Browsing by Advisor/Supervisor
Now showing items 1-14 of 14
-
Biometric-based Voters Identity Management to Combat Impersonation Vulnerability for A Credible E-Voting Process in Nigeria
(North-West University (South Africa), 2015)Today, democracy has become a de facto standard of every form of government in the world, nations and organizations. People are given the power to vote for candidates of their choice to represent them in offices. These ... -
A comprehensive analysis of LoRa/LoRaWAN effectiveness using WaterGrid-Sense in a real system deployment
(North-West University (South Africa), 2019)LoRa also known as Long Range is a leading Low Powered Wide Area Network because it operates in unlicensed bands and has attracted widespread research. However, to continually improve this technology and for it to remain ... -
Cryptanalysis of data encryption standard/triple data encryption standard on a Java card
(North-West University (South Africa), Mafikeng Campus, 2016)Cryptographically embedded devices are vulnerable to Side Channel Attacks. Side channel attack is based upon the principle that the attacker extract leaked information from the physical implementation of the cryptosystem ... -
Deploying and Sustaining Rural Telecommunication Broadband Network for Rural Economic Development in Botswana
(North-West University (South Africa), 2015)It is critical for developing countries to investigate why despite enormous investments in both capital and infrastructure efforts, broadband development remain a mammoth challenge to achieve. Thus, this study reviews ... -
A hybrid framework for business intelligence systems adoption by small scale enterprises in Namibia
(North-West University (South Africa), 2022)The prevailing economic environment, characterised by retrenchments, company closures and the drive to eradicate poverty has led to the increase in the number of small businesses. The small scale enterprises operate in the ... -
Identification of compromise - prone nodes in mobile ad hoc networks using machine learning techniques
(North-West University (South Africa), 2018)"Abstract not copied" -
Implementation and analysis of improved apriori algorithm in data mining
(North-West University (South Africa), 2018)"Abstract not copied" -
Optimized dynamic programming search for automatic speech recognition on a Graphics Processing Unit (GPU) platform using Compute Unified Device Architecture (CUDA)
(2014)In a typical recognition process, there are substantial parallelization challenges in concurrently assessing thousands of alternative interpretations of a speech utterance to find the most probable one. During this ... -
Predictive system for characterizing low performance of Undergraduate students using machine learning techniques
(North-West University (South Africa), 2020)One challenge of educational institutions is the low academic performance of students. This challenge affects students, tutors, institutions and the society in varieties of ways. To deal with this problem, researchers have ... -
Quality of Service (QoS) in optical broadband access and metro network architecture
(North-West University (South Africa), 2016)Fibre-Wireless (FiWi) is a hybridized Dense Wavelength-Division Multiplexing-Passive Optical Network (DWDM-PON) with Worldwide Interoperability for Microwave Access (WiMAX) as a means of providing higher bandwidth and ... -
Quality of service (QoS) in optical broadband access and metro network architecture
(North-West University (South Africa), 2016)Fibre-Wireless (FiWi) is a hybridized Dense Wavelength-Division Multiplexing-Passive Optical Network (DWDM-PON) with Worldwide Interoperability for Microwave Access (WiMAX) as a means of providing higher bandwidth and ... -
A robust self-healing and intrusion detection model in software-defined wireless sensor networks
(North-West University (South Africa), 2023)Software-defined wireless sensor network (SDWSN) is a networking model that brings software-defined networking (SDN) benefits such as effortlessness, innovation, and flexible network management and configuration to the ... -
Secure multi-level steganographic system as security measure to safeguard data transmission and sharing over the internet
(North-West University (South Africa), 2015)Recent advances in steganography systems have shown good results in bringing reliable data security over the Internet. However, these systems have their unique vulnerabilities since they are faced with a variety of threats ... -
User-centric video streaming quality of service and experience evaluation over next generation mobile networks
(North-West University (South Africa), 2016)Quality of Experience (QoE) is a prototype of human feelings, wishes, impressions and motives. Quality of Service (QoS) on the other hand is a technology-based metric that is employed to gauge how a network performs at ...