A methodology for modernising legacy web applications: subtitle if needed. If no subtitle follow instructions in manual
- Authors: Malgraff, Maxine
- Date: 2024-04
- Subjects: Management information systems , Information technology , Application software -- Development
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64148 , vital:73657
- Description: One problem faced in the Information Systems domain is that of poorly maintained, poorly documented, and/or unmanageable systems, known as Legacy Information Systems (LISs). As a result of the everchanging web development landscape, web applications have also become susceptible to the challenges faced in keeping up with technological advances, and older applications are starting to display the characteristics of becoming Legacy Web Applications (LWAs). As retaining business process support and meeting business requirements is often necessary, one method of recovering vital LWAs is to modernise them. System modernisation aims to recover business knowledge and provide an enhanced system that overcomes the problems plagued by LISs. When planning to modernise an LWA, guidance and support are essential to ensure that the modernisation exercise is performed efficiently and effectively. Modernisation methodologies can provide this required guidance and support as they provide models, tools and techniques that serve as guiding principles for the modernisation process. Although many modernisation methodologies exist, very few offer a comprehensive approach to modernisation that provides guidelines for each modernisation phase, tools to assist in the modernisation and techniques that can be used throughout. Existing methodologies also do not cater for cases that include both the LWA and migration to modernised web-specific environments. This research study aimed to investigate modernisation methodologies and identify which methodologies, or parts thereof, could be adapted for modernising LWAs. Existing methodologies were analysed and compared using the definition of a methodology, as well as other factors that improve the modernisation process. Modernisation case studies were reviewed to identify lessons learned from these studies so that these could be considered when planning an LWA modernisation. The ARTIST methodology was the most comprehensive modernisation methodology identified from those researched and was selected as the most appropriate methodology for modernising an LWA. ARTIST was modified to the mARTIST methodology to cater for web-based environments.mARTIST was used to modernise an existing LWA, called OldMax, at an automotive manufacturer, anonymously referred to as AutoCo, to determine its ability to support the modernisation of LWAs. Additional tools and evaluation methods were also investigated and used in place of those recommended by ARTIST, where deemed appropriate for the modernisation of OldMax. Limitations set by AutoCo on the hosting and technical environments for the modernised application also required ARTIST to be adapted to better suit the use case. The steps taken during this modernisation were documented and reported on to highlight the effectiveness of mARTIST and the tools used. The result of this modernisation was that the modernised web application, ModMax, was evaluated to determine the success of the modernisation. The modernisation of OldMax to ModMax, using the mARTIST methodology, was found to be successful based on the criteria set by the ARTIST methodology. Based on this, mARTIST can successfully be used for the modernisation of LWAs. To support future modernisations, an evaluation method for determining technical feasibility was developed for LWA, and alternate tools that could be used throughout modernisation exercises were recommended. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Malgraff, Maxine
- Date: 2024-04
- Subjects: Management information systems , Information technology , Application software -- Development
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64148 , vital:73657
- Description: One problem faced in the Information Systems domain is that of poorly maintained, poorly documented, and/or unmanageable systems, known as Legacy Information Systems (LISs). As a result of the everchanging web development landscape, web applications have also become susceptible to the challenges faced in keeping up with technological advances, and older applications are starting to display the characteristics of becoming Legacy Web Applications (LWAs). As retaining business process support and meeting business requirements is often necessary, one method of recovering vital LWAs is to modernise them. System modernisation aims to recover business knowledge and provide an enhanced system that overcomes the problems plagued by LISs. When planning to modernise an LWA, guidance and support are essential to ensure that the modernisation exercise is performed efficiently and effectively. Modernisation methodologies can provide this required guidance and support as they provide models, tools and techniques that serve as guiding principles for the modernisation process. Although many modernisation methodologies exist, very few offer a comprehensive approach to modernisation that provides guidelines for each modernisation phase, tools to assist in the modernisation and techniques that can be used throughout. Existing methodologies also do not cater for cases that include both the LWA and migration to modernised web-specific environments. This research study aimed to investigate modernisation methodologies and identify which methodologies, or parts thereof, could be adapted for modernising LWAs. Existing methodologies were analysed and compared using the definition of a methodology, as well as other factors that improve the modernisation process. Modernisation case studies were reviewed to identify lessons learned from these studies so that these could be considered when planning an LWA modernisation. The ARTIST methodology was the most comprehensive modernisation methodology identified from those researched and was selected as the most appropriate methodology for modernising an LWA. ARTIST was modified to the mARTIST methodology to cater for web-based environments.mARTIST was used to modernise an existing LWA, called OldMax, at an automotive manufacturer, anonymously referred to as AutoCo, to determine its ability to support the modernisation of LWAs. Additional tools and evaluation methods were also investigated and used in place of those recommended by ARTIST, where deemed appropriate for the modernisation of OldMax. Limitations set by AutoCo on the hosting and technical environments for the modernised application also required ARTIST to be adapted to better suit the use case. The steps taken during this modernisation were documented and reported on to highlight the effectiveness of mARTIST and the tools used. The result of this modernisation was that the modernised web application, ModMax, was evaluated to determine the success of the modernisation. The modernisation of OldMax to ModMax, using the mARTIST methodology, was found to be successful based on the criteria set by the ARTIST methodology. Based on this, mARTIST can successfully be used for the modernisation of LWAs. To support future modernisations, an evaluation method for determining technical feasibility was developed for LWA, and alternate tools that could be used throughout modernisation exercises were recommended. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
Interactive visualisation of electricity usage in smart environments
- Ngwenya, Moreblessing Tafadzwa
- Authors: Ngwenya, Moreblessing Tafadzwa
- Date: 2023-04
- Subjects: Smart environment -- south Africa , Application software -- Development , Intelligent buildings
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/61477 , vital:70687
- Description: Saving electricity is a trending topic due to the electricity challenges that are being faced globally. Smart environments are environments that are equipped with physical objects, which include computers, sensors, actuators, smartphones, and wearable devices interconnected together through the Internet of Things. The Internet of Things provides a network to achieve communication, and computation abilities to provide individuals with smart services anytime, and anywhere. Rapid developments in information technology have increased the number of smart appliances being used, leading to increased electricity usage. Devices and appliances in Smart Environments continue to consume electricity even when not in use, because of the standby function. The problems arise as the electricity consumption of the standby function accumulates to large amounts. Effective communication through visualisation of the electricity consumption in a Smart Environment provides a viable solution to reducing the consumption of electricity. This research aimed to design and developed a visualisation system that successfully communicates electricity consumption to the user using a variety of visualisation techniques. The Design Science Research Methodology was used to address the research questions and was used to iteratively design and develop an energy usage visualisation system. The visualisation system was created for the Smart Lab at the Nelson Mandela University's Department of Computing Sciences. A usability study was conducted to assess the usability and efficacy of the system. The system was found to be usable and effective in communicating power usage to potential customers, since the participants were able to complete the tasks in a short amount of time. The positive results show that visualisation can aid in communicating electricity usage to customers, resulting in a possible reduction in electricity consumption and improved decision-making. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2023
- Full Text:
- Date Issued: 2023-04
- Authors: Ngwenya, Moreblessing Tafadzwa
- Date: 2023-04
- Subjects: Smart environment -- south Africa , Application software -- Development , Intelligent buildings
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/61477 , vital:70687
- Description: Saving electricity is a trending topic due to the electricity challenges that are being faced globally. Smart environments are environments that are equipped with physical objects, which include computers, sensors, actuators, smartphones, and wearable devices interconnected together through the Internet of Things. The Internet of Things provides a network to achieve communication, and computation abilities to provide individuals with smart services anytime, and anywhere. Rapid developments in information technology have increased the number of smart appliances being used, leading to increased electricity usage. Devices and appliances in Smart Environments continue to consume electricity even when not in use, because of the standby function. The problems arise as the electricity consumption of the standby function accumulates to large amounts. Effective communication through visualisation of the electricity consumption in a Smart Environment provides a viable solution to reducing the consumption of electricity. This research aimed to design and developed a visualisation system that successfully communicates electricity consumption to the user using a variety of visualisation techniques. The Design Science Research Methodology was used to address the research questions and was used to iteratively design and develop an energy usage visualisation system. The visualisation system was created for the Smart Lab at the Nelson Mandela University's Department of Computing Sciences. A usability study was conducted to assess the usability and efficacy of the system. The system was found to be usable and effective in communicating power usage to potential customers, since the participants were able to complete the tasks in a short amount of time. The positive results show that visualisation can aid in communicating electricity usage to customers, resulting in a possible reduction in electricity consumption and improved decision-making. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2023
- Full Text:
- Date Issued: 2023-04
Usable Security Heuristics for Instant Messaging Application Development
- Authors: Van Niekerk, Craig Michael
- Date: 2022-04
- Subjects: Application software -- Development
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/58506 , vital:59655
- Description: As instant messaging (IM) applications have become more popular, the privacy and security concerns associated with their usage has become ever more relevant. As with many software programs, IM applications have a history of security vulnerabilities. Although IM application usage is globally increasing, it has been found that currently no generally recognised standards exist to aid IM application developers when developing the usability of the security features they implement. The problem is further exacerbated as research suggests that typical users have neither the requisite understanding of the available IM security features, nor the capacity to make full use of those protection features. The primary objective of this study is to create a set of usable security heuristics to assist developers of instant messaging applications to consider the usability of the security features implemented in these applications. This primary objective is further divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to determine IM security risks and their related implications on users; to identify and investigate existing security and usability heuristics, guidelines, standards and best practices for mobile application development; to map the identified security and usability heuristics, guidelines, standards and best practices to IM applications; and to develop a prototype to demonstrate the applicability of the proposed usable security heuristics to a typical IM application. First, a comprehensive literature study is used to determine and understand the information security threats relevant to IM applications, how IM applications operate, the security features implemented by IM applications and the potential impact the relevant information security threats could have on IM application users. Thereafter, a further literature review and content analysis are used to identify and investigate existing heuristics, guidelines, standards, and best practices for mobile application development. The findings from the content analysis, in combination with the previously identified threats to IM applications, are then mapped to IM applications, and a preliminary set of usable security heuristics for IM application development is established. This preliminary set of usable security heuristics undergoes multiple iterations of refinement to establish the proposed set of usable security heuristics for IM application development. Furthermore, an expert review is conducted to validate the proposed set of usable security heuristics from the perspectives of security, usability, and mobile application development. In addition, the expert review was also used to determine the efficacy, utility, and quality of the proposed usable security heuristics. To further validate the proposed heuristics, a proof-of-concept prototype is used, in addition to the expert review, to demonstrate the applicability of the proposed set of usable security heuristics to a typical IM application. Such a set of usable security heuristics would be useful for IM application developers and would result in the vi improved implementation of usable security, leading to an improvement in the security of IM applications. The proposed set of usable security heuristics therefore adds a further contribution to this research area, providing a solid foundation for future research. , Thesis (MA) -- Faculty of Engineering, the Built Environment, and Technology, 2022
- Full Text:
- Date Issued: 2022-04
- Authors: Van Niekerk, Craig Michael
- Date: 2022-04
- Subjects: Application software -- Development
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/58506 , vital:59655
- Description: As instant messaging (IM) applications have become more popular, the privacy and security concerns associated with their usage has become ever more relevant. As with many software programs, IM applications have a history of security vulnerabilities. Although IM application usage is globally increasing, it has been found that currently no generally recognised standards exist to aid IM application developers when developing the usability of the security features they implement. The problem is further exacerbated as research suggests that typical users have neither the requisite understanding of the available IM security features, nor the capacity to make full use of those protection features. The primary objective of this study is to create a set of usable security heuristics to assist developers of instant messaging applications to consider the usability of the security features implemented in these applications. This primary objective is further divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to determine IM security risks and their related implications on users; to identify and investigate existing security and usability heuristics, guidelines, standards and best practices for mobile application development; to map the identified security and usability heuristics, guidelines, standards and best practices to IM applications; and to develop a prototype to demonstrate the applicability of the proposed usable security heuristics to a typical IM application. First, a comprehensive literature study is used to determine and understand the information security threats relevant to IM applications, how IM applications operate, the security features implemented by IM applications and the potential impact the relevant information security threats could have on IM application users. Thereafter, a further literature review and content analysis are used to identify and investigate existing heuristics, guidelines, standards, and best practices for mobile application development. The findings from the content analysis, in combination with the previously identified threats to IM applications, are then mapped to IM applications, and a preliminary set of usable security heuristics for IM application development is established. This preliminary set of usable security heuristics undergoes multiple iterations of refinement to establish the proposed set of usable security heuristics for IM application development. Furthermore, an expert review is conducted to validate the proposed set of usable security heuristics from the perspectives of security, usability, and mobile application development. In addition, the expert review was also used to determine the efficacy, utility, and quality of the proposed usable security heuristics. To further validate the proposed heuristics, a proof-of-concept prototype is used, in addition to the expert review, to demonstrate the applicability of the proposed set of usable security heuristics to a typical IM application. Such a set of usable security heuristics would be useful for IM application developers and would result in the vi improved implementation of usable security, leading to an improvement in the security of IM applications. The proposed set of usable security heuristics therefore adds a further contribution to this research area, providing a solid foundation for future research. , Thesis (MA) -- Faculty of Engineering, the Built Environment, and Technology, 2022
- Full Text:
- Date Issued: 2022-04
Planning considerations for smart meter implementations in South Africa
- Authors: Muchenje, Tonderai
- Date: 2020
- Subjects: Application software -- Development , Smart power grids
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/46218 , vital:39515
- Description: Smart meter implementations are still in their infancy in many African countries. This is evident by the lack of research on the subject in the African context. Most of the research studies are either Eurocentric or US-centric. Although these studies are important and informative, they might not address the African challenges in context. Hence, South Africa was chosen as the testbed for an investigation that addresses the apparent knowledge gap. This study set out to formulate a framework for planning considerations in the implementation of smart meter technology within South Africa. Through extensive literature review and analysis, the technology acceptance model (TAM) was chosen as a foundational framework for this study. Although TAM is widely used for researching technology acceptance and use, its applicability was found to be inadequate in explaining customer centric factors in smart metering. Therefore, it was supplemented with factors from the theory of reasoned action (TRA), the theory of planned behavior (TPB), privacy calculus theory (PCT), as well as the unified theory of acceptance and use of technology (UTAUT). A total of 11 consumer-centric factors were identified, and these were statistically analysed using the structural equation modelling technique (SEM). Ten (10) consumer-centric factors was found to be significant. These were attitude, perceived value, monetary cost, privacy risk, perceived ease of use, perceived usefulness, facilitating conditions, social norms, trust in technology and behavioral intention. Hypothesis testing confirmed that, not one acceptance model could adequately be used to identify and explain the consumer-centric factors that can be incorporated for planning considerations for smart meter implementation in South Africa. It was further observed that the consumer-centric factors such as environmental issues, security, reliability and health issues that were important in developed countries were not deemed so in South Africa. From a methodological perspective, the study attests to contextual localised application as opposed to universal meaning and measurement invariance when incorporating planning consideration for smart meter implementation in South Africa as compared to European countries and the United States of America. Finally, the findings hold some practical implications, as they showed the practical utility of the model in predicting the consumer-centric factors that can be incorporated for planning considerations. In support, the Business Model Canvas (BMC) was found to be a useful tool in deriving and reporting on the formulation of planning consideration guidelines. Using the BMC, five planning consideration guidelines were derived: customer segmentation, partnerships, benefits communication, value identification and customer attitude. These planning considerations will allow smart meter providers to identify their customers, partners and value propositions they might need to offer consumers to facilitate a higher smart meter acceptance and use. The proposed planning consideration guidelines can practically be used by policymakers and regulators for several aspects for future pervasive technology acceptance studies. This research has, therefore, created a platform for further research in the smart technology domain while providing a usable predictive framework for the identification of consumer-centric factors and formulation of planning considerations guidelines for smart meter implementation within the South African context.
- Full Text:
- Date Issued: 2020
- Authors: Muchenje, Tonderai
- Date: 2020
- Subjects: Application software -- Development , Smart power grids
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/46218 , vital:39515
- Description: Smart meter implementations are still in their infancy in many African countries. This is evident by the lack of research on the subject in the African context. Most of the research studies are either Eurocentric or US-centric. Although these studies are important and informative, they might not address the African challenges in context. Hence, South Africa was chosen as the testbed for an investigation that addresses the apparent knowledge gap. This study set out to formulate a framework for planning considerations in the implementation of smart meter technology within South Africa. Through extensive literature review and analysis, the technology acceptance model (TAM) was chosen as a foundational framework for this study. Although TAM is widely used for researching technology acceptance and use, its applicability was found to be inadequate in explaining customer centric factors in smart metering. Therefore, it was supplemented with factors from the theory of reasoned action (TRA), the theory of planned behavior (TPB), privacy calculus theory (PCT), as well as the unified theory of acceptance and use of technology (UTAUT). A total of 11 consumer-centric factors were identified, and these were statistically analysed using the structural equation modelling technique (SEM). Ten (10) consumer-centric factors was found to be significant. These were attitude, perceived value, monetary cost, privacy risk, perceived ease of use, perceived usefulness, facilitating conditions, social norms, trust in technology and behavioral intention. Hypothesis testing confirmed that, not one acceptance model could adequately be used to identify and explain the consumer-centric factors that can be incorporated for planning considerations for smart meter implementation in South Africa. It was further observed that the consumer-centric factors such as environmental issues, security, reliability and health issues that were important in developed countries were not deemed so in South Africa. From a methodological perspective, the study attests to contextual localised application as opposed to universal meaning and measurement invariance when incorporating planning consideration for smart meter implementation in South Africa as compared to European countries and the United States of America. Finally, the findings hold some practical implications, as they showed the practical utility of the model in predicting the consumer-centric factors that can be incorporated for planning considerations. In support, the Business Model Canvas (BMC) was found to be a useful tool in deriving and reporting on the formulation of planning consideration guidelines. Using the BMC, five planning consideration guidelines were derived: customer segmentation, partnerships, benefits communication, value identification and customer attitude. These planning considerations will allow smart meter providers to identify their customers, partners and value propositions they might need to offer consumers to facilitate a higher smart meter acceptance and use. The proposed planning consideration guidelines can practically be used by policymakers and regulators for several aspects for future pervasive technology acceptance studies. This research has, therefore, created a platform for further research in the smart technology domain while providing a usable predictive framework for the identification of consumer-centric factors and formulation of planning considerations guidelines for smart meter implementation within the South African context.
- Full Text:
- Date Issued: 2020
Wireless mobile android technology in the monitoring and control of a safety integrated robotic cell
- Authors: Cumberlege, Aidan
- Date: 2013
- Subjects: Android (Electronic resource) , Application software -- Development , Computer software -- Development , Mobile computing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/46284 , vital:39543
- Description: The constant strive for improving the efficiency of production processes has become a worldwide challenge. In high speed production facilities response time between man and machine is of utmost importance when financial implications are taken into account. This dissertation contributes to improving the response time by making use of wireless notification between the machine and the maintenance technician when process faults occur. The tool used to achieve this is based on Android. Research is carried out on the latest Android technology while taking the safety aspects of a production environment into consideration. Research in designing a rule based intelligent system is established by using a tablet as the user interface for automatic notification and corrective action recommendations. Quick response is achieved by setting up a wireless network. As a result of designing a wireless intelligent maintenance tool, production downtime is improved. Management can recall all activities logged by the system for graphical representation.
- Full Text:
- Date Issued: 2013
Wireless mobile android technology in the monitoring and control of a safety integrated robotic cell
- Authors: Cumberlege, Aidan
- Date: 2013
- Subjects: Android (Electronic resource) , Application software -- Development , Computer software -- Development , Mobile computing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/46284 , vital:39543
- Description: The constant strive for improving the efficiency of production processes has become a worldwide challenge. In high speed production facilities response time between man and machine is of utmost importance when financial implications are taken into account. This dissertation contributes to improving the response time by making use of wireless notification between the machine and the maintenance technician when process faults occur. The tool used to achieve this is based on Android. Research is carried out on the latest Android technology while taking the safety aspects of a production environment into consideration. Research in designing a rule based intelligent system is established by using a tablet as the user interface for automatic notification and corrective action recommendations. Quick response is achieved by setting up a wireless network. As a result of designing a wireless intelligent maintenance tool, production downtime is improved. Management can recall all activities logged by the system for graphical representation.
- Full Text:
- Date Issued: 2013
OVR : a novel architecture for voice-based applications
- Authors: Maema, Mathe
- Date: 2011 , 2011-04-01
- Subjects: Telephone systems -- Research , User interfaces (Computer systems) -- Research , Expert systems (Computer science) , Artificial intelligence , VoiceXML (Document markup language) , Application software -- Development
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4671 , http://hdl.handle.net/10962/d1006694 , Telephone systems -- Research , User interfaces (Computer systems) -- Research , Expert systems (Computer science) , Artificial intelligence , VoiceXML (Document markup language) , Application software -- Development
- Description: Despite the inherent limitation of accessing information serially, voice applications are increasingly growing in popularity as computing technologies advance. This is a positive development, because voice communication offers a number of benefits over other forms of communication. For example, voice may be better for delivering services to users whose eyes and hands may be engaged in other activities (e.g. driving) or to semi-literate or illiterate users. This thesis proposes a knowledge based architecture for building voice applications to help reduce the limitations of serial access to information. The proposed architecture, called OVR (Ontologies, VoiceXML and Reasoners), uses a rich backend that represents knowledge via ontologies and utilises reasoning engines to reason with it, in order to generate intelligent behaviour. Ontologies were chosen over other knowledge representation formalisms because of their expressivity and executable format, and because current trends suggest a general shift towards the use of ontologies in many systems used for information storing and sharing. For the frontend, this architecture uses VoiceXML, the emerging, and de facto standard for voice automated applications. A functional prototype was built for an initial validation of the architecture. The system is a simple voice application to help locate information about service providers that offer HIV (Human Immunodeficiency Virus) testing. We called this implementation HTLS (HIV Testing Locator System). The functional prototype was implemented using a number of technologies. OWL API, a Java interface designed to facilitate manipulation of ontologies authored in OWL was used to build a customised query interface for HTLS. Pellet reasoner was used for supporting queries to the knowledge base and Drools (JBoss rule engine) was used for processing dialog rules. VXI was used as the VoiceXML browser and an experimental softswitch called iLanga as the bridge to the telephony system. (At the heart of iLanga is Asterisk, a well known PBX-in-a-box.) HTLS behaved properly under system testing, providing the sought initial validation of OVR. , LaTeX with hyperref package
- Full Text:
- Date Issued: 2011
- Authors: Maema, Mathe
- Date: 2011 , 2011-04-01
- Subjects: Telephone systems -- Research , User interfaces (Computer systems) -- Research , Expert systems (Computer science) , Artificial intelligence , VoiceXML (Document markup language) , Application software -- Development
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4671 , http://hdl.handle.net/10962/d1006694 , Telephone systems -- Research , User interfaces (Computer systems) -- Research , Expert systems (Computer science) , Artificial intelligence , VoiceXML (Document markup language) , Application software -- Development
- Description: Despite the inherent limitation of accessing information serially, voice applications are increasingly growing in popularity as computing technologies advance. This is a positive development, because voice communication offers a number of benefits over other forms of communication. For example, voice may be better for delivering services to users whose eyes and hands may be engaged in other activities (e.g. driving) or to semi-literate or illiterate users. This thesis proposes a knowledge based architecture for building voice applications to help reduce the limitations of serial access to information. The proposed architecture, called OVR (Ontologies, VoiceXML and Reasoners), uses a rich backend that represents knowledge via ontologies and utilises reasoning engines to reason with it, in order to generate intelligent behaviour. Ontologies were chosen over other knowledge representation formalisms because of their expressivity and executable format, and because current trends suggest a general shift towards the use of ontologies in many systems used for information storing and sharing. For the frontend, this architecture uses VoiceXML, the emerging, and de facto standard for voice automated applications. A functional prototype was built for an initial validation of the architecture. The system is a simple voice application to help locate information about service providers that offer HIV (Human Immunodeficiency Virus) testing. We called this implementation HTLS (HIV Testing Locator System). The functional prototype was implemented using a number of technologies. OWL API, a Java interface designed to facilitate manipulation of ontologies authored in OWL was used to build a customised query interface for HTLS. Pellet reasoner was used for supporting queries to the knowledge base and Drools (JBoss rule engine) was used for processing dialog rules. VXI was used as the VoiceXML browser and an experimental softswitch called iLanga as the bridge to the telephony system. (At the heart of iLanga is Asterisk, a well known PBX-in-a-box.) HTLS behaved properly under system testing, providing the sought initial validation of OVR. , LaTeX with hyperref package
- Full Text:
- Date Issued: 2011
- «
- ‹
- 1
- ›
- »