Skip to main content

Research Repository

Advanced Search

All Outputs (101)

Knowledge4COVID-19: A semantic-based approach for constructing a COVID-19 related knowledge graph from various sources and analyzing treatments’ toxicities (2022)
Journal Article
Sakor, A., Jozashoori, S., Niazmand, E., Rivas, A., Bougiatiotis, K., Aisopos, F., …Vidal, . M. (2023). Knowledge4COVID-19: A semantic-based approach for constructing a COVID-19 related knowledge graph from various sources and analyzing treatments’ toxicities. Journal of Web Semantics, 75, Article 100760. https://doi.org/10.1016/j.websem.2022.100760

In this paper, we present Knowledge4COVID-19, a framework that aims to showcase the power of integrating disparate sources of knowledge to discover adverse drug effects caused by drug–drug interactions among COVID-19 treatments and pre-existing condi... Read More about Knowledge4COVID-19: A semantic-based approach for constructing a COVID-19 related knowledge graph from various sources and analyzing treatments’ toxicities.

A comparative study of performance in three bachelor’s degrees of information system (IS) streams: Implications on delivery (2022)
Journal Article
Eyitayo, O. T., & Rammidi, G. (2022). A comparative study of performance in three bachelor’s degrees of information system (IS) streams: Implications on delivery. Journal of ICT Development, Applications and Research, 3(1/2), 81-96. https://doi.org/10.47524/jictdar.v3i1.82

This study describes the difference between student performances across three Information System streams (Business Information Systems, Computer Information Systems, and Information Management) in the University of Botswana. A quantitative approach w... Read More about A comparative study of performance in three bachelor’s degrees of information system (IS) streams: Implications on delivery.

Intrusion detection framework for the Internet of Things using a dense random neural network (2021)
Journal Article
Latif, S., Huma, Z. E., Jamal, S. S., Ahmed, F., Ahmad, J., Zahid, A., …Abbasi, Q. H. (2022). Intrusion detection framework for the Internet of Things using a dense random neural network. IEEE Transactions on Industrial Informatics, 18(9), 6435-6444. https://doi.org/10.1109/TII.2021.3130248

The Internet of Things (IoT) devices, networks, and applications have become an integral part of modern societies. Despite their social, economic, and industrial benefits, these devices and networks are frequently targeted by cybercriminals. Hence, I... Read More about Intrusion detection framework for the Internet of Things using a dense random neural network.

Multicast DIS attack mitigation in RPL-based IoT-LLNs (2021)
Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021). Multicast DIS attack mitigation in RPL-based IoT-LLNs. Journal of Information Security and Applications, 61, Article 102939. https://doi.org/10.1016/j.jisa.2021.102939

The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was standardised by the IETF ROLL Working Group to address the routing issues in the Internet of Things (IoT) Low-Power and Lossy Networks (LLNs). RPL builds and maintains a Destination... Read More about Multicast DIS attack mitigation in RPL-based IoT-LLNs.

On the involution fixity of simple groups (2021)
Journal Article
Burness, T. C., & Covato, E. (2021). On the involution fixity of simple groups. Proceedings of the Edinburgh Mathematical Society, 64(2), 408-426. https://doi.org/10.1017/S0013091521000237

Let be a finite permutation group of degree and let be the involution fixity of, which is the maximum number of fixed points of an involution. In this paper, we study the involution fixity of almost simple primitive groups whose socle is an alternati... Read More about On the involution fixity of simple groups.

Fault-tolerant AI-driven intrusion detection system for the Internet of Things (2021)
Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021). Fault-tolerant AI-driven intrusion detection system for the Internet of Things. International Journal of Critical Infrastructure Protection, 34, Article 100436. https://doi.org/10.1016/j.ijcip.2021.100436

Internet of Things (IoT) has emerged as a key component of all advanced critical infrastructures. However, with the challenging nature of IoT, new security breaches have been introduced, especially against the Routing Protocol for Low-power and Lossy... Read More about Fault-tolerant AI-driven intrusion detection system for the Internet of Things.

Deep neural network-based application partitioning and scheduling for hospitals and medical enterprises using IoT assisted mobile fog cloud (2021)
Journal Article
Lakhan, A., Mastoi, Q., Elhoseny, M., Suleman, M., Mazin, M. &., Mohammed, A., …Mohammed, M. A. (2022). Deep neural network-based application partitioning and scheduling for hospitals and medical enterprises using IoT assisted mobile fog cloud. Enterprise Information Systems, 16(7), Article 1883122. https://doi.org/10.1080/17517575.2021.1883122

These days, fog-cloud based healthcare application partitioning techniques have been growing progressively. However, existing static fog-cloud based application partitioning methods are static and cannot adopt dynamic changes in the dynamic environme... Read More about Deep neural network-based application partitioning and scheduling for hospitals and medical enterprises using IoT assisted mobile fog cloud.

Trust-aware and cooperative routing protocol for IoT security (2020)
Journal Article
Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2020). Trust-aware and cooperative routing protocol for IoT security. Journal of Information Security and Applications, 52, Article 102467. https://doi.org/10.1016/j.jisa.2020.102467

The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to... Read More about Trust-aware and cooperative routing protocol for IoT security.

Decision support process for selection of an optimal enterprise architecture framework for e-government implementation (2019)
Journal Article
Mokone, C. B., Eyitayo, O. T., & Masizana, A. (2019). Decision support process for selection of an optimal enterprise architecture framework for e-government implementation. Journal of e-Government Studies and Best Practices, Article 569505. https://doi.org/10.5171/2019.569505

The paper discusses the findings of the case study of applying multiple-criteria decision-making (MCDM) method to select attributes of the Enterprise Architecture (EA) frameworks for an e-Government implementation in a developing country. The paper f... Read More about Decision support process for selection of an optimal enterprise architecture framework for e-government implementation.

A streaming dataflow engine for sparse matrix-vector multiplication using high-level synthesis (2019)
Journal Article
Hosseinabady, M., & Nunez-Yanez, J. L. (2020). A streaming dataflow engine for sparse matrix-vector multiplication using high-level synthesis. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(6), 1272-1285. https://doi.org/10.1109/TCAD.2019.2912923

Using high-level synthesis techniques, this paper proposes an adaptable high-performance streaming dataflow engine for sparse matrix dense vector multiplication (SpMV) suitable for embedded FPGAs. As the SpMV is a memory-bound algorithm, this engine... Read More about A streaming dataflow engine for sparse matrix-vector multiplication using high-level synthesis.

Development of machine learning models to predict student performance in computer literacy courses (2018)
Journal Article
Anderson, G., & Eyitayo, O. T. Development of machine learning models to predict student performance in computer literacy courses. International Review on Computers and Software, 13(1), https://doi.org/10.15866/irecos.v13i1.16863

This paper reports on a study carried out to build machine learning models for the purpose of predicting student performance in a second course of a two-course sequence, based on performance in various aspects of the first course’s exam. Detailed dat... Read More about Development of machine learning models to predict student performance in computer literacy courses.

Dynamic energy management of FPGA accelerators in embedded systems (2018)
Journal Article
Hosseinabady, M., & Nunez-Yanez, J. L. (2018). Dynamic energy management of FPGA accelerators in embedded systems. ACM Transactions on Embedded Computing Systems, 17(3), Article 63. https://doi.org/10.1145/3182172

In this article, we investigate how to utilise an Field-Programmable Gate Array (FPGA) in an embedded system to save energy. For this purpose, we study the energy efficiency of a hybrid FPGA-CPU device that can switch task execution between hardware... Read More about Dynamic energy management of FPGA accelerators in embedded systems.

Simultaneous multiprocessing in a software-defined heterogeneous FPGA (2018)
Journal Article
Nunez-Yanez, J., Amiri, S., Hosseinabady, M., Rodríguez, A., Asenjo, R., Navarro, A., …Gran, R. (2019). Simultaneous multiprocessing in a software-defined heterogeneous FPGA. Journal of Supercomputing, 75(8), 4078-4095. https://doi.org/10.1007/s11227-018-2367-9

Heterogeneous chips that combine CPUs and FPGAs can distribute processing so that the algorithm tasks are mapped onto the most suitable processing element. New software-defined high-level design environments for these chips use general purpose langua... Read More about Simultaneous multiprocessing in a software-defined heterogeneous FPGA.

Secure and privacy-aware traffic information as a service in VANET-based clouds (2015)
Journal Article
Hussain, R., Rezaeifar, Z., Lee, Y. H., & Oh, H. (2015). Secure and privacy-aware traffic information as a service in VANET-based clouds. Pervasive and Mobile Computing, 24, 194-209. https://doi.org/10.1016/j.pmcj.2015.07.007

The multitude of applications and services in Vehicular Ad hoc NETwork (VANET) and cloud computing technology that are dreamed of in the near future, are visible today. VANET applications are set to explode in the next couple of years as a result of... Read More about Secure and privacy-aware traffic information as a service in VANET-based clouds.

Energy optimization in commercial FPGAs with voltage, frequency and logic scaling (2015)
Journal Article
Luis Nunez-Yanez, J., Hosseinabady, M., & Beldachi, A. (2016). Energy optimization in commercial FPGAs with voltage, frequency and logic scaling. IEEE Transactions on Computers, 65(5), 1484-1493. https://doi.org/10.1109/TC.2015.2435771

This paper investigates the energy reductions possible in commercially available FPGAs configured to support voltage, frequency and logic scalability combined with power gating. Voltage and frequency scaling is based on in-situ detectors that allow t... Read More about Energy optimization in commercial FPGAs with voltage, frequency and logic scaling.

Data partitioning for semantic web (2014)
Journal Article
Padiya, T., Ahir, M., Bhise, M., & Chaudhary, S. (2014). Data partitioning for semantic web. International Journal of Computer and Communication Technology, 5(3), 32-35. https://doi.org/10.47893/IJCCT.2014.1247

Semantic web database is an RDF database. Tremendous increase can be seen in semantic web data, as real life applications of semantic web are using this data. Efficient management of this data at a larger scale, and efficient query performance are th... Read More about Data partitioning for semantic web.

Enterprise resource planning (ERP) systems - Is Botswana winning? A question on culture effects (2014)
Journal Article
Eyitayo, O. (2014). Enterprise resource planning (ERP) systems - Is Botswana winning? A question on culture effects. Issues in Informing Science and Information Technology, 11, 47-55. https://doi.org/10.28945/1979

As the economy of the country is improving, organisations across Botswana are increasing their investments in Enterprise Resource Planning (ERP) technology as a way of helping in the growth of their business. Some institutions that have implemented E... Read More about Enterprise resource planning (ERP) systems - Is Botswana winning? A question on culture effects.

On the prime graph of simple groups (2014)
Journal Article
Burness, T. C., & Covato, E. (2015). On the prime graph of simple groups. Bulletin of the Australian Mathematical Society, 91(2), 227-240. https://doi.org/10.1017/S0004972714000707

Let G be a finite group, let π(G) be the set of prime divisors of jGj and let Γ(G) be the prime graph of G. This graph has vertex set π(G), and two vertices r and s are adjacent if and only if G contains an element of order rs. Many properties of the... Read More about On the prime graph of simple groups.

On boundedly generated subgroups of profinite groups (2014)
Journal Article
Covato, E. (2014). On boundedly generated subgroups of profinite groups. Journal of Algebra, 406, 20-45. https://doi.org/10.1016/j.jalgebra.2014.02.019

In this paper we investigate the following general problem. Let G be a group and let i(G) be a property of G. Is there an integer d such that G contains a d-generated subgroup H with i(H) = i(G)? Here we consider the case where G is a profinite group... Read More about On boundedly generated subgroups of profinite groups.

Using adult learning principles as a framework for learning ICT skills needed for research projects (2013)
Journal Article
Eyitayo, O. T. (2013). Using adult learning principles as a framework for learning ICT skills needed for research projects. Journal of Information Technology Education: Innovations in Practice, 12, 073-089. https://doi.org/10.28945/1774

Executive Summary Students in higher institutions need to carry out research projects. The focus of this paper explores a model to help students learn ICT skills needed for research projects. Generally students go through the 'long and hard route' to... Read More about Using adult learning principles as a framework for learning ICT skills needed for research projects.