Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dharm Singh Jat is active.

Publication


Featured researches published by Dharm Singh Jat.


Advances in intelligent systems and computing | 2016

Fuzzy Logic-Based Expert System for Assessment of Bank Loan Applications in Namibia

Dharm Singh Jat; Axel Jerome Xoagub

In the present scenario, the majority of people in Namibia do not have enough capital to build houses, start-up businesses so they turn to banks to get a loan. In today’s era, banks loans are considered to be one of the highest market risk phenomenon. Unsecured bank loans that are given without any collateral are a major stumbling in today’s world, which can be seen from the economic recession that occurred across the world. The aim of this review paper is to present the exhaustive review and introduce a fuzzy logic-based automated artificial system, replacing the existing manual system, which will help in decision-making for disbursement of the bank loan and give the reason for the inferred decision.


2016 International Conference on ICT in Business Industry & Government (ICTBIG) | 2016

A quick cybersecurity wellness evaluation framework for critical organizations

Husin Jazri; Dharm Singh Jat

The dynamics of cyber threats globally exposes many critical organizations to information security risks on a daily basis or even shorter. As a result, some of the critical organizations lose focus and becomes blinded of changing risks level. Thus, there is an urgent need to have a quick evaluation framework based on well-established security criteria that would enable critical organizations to detect security weaknesses as fast as the threats that come, and rectify those vulnerabilities before attackers taking advantage. This paper proposes a simplified and quick framework of measuring cyber security risks profile for critical organizations. This simplified framework can also be built into a real time cybersecurity dashboard system for critical organizations to use for quick monitoring.


Archive | 2018

A Review of the Quality of Service for Time-Sensitive Applications Through Admission Control in 802.11 WLAN

Dharm Singh Jat; Arun Shejwal; Guy Lusilao; Charu Singh

Today, the text, voice, and video communications have become the integrated part of our society. All spheres of life, from industry to leisure, now depend upon received data and its reliable and in-time transmission. This paper provides an understanding of the current challenges of Quality of Service (QoS) for real-time application through Admission Control in the network based on IEEE 802.11 WLAN protocol. It explains the gaps in research and limitations that exist in current admission control schemes. The study proposal gives out work method to develop the efficient and effective admission control scheme for 802.11 WLAN and bridge the gap in research.


Archive | 2018

Internet Victimization Patterns Over Mobile Phone in Namibia

Husin Jazri; Elizabeth Paulus; Dharm Singh Jat; Durgesh Kumar Mishra

The growing evidences are suggesting that Internet victimization patterns are increasing as smartphone technology and mobile phone applications evolve. This research examines mobile phone-based Internet victimization in the 14 regions across Namibia. This research uses samples of 232 participants across Namibia with a 26-question-based survey. The survey explains in some detail the behavior of online victims and possible perpetrators. The survey also outlines different types of Internet victimizations over mobile phone. Based on the Internet victimizations scorecard, males are found to experience more instances of victimization than women in Namibia. Social networking, forum, and blog use predicted Internet victimization more than any other means. This research finding revealed that this country is in need of specific measures to curb the increase of Internet victimization and educate its citizen on this issue urgently.


Archive | 2018

The Study of the Relationship Between Internet Addiction and Depression Amongst Students of University of Namibia

Poonam Dhaka; Atty Mwafufya; Hilma Mbandeka; Iani de Kock; Manfred Janik; Dharm Singh Jat

The aim of this preliminary study was to explore the impact of Internet usage on individual functioning by exploring the relationship between Internet usage and depression amongst the students of University of Namibia. An exploratory study was conducted amongst 36 conveniently selected males and females’ students. This study investigated prevalence of internet addiction and its association with depression. In this study two tests were used, the Young Internet Addiction Test (YIAT) and the Patient Health Questionnaire (PHQ-9). The males scored an average of 36.6 on the YIAT whilst females scored an average of 33.9. On the PHQ-9, the males scored 14.7 and females scored 16 on average. The differences in hours spend per day for females were 4.5 h and males spend 6.4 on average. The result of this exploratory study reveals that there is a correlation between Internet addiction scores, depression scores and time spent online.


Journal of Statistics and Management Systems | 2018

Applications of statistical techniques and artificial neural networks: A review

Dharm Singh Jat; Poonam Dhaka; Anton S. Limbo

Abstract Big data is everywhere, and storage is affordable. The existing hardware and software are unable to analysis the vast amount of various types of data. Big data has become too complex and too dynamic to be able to process, store, analyze and manage with traditional data tools. Various statistical methods are important tools for big data analysis, but certain assumptions are required. So, a need emerges to explore an intelligent technique to analysis a large amount of data efficiently. One of the important approach used in machine learning is an artificial neural network (ANN) and is used to analysis the big data by using algorithms which allows learning, and the target value are based on data alone as compared to set of certain assumptions in statistical methods. Learning process can be simplified and automated by using iterative approach. This paper gives useful insight into the capabilities of Statistical Techniques and Artificial Neural Networks used in different types of applications.


Journal of Information and Optimization Sciences | 2017

Performance analysis and throughput optimization of the 802.11N EDCA for video traffic

Dharm Singh Jat; Lal Chand Bishnoi; Arun Shejwal; Shoopala Nambahu

Abstract One of the promising candidate access technology for wireless communication in present and the future scenario is based on IEEE 802.11 Wireless LAN (WLAN) standard. The popularity of WLAN is further driven by the ability to use portable mobile hand-held devices that support applications with increasing multimedia content.This study presented on analysis of throughput performance and average delay of video traf fic over wireless EDCA WLAN networks by aggregation effect using the simulation methodology. In this study, the effect of frame aggregation (FA) mechanism for H.264/SVC video traffic on throughput and average delay of IEEE802.11n have been investigated. Simulation results validate the efficiency of the suggested MAC aggregation mechanism and aggregation sizes are adapted to achieve throughput optimization. Result shows significant improvement between measurement defined by the draft of IEEE802.11n and the proposed methodology.


international conference on information and communication technology | 2016

Relevance of Cloud Computing in Namibia: A Case Study

Dharm Singh Jat; Michael S. Haodom; Anicia Peters

The purpose of this study is to examine if cloud computing is a feasible and a relevant computing solution for Namibia. Currently, there seems to be inadequate guidelines for adopting cloud computing in Namibia. The research will introduce the technologies underlying cloud computing, and briefly describe different cloud computing technologies, as in how the cloud is access and what services are provided through the cloud. We also cover cloud computing from a commercial standpoint, to make sure that cloud computing adoption and underlying technologies are fully realized, and the risks involved are properly understood.


international conference on information and communication technology | 2016

The Effect of Internet Usage on the Psychological States of Adolescents and Young Adults

Poonam Dhaka; Dharm Singh Jat; Isaac Nhamu; Charu Singh

The objective of this study was to investigate the prevalence of internet addiction and the impact of internet usage on the level of anxiety among the male and female students. The preliminary study compares the perceptions of 84 randomly selected males and females students from India and Namibia based on closed-ended questions about internet usage and anxiety. The Young Internet Addiction Test (YIAT) and the Hospital Anxiety and Depression Scale (HADS) were used as assessment tools for data collection. In this study the data was analyzed using mean, standard deviation, t-test and correlation analysis. Results showed that both parameters are significant and positively correlated means increasing the addiction increase the anxiety and the trend were same in male and female.


Archive | 2016

A Novel Cross-Layer Mechanism for Improving H.264/AVC Video Transmissions Over IEEE 802.11n WLANs

Lal Chand Bishnoi; Dharm Singh Jat

This paper proposes a Novel Cross-layer Mechanism (NCLM) for Improving H.264/AVC Video Transmissions over IEEE 802.11n wireless network. According to the network traffic loads and the importance of the video data, the proposed mechanism dynamically selects the suitable access categories (AC) instead of predefined AC. This proposed novel cross-layer mechanism gives the information about the importance of video packets to the MAC layer. Information about the network traffic load is available from the queue length of all access categories. During this research, we analyzed the performance of NCLM in both light and heavy load over IEEE 802.11n wireless networks. In this research, the performance of video traffic measured by average: Throughput, PSNR, VQM, and SSIM. Simulation results of this research demonstrate that the performance of proposed mechanism was higher in comparison to the results derived from IEEE 802.11n EDCA, CLOT, DACMM, IPB-Frame AMM, and Static Mapping algorithm.

Collaboration


Dive into the Dharm Singh Jat's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anton S. Limbo

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Arun Shejwal

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Husin Jazri

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Shoopala Nambahu

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Anicia Peters

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Axel Jerome Xoagub

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Chucknorris Garikayi Madamombe

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Durgesh Kumar Mishra

University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge