Agent-Based Modeling and Simulation for Transmission Dynamics and Surveillance of Dengue: Conceptual and Design Model
- Pascoe, Luba, Nyambo, Devotha G, Bradshaw, Karen L, Clemen, Thomas
- Authors: Pascoe, Luba , Nyambo, Devotha G , Bradshaw, Karen L , Clemen, Thomas
- Date: 2023
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/440200 , vital:73756 , xlink:href="https://doi.org/10.1109/AFRICON55910.2023.10293299"
- Description: African countries need to strengthen surveillance and control of arboviral diseases such as dengue due to increased outbreaks and spread of arboviruses. Climatic, socio-environment, and ecological variables influence the spread of dengue fever in Sub-Saharan Africa. This paper presents an Agent-Based conceptual and design model for dengue fever developed using the Multi-Agent Research and Simulation (MARS) framework. The study analyzes dengue fever's spatial distribution and identifies the causal relationship between the disease and its climatic and environmental variables. Agent-based modeling (ABM) was used to comprehend the spatial patterns of variation to determine the ecological association between the observed spatio-temporal variations in dengue fever. The domain and design model of an ABM for the surveillance of dengue fever is presented based on the Overview, Design Concepts, and Details (ODD) protocol. Model input parameters and input data for the study area are also presented. The dengue ABM can be adopted and reused for modeling other diseases and other complex problems from different domains while ensuring that their unique characteristics and appropriate modifications are considered to ensure the model's validity and relevance to the new context.
- Full Text:
- Date Issued: 2023
- Authors: Pascoe, Luba , Nyambo, Devotha G , Bradshaw, Karen L , Clemen, Thomas
- Date: 2023
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/440200 , vital:73756 , xlink:href="https://doi.org/10.1109/AFRICON55910.2023.10293299"
- Description: African countries need to strengthen surveillance and control of arboviral diseases such as dengue due to increased outbreaks and spread of arboviruses. Climatic, socio-environment, and ecological variables influence the spread of dengue fever in Sub-Saharan Africa. This paper presents an Agent-Based conceptual and design model for dengue fever developed using the Multi-Agent Research and Simulation (MARS) framework. The study analyzes dengue fever's spatial distribution and identifies the causal relationship between the disease and its climatic and environmental variables. Agent-based modeling (ABM) was used to comprehend the spatial patterns of variation to determine the ecological association between the observed spatio-temporal variations in dengue fever. The domain and design model of an ABM for the surveillance of dengue fever is presented based on the Overview, Design Concepts, and Details (ODD) protocol. Model input parameters and input data for the study area are also presented. The dengue ABM can be adopted and reused for modeling other diseases and other complex problems from different domains while ensuring that their unique characteristics and appropriate modifications are considered to ensure the model's validity and relevance to the new context.
- Full Text:
- Date Issued: 2023
Improved palmprint segmentation for robust identification and verification
- Brown, Dane L, Bradshaw, Karen L
- Authors: Brown, Dane L , Bradshaw, Karen L
- Date: 2019
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/460576 , vital:75966 , xlink:href="https://doi.org/10.1109/SITIS.2019.00013"
- Description: This paper introduces an improved approach to palmprint segmentation. The approach enables both contact and contactless palmprints to be segmented regardless of constraining finger positions or whether fingers are even depicted within the image. It is compared with related systems, as well as more comprehensive identification tests, that show consistent results across other datasets. Experiments include contact and contactless palmprint images. The proposed system achieves highly accurate classification results, and highlights the importance of effective image segmentation. The proposed system is practical as it is effective with small or large amounts of training data.
- Full Text:
- Date Issued: 2019
- Authors: Brown, Dane L , Bradshaw, Karen L
- Date: 2019
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/460576 , vital:75966 , xlink:href="https://doi.org/10.1109/SITIS.2019.00013"
- Description: This paper introduces an improved approach to palmprint segmentation. The approach enables both contact and contactless palmprints to be segmented regardless of constraining finger positions or whether fingers are even depicted within the image. It is compared with related systems, as well as more comprehensive identification tests, that show consistent results across other datasets. Experiments include contact and contactless palmprint images. The proposed system achieves highly accurate classification results, and highlights the importance of effective image segmentation. The proposed system is practical as it is effective with small or large amounts of training data.
- Full Text:
- Date Issued: 2019
Major security incidents since 2014: an African perspective
- Van Heerden, Renier, Von Solms, Sune, Vorster, Johannes
- Authors: Van Heerden, Renier , Von Solms, Sune , Vorster, Johannes
- Date: 2018
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68291 , vital:29234 , https://ieeexplore.ieee.org/abstract/document/8417326/
- Description: Publisher version , The integration of technology in the modern society provides many benefits, but with increased connectivity comes increased risk where governments, businesses and individuals are vulnerable to a variety of cyber-attacks. Many of the large information security attacks of the last decade can be seen as an attack on 'foreign” systems or individuals when viewed from an African perspective, with no direct impact on an individual in Africa. However, information security experts in Africa states that although some of these attacks might not have had a direct impact of the African individual, but never the less should not be ignored as it does indirectly influence the African individual. The experts state that even if the individuals or businesses are not directly influenced by an attack, it should not be ignored as similar attacks might influence them in the future. They emphasise that these attacks should improve their cybersecurity awareness and behaviour, in order to prevent similar attacks from impacting them.
- Full Text: false
- Date Issued: 2018
- Authors: Van Heerden, Renier , Von Solms, Sune , Vorster, Johannes
- Date: 2018
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68291 , vital:29234 , https://ieeexplore.ieee.org/abstract/document/8417326/
- Description: Publisher version , The integration of technology in the modern society provides many benefits, but with increased connectivity comes increased risk where governments, businesses and individuals are vulnerable to a variety of cyber-attacks. Many of the large information security attacks of the last decade can be seen as an attack on 'foreign” systems or individuals when viewed from an African perspective, with no direct impact on an individual in Africa. However, information security experts in Africa states that although some of these attacks might not have had a direct impact of the African individual, but never the less should not be ignored as it does indirectly influence the African individual. The experts state that even if the individuals or businesses are not directly influenced by an attack, it should not be ignored as similar attacks might influence them in the future. They emphasise that these attacks should improve their cybersecurity awareness and behaviour, in order to prevent similar attacks from impacting them.
- Full Text: false
- Date Issued: 2018
The pattern-richness of graphical passwords
- Vorster, Johannes, Van Heerden, Renier, Irwin, Barry V W
- Authors: Vorster, Johannes , Van Heerden, Renier , Irwin, Barry V W
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68322 , vital:29238 , https://doi.org/10.1109/ISSA.2016.7802931
- Description: Publisher version , Conventional (text-based) passwords have shown patterns such as variations on the username, or known passwords such as “password”, “admin” or “12345”. Patterns may similarly be detected in the use of Graphical passwords (GPs). The most significant such pattern - reported by many researchers - is hotspot clustering. This paper qualitatively analyses more than 200 graphical passwords for patterns other than the classically reported hotspots. The qualitative analysis finds that a significant percentage of passwords fall into a small set of patterns; patterns that can be used to form attack models against GPs. In counter action, these patterns can also be used to educate users so that future password selection is more secure. It is the hope that the outcome from this research will lead to improved behaviour and an enhancement in graphical password security.
- Full Text: false
- Date Issued: 2016
- Authors: Vorster, Johannes , Van Heerden, Renier , Irwin, Barry V W
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68322 , vital:29238 , https://doi.org/10.1109/ISSA.2016.7802931
- Description: Publisher version , Conventional (text-based) passwords have shown patterns such as variations on the username, or known passwords such as “password”, “admin” or “12345”. Patterns may similarly be detected in the use of Graphical passwords (GPs). The most significant such pattern - reported by many researchers - is hotspot clustering. This paper qualitatively analyses more than 200 graphical passwords for patterns other than the classically reported hotspots. The qualitative analysis finds that a significant percentage of passwords fall into a small set of patterns; patterns that can be used to form attack models against GPs. In counter action, these patterns can also be used to educate users so that future password selection is more secure. It is the hope that the outcome from this research will lead to improved behaviour and an enhancement in graphical password security.
- Full Text: false
- Date Issued: 2016
The current state of digital forensic practitioners in South Africa
- Jordaan, Jason, Bradshaw, Karen L
- Authors: Jordaan, Jason , Bradshaw, Karen L
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , book
- Identifier: http://hdl.handle.net/10962/475285 , vital:77792 , ISBN 9781479977550 , https://doi.org/10.1109/ISSA.2015.7335068
- Description: Recent high profile court trials around the world, including South Africa, have highlighted the importance of forensic science evidence in court. They have also show what can happen when forensic science is handled poorly in court leading to incorrect convictions or acquittals. Most often the problems have been linked to the qualifications, training, competency and experience of the forensic practitioners who examined and analysed the evidence. With digital forensics being recognised as a forensics science and criminal trials such as Casey Anthony and Julia Amero dominated by errors in the digital forensics process attributed to the examiners, it is crucial to understand what the current situation is in South Africa with regards local digital forensic practitioners, so as to identify any strengths or shortcomings which could impact on digital evidence in a court of law. The research focused on understanding the academic qualifications, digital forensics training, competency, and experience of South African digital forensic practitioners. General trends were identified through the research showing that South African digital forensic practitioners often lacked the necessary academic qualifications, training, competency and experience required of a digital forensics practitioner, raising concerns about the quality of digital forensics practice in South Africa. When contrasted against international standards, the research identified areas of improvement, and suggested potential remedial actions to address the situation.
- Full Text:
- Date Issued: 2015
- Authors: Jordaan, Jason , Bradshaw, Karen L
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , book
- Identifier: http://hdl.handle.net/10962/475285 , vital:77792 , ISBN 9781479977550 , https://doi.org/10.1109/ISSA.2015.7335068
- Description: Recent high profile court trials around the world, including South Africa, have highlighted the importance of forensic science evidence in court. They have also show what can happen when forensic science is handled poorly in court leading to incorrect convictions or acquittals. Most often the problems have been linked to the qualifications, training, competency and experience of the forensic practitioners who examined and analysed the evidence. With digital forensics being recognised as a forensics science and criminal trials such as Casey Anthony and Julia Amero dominated by errors in the digital forensics process attributed to the examiners, it is crucial to understand what the current situation is in South Africa with regards local digital forensic practitioners, so as to identify any strengths or shortcomings which could impact on digital evidence in a court of law. The research focused on understanding the academic qualifications, digital forensics training, competency, and experience of South African digital forensic practitioners. General trends were identified through the research showing that South African digital forensic practitioners often lacked the necessary academic qualifications, training, competency and experience required of a digital forensics practitioner, raising concerns about the quality of digital forensics practice in South Africa. When contrasted against international standards, the research identified areas of improvement, and suggested potential remedial actions to address the situation.
- Full Text:
- Date Issued: 2015
Delivering a personalised video service using IPTV
- Shibeshi, Zelalem S, Ndakunda, Shange, Terzoli, Alfredo, Bradshaw, Karen
- Authors: Shibeshi, Zelalem S , Ndakunda, Shange , Terzoli, Alfredo , Bradshaw, Karen
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/477078 , vital:78043
- Description: Video oriented services are taking the lead in terms of revenue in the current Internet environment. In order to tap this revenue, Telcos are resorting to serious measures such as moving to Next Generation Network (NGN) where they can provide QoS for services that demand this feature, such as, IPTV. IPTV is more than just what its name implies and includes various types of additional services to make the TV a better entertainment and communication environment. Various innovative IPTV services have been proposed and developed by researchers and practitioners, including personalized advertisement, personalized EPG (Electronic Program Guide), and personalized VoD (Video on Demand). In this paper we introduce a new IPTV service called, the personalized dynamic video delivery service, which sends new video alerts (like breaking news alert) to subscribed users and notifies them when the video is available. If desired, users can watch the video automatically by switching from what they are currently watching without requiring explicitly a new video setup. Users can configure their profile and also set a policy on the way they wish to be notified and the types of video they wish to be alerted to. The paper describes the issues surrounding the delivery of this service and presents the architecture and the various open source technologies that are used to develop the service.
- Full Text:
- Date Issued: 2011
- Authors: Shibeshi, Zelalem S , Ndakunda, Shange , Terzoli, Alfredo , Bradshaw, Karen
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/477078 , vital:78043
- Description: Video oriented services are taking the lead in terms of revenue in the current Internet environment. In order to tap this revenue, Telcos are resorting to serious measures such as moving to Next Generation Network (NGN) where they can provide QoS for services that demand this feature, such as, IPTV. IPTV is more than just what its name implies and includes various types of additional services to make the TV a better entertainment and communication environment. Various innovative IPTV services have been proposed and developed by researchers and practitioners, including personalized advertisement, personalized EPG (Electronic Program Guide), and personalized VoD (Video on Demand). In this paper we introduce a new IPTV service called, the personalized dynamic video delivery service, which sends new video alerts (like breaking news alert) to subscribed users and notifies them when the video is available. If desired, users can watch the video automatically by switching from what they are currently watching without requiring explicitly a new video setup. Users can configure their profile and also set a policy on the way they wish to be notified and the types of video they wish to be alerted to. The paper describes the issues surrounding the delivery of this service and presents the architecture and the various open source technologies that are used to develop the service.
- Full Text:
- Date Issued: 2011
Using an RTSP Proxy to implement the IPTV Media Function via a streaming server
- Shibeshi, Zelalem S, Terzoli, Alfredo, Bradshaw, Karen L
- Authors: Shibeshi, Zelalem S , Terzoli, Alfredo , Bradshaw, Karen L
- Date: 2010
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/477122 , vital:78047 , xlink:href="https://doi.org/10.1109/ICUMT16976.2010"
- Description: Multimedia in IMS, including IPTV, is handled by a separate unit, the Media Function (MF), which is made up of Media Control and Media Delivery Functions (MCF and MDF). According to the different specifications of an IMS based IPTV architecture, the User Equipment (UE) is expected to use the RTSP protocol as a media control protocol to interact with the MCF, and gets delivery of media from the MDF using the RTP protocol. This generally means that the streaming session is initiated from the media controller on behalf of the user but the delivery of media is sent to the UE from the media deliverer (media server). Due to lack of free and open source Media Servers and on the contrary, the availability of free and open source Streaming Servers, the ideal choice for the delivery of media in multimedia services, including IPTV, by the research community are Streaming Servers. Nevertheless, because of denial of service attack and other issues, most streaming servers do not allow different locations for the session setup request and the delivery of media of the streaming session. This makes it difficult to have a separate media control unit for IPTV service in IMS, if one wants to use a streaming server as an MDF unit. For this purpose we propose another component (an RTSP proxy and relay unit) to be part of the IPTV Media Function (MF). The unit will be used to mediate between the MFC and MDF and will properly relay media control (RTSP) commands from the UE and MFC to the MDF and RTP packets from the MDF to the UE. This, we believe, will facilitate the development of an IPTV service using readily available open source streaming servers. In this paper we show how this RTSP proxy and relay unit can be integrated into the Media Function of the IPTV architecture to ease the media delivery process of IMS based IPTV service.
- Full Text:
- Date Issued: 2010
- Authors: Shibeshi, Zelalem S , Terzoli, Alfredo , Bradshaw, Karen L
- Date: 2010
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/477122 , vital:78047 , xlink:href="https://doi.org/10.1109/ICUMT16976.2010"
- Description: Multimedia in IMS, including IPTV, is handled by a separate unit, the Media Function (MF), which is made up of Media Control and Media Delivery Functions (MCF and MDF). According to the different specifications of an IMS based IPTV architecture, the User Equipment (UE) is expected to use the RTSP protocol as a media control protocol to interact with the MCF, and gets delivery of media from the MDF using the RTP protocol. This generally means that the streaming session is initiated from the media controller on behalf of the user but the delivery of media is sent to the UE from the media deliverer (media server). Due to lack of free and open source Media Servers and on the contrary, the availability of free and open source Streaming Servers, the ideal choice for the delivery of media in multimedia services, including IPTV, by the research community are Streaming Servers. Nevertheless, because of denial of service attack and other issues, most streaming servers do not allow different locations for the session setup request and the delivery of media of the streaming session. This makes it difficult to have a separate media control unit for IPTV service in IMS, if one wants to use a streaming server as an MDF unit. For this purpose we propose another component (an RTSP proxy and relay unit) to be part of the IPTV Media Function (MF). The unit will be used to mediate between the MFC and MDF and will properly relay media control (RTSP) commands from the UE and MFC to the MDF and RTP packets from the MDF to the UE. This, we believe, will facilitate the development of an IPTV service using readily available open source streaming servers. In this paper we show how this RTSP proxy and relay unit can be integrated into the Media Function of the IPTV architecture to ease the media delivery process of IMS based IPTV service.
- Full Text:
- Date Issued: 2010
- «
- ‹
- 1
- ›
- »