Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Boyce Sigweni

    The shovel-truck system is commonly used in open-pit mining operations. Truck haulage cost constitutes about 26% of open-pit mining costs as the trucks are mostly powered by diesel whose cost is escalating annually. Therefore, reducing... more
    The shovel-truck system is commonly used in open-pit mining operations. Truck haulage cost constitutes about 26% of open-pit mining costs as the trucks are mostly powered by diesel whose cost is escalating annually. Therefore, reducing fuel consumption could lead to a significant decrease in overall mining costs. Various methods have been proposed to improve fuel efficiency in open-pit mines. Case-based reasoning (CBR) can be used to estimate fuel consumption by haulage trucks. In this work, CBR methods namely case-based reasoning using forward sequential selection (CBR-FSS), traditional CBR, and Naïve techniques were used to predict fuel consumption by trucks operating at Orapa Mine. The results show that the CBR method can be used to predict fuel consumption by trucks in open-pit mines; the predicted values of fuel consumption using the CBR-FSS technique gave much lower absolute residual values, higher standardised accuracy values, and effect sizes than those of other prediction t...
    In recent years, several efforts have been made by many researchers to emphasize security issues in the IoT sensor network framework. It is evident from prior research that the area of security and privacy has caught the attention of many... more
    In recent years, several efforts have been made by many researchers to emphasize security issues in the IoT sensor network framework. It is evident from prior research that the area of security and privacy has caught the attention of many researchers. Although the focus of this chapter is to review recent research techniques and mechanisms to ensure IoT security, some related works do not exclusively focus on security areas such as security and privacy issues, and their solutions, in the IoT system architecture. This work aims to unearth research opportunities to address security issues and challenges. The contribution of this work focuses on providing a layered approach to propose solutions to layer security challenges using emerging technologies for securing sensor networks through mechanisms such as lightweight encryption, authentication trust recommendation, and secure cloud computing. The work presents recent trends in current research on securing IoT communication and applications concerning the IoT architecture. The study further gives insights on the need for convergence with several interdisciplinary technologies to improve the security of IoT through opportunities such as blockchain, machine learning, and the development of context-aware applications, IoP and IoE should be further investigated to review real-life examples and analysis of their effectiveness towards enhancing privacy and security in wireless IoT sensor networks.
    IoT opportunities and application domains are endless and equally have shortcomings that need to be addressed. This section broadens the open research areas that need to be further investigated to address the challenges in IoT networks.... more
    IoT opportunities and application domains are endless and equally have shortcomings that need to be addressed. This section broadens the open research areas that need to be further investigated to address the challenges in IoT networks. We highlight potential future directions and futuristic applications that can help alleviate these challenges. Although the application of IoT has been widely adopted, an extensive research effort still needs to be done in this direction. This chapter aims to further discuss and collate future work direction in the area of IoT sensor networks to give insights to researchers for areas that still need investigation in wireless IoT sensor networks. Open research areas in IoT sensor networks include hardware security, lack of lightweight cryptographic algorithms, lack of trust management systems, lack of lightweight, secure routing protocols, and anti-malware solutions. Future challenges have been exposed in this chapter, with the hope of encouraging fur...
    This paper investigates the feasibility of Timed Efficient Stream Loss-tolerant Authentica- tion to serve security needs of Power Line Communication (PLC) system. PLC network has been identified as the ideal choice to function as the last... more
    This paper investigates the feasibility of Timed Efficient Stream Loss-tolerant Authentica- tion to serve security needs of Power Line Communication (PLC) system. PLC network has been identified as the ideal choice to function as the last mile network, deliver load management messages to smart meters. However, there is need to address the security concerns for load management messages delivered over power line communications. The ubiquitous nature of the power line communication infrastructure exposes load management systems (LMS) deployed over it to a security risk. Ordinarily, PLC network does not em- ploy any security measures on which the smart meters and data concentrators can depend on. Therefore, the need to provide a secure mechanism for communication of load man- agement system messages over a PLC network. In LMS, source authentication is of highest priority because we need to respond only to messages from an authenticated source. This is achieved by investigating suitable ...
    The shovel-truck system is commonly used in open-pit mining operations. Truck haulage cost constitutes about 26% of open-pit mining costs as the trucks are mostly powered by diesel whose cost is escalating annually. Therefore, reducing... more
    The shovel-truck system is commonly used in open-pit mining operations. Truck haulage cost constitutes about 26% of open-pit mining costs as the trucks are mostly powered by diesel whose cost is escalating annually. Therefore, reducing fuel consumption could lead to a significant decrease in overall mining costs. Various methods have been proposed to improve fuel efficiency in open-pit mines. Case-based reasoning (CBR) can be used to estimate fuel consumption by haulage trucks. In this work, CBR methods namely case-based reasoning using forward sequential selection (CBR-FSS), traditional CBR, and Naïve techniques were used to predict fuel consumption by trucks operating at Orapa Mine. The results show that the CBR method can be used to predict fuel consumption by trucks in open-pit mines; the predicted values of fuel consumption using the CBR-FSS technique gave much lower absolute residual values, higher standardised accuracy values, and effect sizes than those of other prediction t...
    Background: The Agriculture sector in Botswana is the biggest water consumer and irrigation is a common practice. However, water leaks are common occurrence in irrigation systems. The current most prevalent methods for leak detection... more
    Background: The Agriculture sector in Botswana is the biggest water consumer and irrigation is a common practice. However, water leaks are common occurrence in irrigation systems. The current most prevalent methods for leak detection involves visual inspection of irrigation pipelines, which is not feasible due to water drainage in sandy soils and pipes being buried underground. Hence, the need to investigate the viability of vibration sensors for detection of water leaks. Proper water management requires constant monitoring of the water pipe network and fast detection of leaks. This paper discusses the use of an accelerometer to monitor water leaks and data analysis techniques that can be used for detecting leaks in crop irrigation systems. Objective: To detect water leaks in a farm piping system, hence help farmer reduce water loss. Method: We apply our algorithm on an experimental dataset to detect water leak. An unbiased statistic, Standardised Accuracy (SA), is used for evaluati...
    The proliferation of the Internet has birthed the emergence of the Internet of Things (IoT), which is rapidly evolving and already taking strides as a universal solution to connected things. IoT transforms devices to be smart, to deliver... more
    The proliferation of the Internet has birthed the emergence of the Internet of Things (IoT), which is rapidly evolving and already taking strides as a universal solution to connected things. IoT transforms devices to be smart, to deliver exceptional services, and to transform everyday settings. The rapid evolution of IoT has brought along many benefits. However, IoT has also brought about ambiguity and several security concerns to IoT adopters. Security issues are the most critical challenges that need to be addressed in promoting the adoption and development of IoT systems. Addressing these challenges using a layered approach has not been adequately addressed. Several studies have proposed solutions to address security issues. Nevertheless, they have failed to propose an appropriate layered security approach or framework that addresses the majority of the security issues using a cross-layered approach. The aim of this work is to highlight security issues and challenges and provide ...
    Background: Telecentre implementation in developing countries such as Ghana, has been inundated with failure. Various methods have been proposed to mitigate these failures, considering the substantial amounts invested. Various methods... more
    Background: Telecentre implementation in developing countries such as Ghana, has been inundated with failure. Various methods have been proposed to mitigate these failures, considering the substantial amounts invested. Various methods have been proposed. Recent work has shown that case-based reasoning (CBR) can be used to predict sustainability of a telecentre. Unfortunately, the factors that play a major role in the collapse of telecentres are yet to be determined. Objective: To combine two approaches (ICT4D evaluation and Machine Learning) and to identify the most important factors in the sustainability of a telecentre. Through the use of a case study, this paper applies the well-established feature subset selection (FSS) methodology to identify these influential factors. Method: We apply CBR with FSS on real life dataset to predict the Design Reality Gap score (DRGS). We compare two machine learning FSS methods with Expert Based Selection (EBS) method against benchmark using Arch...
    The advances of the Internet have undergone many changes over the years. This has led to an increment in the number of connected applications through emerging technologies to the Internet. The contribution of this chapter is two-fold; the... more
    The advances of the Internet have undergone many changes over the years. This has led to an increment in the number of connected applications through emerging technologies to the Internet. The contribution of this chapter is two-fold; the first fold characterizes and presents applications of IoT sensor networks into three application domains, namely consumer IoT, commercial IoT, and Industrial IoT (IIoT). Consumer IoT includes applications such as smart homes using technologies such as virtual assistants such as voice assistants or smartphones to control home appliances such as doors, locks, and switches in the house. Commercial IoT includes smart cities with applications such as smart meters, smart farming, and not limited to smart transportation. In contrast, industrial IoT application is applied in industrial manufacturing for asset management in applications such as smart grids, communication factories, and industries to achieve efficiency and sustainable energy management pract...
    The shovel-truck system is commonly used in open-pit mining operations. Truck haulage cost constitutes about 26% of open-pit mining costs as the trucks are mostly powered by diesel whose cost is escalating annually. Therefore, reducing... more
    The shovel-truck system is commonly used in open-pit mining operations. Truck haulage cost constitutes about 26% of open-pit mining costs as the trucks are mostly powered by diesel whose cost is escalating annually. Therefore, reducing fuel consumption could lead to a significant decrease in overall mining costs. Various methods have been proposed to improve fuel efficiency in open-pit mines. Case-based reasoning (CBR) can be used to estimate fuel consumption by haulage trucks. In this work, CBR methods namely case-based reasoning using forward sequential selection (CBR-FSS), traditional CBR, and Naïve techniques were used to predict fuel consumption by trucks operating at Orapa Mine. The results show that the CBR method can be used to predict fuel consumption by trucks in open-pit mines; the predicted values of fuel consumption using the CBR-FSS technique gave much lower absolute residual values, higher standardised accuracy values, and effect sizes than those of other prediction t...
    Context : Software effort estimation is a very important component of the software development life cycle. It underpins activities such as planning, maintenance and bidding. Therefore, it has triggered much research over the past four... more
    Context : Software effort estimation is a very important component of the software development life cycle. It underpins activities such as planning, maintenance and bidding. Therefore, it has triggered much research over the past four decades, including many machine learning approaches. One popular approach, that has the benefit of accessible reasoning, is analogybased estimation. Machine learning including analogy is known to significantly benefit from feature selection/weighting. Unfortunately feature weighting search is an NP hard problem, therefore computationally very demanding, if not intractable. Objective : Therefore, one objective of this research is to develop an efficient and effective feature weighting algorithm for estimation by analogy. However, a major challenge for the effort estimation research community is that experimental results tend to be contradictory and also lack reliability. This has been paralleled by a recent awareness of how bias can impact research resu...
    This study reviews literature on the use of Social Media (SM) in emergency response operations while identifying gaps in this research stream that need attention from Information Systems (IS) researchers. The research is grounded in past... more
    This study reviews literature on the use of Social Media (SM) in emergency response operations while identifying gaps in this research stream that need attention from Information Systems (IS) researchers. The research is grounded in past works and attempts to build on research on the application of SM in emergencies. It focuses on understanding the role of SM in the prevention, management and response to emergencies. The review contains a detailed literature exposition of IS and disasters journals. The appraisal of such research stream led the review to focus on the concept of digital volunteerism as an offshoot of crowdsourcing initiatives. Findings from the review reveal that previous studies overlooked the interfacing challenges between formal and traditional aid agencies on one hand and digital humanitarians on the other. Consequently, we identify gaps in the extant literature and propose areas of interest for future research.
    LoRa is a communication scheme that is part of the low power wide are network (LPWAN) technology using ISM bands. It has seen extensive documentation and use in research and industry due to its long coverage ranges of up-to 20Km or more... more
    LoRa is a communication scheme that is part of the low power wide are network (LPWAN) technology using ISM bands. It has seen extensive documentation and use in research and industry due to its long coverage ranges of up-to 20Km or more with less than 14dB transmit power. Moreover, some applications report theoretical battery lives of upto 10years for field deployed modules utilising the scheme in WSN applications. Additionally, the scheme is very resilient to losses from noise, as well bursts of interference through its FEC. Our objective is to systematically review the empirical evidence of the use-cases of LoRa in rural landscapes, metrics and the relevant validation schemes. In addition the research is evaluated based on (i) mathematical function of the scheme (bandwidth use, spreading factor, symbol rate, chip rate and nominal bit rate) (ii) use-cases (iii) test-beds, metrics of evaluation and (iv) validation methods. A systematic literature review of published, refereed primar...
    The most challenging issue in the design of wireless sensor networks for the application of localization in the underground environment, mostly for miner’s location, is the sensor nodes’ energy consumption, efficiency and communication.... more
    The most challenging issue in the design of wireless sensor networks for the application of localization in the underground environment, mostly for miner’s location, is the sensor nodes’ energy consumption, efficiency and communication. Underground Wireless Sensor Networks are active and promising area of application of Wireless Sensor Networks (WSNs), whereby sensor nodes perform sensing duties in the underground environment. Most of the communication techniques used in the underground environment experience a high path loss and hence, hinders the range needed for transmission. However, the available option to increase information transmission is to increase the transmission power which needs large size of apparatus which is also limited in the underground. To solve the mentioned problems, this paper proposed a Magnetic Induction based Pulse Power. Analytical results of the Magnetic Induction based Pulse Power with an ordinary magnetic induction communication technique show an impr...
    ABSTRACT
    ABSTRACT
    ABSTRACT
    This paper investigates the feasibility of Timed Efficient Stream Loss-tolerant Authen-tication to serve security needs of Power Line Communication (PLC) system. PLC network has been identified as the ideal choice to function as the last... more
    This paper investigates the feasibility of Timed Efficient Stream Loss-tolerant Authen-tication to serve security needs of Power Line Communication (PLC) system. PLC network has been identified as the ideal choice to function as the last mile network, deliver load management messages to smart meters. However, there is a need to address the security concerns for load management messages delivered over power line communications. The ubiquitous nature of the power line communication infrastructure exposes load management systems (LMS) deployed over it to a security risk. Ordinarily , PLC network does not employ security measures on which the smart meters and data concentrators can depend on. Therefore, the need to provide a secure mechanism for communication of load management system messages over a PLC network. In LMS, source authentication is of highest priority because we need to respond only to messages from an authenticated source. This is achieved by investigating suitable robust authentication protocols. In this paper we present modifications to Timed Efficient Stream Loss-tolerant Authentication for secure authentication to secure messages for load management over PLC. We show that PLC may be used to securely and effectively deliver Load Management messages to smart meters, with minimal overhead.