as Radar Signal with Good Power Sensitivity and Precision -- 5.2 Finding the Best Channel -- 5.3 Evaluation of MaxHold-RMS Approach -- 5.4 Percentage Ratio Count Approach -- 5.5 Scan Duration Required for Wireless Signal Detection on 5 GHz Spectrum 5.6 Detection of Non-IEEE802.11 Wireless Signal -- 6 Conclusion and Recommendation -- References -- Resource Efficient Algorithm for D2D Communications Between Adjacent and Co-channel Cells of LTE Networks -- Abstract -- 1 Introduction -- 2 D2D Communication Based on Adjacent and Co-channel Cells in LTE Networks -- 3 Related Works -- 4 Proposed D2D Algorithm Design -- 4.1 Flowchart Representation of the Proposed Algorithm -- 4.2 Proposed Algorithm -- 5 Simulation Results and Analysis -- 6 Conclusion and Further Works -- References -- 5G Dilemma of Supporting Contrasting Narrowband and Broadband Services -- 1 Introduction -- 2 Requirements for Realizing 5G Systems -- 2.1 Enhanced Data Rates -- 2.2 Ultra-reliable and Low Latency -- 2.3 Very High Bandwidth Density -- 2.4 Very High Connection Density -- 2.5 Very High Mobility -- 2.6 Evolution or Revolution in the RAN -- 3 Enabling Technologies for Broadband and Narrowband -- 3.1 Small Cells and Millimetre-Wave Band -- 3.2 Massive Multiple-Input, Multiple-Output and Beamforming -- 4 Current Development and Challenges -- 4.1 Current Development -- 4.2 Challenges Toward 5G Realization -- 5 Conclusion -- References -- Design of Novel High Density, Fault Tolerant Protocol for Cluster Based Routing in Ad-Hoc Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Models, Parameter Metrics and Clustering Algorithm -- 3.1 Proposed Model -- 3.2 Proposed Flowcharts -- 3.3 Parameter Metrics -- 3.4 Clustering Algorithms -- 4 Analysis of Simulation Results -- 5 Conclusion and Future Works -- References -- ICT Applications for Development -- SafeTransit: A Transit Safety Information Gathering Decision System -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 LA Metro Transit Watch -- 2.2 Matserve Msafiri -- 3 Methodology -- 4 SafeTransit Model and System Design 4.1 System Design and Implementation Information technology-Developing countries-Congresses Adegboyega, Ojo Sonstige oth Uwadia, Charles Sonstige oth Erscheint auch als Druck-Ausgabe Odumuyiwa, Victor E-Infrastructure and e-Services for Developing Countries Cham : Springer International Publishing AG,c2018 9783319988269 |
spellingShingle | Odumuyiwa, Victor E-Infrastructure and e-Services for Developing Countries 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings Intro -- Preface -- Organization -- Contents -- e-Government -- A Model for Designing, Implementing and Evaluating Citizen-Centric e-Government in Namibia -- Abstract -- 1 Introduction -- 1.1 Citizen-Centric e-Government -- 1.2 Theories on Public Sector Reform -- 2 Literature Review -- 3 Namibia's e-Government Initiatives -- 4 Methodology -- 5 The Proposed Model for Citizen-Centric e-Government -- 5.1 The e-Government Design and Implementation Component -- 5.2 Factors of e-Government Evaluation -- 6 Conclusion -- References -- Towards an Interoperability e-Government Framework for Uganda -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Analysis and Design Phase -- 3.2 Framework Design and Evaluation -- 4 The Framework -- 4.1 e-Government Ontology -- 4.2 Services Architecture -- 4.3 Business Process Architecture -- 4.4 Data Architecture -- 4.5 Organization Architecture -- 5 Framework Evaluation -- 5.1 Results from the Evaluation -- 5.2 Discussion -- 6 Conclusion -- References -- The State of e-Government Security in South Africa: Analysing the National Information Security Policy -- Abstract -- 1 Introduction -- 2 e-Government Research -- 3 National Information Security -- 4 Information Security Linked Legislation -- 5 National Information Security Policy Constructs -- 6 Methodology -- 7 Findings -- 8 Alignment with DPSA Guidelines -- 9 Discussion of Findings -- 10 Implications for Practice -- 11 Conclusion -- References -- Network and Load Management -- A Priority Load-Aware Scheduling Algorithm for Wireless Broadband Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 The Proposed PLAS Algorithm -- 4 Performance Evaluation -- 5 Conclusions -- Acknowledgement -- References -- Scheduling Cloud Workloads Using Carry-On Weighted Round Robin -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach 3.1 Algorithm 1: CWRR -- 3.2 System Process Flow -- 4 Performance Evaluation -- 5 Results -- 6 Contributions -- 7 Conclusion -- References -- Performance Analysis of a Collaborative DSA-Based Network with Malicious Nodes -- 1 Introduction -- 2 System Model -- 2.1 Assumptions -- 2.2 Performance Metrics -- 3 Results and Discussions -- 4 Conclusion -- References -- Digital Inclusion -- Digital Inclusion: A Model for e-Infrastructure and e-Services in Developing Countries -- Abstract -- 1 Introduction -- 2 The Siyakhula Living Lab -- 3 The Model: e-Infrastructure -- 3.1 The Network: The Broadband Island -- 3.2 The 'Large ICT' Installation: The Digital Access Node -- 4 The Model: e-Services -- 4.1 TeleWeaver: The Business Model -- 4.2 TeleWeaver: System Architecture -- 5 Discussion -- 6 Conclusion -- References -- SV4D Architecture: Building Sustainable Villages for Developing Countries -- Abstract -- 1 Introduction -- 2 SV4D Architecture -- 2.1 Communication for Development (Comm4Dev) Infrastructure -- 2.2 Framework for Occasional Connectivity - Postbox Sync -- 3 SV4D Testbed Preliminary Performance Evaluation -- 3.1 Testing Link Capability -- 3.2 Supporting Different Access Technologies -- 3.3 Dealing with Intermittent Connectivity -- 4 Conclusions and Future Work -- Acknowledgments -- References -- Design and Implementation of a Smart Meter -- Abstract -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Objectives -- 2 Related Work and Background -- 2.1 Conventional Electricity Meter Design -- 2.2 Smart Electricity Meter Design -- 2.3 Requirements and Challenges in the Design and Implementation of Smart Meters -- 3 Design of the Proposed System -- 3.1 Control and Management System -- 3.2 Display System -- 3.3 Communication System -- 3.4 Database System -- 4 Implementation and Demonstration -- 4.1 Circuit Design and Implementation 4.2 Circuit Software Implementation -- 4.3 Database Implementation -- 4.4 Case Study -- 5 Discussion -- 6 Conclusion -- References -- Towards a Persuasive Technology for Electricity Theft Reduction in Uganda -- Abstract -- 1 Introduction -- 2 Persuasive Techniques -- 3 Design of Persuasion Technologies -- 3.1 Fogg's Eight Steps -- 3.2 Persuasive System Design (PSD) -- 3.3 Unified-Framework for Analysing, Designing and Evaluating Persuasion Systems -- 3.4 Selecting the Persuasive Design Method -- 4 Adaptation of Fogg's Eight Steps -- 4.1 Step 1: Identify Target Behaviour/Attitude -- 4.2 Step 2: Choose Audience -- 4.3 Step 3: Selecting Persuasion Techniques -- 4.4 Step 4: Selection of Technology -- 4.5 Step 5: Requirements Specification -- 4.6 Step 6: Design Basing on Similar/Successful Technologies -- 5 Discussion -- 6 Conclusion -- Acknowledgements -- References -- The Role of Culture in the Design of Effective Cybersecurity Training and Awareness Programmes. A Case Study of the United Arab Emirates (UAE) -- Abstract -- 1 Introduction -- 2 Study Background -- 3 Case Study -- 4 Discussions -- 5 Conclusion -- References -- Knowledge Extraction, Representation and Sharing -- Development of Collaborative Customer Service Officer Knowledge Sharing System (CCSOKSS) -- Abstract -- 1 Introduction -- 2 Knowledge -- 2.1 Knowledge Management -- 2.2 Knowledge Sharing -- 2.3 Review of Existing Knowledge Management in Organizations -- 2.3.1 Banking Knowledge Management Model (BKMM) -- 2.3.2 Comparison of Knowledge Sharing Systems in Organizations -- 2.3.3 Overview of Customer Service in the Nigerian Banking Industry -- 3 Methodology -- 3.1 Knowledge Acquisition from Existing Officers After Mergers/Acquisitions -- 3.2 Architecture of Collaborative Customer Service Officer Knowledge Sharing System (CCSOKSS) -- 3.2.1 User Access -- 3.2.2 Creation -- 3.2.3 Filtering 3.2.4 Sharing -- 3.2.5 Retention -- 3.2.6 Exploitation -- 3.2.7 Utilization -- 4 Discussion of Findings -- 5 Conclusion and Recommendation -- References -- Towards Building a Knowledge Graph with Open Data - A Roadmap -- Abstract -- 1 Introduction -- 1.1 Open Data -- 1.2 Knowledge Graph -- 2 Related Work -- 3 Proposed Architecture of the Knowledge Graph System -- 4 Conclusions -- References -- A Secured Preposition-Enabled Natural Language Parser for Extracting Spatial Context from Unstructured Data -- Abstract -- 1 Introduction -- 2 Formal Theory/Concept -- 3 Methodology -- 4 PeNLP Implementation and Evaluation -- 4.1 The PeNLP Algorithm -- 4.2 Evaluation Mechanism -- 5 Conclusion -- References -- Networks and Communications -- Implementation and Performance Analysis of Trellis Coded Modulation in Additive White Gaussian Noise -- Abstract -- 1 Introduction -- 1.1 Areas of Application -- 2 TCM Encoder -- 3 TCM Decoder Using Maximum Likelihood Soft Decision Decoding -- 3.1 Fading Channels -- 4 Results and Analysis -- 4.1 Simulation Results -- 5 Conclusion and Further Work -- References -- Spectrum Utilization Assessment of Wi-Fi Network Using Qualcomm/Atheros 802.11 Wireless Chipset -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 3 Literature Review -- 4 Proof of Concept Solution Model -- 4.1 Spectral Sample Processing Module -- 4.2 MaxHold-RMS and Percentage Count Ratio Approaches -- 4.3 Multi-variable Decision-Making Module -- 4.4 Ranking Module -- 5 Experimental Performance Evaluation and Analysis -- 5.1 Capability of Qualcomm/Atheros Chipset to Detect Narrowband Signals Such as Radar Signal with Good Power Sensitivity and Precision -- 5.2 Finding the Best Channel -- 5.3 Evaluation of MaxHold-RMS Approach -- 5.4 Percentage Ratio Count Approach -- 5.5 Scan Duration Required for Wireless Signal Detection on 5 GHz Spectrum 5.6 Detection of Non-IEEE802.11 Wireless Signal -- 6 Conclusion and Recommendation -- References -- Resource Efficient Algorithm for D2D Communications Between Adjacent and Co-channel Cells of LTE Networks -- Abstract -- 1 Introduction -- 2 D2D Communication Based on Adjacent and Co-channel Cells in LTE Networks -- 3 Related Works -- 4 Proposed D2D Algorithm Design -- 4.1 Flowchart Representation of the Proposed Algorithm -- 4.2 Proposed Algorithm -- 5 Simulation Results and Analysis -- 6 Conclusion and Further Works -- References -- 5G Dilemma of Supporting Contrasting Narrowband and Broadband Services -- 1 Introduction -- 2 Requirements for Realizing 5G Systems -- 2.1 Enhanced Data Rates -- 2.2 Ultra-reliable and Low Latency -- 2.3 Very High Bandwidth Density -- 2.4 Very High Connection Density -- 2.5 Very High Mobility -- 2.6 Evolution or Revolution in the RAN -- 3 Enabling Technologies for Broadband and Narrowband -- 3.1 Small Cells and Millimetre-Wave Band -- 3.2 Massive Multiple-Input, Multiple-Output and Beamforming -- 4 Current Development and Challenges -- 4.1 Current Development -- 4.2 Challenges Toward 5G Realization -- 5 Conclusion -- References -- Design of Novel High Density, Fault Tolerant Protocol for Cluster Based Routing in Ad-Hoc Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Models, Parameter Metrics and Clustering Algorithm -- 3.1 Proposed Model -- 3.2 Proposed Flowcharts -- 3.3 Parameter Metrics -- 3.4 Clustering Algorithms -- 4 Analysis of Simulation Results -- 5 Conclusion and Future Works -- References -- ICT Applications for Development -- SafeTransit: A Transit Safety Information Gathering Decision System -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 LA Metro Transit Watch -- 2.2 Matserve Msafiri -- 3 Methodology -- 4 SafeTransit Model and System Design 4.1 System Design and Implementation Information technology-Developing countries-Congresses |
title | E-Infrastructure and e-Services for Developing Countries 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings |
title_auth | E-Infrastructure and e-Services for Developing Countries 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings |
title_exact_search | E-Infrastructure and e-Services for Developing Countries 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings |
title_exact_search_txtP | E-Infrastructure and e-Services for Developing Countries 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings |
title_full | E-Infrastructure and e-Services for Developing Countries 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings |
title_fullStr | E-Infrastructure and e-Services for Developing Countries 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings |
title_full_unstemmed | E-Infrastructure and e-Services for Developing Countries 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings |
title_short | E-Infrastructure and e-Services for Developing Countries |
title_sort | e infrastructure and e services for developing countries 9th international conference africomm 2017 lagos nigeria december 11 12 2017 proceedings |
title_sub | 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings |
topic | Information technology-Developing countries-Congresses |
topic_facet | Information technology-Developing countries-Congresses |
work_keys_str_mv | AT odumuyiwavictor einfrastructureandeservicesfordevelopingcountries9thinternationalconferenceafricomm2017lagosnigeriadecember11122017proceedings AT adegboyegaojo einfrastructureandeservicesfordevelopingcountries9thinternationalconferenceafricomm2017lagosnigeriadecember11122017proceedings AT uwadiacharles einfrastructureandeservicesfordevelopingcountries9thinternationalconferenceafricomm2017lagosnigeriadecember11122017proceedings |