Conference Publications
Permanent URI for this collection
Browse
Browsing Conference Publications by browse.metadata.cluster "Next Generation Enterprises & Institutions"
Now showing 1 - 20 of 159
Results Per Page
Sort Options
Item 4G RAN infrastructure sharing by 5G virtualized mobile network operators: A tutorial(2021-09) Mamushiane, Lusani; Mboweni, Lawrence S; Kobo, Hlabishi; Mudumbe, Mduduzi J; Mwangama, J; Lysko, Albert AActive radio access network (RAN) infrastructure sharing has emerged as a promising solution for efficient spectrum utilization, capital and operational cost savings, improved MVNO penetration rates and lower broadband retail prices in both emerging and developed markets. This paper presents a tutorial on the testbed implementation of an active RAN sharing architecture, leveraging multi-vendor virtualized 5G and 4G core networks running on commodity hardware and proprietary 4G RAN equipment (eNodeB). Troubleshooting techniques used for different implementation challenges encountered are also presented in this contribution. The performance of the proposed architecture was validated using end-user quality of experience (QoE) as the key performance indicator. The results show no performance degradation when RAN sharing is being utilized.Item 5G network slice resource overbooking: An opportunity for telcos to boost their revenue(2022-08) Mamushiane, Lusani; Mwangama, J; Lysko, Albert A; Kobo, Hlabishi IThe global impact of COVID-19 has been unprecedented, with over-the-top (OTT) services consumption growing at a staggering rate. While OTT does consume revenue-generating data, OTT services are gradually substituting the traditional primary sources of revenue, voice and SMS services, with “freemium-based” alternatives such as WhatsApp and Telegram. This has driven telcos to reconsider their strategies and revenue sources. We believe that 5G network slicing (a type of 5G infrastructure sharing) is a potential solution that telcos could adopt to boost their revenue. In particular, this paper introduces the concept of network slice resource overbooking. We consider leveraging machine learning (ML) to maximise network resource utilisation which translates to maximum revenue gains for telcos. The concept of overbooking is unique and novel in network slicing. To realise this objective, we intend to build a mathematical model of the overbooking strategy, and integrate the model into a resource orchestration platform for evaluation on an emulated 3GPP (Release 16) compliant 5G testbed.Item A review of dynamic RRA techniques on 5G and beyond mobile networks(2024-07) Nokane, Boikobo; Isong, B; Masonta, Moshe TThe 5G mobile network aims to enhance wireless communication by providing faster and more reliable connectivity. Open radio access network (RAN) architecture, which offers flexibility and innovation in Radio Resource Allocation (RRA), is central for optimal network performance. However, traditional RRA methods fall short of meeting the complex demands of 5G due to scalability issues. Incorporating machine learning (ML) techniques into open RAN can enhance adaptability and intelligence, ensuring that 5G networks meet high performance and service quality standards. This paper presents a comprehensive review of ML-based and traditional RRA methods in meeting the evolving demands of wireless networks. Literature from relevant articles was selected and analysed to highlight the techniques used, trends, strengths, and limitations. The findings reveal the potential and transformative impact of ML on the future of wireless communications, particularly in achieving the key performance indicators and quality of service expected from 5G and beyond networks. It also shows that research in ML-based RRA methods is at its infancy stage and more research is needed to advance the technology.Item Accelerated design of a conformal strongly coupled magnetic resonance wireless power transfer(2021-11) Molefi, M; Markus, ED; Abu-Mahfouz, Adnan MIA Conformal Strongly Coupled Magnetic Resonance (CSCMR) wireless power transfer (WPT) system is a small footprint technology suitable for applications such as small low power sensors and implantable medical devices. These applications require specific WPT systems with certain physical dimensions that complement the size of the device. The design of these systems can be complex and require intense computational resources and long simulation times to conceptualise the optimal WPT system. This paper discusses the system architecture for CSCMR-WPT model. A quicker mathematical analysis to estimate the optimal CSCMR-WPT resonator loops and source/load loops is shown. The results confirm that this method can lead to quicker conceptualisation of a WPT model.Item Adaptive interference avoidance and mode selection scheme for D2D-enabled small cells in 5G-IIoT networks(2024-02) Gbadamosi, SA; Hancke, GP; Abu-Mahfouz, Adnan MISmall cell (SC) and device-to-device (D2D) communications can fulfill high-speed wireless communication in indoor industrial Internet-of-Things (IIoT) services and cell-edge devices. However, controlling interference is crucial for optimizing resource sharing (RS). To address this, we present an adaptive interference avoidance and mode selection (MS) framework that incorporates MS, channel gain factor (CGF), and power-allocation (PA) techniques to reduce reuse interference and increase the data rate of IIoT applications for 5G D2D-enabled SC networks. Our proposed approach employs a two-phase RS algorithm that minimizes the system's computational complexity while maximizing the network sum rate. First, we adaptively determine the D2D user mode for each cell based on the D2D pair channel gain ratios of the cellular and reuse mode. We compute the CGF for each cell with a D2D pair in reuse mode (RM) to select the reuse partner. Then we determine the optimal distributed power for the D2D users and IoT-user equipment using the Lagrangian dual decomposition method to maximize the network sum rate while limiting the interference power. The simulation results indicate that our proposed approach can maximize system throughput and signal-to-interference plus noise ratio, reducing signaling overhead compared to other algorithms.Item Addressing accessibility, affordability and sustainability barriers for broadband internet access and penetration in rural areas(2023-10) Ngwenya, SO; Heymann, R; Swart, TG; Lysko, Albert AIt has been said that the spread of Information and Communications Technology (ICT) and global interconnectedness has a great potential to accelerate human progress, to bridge the “digital divide” and to develop knowledge societies, in countries where it is available. However, it has also been determined that certain barriers, more prevalent in rural communities, pose an incessant impediment to the access and penetration trends of broadband internet networks and infrastructure in rural areas. These barriers have been identified as ‘accessibility’, ‘affordability’, and ‘sustainability’. It is hereby asserted, therefore, that a concerted effort is required to address these barriers, with great deliberation and haste, if digital inclusion is to be achieved in rural areas. This paper proposes a broadband internet system that is aimed at addressing these barriers, through a proposed model, which is intended to be implemented as a Proof of Concept (PoC) in the rural area of Mbazwana, located in the province of KwaZulu-Natal (KZN), South Africa (SA). The model has been presented to the community, and subsequently followed by a survey to determine the feasibility of the implementation thereof. This paper will present the proposed model, as well as the results obtained from the research conducted.Item Age invariant face recognition methods: A review(2021-12) Baruni, Kedimotse P; Mokoena, Nthabiseng ME; Veeraragoo, Mahalingam; Holder, Ross PFace recognition is one of the biometric technologies that is mostly used in surveillance and law enforcement for identification and verification. However, face recognition remains a challenge in verifying and identifying individuals due to significant facial appearance discrepancies caused by age progression. Especially in applications that verify individuals from their passports, driving licenses and finding missing children after decades. The most critical step in Age- Invariant Face Recognition (AIFR) is extracting rich discriminative age-invariant features for each individual in face recognition applications. The variation of facial appearance across aging can be solved using three methods, namely, generative (aging simulation), discriminative (feature-based) and deep neural networks methods. This work reviews and compares the state-of-art AIFR methods to address the work that has been done to minimize the effect of aging in face recognition application during the pre-processing and feature extraction stages to extract rich discriminative age-invariant features from facial images of individuals (subjects) captured at different ages, shortfalls and advantages of these methods. The novelty of this work lies in analyzing the state-of-art work that has been done during the pre-processing and/or feature extraction stages to minimize the difference between the query and enrolled face images captured over age progression.Item Analysis of energy-efficient techniques for SDWSN energy usage optimization(2020-11) Mathebula, I; Isong, B; Gasela, N; Abu-Mahfouz, Adnan MISoftware-Defined Wireless Sensor Networks (SDWSN) has received significant attention in recent years due to its inherent challenges such as network security, trust management, inefficient energy consumption, and so on. In particular, inefficient energy utilization has remained a core critical challenge as sensor nodes are naturally resource constraint and mostly deployed in unattended environments. This challenge has a direct impact on SDWSN performance and reliability. Albeit, several techniques have been proposed and developed to address the challenge in the traditional WSN and few for SDWSN, optimal efficient energy utilization is yet to be achieved. Therefore, this paper survey some of the energy efficiency techniques reported in the literature. The goal is to gain insights into these techniques, strategies employed, their pros and cons which could be utilized to design an efficient-energy mechanism for SDWSN. The findings obtained show that the existing approach ensures efficient energy utilization and improve network performance. While some have routing protocol and security mechanisms, fault tolerance, and battery fault detector mechanisms are not incorporated.Item Analysis of hierarchical cluster-based energy-aware routing protocols in WSNs for SDWSN application(2021-12) Molose, RSS; Isong, B; Dladlu, N; Abu-Mahfouz, Adnan MIEnergy consumption is a typical challenge that is inherent in wireless sensors networks (WSN). Despite the proposals and the development of several routing protocols and Software-defined WSN (SDWSN) introduction to address the challenge and others, optimal energy efficiency is far from being achieved. Therefore, this paper reviewed some of the selected relevant studies based on existing energy-efficient routing protocols to identify the protocols applied and the solutions offered to achieve efficient energy utilization in different applications. Findings show that several different energy-aware routing protocols exist in the WSN with subclasses, each having its strengths and weaknesses. Moreover, empirical evaluation was conducted on 3 commonly deployed hierarchical cluster-based protocols, LEACH, DEEC and TEEN to assess their network lifetime abilities. The results show TEEN protocol outperformed other protocols based on the number of alive nodes with an increase in the number of iterations. We, therefore, recommend the use of these protocols in designing an efficient energy-aware protocol for SDWSN controller placement.Item Antenna research directions for 6G: A brief overview through sampling literature(2021-03) Olwal, TO; Chuku, PN; Lysko, Albert AAntennas are a critical component in any wireless link. The significance of their role continues to grow, together with the rise of machine-to-machine (M2M) communications and telecommunications starting to move from the fourth generation (4G, or Long-Term Evolution, LTE) to the fifth generation (5G) and beyond 5G (B5G), and also due to the prominence of the convenience promised by the ubiquitous wireless communications. The antennas, or more precisely their large size and appearance, also become a subject of public debate, leading to the need for better antennas, which are can do both: provide high performance and offer visually attractive or nearly invisible/transparent designs. This work reviews several key research trends in antennas to fulfill these demands for the fifth generation of communications (5G) and beyond, especially 6G, and considers novel antenna techniques and designs needed to increase the smartness of the antenna systems and to provide improved beamforming and security.Item Antenna research directions for 6G: A brief overview through sampling literature(2021-03) Olwal, TO; Chuku, PN; Lysko, Albert AAntennas are a critical component in any wireless link. The significance of their role continues to grow, together with the rise of machine-to-machine (M2M) communications and telecommunications starting to move from the fourth generation (4G, or Long-Term Evolution, LTE) to the fifth generation (5G) and beyond 5G (B5G), and also due to the prominence of the convenience promised by the ubiquitous wireless communications. The antennas, or more precisely their large size and appearance, also become a subject of public debate, leading to the need for better antennas, which are can do both: provide high performance and offer visually attractive or nearly invisible/transparent designs. This work reviews several key research trends in antennas to fulfill these demands for the fifth generation of communications (5G) and beyond, especially 6G, and considers novel antenna techniques and designs needed to increase the smartness of the antenna systems and to provide improved beamforming and security.Item Approximating a Zulu GF concrete syntax with a neural network for natural language understanding(2021-09) Marais, LauretteMultilingual Grammatical Framework (GF) domain grammars have been used in a variety of different applications, including question answering, where concrete syntaxes for parsing questions and generating answers are typically required for each supported language. In low-resourced settings, grammar engineering skills, appropriate knowledge of the use of supported languages in a domain, and appropriate domain data are scarce. This presents a challenge for developing domain specific concrete syntaxes for a GF application grammar, on the one hand, while on the other hand, machine learning techniques for performing question answering are hampered by a lack of sufficient data. This paper presents a method for overcoming the two challenges of scarce or costly grammar engineering skills and lack of data for machine learning. A Zulu resource grammar is leveraged to create sufficient data to train a neural network that approximates a Zulu concrete syntax for parsing questions in a proof-of-concept question-answering system.Item Assessing the effectiveness of 4IR strategy on South African township economy: Smart Township perspective(2021-12) Mathibe, Motshedisi; Mochenje, Tonderai; Masonta, Moshe TAs the Coronavirus disease (COVID-19) pandemic changed how people and business interact, its impact severely impacted the global economy. The government imposed heavy lockdown regulations further damaged an already struggling informal sector economy as many livelihoods and informal businesses within the townships came to a halt. Though the South African government introduced various financial relief through the R500 billion support grant, there are township entrepreneurs who could not access the government grant to sustain their everyday business operations. Despite the invisibility of the informal sector, it is considered to contribute about 5 – 30% of the Gross Domestic Product (GDP). Hence, the need to develop a smart township strategy for the township economy will better prepare the township entrepreneurs with a creative and innovative way to survive any future pandemics. This chapter aims to identify factors and enablers that can catalyse critical and innovative thinking to safeguard the township economy and assess the maturity level of the national fourth industrial revolution (4IR) strategy towards building on a South African smart township economy. A digital infrastructure value chain model for building the smart township is proposed. The model also identified digital skills training and upskilling township entrepreneurs to reposition and align themselves within the smart township ecosystems. Furthermore, the chapter proposed key recommendations on how the policy makers could leverage on the 4IR strategy in enabling the township entrepreneurs to actively participate in the digital economy. The objective and significance of this chapter is to assist the policy makers (at provincial and local government level) in understanding both theoretically and practically technological innovation strategies and methods to adopt post-pandemic.Item Automatic number plate recognition for remote gate automation: An edge computing approach(2021-06) Le Roux, E; Ndiaye, M; Abu-Mahfouz, Adnan MIThe article proposes a gate automation system based on automatic number plate recognition (ANPR). The system uses a convolutional neural network (CNN) to identify and classify each number plate which is then compared to a database of authorized numbers before a gate is opened. Once the gate is opened an extra feature of alerting the farm settlement owner via SMS and LoRa is added. What this work tries to do is demonstrate the ability of an IoT-edge device to perform complex image processing computations simply by adding more computing resources at the edge. Edge computing suggests adding a powerful edge device to support edge devices however, we envision the extra computing power can be extended and embedded in the edge devices themselves. To demonstrate this we equip our edge device system with a single board computer to provide the needed computing resources for ANPR.Item AwezaMed: A multilingual, multimodal speech-to-speech translation application for maternal health care(2020-07) Marais, Laurette; Louw, Johannes A; Badenhorst, Jacob AC; Calteaux, Karen V; Wilken, Ilana; Van Niekerk, Nina; Stein, GlennThe language contexts of multilingual developing countries such as South Africa are often characterised by communication challenges resulting from language differences. AwezaMed is a multilingual, multimodal speech-to-speech translation application for the health care domain, which was designed to assist in bridging communication barriers and mitigate the risks of miscommunication. The application focuses on the domain of maternal health care. It uses English as source language and Afrikaans, isiXhosa and isiZulu as target languages to enable health care providers to communicate with patients in their own language. It incorporates automatic speech recognition, machine translation and text-to-speech to deliver speech-to-speech translation functionality in a scalable way via a REST API to an Android mobile application. It is being piloted at various health care facilities across South Africa.Item The benefits of digital transformation addressing the hindrances and challenges of e-government services in South Africa: A scoping review(2022-05) Maremi, Keneilwe J; Thulare, Tumiso; Herselman, Martha EThe objective of this paper is to provide insight into how the successful implementation of Digital Transformation (DT) can help address the challenges and hindrances in South Africa's e-Government. It is essential to aid South Africa's seamless transition to e-Government. A scoping review was conducted to identify how the benefits of digital transformation can be aligned with addressing the hindrances and challenges of e-Government services in South Africa. A study was also conducted at 12 prioritised South African government departments through expert interviews to identify hindrances in implementing e-Government services. The study found that the main hindrances to e-Government were the lack of governance between departments, the integration of legacy systems, insufficient funding for e-Government projects, and various systems and applications across government. The paper recommends that the government should consider factors hindering the implementation of e-Government from realising the benefits of DT.Item Beyond reality: An application of extended reality and blockchain in the metaverse(2023-07) Moodley, Jayandren; Meiring, Gys AM; Mtetwa, Njabulo S; Motuba, Obakeng M; Mphephu, Mutali; Maluleke, Mikateko SG; Balmahoon, ReevanaThe convergence of Fourth Industrial Revolution (4IR) technologies and Web2 to Web3 transformation, presents significant benefits and opportunities for industry. This study explores the integrated benefits of Extended Reality (XR) and Distributed Ledger Technology (DLT) in a Metaverse application for virtual consulting. Since XR enhances collaboration using visualization, and DLT ensures transactional security and privacy, an overview of XR and DLT technology is provided, highlighting their specific benefits and challenges concerning Remote Health and Wellness consulting. The paper proposes a Metaverse solution to leverage these benefits, enabling more affordable and accessible healthcare consulting in developing economies. A key outcome of the research is to develop a metaverse prototype that bridges the gap between Web 2.0 and Web 3.0 technologies. By doing so, it aims to improve usability for end-users, drive the adoption of XR and Blockchain, generate new business models, and unlock new revenue streams for industry and underserved communities.Item Bringing children’s dictionaries to digital life(2023-11) Wilken, Ilana; Marais, LauretteSouth Africa is facing a literacy crisis, with the latest PIRLS results showing that 8 out of 10 learners cannot read for basic comprehension by the time they leave the foundation phase. In this climate, the development of strategies to assist educators in harnessing the available resources to maximum effect is needed. However, most teaching resources are not digitally available, and even fewer are available in formats that make them readily available for use in natural language applications. The Ngiyaqonda! project aims to provide an interactive, multimodal digital environment within which learners can practise their reading and writing skills. Computational grammars and speech technology are combined in a mobile application to facilitate the transition from oral competency in a language to written competency. In this paper, we show how words from a multilingual dictionary for foundation phase learners can be brought to digital life within the Ngiyaqonda! application to enhance the learning experience of core concepts and vocabulary. We use the official foundation phase CAPS English isiZulu dictionary (Mbatha et al. 2018) to ensure that the content of the computational grammars is aligned with relevant learning outcomes. The result is a fully parallel, multilingual computational grammar that is aligned at the semantic level, ready to be included in the Ngiyaqonda! application.Item Building a dataset for misinformation detection in the low-resource language(2024-05) Mukwevho, M; Rananga, S; Mbooi, Mahlatse S; Isong, B; Marivate, VIn the modern digital age, the widespread dissemination of misinformation has become a serious issue. Most focus in identifying misinformation online has been targeted at the English language in contrast to low-resource languages like Tshivenda. In this paper, we create a new dataset for news in the Tshivenda language to assist in developing resources for misinformation in the language. In our proposed methodology, we leveraged conditional random fields (CRF), gated recurrent unit (GRU), and long short-term memory (LSTM) to collect and annotate social media content. By applying these deep learning approaches to existing Tshivenda posts, we can assess their effectiveness for identifying false news in a low-resource language setting. This paper emphasises the vital need to combat misinformation in languages with limited resources, such as Tshivenda. Through the creation of a specialised dataset and the use of advanced techniques, it aims to address the problem of the spread of misinformation in low represented language communities.Item Challenges of user data privacy in self-sovereign identity verifiable credentials for autonomous building access during the COVID-19 pandemic(2024-03) Naicker, Denver; Moodley, MackaylanSelf-sovereign identity is an emerging blockchain technology field. Its use cases primarily surround identity and credential management and advocate the privacy of user details during the verification process. Our endeavor was to test and implement the features promoted for self-sovereign identity through open- and closed-source frameworks utilizing a scenario of building access management to adhere to health risk and safety questionnaires during the COVID-19 pandemic. Our investigation identifies whether user data privacy could be ensured through verifiable credentials and whether business practices would need to evolve to mitigate storing personal data centrally.