South African Computer Journal - Volume 2004, Issue 32, 2004
Volumes & issues
Volume 2004, Issue 32, 2004
YASEVITCH? (Yet Another Software Event Vigorously Inclined Towards Cloudy Heights) : guest contributionAuthor Stefan GrunerSource: South African Computer Journal 2004, pp 1 –2 (2004)More Less
Yasevitch? Does that sound somehow strange and Serbian to you? Fair enough - I made it up. But what do you think about the Software Engineering Track of the Annual ACM Symposium on Applied Computing (SAC)? I bet a bottle of crisp South-African white wine against a glass of room-temperature British beer that you have not heard anything about this Software Engineering Track to date, and that is the reason why I am writing this guest editorial - with many thanks to Derrick Kourie for allowing me to litter your esteemed journal with considerations of questionable significance.
Comparative phonetic analysis and phoneme recognition for Afrikaans, English and Xhosa using the African Speech Technology telephone speech databases : research articleAuthors:Source: South African Computer Journal 2004, pp 3 –12 (2004)More Less
This paper concerns the Afrikaans, English and Xhosa speech databases recently developed as part of the African Speech Technology project. The three corpora are analysed and compared in terms of their phonetic content, diversity and mutual overlap. Connected phoneme recognition systems are subsequently developed and tested in each language.
Source: South African Computer Journal 2004, pp 13 –24 (2004)More Less
Over the past eighteen months, there has been a renewed interest in mobile agent technology due to the continued exponential growth of Internet applications, the establishment of open standards for these applications, as well as the semantic web developments. However, the lack of a standardised programming model addressing all aspects of mobile agent systems prevents widespread deployment of the potentially useful technology. The architectural requirements dealing with all aspects of a mobile agent system are not clearly stipulated. As a result, the commercially available mobile agent systems and mobile agent tool kits address different mobile agent issues, and little reuse of available technologies and architectures takes place. The purpose of this paper is to describe an architectural model that identifies the components representing the essential aspects of a mobile agent system. Due to the intensive nature of development, implementation and testing of this model, we describe preliminary work. However, in the meanwhile, there are benefits associated with this preliminary model, namely that it provides a clear understanding of the architectural issues of mobile agent computing, giving novice researchers and practitioners who enters the field for the first time a foundation for making sensible decisions when researching, designing and developing mobile agents. The model is also significant in that it provides a benchmark for researchers and developers to measure the capabilities of mobile agents created by commercially available tool kits.
Development through communicative action and information system design : a case study from South Africa : research articleAuthor E. ByrneSource: South African Computer Journal 2004, pp 25 –33 (2004)More Less
Many authors have recognised the importance of structure in shaping information system (IS) design and use. Structuration theory has been used in IS research and design to assist with the identification and understanding of the structures in which the IS is situated. From a critical theoretical perspective, focusing on the Habermas' theory of communicative action, a community-based child health information system was designed and implemented in a municipality in rural South Africa. The structures which shaped and influenced the design of this IS (the restructured health services and social tradition) are explored and discussed. From this case study the implications of using IS design as a developmental tool are raised: namely the development of a shared understanding, the participation of key players and the agreement on joint action.
E-commerce success : the quest for IS effectiveness measurement : a conceptual framework for the e-commerce environment : research articleSource: South African Computer Journal 2004, pp 34 –43 (2004)More Less
Although the current era of business has surpassed the hype that was associated with e-Commerce in the 1990s, e-Commerce is still immature. There is still much misunderstanding of e-Commerce's potential capability and how it can be effectively employed. To facilitate the development of e-Commerce into a sound business strategy, it is necessary to develop a valid and robust framework for e-Commerce evaluation. This paper reports on research which is being conducted using a combination of user-satisfaction and Service Quality approaches to this problem. The paper builds on a comprehensive literature study and suggests an appropriate framework for further exploration of the measurement of e-customer satisfaction in the South African context. The findings of the first stage of field work are reported.
Source: South African Computer Journal 2004, pp 44 –52 (2004)More Less
Traditional game playing programs have relied on advanced search algorithms and hand-tuned evaluation functions to play 'intelligently'. A historical overview of these techniques is provided, followed by a revealing look at recent developments in coevolutionary strategies to facilitate game learning. The use of particle swarms in conjunction with neural networks to learn how to play tic-tac-toe is experimentally compared to current game learning research. The use of a new particle swarm neighbourhood structure and innovative board state representation show promising results that warrant further investigation to its application in more complex games like checkers.
Author S. HazelhurstSource: South African Computer Journal 2004, pp 53 –68 (2004)More Less
The use of automatic model checking algorithms to verify detailed gate or switch level designs of circuits is very attractive because the method is automatic and such models can accurately capture detailed functional, timing, and even subtle electrical behaviour of circuits. The use of binary decision diagrams has extended by orders of magnitude the size of circuits that can be so verified, but there are still very significant limitations due to the computational complexity of the problem. Verifying abstract versions of the model is attractive to reduce computational costs but this poses the problem of how to build abstractions easily without losing the accuracy of the low-level model. <br>This paper proposes a method of bridging the gap between detailed designs and abstract models, and presents preliminary theoretical and experimental results. Starting with a detailed, low-level model of a circuit (which uses BDDs for representing data), the human verifier picks a set of properties that s/he believes characterises the circuit. These properties are automatically verified by a model checking algorithm. Once proved, these properties are used to synthesise automatically an abstract model of the circuit, which can use symbolic representation of data. An automatic model checking algorithm can then be applied to the abstract model to verify more properties of the circuit. The preliminary results, although limited, were promising: the abstraction could be constructed and verified with relatively modest cost, thereby reducing the human cost of verification significantly.
Source: South African Computer Journal 2004, pp 69 –78 (2004)More Less
Whether you are interested in improving the usability of Linux, Macintosh or Windows, there is one restriction you cannot escape - the hierarchical file storage system. The notion of files and folders has been with us for so long that it almost seems axiomatic. In this paper we look at the effects on users of forcing a hierarchical classification of files. We also consider how some of the resultant problems can be tackled with a new piece of file browsing software based on the ideas of relational database systems.
Author M.K. DenkoSource: South African Computer Journal 2004, pp 79 –86 (2004)More Less
A mobile ad hoc network is a dynamic mobile wireless network that can be formed without the need for any pre-existing wired or wireless infrastructure. One of the main challenges in an ad hoc network is the design of robust routing algorithms that adapt to the frequent and randomly changing network topology. Clustering can reduce routing overhead and provide more scalable solutions. In this paper we propose a mobile agent-based clustering architecture for routing in mobile ad hoc networks. Using this clustering architecture, hybrid routing schemes can be employed for intra-cluster and inter-cluster routing to improve the performance of routing. All nodes use two mobile agents to perform routing and clustering operations. They collect routing and clustering information and periodically maintain the corresponding tables. We identify various parameters for improving network performance in the proposed clustering architecture. By using some optimal values for these clustering and routing parameters, more robust and scalable routing can be attained.