Bassey Isong

Bassey Isong
North-West University, Mafikeng · Computer Science

BSc (CS) MSc(CS) MSc(SE) and PhD in Computer Science

About

71
Publications
50,436
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
553
Citations
Citations since 2017
51 Research Items
533 Citations
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140

Publications

Publications (71)
Article
Full-text available
Real-world optimization problems demand sophisticated algorithms. Over the years bio-inspired approach, a subset of computational intelligence has demonstrated remarkable success in real-world use cases, especially where exact or deterministic algorithms are ineffective. Petroleum product scheduling is a complex optimization task belonging to the c...
Article
Full-text available
Low-Power Wide-Area Network (LPWAN) is a wireless WAN technology that connects low-powered and low-bandwidth devices with low bit rates atop Long Ranges (LoRa). It is characterized by improved scalability, wide area coverage, and low power consumption, which are beneficial to resource-constrained devices on the Internet of Things (IoT) for effectiv...
Article
Full-text available
The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally accepted and resilient LoRaWAN security model is challenging. Although several security models...
Article
Full-text available
Over a decade since transparency was introduced as a first-class concept in computing, transparency is still an emerging concept that is quite poorly understood. Also, despite existing research contributions, transparency is yet to be incorporated into the software engineering practice, and the promise it holds remains unfulfilled. Although there i...
Article
Full-text available
LoRaWAN has established itself as one of the leading MAC layer protocols in the field of LPWAN. Although the technology itself is quite mature, its resource allocation mechanism, the Adaptive Data Rate (ADR) algorithm is still quite new, unspecified and its functionalities still limited. Various studies have shown that the performance of the ADR al...
Article
Full-text available
Software-Defined Networking (SDN) is a network paradigm introduced to overcome the inherent challenges of traditional networks. Its architecture is either deployed with a single controller or multiple controllers. While the first is not suitable for large-scale networks, the latter is confronted with a controller placement problem (CPP) in a large-...
Article
Full-text available
Trust is an important computing networks concept and remains an issue not just in social platforms but also in networks in the deliverance of Quality of service (QoS). Video Streaming has, over the years gained prominence in mobile and vehicular ad hoc networks. However, it is faced with several challenges of being vulnerable to different attacks a...
Conference Paper
Full-text available
One of the challenges faced by Wireless sensor networks (WSNs) is the issue of uncontrollable interference as the spectrum becomes congested due to the current proliferation of wireless devices. Cognitive radio (CR) emerged as one of the promising solutions to overcome the challenges while having the sensor nodes to access the licensed spectrum ban...
Conference Paper
Full-text available
Vehicle security is an emergent issue in the technology sector that has benefited from the continuous advancement in technology through the creation of more complex and advanced security systems. This serves to address the pandemic of vehicle theft that is prevalent in numerous countries due to inadequate security in vehicles. Consequently, securit...
Conference Paper
Full-text available
Internet of Things (IoT) has attracted widespread applicability not only limited to smart cities and communities but also in water, waste management and so on. It strength lies in the high impacts it created in the daily life and the potential user’s behavior. However, for it to be more effective and increase its adoption, it is require to be energ...
Conference Paper
Full-text available
Wireless Sensor Networks (WSNs) are network paradigm that are constrained by several challenges such as management of the network, energy consumption, data processing, quality of services (QoS) provisioning, and security. Software-Defined Networking (SDN) emerged as a viable solution to mitigate these inherent challenges yielding SDWSN. SDWSN is ga...
Conference Paper
Full-text available
Software defined network (SDN) is a paradigm developed achieve great flexibility and cope with the limitations of traditional networks architecture such as the wireless sensor networks (WSNs). Introducing SDN in WSN leads to SDWSN. However, due to the challenges that are inherent in SDN and WSN, SDWSN is faced with number of challenges such network...
Conference Paper
Full-text available
Software defined networking (SDN) is a paradigm developed to cope with inherent limitations posed by the lack of flexibility in the traditional networking architecture like the Wireless Sensor Network (WSN). The application of SDN in WSN has been advantageous with respect to network management and configuration leading to a new network paradigm cal...
Conference Paper
Full-text available
Vehicular ad hoc network (VANET) is an emerging network technology with the goal of providing public safety, traffic coordination and infotainment for the comfort of passengers in moving vehicles. However, it faces the challenge of not providing the expected quality of service (QoS) when streaming videos online. This challenge emanate from the vari...
Conference Paper
Full-text available
Internet of Things (IoT) has revolutionized the traditional Internet where only human-centric services were offered. It has enabled objects to have the ability to connect and communicate through the Internet. IoT has several applications such as smart water management systems. However, they require high energy-efficient sensor nodes that are able t...
Conference Paper
Full-text available
In recent years there has been explosive growth of data and its utilization triggered by technological advancements. Consequently, several business enterprises have accumulated enormous data from client purchases gathered at all times. Data mining involve processes used to turn raw data into beneficial information through the use of suitable softwa...
Conference Paper
Full-text available
Wireless Sensors Networks (WSNs) have been gaining significant attention in both the industries and the academia in recent years. However, WSN are vulnerable to growing security threats and attacks which are inept for the current traditional security mechanisms to cope with or mitigate such security challenges. As a solution, Software Defined Netwo...
Conference Paper
Full-text available
In this paper, we explore the potential of introducing fundamental concepts of programming to first year students using spreadsheets. Many students find programming to be difficult to learn as the concepts are new and unfamiliar. On the other hand, spreadsheets have a relatively easy to use interface that provides instant viewing of results of data...
Conference Paper
Full-text available
Software Defined Networks (SDNs) is a new network paradigm and is gaining significant attention in recent years. However, security remains a great challenge, though several improvements have been proposed. A key security challenge is the lack of trust between the SDN controller and the applications running atop the control plane. SDN controller can...
Article
Object-oriented software (OOS) is dominating the software development world today and thus, has to be of high quality and maintainable. However, their recent size and complexity affects the delivering of software products with high quality as well as their maintenance. In the perspective of software maintenance, software change impact analysis (SCI...
Article
Full-text available
Refactoring is used to improve deteriorated software design, code and their maintainability. In objectoriented (OO) code, before refactoring is performed, its opportunities must be identified and s everal approaches exist this regard. Among the approaches is the software metric-based approach where quality software metrics are used. Therefore, this...
Conference Paper
Full-text available
This paper presents analysis of existing empirical studies of software metric-based refactorings opportunities identification (ROI) for object-oriented (OO) software systems. We carried out a comprehensive analysis on sixteen (16) primary studies to identify the state-of-the-practice in ROI, focusing on their operations, refactoring activities, pro...
Conference Paper
Today, several institutions of higher learning are using access cards as access control measure to gain access to their institutions and facilities. Though, these cards are simple and convenient in terms of usage, they offer the lowest security strength as they are often prone to lost, theft, forget and clone. If compromised, valuable information a...
Conference Paper
Full-text available
Vehicular ad hoc network (VANET) is an emerging network technology with the goal of providing public safety, traffic coordination and infotainment for the comfort of passengers in moving vehicles. However, it faces the challenge of not providing the expected quality of service (QoS) when streaming videos online. This challenge emanate from the vari...
Conference Paper
Today, several institutions of higher learning are using access cards as access control measure to gain access to their institutions and facilities. Though, these cards are simple and convenient in terms of usage, they offer the lowest security strength as they are often prone to lost, theft, forget and clone. If compromised, valuable information a...
Article
Full-text available
Effective and efficient public service delivery like healthcare services are very important in today's society, especially in the rural areas. People in rural areas are expected to have access to public facilities at all times. However, these services are not always available when they are needed. This paper discusses the problems faced by rural ar...
Article
Full-text available
Universities in South Africa (SA) are facing several challenges due to the influx of students with diverse backgrounds entering the first year. One of such challenges is the use of technologies for teaching and learning. Institutions in the rural areas are flooded with first year students characterized as under-prepared, educationally underprivileg...
Article
Full-text available
With the sharp rise in software dependability and failure cost, high quality has been in great demand. However, guaranteeing high quality in software systems which have grown in size and complexity coupled with the constraints imposed on their development has become increasingly difficult, time and resource consuming activity. Consequently, it beco...
Article
Full-text available
Computer programming (CP) course offered in universities is difficult coupled with insufficient infrastructures and teaching staff. In spite of these, several undergraduate Computer Science (CS) students are increasingly acquiring programming skills and developing commercial applications even without attending formal programming classes. However, s...
Article
Full-text available
Object-oriented (OO) software have complex dependencies and different change types which frequently affect their maintenance in terms of ripple-effects identification or may likely introduce some faults which are hard to detect. As change is both important and risky, change impact analysis (CIA) is a technique used to preserve the quality of the so...
Article
Full-text available
The teaching of computer programming is one of the greatest challenges that have remained for years in Computer Science Education. A particular case is computer programming course for the beginners. While the traditional objectivist lecture-based approaches do not actively engage students to achieve their learning outcome, we believe that integrati...
Article
Full-text available
Object-oriented (OO) approaches of software development promised better maintainable and reusable systems, but the complexity resulting from its features usually introduce some faults that are difficult to detect or anticipate during software change process. Thus, the earlier they are detected, found and fixed, the lesser the maintenance costs. Sev...
Article
Full-text available
Mobile agents have engrossed substantial attention in recent years, especially in fault tolerance researches and several approaches have emerged. Fault tolerance design tends to put a stop to incomplete or complete loss of the agent in the face of failures. Despite these developments, reliability issues still remain a critical challenge. Moreover,...
Conference Paper
Market-driven software development organizations are faced with many challenges resulting from Market-driven Requirements Engineering (MDRE) processes. Among these challenges are release planning (RP) and dependencies problems. RP constitutes both an important and a complex activity in MDRE and is achieved via prioritization. However, the task of s...

Network

Cited By