Professor Gabriel Kabanda | University of KwaZulu-Natal (original) (raw)
Papers by Professor Gabriel Kabanda
Proceedings of the 17th International Business Conference, North-West University, 2024
Generative Artificial Intelligence (GenAI) is revolutionizing content creation and natural langua... more Generative Artificial Intelligence (GenAI) is revolutionizing
content creation and natural language comprehension, with large
language models (LLMs) and AI generating original content in
various modalities, such as text, photos, audio, and videos. Machine
Learning (ML) with a hypothesis-based, goal-oriented approach
called Reinforcement Learning (RL) that accomplishes long-term
objectives through leveraging interactions with the environment.
This study aims to establish the Reinforcement Learning (RL)
paradigm for GenAI applications in business, using Python to
implement RL Q-Learning and the Asynchronous Advantage Actor-
Critic (A3C) algorithms. The pragmatism-based study used a
positivist, quantitative approach to identify the RL paradigm for
GenAI business applications, and was also explanatory,
exploratory, and descriptive. An analysis of GenAI's business
applications was done using the 370-person sample size of the study
population comprising staff members and clients of five commercial
banks in Zimbabwe. The A3C algorithm was found to be simpler
and perform better in the Deep Reinforcement Learning (DRL) task.
The A3C algorithm, which is premised on Q-Learning in DRL, can
be used to combat cybersecurity risks. Because Generative AI can
automate tasks that take 60–70% of an employee's time, it has the
potential to dramatically improve the global economy, especially in
the banking, high-tech, and life sciences sectors.
CRC Press eBooks, Feb 14, 2024
Productivity Press eBooks, Nov 6, 2023
CRC Press eBooks, Feb 14, 2024
Productivity Press eBooks, Nov 6, 2023
International Journal of Latest Technology in Engineering, Management & Applied Science
This study investigated ‘The Access and Use of Information and Communication Technology for Dista... more This study investigated ‘The Access and Use of Information and Communication Technology for Distance Education by Zimbabwe Open University’s Virtual Region graduates.' This study was informed by the pragmatist philosophy and used the sequential exploratory approach. From a population of 50 virtual region graduates in 2022, 16 were sampled for this study. Findings were that using ICT for ZOU’s online-communication was uncomplicated. Half the graduates used their laptops for e-learning while the other half used other means. Most students indicated that lack of robust ICT-infrastructure led to students’ inability to access learning materials. 50% of the students indicated that ZOU’s responses online was slow. All graduates indicated that ZOU online tutorials were unavailable. Most graduates’ lives/careers/businesses improved after the attainment of ZOU’s virtual-qualification. All graduates were willing to recommend studies with ZOU’s Virtual region. They rated ZOU as most-convenie...
International Journal of Latest Technology in Engineering, Management & Applied Science
This study investigated ‘The Access and Use of Information and Communication Technology for Dista... more This study investigated ‘The Access and Use of Information and Communication Technology for Distance Education by Zimbabwe Open University’s Virtual Region graduates.' This study was informed by the pragmatist philosophy and used the sequential exploratory approach. From a population of 50 virtual region graduates in 2022, 16 were sampled for this study. Findings were that using ICT for ZOU’s online-communication was uncomplicated. Half the graduates used their laptops for e-learning while the other half used other means. Most students indicated that lack of robust ICT-infrastructure led to students’ inability to access learning materials. 50% of the students indicated that ZOU’s responses online was slow. All graduates indicated that ZOU online tutorials were unavailable. Most graduates’ lives/careers/businesses improved after the attainment of ZOU’s virtual-qualification. All graduates were willing to recommend studies with ZOU’s Virtual region. They rated ZOU as most-convenie...
CRC Press eBooks, Aug 10, 2023
CRC Press eBooks, Mar 29, 2023
WIT Transactions on Information and Communication Technologies, 1970
Journal of Educational System
A lot of expertise has not be harnessed in the past from expatriate experts due to lack of a stan... more A lot of expertise has not be harnessed in the past from expatriate experts due to lack of a standard methodology for knowledge acquisition. A knowledge acquisition methodology consists of a collection of procedures, techniques, tools, and documentation aids which will facilitate the development of an expert system. The drawbacks and associated factors which characterise this bottle-neck problem are outlined. Knowledge elicitation is presented as the most effective mode of knowledge acquisition. The use of inductive programs as tools of knowledge acquisition is discussed. Employment of this methodology in the development and as a useful model in acquiring knowledge for both knowledge bases and procedural systems such as relational databases is proposed. By using heuristic or rule-of-thumb knowledge in the areas where algorithmic knowledge is incomplete or inappropriate , a particular system can be described more comprehensively. This paper describes the methodology currently in use ...
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING, MANAGEMENT & APPLIED SCIENCE (IJLTEMAS), 2023
's Virtual Region graduates.' This study was informed by the pragmatist philosophy and used the s... more 's Virtual Region graduates.' This study was informed by the pragmatist philosophy and used the sequential exploratory approach. From a population of 50 virtual region graduates in 2022, 16 were sampled for this study. Findings were that using ICT for ZOU's online-communication was uncomplicated. Half the graduates used their laptops for elearning while the other half used other means. Most students indicated that lack of robust ICT-infrastructure led to students' inability to access learning materials. 50% of the students indicated that ZOU's responses online was slow. All graduates indicated that ZOU online tutorials were unavailable. Most graduates' lives/careers/businesses improved after the attainment of ZOU's virtual-qualification. All graduates were willing to recommend studies with ZOU's Virtual region. They rated ZOU as most-convenient. Challenges graduates faced included unavailable online-tutorials, computer-illiteracy, inadequate tools, unwillingness to change, lack of expertise, software problems, internet-connectivity, lack of robust ICT-infrastructure and administration challenges. Recommendations were that Government should supply free e-learning resources and training, timemanagement and attitude-change training programmes to enable prospects to use and access ICT easier. Band with had to be increased, e-tutorials to be functional and communication improved by ZOU's administration to allow full utilisation of ICT for learning purposes by students. Graduates needed hands-on skills to overcome e-learning challenges.
IJRISS, 2023
The paper examined the exposition of online-counselling to ZOU students. The mixed research desig... more The paper examined the exposition of online-counselling to ZOU students. The mixed research design was used with the sequential-exploratory strategy and an online-survey. Findings were that Student Advisors/Counsellors used both online and face-to-face modes. Online-counselling was considered useful although face-to-face counselling had the advantage of observing clients' feelings. Participants had no adequate online-counselling equipment to use. Online-counselling was time-consuming and costly due to network problems. Lack of video/teleconferencing equipment prevented participants from conducting ecounselling effectively. Younger compared to older students preferred online-counselling. The study recommended increasing Wi-Fi access and deploying video/conference equipment to users. Clients needed to observe the body language of the counsellor to see if they were empathizing with the client.
Oriental journal of computer science and technology
Reinforcement learning (RL) is a type of ML, which involves learning from interactions with the e... more Reinforcement learning (RL) is a type of ML, which involves learning from interactions with the environment to accomplish certain long-term objectives connected to the environmental condition. RL takes place when action sequences, observations, and rewards are used as inputs, and is hypothesis-based and goal-oriented. The key asynchronous RL algorithms are Asynchronous one-step Q learning, Asynchronous one-step SARSA, Asynchronous n-step Q-learning and Asynchronous Advantage Actor-Critic (A3C). The paper ascertains the Reinforcement Learning (RL) paradigm for cybersecurity education and training. The research was conducted using a largely positivism research philosophy, which focuses on quantitative approaches of determining the RL paradigm for cybersecurity education and training. The research design was an experiment that focused on implementing the RL Q-Learning and A3C algorithms using Python. The Asynchronous Advantage Actor-Critic (A3C) Algorithm is much faster, simpler, and s...
Global Journal of Computer Science and Technology: E-Network, Web & Security, 2023
The adoption of virtual reality (VR) and augmented reality (AR) headsets in futuristic and scienc... more The adoption of virtual reality (VR) and augmented reality (AR) headsets in futuristic and science fiction has made it possible for the Metaverse to exist as a single, universal, immersive virtual universe. By extending technology outside of our physical reality, the Metaverse alters the human experience. The four categories we use to categorize metaverse definitions are environment, interface, interaction, and social value. Currently, it is unclear what the metaverse's structure and elements are. A cybersecurity framework for these devices is necessary as the world grows more interconnected and immersive technologies are increasingly widely used in business, government, and consumer markets. Used was a literature review. The goal of the study is to create a cybersecurity model for a Roblox-based Metaverse architecture framework that can be applied to internationalization, the value chain of education, and the delivery of online and e-learning education. The research is conducted using the Interpretivist Paradigm.
Oriental Journal of Computer Science and Technology, 2023
Reinforcement learning (RL) is a type of ML, which involves learning from interactions with the e... more Reinforcement learning (RL) is a type of ML, which involves learning from interactions with the environment to accomplish certain long-term objectives connected to the environmental condition. RL takes place when action sequences, observations, and rewards are used as inputs, and is hypothesis-based and goal-oriented. The key asynchronous RL algorithms are Asynchronous one-step Q learning, Asynchronous one-step SARSA, Asynchronous n-step Q-learning and Asynchronous Advantage Actor-Critic (A3C). The paper ascertains the Reinforcement Learning (RL) paradigm for cybersecurity education and training. The research was conducted using a largely positivism research philosophy, which focuses on quantitative approaches of determining the RL paradigm for cybersecurity education and training. The research design was an experiment that focused on implementing the RL Q-Learning and A3C algorithms using Python. The Asynchronous Advantage Actor-Critic (A3C) Algorithm is much faster, simpler, and scores higher on Deep Reinforcement Learning task. The research was descriptive, exploratory and explanatory in nature. A survey was conducted on the cybersecurity education and training as exemplified by Zimbabwean commercial banks. The study population encompassed employees and customers from five commercial banks in Zimbabwe, where the sample size was 370. Deep reinforcement learning (DRL) has been used to address a variety of issues in the Internet of Things. DRL heavily utilizes A3C algorithm with some Q-Learning, and this can be used to fight against intrusions into host computers or networks and fake data in IoT devices.
Advances in computational intelligence and robotics book series, Apr 7, 2023
Reinforcement learning (RL) is learning from interactions with the environment in order to accomp... more Reinforcement learning (RL) is learning from interactions with the environment in order to accomplish certain long-term objectives connected to the environmental condition. Reinforcement learning takes place when action sequences, observations, and rewards are used as inputs, and is hypothesis-based and goal-oriented. The purpose of the research was to conduct a systematic literature review of reinforcement algorithms in machine learning in order to develop a successful multi-agent RL algorithm that can be applied to robotics, network packet routing, energy distribution, and other applications. The robotics-related RL techniques of value-based RL, policy-based RL, model-based RL, deep reinforcement learning, meta-RL, and inverse RL were examined. As a result, the robotics-related RL techniques of value-based RL, policy-based RL, model-based RL, deep RL, meta-RL, and inverse RL were discussed in this research work. The asynchronous advantage actor-critic algorithm (A3C) is one of the best reinforcement algorithms. A3C performs better on deep RLchallenges and is quicker and easier to use.
Ubiquitous and Pervasive Computing - New Trends and Opportunities
Among the most revolutionary technologies are big data analytics, artificial intelligence (AI) an... more Among the most revolutionary technologies are big data analytics, artificial intelligence (AI) and robotics, machine learning (ML), cybersecurity, blockchain technology, and cloud computing. The project was focused on how to create a Big Data Analytics Architecture Framework to increase the production capability and global trade for Sub-Saharan Africa’s oilseeds and textile industries (SSA). The infrastructure, e-commerce, and disruptive technologies in the oilseeds and textile industries, as well as global e-commerce, all demand large investments. The pragmatic paradigm served as the foundation for the research approach. This study employed a review of the literature, document analysis, and focus groups. For the oilseeds and textile sectors in SSA, a Big Data analytics architectural framework was created. The Hadoop platform was created as a framework for big data analytics. The open-source Hadoop platform offers the analytical tools and computing capacity needed to handle such mas...
Proceedings of the 17th International Business Conference, North-West University, 2024
Generative Artificial Intelligence (GenAI) is revolutionizing content creation and natural langua... more Generative Artificial Intelligence (GenAI) is revolutionizing
content creation and natural language comprehension, with large
language models (LLMs) and AI generating original content in
various modalities, such as text, photos, audio, and videos. Machine
Learning (ML) with a hypothesis-based, goal-oriented approach
called Reinforcement Learning (RL) that accomplishes long-term
objectives through leveraging interactions with the environment.
This study aims to establish the Reinforcement Learning (RL)
paradigm for GenAI applications in business, using Python to
implement RL Q-Learning and the Asynchronous Advantage Actor-
Critic (A3C) algorithms. The pragmatism-based study used a
positivist, quantitative approach to identify the RL paradigm for
GenAI business applications, and was also explanatory,
exploratory, and descriptive. An analysis of GenAI's business
applications was done using the 370-person sample size of the study
population comprising staff members and clients of five commercial
banks in Zimbabwe. The A3C algorithm was found to be simpler
and perform better in the Deep Reinforcement Learning (DRL) task.
The A3C algorithm, which is premised on Q-Learning in DRL, can
be used to combat cybersecurity risks. Because Generative AI can
automate tasks that take 60–70% of an employee's time, it has the
potential to dramatically improve the global economy, especially in
the banking, high-tech, and life sciences sectors.
CRC Press eBooks, Feb 14, 2024
Productivity Press eBooks, Nov 6, 2023
CRC Press eBooks, Feb 14, 2024
Productivity Press eBooks, Nov 6, 2023
International Journal of Latest Technology in Engineering, Management & Applied Science
This study investigated ‘The Access and Use of Information and Communication Technology for Dista... more This study investigated ‘The Access and Use of Information and Communication Technology for Distance Education by Zimbabwe Open University’s Virtual Region graduates.' This study was informed by the pragmatist philosophy and used the sequential exploratory approach. From a population of 50 virtual region graduates in 2022, 16 were sampled for this study. Findings were that using ICT for ZOU’s online-communication was uncomplicated. Half the graduates used their laptops for e-learning while the other half used other means. Most students indicated that lack of robust ICT-infrastructure led to students’ inability to access learning materials. 50% of the students indicated that ZOU’s responses online was slow. All graduates indicated that ZOU online tutorials were unavailable. Most graduates’ lives/careers/businesses improved after the attainment of ZOU’s virtual-qualification. All graduates were willing to recommend studies with ZOU’s Virtual region. They rated ZOU as most-convenie...
International Journal of Latest Technology in Engineering, Management & Applied Science
This study investigated ‘The Access and Use of Information and Communication Technology for Dista... more This study investigated ‘The Access and Use of Information and Communication Technology for Distance Education by Zimbabwe Open University’s Virtual Region graduates.' This study was informed by the pragmatist philosophy and used the sequential exploratory approach. From a population of 50 virtual region graduates in 2022, 16 were sampled for this study. Findings were that using ICT for ZOU’s online-communication was uncomplicated. Half the graduates used their laptops for e-learning while the other half used other means. Most students indicated that lack of robust ICT-infrastructure led to students’ inability to access learning materials. 50% of the students indicated that ZOU’s responses online was slow. All graduates indicated that ZOU online tutorials were unavailable. Most graduates’ lives/careers/businesses improved after the attainment of ZOU’s virtual-qualification. All graduates were willing to recommend studies with ZOU’s Virtual region. They rated ZOU as most-convenie...
CRC Press eBooks, Aug 10, 2023
CRC Press eBooks, Mar 29, 2023
WIT Transactions on Information and Communication Technologies, 1970
Journal of Educational System
A lot of expertise has not be harnessed in the past from expatriate experts due to lack of a stan... more A lot of expertise has not be harnessed in the past from expatriate experts due to lack of a standard methodology for knowledge acquisition. A knowledge acquisition methodology consists of a collection of procedures, techniques, tools, and documentation aids which will facilitate the development of an expert system. The drawbacks and associated factors which characterise this bottle-neck problem are outlined. Knowledge elicitation is presented as the most effective mode of knowledge acquisition. The use of inductive programs as tools of knowledge acquisition is discussed. Employment of this methodology in the development and as a useful model in acquiring knowledge for both knowledge bases and procedural systems such as relational databases is proposed. By using heuristic or rule-of-thumb knowledge in the areas where algorithmic knowledge is incomplete or inappropriate , a particular system can be described more comprehensively. This paper describes the methodology currently in use ...
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING, MANAGEMENT & APPLIED SCIENCE (IJLTEMAS), 2023
's Virtual Region graduates.' This study was informed by the pragmatist philosophy and used the s... more 's Virtual Region graduates.' This study was informed by the pragmatist philosophy and used the sequential exploratory approach. From a population of 50 virtual region graduates in 2022, 16 were sampled for this study. Findings were that using ICT for ZOU's online-communication was uncomplicated. Half the graduates used their laptops for elearning while the other half used other means. Most students indicated that lack of robust ICT-infrastructure led to students' inability to access learning materials. 50% of the students indicated that ZOU's responses online was slow. All graduates indicated that ZOU online tutorials were unavailable. Most graduates' lives/careers/businesses improved after the attainment of ZOU's virtual-qualification. All graduates were willing to recommend studies with ZOU's Virtual region. They rated ZOU as most-convenient. Challenges graduates faced included unavailable online-tutorials, computer-illiteracy, inadequate tools, unwillingness to change, lack of expertise, software problems, internet-connectivity, lack of robust ICT-infrastructure and administration challenges. Recommendations were that Government should supply free e-learning resources and training, timemanagement and attitude-change training programmes to enable prospects to use and access ICT easier. Band with had to be increased, e-tutorials to be functional and communication improved by ZOU's administration to allow full utilisation of ICT for learning purposes by students. Graduates needed hands-on skills to overcome e-learning challenges.
IJRISS, 2023
The paper examined the exposition of online-counselling to ZOU students. The mixed research desig... more The paper examined the exposition of online-counselling to ZOU students. The mixed research design was used with the sequential-exploratory strategy and an online-survey. Findings were that Student Advisors/Counsellors used both online and face-to-face modes. Online-counselling was considered useful although face-to-face counselling had the advantage of observing clients' feelings. Participants had no adequate online-counselling equipment to use. Online-counselling was time-consuming and costly due to network problems. Lack of video/teleconferencing equipment prevented participants from conducting ecounselling effectively. Younger compared to older students preferred online-counselling. The study recommended increasing Wi-Fi access and deploying video/conference equipment to users. Clients needed to observe the body language of the counsellor to see if they were empathizing with the client.
Oriental journal of computer science and technology
Reinforcement learning (RL) is a type of ML, which involves learning from interactions with the e... more Reinforcement learning (RL) is a type of ML, which involves learning from interactions with the environment to accomplish certain long-term objectives connected to the environmental condition. RL takes place when action sequences, observations, and rewards are used as inputs, and is hypothesis-based and goal-oriented. The key asynchronous RL algorithms are Asynchronous one-step Q learning, Asynchronous one-step SARSA, Asynchronous n-step Q-learning and Asynchronous Advantage Actor-Critic (A3C). The paper ascertains the Reinforcement Learning (RL) paradigm for cybersecurity education and training. The research was conducted using a largely positivism research philosophy, which focuses on quantitative approaches of determining the RL paradigm for cybersecurity education and training. The research design was an experiment that focused on implementing the RL Q-Learning and A3C algorithms using Python. The Asynchronous Advantage Actor-Critic (A3C) Algorithm is much faster, simpler, and s...
Global Journal of Computer Science and Technology: E-Network, Web & Security, 2023
The adoption of virtual reality (VR) and augmented reality (AR) headsets in futuristic and scienc... more The adoption of virtual reality (VR) and augmented reality (AR) headsets in futuristic and science fiction has made it possible for the Metaverse to exist as a single, universal, immersive virtual universe. By extending technology outside of our physical reality, the Metaverse alters the human experience. The four categories we use to categorize metaverse definitions are environment, interface, interaction, and social value. Currently, it is unclear what the metaverse's structure and elements are. A cybersecurity framework for these devices is necessary as the world grows more interconnected and immersive technologies are increasingly widely used in business, government, and consumer markets. Used was a literature review. The goal of the study is to create a cybersecurity model for a Roblox-based Metaverse architecture framework that can be applied to internationalization, the value chain of education, and the delivery of online and e-learning education. The research is conducted using the Interpretivist Paradigm.
Oriental Journal of Computer Science and Technology, 2023
Reinforcement learning (RL) is a type of ML, which involves learning from interactions with the e... more Reinforcement learning (RL) is a type of ML, which involves learning from interactions with the environment to accomplish certain long-term objectives connected to the environmental condition. RL takes place when action sequences, observations, and rewards are used as inputs, and is hypothesis-based and goal-oriented. The key asynchronous RL algorithms are Asynchronous one-step Q learning, Asynchronous one-step SARSA, Asynchronous n-step Q-learning and Asynchronous Advantage Actor-Critic (A3C). The paper ascertains the Reinforcement Learning (RL) paradigm for cybersecurity education and training. The research was conducted using a largely positivism research philosophy, which focuses on quantitative approaches of determining the RL paradigm for cybersecurity education and training. The research design was an experiment that focused on implementing the RL Q-Learning and A3C algorithms using Python. The Asynchronous Advantage Actor-Critic (A3C) Algorithm is much faster, simpler, and scores higher on Deep Reinforcement Learning task. The research was descriptive, exploratory and explanatory in nature. A survey was conducted on the cybersecurity education and training as exemplified by Zimbabwean commercial banks. The study population encompassed employees and customers from five commercial banks in Zimbabwe, where the sample size was 370. Deep reinforcement learning (DRL) has been used to address a variety of issues in the Internet of Things. DRL heavily utilizes A3C algorithm with some Q-Learning, and this can be used to fight against intrusions into host computers or networks and fake data in IoT devices.
Advances in computational intelligence and robotics book series, Apr 7, 2023
Reinforcement learning (RL) is learning from interactions with the environment in order to accomp... more Reinforcement learning (RL) is learning from interactions with the environment in order to accomplish certain long-term objectives connected to the environmental condition. Reinforcement learning takes place when action sequences, observations, and rewards are used as inputs, and is hypothesis-based and goal-oriented. The purpose of the research was to conduct a systematic literature review of reinforcement algorithms in machine learning in order to develop a successful multi-agent RL algorithm that can be applied to robotics, network packet routing, energy distribution, and other applications. The robotics-related RL techniques of value-based RL, policy-based RL, model-based RL, deep reinforcement learning, meta-RL, and inverse RL were examined. As a result, the robotics-related RL techniques of value-based RL, policy-based RL, model-based RL, deep RL, meta-RL, and inverse RL were discussed in this research work. The asynchronous advantage actor-critic algorithm (A3C) is one of the best reinforcement algorithms. A3C performs better on deep RLchallenges and is quicker and easier to use.
Ubiquitous and Pervasive Computing - New Trends and Opportunities
Among the most revolutionary technologies are big data analytics, artificial intelligence (AI) an... more Among the most revolutionary technologies are big data analytics, artificial intelligence (AI) and robotics, machine learning (ML), cybersecurity, blockchain technology, and cloud computing. The project was focused on how to create a Big Data Analytics Architecture Framework to increase the production capability and global trade for Sub-Saharan Africa’s oilseeds and textile industries (SSA). The infrastructure, e-commerce, and disruptive technologies in the oilseeds and textile industries, as well as global e-commerce, all demand large investments. The pragmatic paradigm served as the foundation for the research approach. This study employed a review of the literature, document analysis, and focus groups. For the oilseeds and textile sectors in SSA, a Big Data analytics architectural framework was created. The Hadoop platform was created as a framework for big data analytics. The open-source Hadoop platform offers the analytical tools and computing capacity needed to handle such mas...
Review of “The Divine Matrix: Bridging Time, Space, Miracles and Belief” By Gregg Braden, 2018
The review below presents a synopsis of the content, style and merit of the book on "The Divine M... more The review below presents a synopsis of the content, style and merit of the book on "The Divine Matrix: Bridging Time, Space, Miracles, and Belief" by Gregg Braden (Braden, G., 2007). The book presents a mix of science, spirituality and miracles. This Mind is the matrix of all matter and all communication with this field of energy happens through emotion. Recent discoveries purport the reality of Planck's matrix, The Divine Matrix 2007, which is supposed to bridge imagination and reality in line with people's beliefs. In the book, Braden refers to the universal field of energy that the father of quantum theory, Max Planck, describes as a field that connects everything. The book highlights 20 keys within the 4 main points that are meant to empower the reader to feel a stronger sense of control of being an Clive participant in life rather than a victim of life's whims. It is argued that The Divine Matrix is our world, and that it is also everything in our world. The human body offers us a beautiful simple example of a hologram. The power of this matrix in our lives is unleashed by an understanding of the matrix and speaking the language thereof. According to Braden, active participants create their own reality. This book is marriage among positive psychology, quantum physics and spirituality. Lessons from experiments in quantum physics suggest that the very act of observation is an act of creation, and that consciousness is doing the creating. This approach is particularly of great significance in sustainable development and global development in the developing countries. ANALYTICAL EXPOSITION The review below presents a synopsis of the content, style and merit of the book on "The Divine Matrix: Bridging Time, Space, Miracles, and Belief" by Gregg Braden (Braden, G., 2007). The book presents a mix of science, spirituality and miracles. In 1944, Max Planck, the father of quantum theory, introduced the novel idea of divine matrix as the source of the birth of stars, the DNA of life, and all other originations. Recent discoveries purport the reality of Planck's matrix, The Divine Matrix (Braden, G., 2007, p.ix), which is supposed to bridge imagination and reality in line with people's beliefs. Braden totally believes in this web of energy, The Divine Matrix that connects everything in our lives and the world, from the healing of our bodies, to the success of our careers, relationships, and the peace between nations. The power of this matrix in our lives is unleashed by an understanding of the matrix and speaking the language thereof. Max Planck, the father of quantum theory, described in 1944, a universal field of energy that connects everything in creation: the Divine Matrix, with these words: "All matter originates and exist only by virtue of a force…We must assume behind this force the existence of a conscious and intelligent Mind. This Mind is the matrix of all matter." (Braden, G., 2007, p.3). From these words, it can be inferred that The Divine Matrix is our world, and that it is also everything in our world. This means that it is us and all that we love, hate, create and experience. In the book, Braden refers to the universal field of energy that the father of quantum theory, Max Planck, describes as a field that connects everything. In this field, people are the container for all things and the bridge between all things we create internally and externally as well as the surface which reflects back all that we have created (Braden, G., 2007, p.3). The field of energy is holographic, where each piece mirrors the whole. Thus change on any level is reflected throughout the whole. All communication with this field of energy happens through emotion (Braden, G., 2007, p.xix). The book highlights 20 within these 4 main points that are meant to empower the reader to feel a stronger sense of control of being an Clive participant in life rather than a victim of life's whims.
Study on “Building Social Business: The New Kind of Capitalism That Serves Humanity’s Most Pressing Needs” by Muhammad Yunus, 2019
The essay or review describes or analyses the content, style and merit of the publication on Soci... more The essay or review describes or analyses the content, style and merit of the publication on Social
Business by Professor Muhammad Yunus (Yunus, 2010), with a focus on the new idea, theory and
practice of social business. Social business is defined as “A non-dividend company that is created to
address and solve a social problem“. He introduced rules by which his clients would pay him back in
weekly increments without interest. Through a multi-dimensional world-view, capitalism can begin
to include space for social business. A social business combines commercial and social goals. The
investors desire no personal gain and so establish the investment purely to achieve one or more
social objectives. Grameen Bank has since grown as a nationwide bank which serves over 8 million
borrowers, most of whom are women. Yunus argues that social businesses are more beneficial than
mere charity organizations because charity encourages dependence among those being served,
whilst social businesses put those being served in the position of being an active participant in the
economy. He contends that poverty is not created by poor people but it is created by the system of
built institutions. The philanthropy side of social business makes sense and logically very convincing.
Its feasible to do both conventional business and social business. Traditional capitalism is viewed as
seeing individuals as one-dimensional beings that are only out for personal gain, which in the world
of economics results in making highest profit possible. Social businesses must be self-sustaining and
its owners must remain committed to never take any dividend beyond the return of investment.
However, a social enterprise combines commercial and social goals, but with emphasis on the latter
Essay On “Quantum Shift in the Global Brain: How the New Scientific Reality Can Change Us and Our World” by Ervin Laszlo, 2018
The practical side focuses on the problems, opportunities, and challenges now faced individually ... more The practical side focuses on the problems, opportunities, and challenges now faced individually and collectively, and the theoretical side explores the reality suggested by the latest developments in the sciences. Like a two-sided coin, the book provides a background for a particular period in time of quantum shifts, as the terrain and map are changing. The world is now faced with a Macroshift that requires humanity to change with the rapidly changing world, and adopt a new "reality ABSTRACT The essay or review below describes or analyses the content, style and merit of the book on "Quantum Shift in the Global Brain: How the New Scientific Reality Can Change Us and Our World" by Ervin Laszlo (Laszlo, E., 2008). There is now a shift in the materialistic scientific view of reality towards the multidimensional worldview of multiple interconnected realities long known by some of the world's established spiritual traditions. In this way humanity's critical choice is clearly articulated on whether to be the last generation of an outgoing, obsolete world; or the first of a pioneering one that takes us into the future. The world is now faced with a Macroshift that requires humanity to change with the rapidly changing world, and adopt a new "reality map" to guide the world through the environmental, scientific, and geopolitical upheavals as it faces various problems, opportunities, and challenges both individually and collectively. However, it is important to distinguish between random noise and deterministic chaos.The practical side focuses on the problems, opportunities, and challenges now faced individually and collectively, and the theoretical side explores the reality suggested by the latest developments in the sciences. The book gives a scientific explanation on Chaos Theory and Birfucation. Deterministic chaos occurs in a low-dimensional space, while random noise does not. An attractor is a set of points or states in state space to which trajectories within some volume of state space converge asymptotically over time. It is a fact that very few countries are still food self-sufficient, and the internationally available food reserves are shrinking. Like a two-sided coin, the book provides a background for a particular period in time of quantum shifts, as the terrain and map are changing. The fascinating book caters for both lifelong interests and research of the author. More than 900 million people are classified as slum-dwellers, and in the poorest countries 78 percent of the urban population subsists under life-threatening circumstances.
Review of “Fractal Time: The Secret of 2012 and A New World Age” by Gregg Braden, 2018
The review below presents a synopsis of the content, style and merit of the book on "Fractal Time... more The review below presents a synopsis of the content, style and merit of the book on "Fractal Time: The Secret of 2012 and a New World Age" by Gregg Braden (Braden, G., 2009). Our spiritual relationship with God and the universe all appear to be directly influenced by the planetary changes that are being documented now by the best science of today, and supported by various patterns of war and peace. Braden was totally convinced that the Time Code works. Braden posits that time based patterns can be discerned and plotted using his Time Code whether they are grand scale effects emanating from the Big Bang or a more personal scale charting repetitive patterns of setbacks, opportunities and triumphs in one's own life. Gregg Braden himself admits that his book is not scientific. The Maya calculated the end of time and inscribed it as a permanent record for future generations about 2000 years ago. The shift of world ages has been experienced by only five generations in the last 26,000 years, and we will be the sixth. Braden believes that we are living the end of time defined by a 5,125 year cycle of time where the present world age began in 3114B.C. The earth and our solar system complete a cycle every 5,125 years through the heavens.
Model Structure for Block Chain Technology and Cryptocurrency for the Financial Services Sector in Zimbabwe, 2021
The study was purposed to develop the model structure for blockchain technology and cryptocurrenc... more The study was purposed to develop the model structure for blockchain technology and cryptocurrency, and determine the factors that influence the adoption of blockchain technology and cryptocurrency in Zimbabwe in order to make value-adding contributions to the cybersecurity risk management of the financial services sector. Cybersecurity is the collection of policies, techniques, technologies, and processes that work together to protect the confidentiality, integrity, and availability of computing resources, networks, software, programs, and data from attack. Cybersecurity threats have thus shifted from the cryptocurrency to attacking platforms using the cryptocurrency such as crypto exchanges. Essentially, there would be no bitcoin without Blockchain but Blockchain exists without bitcoin.The entire system works with a distributed ledger technology that operates on a decentralized pattern. The blockchain is distributed and highly available, exhibits irreversibility and immutability, and eliminates intermediaries in banking sector. For the blockchain to function fully, it requires components such as the Node, Transaction, Block as a data structure, Chain of the blocks, Miners to perform the block verification process, and Consensus (consensus protocol). The Mixed Method methodology was used. The research utilized focus groups and document analysis to gather knowledge on the subject. A survey was conducted which included distribution of questionnaires and conducting interviews with heads of the banking sector. Findings suggest that, cryptocurrency which is based on blockchain technology is resistant to cybersecurity threats. The research also revealed that Zimbabwe has not yet legally adopted the use of cryptocurrency. We also concluded that cybersecurity systems in Zimbabwe are still under development and a lot of work has to done to ensure that the country is satisfactorily protected from cybersecurity threats. Since locally Bitcoin has been banned most of the traders have resorted to using South African accounts. Central Bank Digital Currency (CBDC) is another form of fiat money, similar to coin and banknote, which can be effectively exchanged for cash in denominations. The network layer is a bridge between the top regulators and ordinary users.The local distributed structure can utilize blockchain to solve the centralized load problem, enrich the financial organization structure, and expedite the payment delivery. Using block-chain technology, settlements can be increasingly optimized reducing the amount of time and money needed. They can allow auditors and government official's access to the block-chain. Transparency greatly increases by using smart contracts and block-chain technology.
Model Structure for Block Chain Technology and Cryptocurrency for the Financial Services Sector in Zimbabwe, 2021
The study was purposed to develop the model structure for blockchain technology and cryptocurrenc... more The study was purposed to develop the model structure for blockchain technology and cryptocurrency, and determine the factors that influence the adoption of blockchain technology and cryptocurrency in Zimbabwe in order to make value-adding contributions to the cybersecurity risk management of the financial services sector. Cybersecurity is the collection of policies, techniques, technologies, and processes that work together to protect the confidentiality, integrity, and availability of computing resources, networks, software, programs, and data from attack. Cybersecurity threats have thus shifted from the cryptocurrency to attacking platforms using the cryptocurrency such as crypto exchanges. Essentially, there would be no bitcoin without Blockchain but Blockchain exists without bitcoin.The entire system works with a distributed ledger technology that operates on a decentralized pattern. The blockchain is distributed and highly available, exhibits irreversibility and immutability, and eliminates intermediaries in banking sector. For the blockchain to function fully, it requires components such as the Node, Transaction, Block as a data structure, Chain of the blocks, Miners to perform the block verification process, and Consensus (consensus protocol). The Mixed Method methodology was used. The research utilized focus groups and document analysis to gather knowledge on the subject. A survey was conducted which included distribution of questionnaires and conducting interviews with heads of the banking sector. Findings suggest that, cryptocurrency which is based on blockchain technology is resistant to cybersecurity threats. The research also revealed that Zimbabwe has not yet legally adopted the use of cryptocurrency. We also concluded that cybersecurity systems in Zimbabwe are still under development and a lot of work has to done to ensure that the country is satisfactorily protected from cybersecurity threats. Since locally Bitcoin has been banned most of the traders have resorted to using South African accounts. Central Bank Digital Currency (CBDC) is another form of fiat money, similar to coin and banknote, which can be effectively exchanged for cash in denominations. The network layer is a bridge between the top regulators and ordinary users.The local distributed structure can utilize blockchain to solve the centralized load problem, enrich the financial organization structure, and expedite the payment delivery. Using block-chain technology, settlements can be increasingly optimized reducing the amount of time and money needed. They can allow auditors and government official's access to the block-chain. Transparency greatly increases by using smart contracts and block-chain technology.
GRIN Verlag Publications., Munich, Germany, E-Book, 16 pages, ISBN# ISBN: 9783668987579, July, 2019, https://www.grin.com/document/491439, 2019
The essay or review below describes or analyses the content, style and merit of the developments ... more The essay or review below describes or analyses the content, style and merit of the developments in Advanced Complexity Theory. Complex, self-organising, adaptive systems possess a kind of dynamism that makes them qualitatively different from static objects such as computer chips. Complex systems are more spontaneous, more disorderly, more alive than that. In the past three decades, chaos theory has shaken science to its foundations with the realisation that very simple dynamical systems can give rise to extraordinarily intricate behaviour. Chaos theory is the qualitative study of unstable, aperiodic behaviour in deterministic, non-linear, dynamical systems.Chaos / complexity scientists have identified a number of describing features of complex nonlinear systems. The main features of complex nonlinear systems are known to be "dynamic, nonlinear, chaotic, unpredictable, sensitive to initial conditions, open, self-organizing, feedback sensitive and adaptive". Two central aspects of chaos theory are the mathematical study of abstract dynamical systems and the application of these dynamical models to complex behaviour in actual experimental systems.There are three aspects of Chaos that relate to fractal patterns, bounded infinity, and unpredictability. Since the notions of nonlinearity incorporate both chaos theory in mathematics and complexity theory in science, an understanding of complexity theory might assist in the elucidation of chaotic concepts.
GRIN Verlag Publications., Munich, Germany, E-Book, 17 pages, ISBN# 9783668986367, July, 2019, https://www.grin.com/document/491408,,, 2019
The paper presents an analytical exposition, critical context and integrative conclusion on the t... more The paper presents an analytical exposition, critical context and integrative conclusion on the trends and best practices in Information Technology Management, and reviews and evaluates the key issues, trends and future direction of Modern Information Technology Management. IT is generally accepted as a key enabler of economic and technological growth.Managers implement new technology to change something: the organization, the nature of work, relationships with other organizations, or some other facet of business. Information Technology (IT) plays a vital role in leveraging productivity and efficiency in private organizations, governments and research. The value of IT in any organization depends on its infrastructure, which consists of computers, network and telecommunication technologies, data and core software applications. Information Technology (IT) is now a force and driver of modern technological development and globalization, and makes the management of information more efficient and effective. Technology management entails all management activities that determine the application of policy, objectives and responsibilities as well as their execution in an organization in terms of planning, allocating resources, organizing and ensuring outcomes that improve processes. The major IT Management issues are: Using technology to design efficient and effective organizations; Developing a plan for information technology in the organization; Using IT as a part of corporate strategy; Taking advantage of interorganizational systems; Deciding on and developing new applications of IT; Reengineering business processes; Adopting special applications; Changing the organization; Managing the IT infrastructure in a time of explosive growth and technological change; Deciding whether and what to outsource; and Deciding how much to invest in IT. Knowledge and skills are a necessary and sufficient condition for technological progress. Developing countries lack enough skilled IT persons who can design, program, install, configure and maintain Information Technology in this constantly changing industry. Accordingly, lack of qualified and globally recognized IT professionals is seriously hampering IT adoption and development. Management Information Systems refer to information management methods tied to the automation or support of human decision making, whereas IT Management refers to the IT related management activities in organizations.
GRIN Verlag Publications., Munich, Germany, E-book, 22 pages, ISBN #, 9783668980433, July, 2019, https://m.grin.com/document/491407, 2019
The paper presented an analytical exposition, critical context and integrative conclusion on the ... more The paper presented an analytical exposition, critical context and integrative conclusion on the discussion on the meaning, significance and potential applications of theoretical foundations of computer science with respect to Algorithms Design and Analysis; Complexity Theory; Turing Machines; Finite Automata; Cryptography; and Machine Learning. An algorithm is any well-defined computational procedure that takes some value or sets of values as input and produces some values or sets of values as output. A Turing machine consists of a finite program, called the finite control, capable of manipulating a linear list of cells, called the tape, using one access pointer, called the head.Cellular automata is an array of finite state machines (inter-related). A universal Turing machine U is a Turing machine that can imitate the behavior of any other Turing machine T. Automata are a particularly simple, but useful, model of computation which were were initially proposed as a simple model for the behavior of neurons. A model of computation is a mathematical abstraction of computers which is used by computer scientists to perform a rigorous study of computation. An automaton with a finite number of states is called a Finite Automaton (FA) or Finite State Machine (FSM). The Church-Turing Thesis states that the Turing machine is equivalent in computational ability to any general mathematical device for computation, including digital computers. The important themes in Theoretical Computer Science (TCS) are efficiency, impossibility results, approximation, central role of randomness, and reductions (NP-completeness and other intractability results).
3.GRIN Verlag Publications, Munich, Germany, E-book, 14 pages, ISBN # 9783668983892, July, 2019, https://www.grin.com/document/491406
The paper presents an analytical exposition, critical context and integrative conclusion on the s... more The paper presents an analytical exposition, critical context and integrative conclusion on the six major text books on Algorithms Design and Analysis. An algorithm is a sequence of unambiguous instructions for solving a problem, and is used for obtaining a required output for any legitimate input in a finite amount of time. Algorithms can be considered as procedural solutions to problems where the focus is on correctness and efficiency. The important problem types are sorting, searching, string processing, graph problems, combinatorial problems, geometric problems, and numerical problems. Divide-and-conquer is a general algorithm design technique that solves a problem by dividing it into several smaller sub-problems of the same type and about the same size, solving each of them recursively, and then combining their solutions to get a solution to the original problem. The brute-force approach to combinatorial problems is the exhaustive search, which generates each and every combinatorial object of the problem following a selection of those of them that satisfy all the constraints until a desired object is found. Although the main tool for analyzing the time efficiency of a nonrecursive algorithm is to set up a sum expressing the number of executions of its basic operation and ascertain the sum's order of growth, the main tool for analyzing the time efficiency of a recursive algorithm is to set up a recurrence relation expressing the number of executions of its basic operation and ascertain the solution's order of growth. A graph with directions on its edges is called a digraph. To list vertices of a digraph in an order such that for every edge of the digraph, the vertex it starts at is listed before the vertex it points to, is the topological sorting problem which has a solution if and only if a digraph is a dag (directed acyclic graph), i.e., it has no directed cycles. The topological sorting problem can be solved by two algorithms, one based on depth-first search; and the second based on a direct application of the decrease-by-one technique. The three major variations of decrease-and-conquer are: decrease-by-a-constant, most often by one (e.g., insertion sort) decrease-by-a-constant-factor, most often by the factor of two (e.g., binary search) variable-size-decrease (e.g., Euclid's algorithm).
GRIN Verlag, Munich, https://www.grin.com/document/491406, 2019
The paper presents an analytical exposition, a critical context, and an integrative conclusion on... more The paper presents an analytical exposition, a critical context, and an integrative conclusion on the six major text books on Algorithms design and analysis.
Algorithms form the heart of Computer Science in general. An algorithm is simply a set of steps to accomplish or complete a task that is described precisely enough that a computer can run it. It is a sequence of unambiguous instructions for solving a problem, and is used for obtaining a required output for any legitimate input in a finite amount of time. Algorithms can be considered as procedural solutions to problems where the focus is on correctness and efficiency.
The important problem types are sorting, searching, string processing, graph problems, combinatorial problems, geometric problems, and numerical problems.
GRIN Verlag, Munich, https://www.grin.com/document/491407, 2019
The paper presents an analytical exposition, critical context and integrative conclusion on the d... more The paper presents an analytical exposition, critical context and integrative conclusion on the discussion on the meaning, significance and potential applications of theoretical foundations of computer science with respect to Algorithms Design and Analysis, Complexity Theory, Turing Machines, Finite Automata, Cryptography and Machine Learning.
An algorithm is any well-defined computational procedure that takes some value or sets of values as input and produces some values or sets of values as output. A Turing machine consists of a finite program, called the finite control, capable of manipulating a linear list of cells, called the tape, using one access pointer, called the head. Cellular automata is an array of finite state machines (inter-related).
A universal Turing machine U is a Turing machine that can imitate the behavior of any other Turing machine T. Automata are a particularly simple, but useful, model of computation which were were initially proposed as a simple model for the behavior of neurons. A model of computation is a mathematical abstraction of computers which is used by computer scientists to perform a rigorous study of computation. An automaton with a finite number of states is called a Finite Automaton (FA) or Finite State Machine (FSM).
The Church-Turing Thesis states that the Turing machine is equivalent in computational ability to any general mathematical device for computation, including digital computers. The important themes in Theoretical Computer Science (TCS) are efficiency, impossibility results, approximation, central role of randomness, and reductions (NP-completeness and other intractability results).