Theses And Dissertations
Permanent URI for this collectionhttp://hdl.handle.net/20.500.11837/212
Browse
Recent Submissions
Item IPSec Traffic Overhead Analysis in Dual Stack 1Pv4/1Pv6 Transition Mechanisms(University of Fort Hare, 2005-12) Mujinga, MathiasInternet Protocol version 6 (IPv6) is the next generation of Internet Protocol proposed by the Internet Engineering Task Force (IETF) to supplant the current Internet Protocol version 4 (/Pv4). Lack of security below the application layer in IPv4 is one of the reasons why there is a need for a new Internet Protocol. IPv6 has built-in support for the Internet Protocol Security protocol (IPSec). IPSec is an Internet standard that is designed to provide data confidentiality, integrity and the authentication through the use of the Authentication Header (AH) and Encapsulating Security Payload (ESP) protocols.Item A Comparison of Open Source Native XML Database Products(University of Fort Hare, 2005-12) Mabanza, NtimaThis introductory chapter discusses the motivation for studying XML databases, including some questions that provide direction for the work. It also briefly introduces previous research, the scope of the thesis and also the research methodology. Chapter one concludes by giving the organization of the thesis.Item Development of a Web-based interface for a wireless Sensor network monitoring system(University of Fort Hare, 2007-12) Gumbo, SibukeleIn the recent past, wireless sensor technology has undergone advancements in its autonomous data collecting aspects, and has become an area worth investigating in relation to structural monitoring applications. The system described in this thesis aims at acquiring , storing and displaying overhead transmission line related data collected from a wireless sensor network. Open source tools were used in its development and implementation. The inherent linearly aligned topology of transmission 1in6 monitoring devices is not without shortcomings; hence analysis of linear node placement, hardware and Software components was carried out to determine the feasibility of the system. Their limited data processing capabilities has motivated the development of a post processing wireless sensor application in Order to present any collected structural data in an understandable format.Item The classification performance of Bayesian networks classifiers : a case study of detecting Denial of Service (DoS) attacks in cloud computing environments(University of Fort Hare, 2016) Moyo, LindaniIn this research we propose a Bayesian networks approach as a promissory classification technique for detecting malicious traffic due to Denial of Service (DoS) attacks. Bayesian networks have been applied in numerous fields fraught with uncertainty and they have been proved to be successful. They have excelled tremendously in classification tasks i.e. text analysis, medical diagnoses and environmental modeling and management. The detection of DoS attacks has received tremendous attention in the field of network security. DoS attacks have proved to be detrimental and are the bane of cloud computing environments. Large business enterprises have been/or are still unwilling to outsource their businesses to the cloud due to the intrusive tendencies that the cloud platforms are prone too. To make use of Bayesian networks it is imperative to understand the ―ecosystem‖ of factors that are external to modeling the Bayesian algorithm itself. Understanding these factors have proven to result in comparable improvement in classification performance beyond the augmentation of the existing algorithms. Literature provides discussions pertaining to the factors that impact the classification capability, however it was noticed that the effects of the factors are not universal, they tend to be unique for each domain problem. This study investigates the effects of modeling parameters on the classification performance of Bayesian network classifiers in detecting DoS attacks in cloud platforms. We analyzed how structural complexity, training sample size, the choice of discretization method and lastly the score function both individually and collectively impact the performance of classifying between normal and DoS attacks on the cloud. To study the aforementioned factors, we conducted a series of experiments in detecting live DoS attacks launched against a deployed cloud and thereafter examined the classification performance in terms of accuracy of different classes of Bayesian networks. NSL-KDD dataset was used as our training set. We used ownCloud software to deploy our cloud platform. To launch DoS attacks, we used hping3 hacker friendly utility. A live packet capture was used as our test set. WEKA version 3.7.12 was used for our experiments. Our results show that the progression in model complexity improves the classification performance. This is attributed to the increase in the number of attribute correlations. Also the size of the training sample size proved to improve classification ability. Our findings noted that the choice of discretization algorithm does matter in the quest for optimal classification performance. Furthermore, our results indicate that the choice of scoring function does not affect the classification performance of Bayesian networks. Conclusions drawn from this research are prescriptive particularly for a novice machine learning researcher with valuable recommendations that ensure optimal classification performance of Bayesian networks classifiers.Item Developing SOA wrappers for communication purposes in rural area(University of Fort Hare, 2010) Samalenge, JimmyThe introduction of Web Services as a platform upon which applications can communicate has contributed a great deal towards the expansion of World Wide Web technologies. The Internet and computing technologies have been some of the factors that have contributed to the socio-economic improvement of urban and industrial areas. This research focuses on the application of Service-Oriented Architecture (SOA) and Web Services technologies in Information and Communication Technologies for Development (ICT4D) contexts. SOA is a style used to design distributed systems, and Web Services are some of the common realizations of the SOA. Web Services allow the exchange of data between two or more machines in a simple and standardized manner over the network. This has resulted in the augmentation of ways in which individuals in a society and in the world communicate. This research aims to develop a SOA-based system with services that are implemented as Web Services. The system is intended to support communication activities of Dwesa community members. The communication methods identified as the most commonly used in the Dwesa community are Short Message Services (SMSs) and voice calls. In this research we have identified further methods (i.e. Multimedia Message Service, Electronic mail and Instant Messaging) to augment communication activities in Dwesa. The developed system, therefore, exposes SMS Web Service, MMS Web Service, Email Web Service and IM Web Service that are consumed in machine-to-machine, machine-to-person and person-to-person types of communication. We have also implemented a one-stop communication shop, through a web portal which provides interfaces to the different communication modules. Elaborate functional and usability testing have also been undertaken to establish the viability and end-user acceptance of the system respectively. This research has provided the initial validation of the effectiveness of the SOA-based system in ICT4D contexts.Item Building a semantic web-based e-health component for a multi-purpose communication centre(University of Fort Hare, 2010) Hlungulu, BulumkoRural communities have limited access to health information which is made available on the internet. This is due to poor infrastructure (i.e., lack of clinics or Internet access) and that gives them problems in accessing information within the domain of health. The availability of Information and Communication Technologies (ICTs) in a rural community can provide the community with a number of beneficial solutions to their problems as they maximize the potential of knowledge sharing and delivery. This research seeks to make use of ICTs deployed in the community of Dwesa, in order to contribute to improving the health standards of the community. It seeks to accomplish this by carrying out an investigation and literature review with the aim of understanding health knowledge sharing dynamics in the context of marginalized communities. The knowledge acquired will then be used in the development and implementation of a semantic web-based e-Health portal as part of the Siyakhula Living Lab (SLL) project. This portal will share and deliver western medical knowledge, traditional knowledge and indigenous knowledge. This research seeks to make use of a combination of Free and/or Open Sources Software in developing the portal to make it affordable to the community.Item Rural internet connectivity: a deployment in Dwesa-Cwebe, Eastern Cape, South Africa(University of Fort Hare, 2007) Mandioma, MartinThis thesis presents aspects of Internet connectivity in rural South Africa. The work looks at government initiatives being undertaken to connect rural communities to up-to-date information networks. Various projects that seek to connect rural areas of South Africa, as well as other remote areas around the world, are discussed. These projects present many novel ideas that have been successfully used to link rural communities in remote areas with the information age. In particular, wired and wireless access technologies that can be implemented to connect remote communities to the Internet are discussed. A field test utilizing GPRS, VSAT and WiMAX was implemented in Dwesa-Cwebe, Eastern Cape Province, South Africa. VSAT proved to offer better Internet connectivity in terms of throughput and latency. WiMAX was then successfully implemented to relay the signal over the remote area of Dwesa-Cwebe, thus effectively providing Internet connectivity to an area with limited cell phone coverage and no telephone lines.Item Implementing a robust, cost effective, e-commerce platform for a disadvantaged community of the Eastern Cape, South Africa(University of Fort Hare, 2008) Njeje, Sicelo GivenThe development of electronic commerce (e-commerce) is the most visible business use of the World Wide Web. The primary goal of an e-commerce site is to sell goods and services online. This project deals with developing an e-commerce platform for marginalized communities of the Eastern Cape region, South Africa. An online “shopping mall” to support the marketing of art and crafts from disadvantaged communities is presented, with Linux-Apache-MySQL-PHP (LAMP) as the development environment. Free and Open Source Software has been chosen to develop the virtual shopping mall system because the use of Open Source allows easy localization and extensions to the system developed and long term sustainability, as the source code is available. Also, it might start a “virtuous” circle, whereby young members of the communities hosting art and craft makers become involved in maintenance, and then production, of software systems. One important design constraint from the e-commerce platform presented in this thesis is the possibility for the art and craft makers to manage their shops directly, from the initial loading of their wares to the day-to-day maintenance, such as changes of price or items. The user requirement elicitation and initial field testing were conducted in Dwesa, an area on the wild coast, South Africa. The system currently comprising two shops is live at the time of writing this thesis at www.dwesa.com.Item Development of a web-based interface for a wireless sensor network monitoring system(University of Fort Hare, 2007) Gumbo, SibukeleIn the recent past, wireless sensor technology has undergone advancements in its autonomous data collecting aspects, and has become an area worth investigating in relation to structural monitoring applications. The system described in this thesis aims at acquiring, storing and displaying overhead transmission line related data collected from a wireless sensor network. Open source tools were used in its development and implementation. The inherent linearly aligned topology of transmission line monitoring devices is not without shortcomings; hence analysis of linear node placement, hardware and software components was carried out to determine the feasibility of the system. Their limited data processing capabilities has motivated the development of a post processing wireless sensor application in order to present any collected structural data in an understandable format.Item Development of an M-commerce security framework.(University of Fort Hare, 2014) Marufu, Mufudzi Anesu ChapmanResearch shows how M-Commerce has managed to find its way to previously inaccessible parts of the world as a major Information and Communication Technologies (ICT) tool for development due to widespread introduction of mobile phones in remote areas. M-Commerce has offered valuable advantages: anytime, anywhere, more personal, more location-aware, more context-aware, more age aware, always online and instant connectivity. But this is not without its problems, of which security is high on the list. The security issues span the whole M-Commerce spectrum, from the top to the bottom layer of the OSI network protocol stack, from machines to humans. This research proposes a threat-mitigation modular framework to help address the security issues lurking in M-Commerce systems being used by marginalised rural community members. The research commences with a literature survey carried out to establish security aspects related to M-Commerce and to determine requirements for a security framework. The framework classifies M-Commerce security threat-vulnerability-risks into four levels: human behaviour and mobile device interaction security, mobile device security, M-Commerce access channel security, wireless network access security. This is followed by a review of the supporting structures or related frameworks that the proposed framework could leverage to address security issues on M-Commerce systems as ICT4D initiatives. The proposed security framework based on the requirements discovered is then presented. As a proof-of-concept, a case study was undertaken at the Siyakhula Living Lab at Dwesa in the Eastern Cape province of South Africa in order to validate the components of the proposed framework. Following the application of the framework in a case study, it can be argued that the proposed security framework allows for secure transacting by marginalised users using M-Commerce initiatives. The security framework is therefore useful in addressing the identified security requirements of M-Commerce in ICT4D contexts.Item Development of high performance computing cluster for evaluation of sequence alignment algorithms(2015) Ngxande, MkhuseliAs the biological databases are increasing rapidly, there is a challenge for both Biologists and Computer Scientists to develop algorithms and databases to manage the increasing data. There are many algorithms developed to align the sequences stored in biological databases - some take time to process the data while others are inefficient to produce reasonable results. As more data is generated, and time consuming algorithms are developed to handle them, there is a need for specialized computers to handle the computations. Researchers are typically limited by the computational power of their computers. High Performance Computing (HPC) field addresses this challenge and can be used in a cost-effective manner where there is no need for expensive equipment, instead old computers can be used together to form a powerful system. This is the premise of this research, wherein the setup of a low-cost Beowulf cluster is explored, with the subsequent evaluation of its performance for processing sequent alignment algorithms. A mixed method methodology is used in this dissertation, which consists of literature study, theoretical and practise based system. This mixed method methodology also have a proof and concept where the Beowulf cluster is designed and implemented to perform the sequence alignment algorithms and also the performance test. This dissertation firstly gives an overview of sequence alignment algorithms that are already developed and also highlights their timeline. A presentation of the design and implementation of the Beowulf Cluster is highlighted and this is followed by the experiments on the baseline performance of the cluster. A detailed timeline of the sequence alignment algorithms is given and also the comparison between ClustalW-MPI and T-Coffee (Tree-based Consistency Objective Function For alignment Evaluation) algorithm is presented as part of the findings in the research study. The efficiency of the cluster was observed to be 19.8%, this percentage is unexpected because the predicted efficiency is 83.3%, which is found in the theoretical cluster calculator. The theoretical performance of the cluster showed a high performance as compared with the experimental performance, this is attributable to the slow network, which was 100Mbps, low processor speed of 2.50 GHz, and low memory of 2 Gigabytes.Item A decentralized multi-agent based network management system for ICTD networks(University of Fort Hare, 2014) Matebese, Sithembiso; Thinyane, MNetwork management is fundamental for assuring high quality services required by each user for the effective utilization of network resources. In this research, we propose the use of a decentralized, flexible and scalable Multi-Agent based system to monitor and manage rural broadband networks adaptively and efficiently. This mechanism is not novel as it has been used for high-speed, large-scale and distributed networks. This research investigates how software agents could collaborate in the process of managing rural broadband networks and developing an autonomous decentralized network management mechanism. In rural networks, network management is a challenging task because of lack of a reliable power supply, greater geographical distances, topographical barriers, and lack of technical support as well as computer repair facilities. This renders the network monitoring function complex and difficult. Since software agents are goal-driven, this research aims at developing a distributed management system that efficiently diagnoses errors on a given network and autonomously invokes effective changes to the network based on the goals defined on system agents. To make this possible, the Siyakhula Living Lab network was used as the research case study and existing network management system was reviewed and used as the basis for the proposed network management system. The proposed network management system uses JADE framework, Hyperic-Sigar API, Java networking programming and JESS scripting language to implement reasoning software agents. JADE and Java were used to develop the system agents with FIPA specifications. Hyperic-Sigar was used to collect the device information, Jpcap was used for collecting device network information and JESS for developing a rule engine for agents to reason about the device and network state. Even though the system is developed with Siyakhula Living Lab considerations, technically it can be used in any small-medium network because it is adaptable and scalable to various network infrastructure requirements. The proposed system consists of two types of agents, the MasterAgent and the NodeAgent. The MasterAgent resides on the device that has the agent platform and NodeAgent resides on devices connected to the network. The MasterAgent provides the network administrator with graphical and web user interfaces so that they can view network analysis and statistics. The agent platform provides agents with the executing environment and every agent, when started, is added to this platform. This system is platform independent as it has been tested on Linux, Mac and Windows platforms. The implemented system has been found to provide a suitable network management function to rural broadband networks that is: scalable in that more node agents can be added to the system to accommodate more devices in the network; autonomous in the ability to reason and execute actions based on the defined rules; fault-tolerant through being designed as a decentralized platform thereby reducing the Single Point of Failure (SPOF) in the system.Item Enhancement of the usability of SOA services for novice users(University of Fort Hare, 2014) Yalezo, SabeloRecently, the automation of service integration has provided a significant advantage in delivering services to novice users. This art of integrating various services is known as Service Composition and its main purpose is to simplify the development process for web applications and facilitates reuse of services. It is one of the paradigms that enables services to end-users (i.e.service provisioning) through the outsourcing of web contents and it requires users to share and reuse services in more collaborative ways. Most service composers are effective at enabling integration of web contents, but they do not enable universal access across different groups of users. This is because, the currently existing content aggregators require complex interactions in order to create web applications (e.g., Web Service Business Process Execution Language (WS-BPEL)) as a result not all users are able to use such web tools. This trend demands changes in the web tools that end-users use to gain and share information, hence this research uses Mashups as a service composition technique to allow novice users to integrate publicly available Service Oriented Architecture (SOA) services, where there is a minimal active web application development. Mashups being the platforms that integrate disparate web Application Programming Interfaces (APIs) to create user defined web applications; presents a great opportunity for service provisioning. However, their usability for novice users remains invalidated since Mashup tools are not easy to use they require basic programming skills which makes the process of designing and creating Mashups difficult. This is because Mashup tools access heterogeneous web contents using public web APIs and the process of integrating them become complex since web APIs are tailored by different vendors. Moreover, the design of Mashup editors is unnecessary complex; as a result, users do not know where to start when creating Mashups. This research address the gap between Mashup tools and usability by the designing and implementing a semantically enriched Mashup tool to discover, annotate and compose APIs to improve the utilization of SOA services by novice users. The researchers conducted an analysis of the already existing Mashup tools to identify challenges and weaknesses experienced by novice Mashup users. The findings from the requirement analysis formulated the system usability requirements that informed the design and implementation of the proposed Mashup tool. The proposed architecture addressed three layers: composition, annotation and discovery. The researchers developed a simple Mashup tool referred to as soa-Services Provisioner (SerPro) that allowed novice users to create web application flexibly. Its usability and effectiveness was validated. The proposed Mashup tool enhanced the usability of SOA services, since data analysis and results showed that it was usable to novice users by scoring a System Usability Scale (SUS) score of 72.08. Furthermore, this research discusses the research limitations and future work for further improvements.Item Investigation of the nfc technology for mobile Payments and the development of a prototype Payment application in the context of marginalized rural areas.(University of Fort Hare, 2014) Gurajena, CarolineBoth communication, and the methods and tools of commerce have evolved over time through the invention of new technologies. The latest of these technologies are mobile devices and electronic commerce respectively. The combination of these two technologies has resulted in the creation of electronic commerce which also enables mobile payments. Mobile payments (mpayments) are enabled by many technologies with Near Field Communication (NFC) being the most recent one. NFC is a wireless technology that enables mobile devices in close proximity to exchange data. The mobile device has already been enthusiastically accepted by the customers and they carry it with them wherever they go and this makes it a good device for providing a payment method alternative. This research looks at contactless mobile payment as a payment method. Customers in marginalized rural areas lack a payment alternative to cash hence in this research we are investigating and proposing the use of a NFC enabled mobile payment application for Marginalized Rural Areas. This research extensively evaluates and assesses the potential of using NFC enabled m-payments in Marginalized Rural Areas in South Africa by carrying out an investigation of the technology and its acceptance by customers. The investigation of the technology included implementation of a prototype application which was used to introduce the technology to the consumers. The customer acceptance of the NFC enabled mobile payments was evaluated using the Technology Acceptance model (TAM). The model was modified to suit the context of this study by adding more constructs. This research concluded that Near Field Communication enabled m-payments have great potential to be used and accepted by people in the marginalized rural areas.Item Exploring user experience (UX) factors for ICTD services(University of Fort Hare, 2014) Nyambi, Pride BongiweConsistent with global entities such as the United Nations- through the World Summit of the Information Society (WSIS), introduction of Information and Communication Technology (ICT) for human development has seen the introduction of ICT-based services aimed at facilitating socio-economic development of marginalized communities. The use of ICTs has always solicited the concept of Human Computer Interaction (HCI), which involves the methods which humans interact with technology. The types of User Interfaces (UIs) and interaction techniques that people use to interact with ICTs affects the way they perceive technology and eventually, their acceptance of the technology. Current ICT systems still haven‟t adopted the concept of placing the user at the core of the interaction. Users are still required to adapt themselves to the interface‟s characteristics; which limits the number of people who can use the system due to inabilities to adapt to the interface. As a result, the information embedded in these technologies is still inaccessible and useless to Marginalized Rural Area (MRA) users. Such usability challenges can be mitigated against and avoided by matching UI components with the users‟ mental models, language, preferences, needs and other socio-cultural artefacts. In this research, literature in Human-Computer Interaction (HCI) is reviewed with emphasis on the usability and User Experience (UX) during user interaction with ICTs using various modes of interactions. HCI emphasizes the need for systems to take account of user‟s characteristics such as their abilities, needs, socio-cultural experiences, behaviours and interests. In efforts to meet the requirement of UX, the user, system and the context of use, need to be evaluated, taking into consideration that changing one entity modifies the UX. This will be achieved by persona profiling to determine the key characteristics of the user communities, clustered according to the key UX attributes. Subsequently, through detailed usability evaluations, including the use of System Usability Scale (SUS) to determine user satisfaction with various UI components/techniques per identified persona- thus providing and persona mapping for usability of Information and Communication Technology for Development (ICTD) services. The results from this research are reflective of the importance of creating personas for usability testing. Some of the personas do not have a problem with interacting with most of the interfaces but their choice of interface comes from a preference point of view. For some personas, their skills and level of experience with ICTs motivates their choice of interface. The common UI component that users from across the spectrum appreciate is UI consistency which makes interaction easier and more natural. Common obstacles with current User Interfaces (UIs) that inhibit users from MRAs include the hefty use of text in interfaces, unintuitive navigation structures and the use of a foreign language. Differences in UIs from different application developers present an inconsistency which challenges the users from rural areas. These differences include the layout, the text entry methods and the form of output produced. A solution to this has been identified from the usability test as the use of speech-enabled interfaces in a language that can be understood by the target audience. In addition, through literature study it has been found that UX of interfaces can be improved by the use of less textual or text-free interfaces. Based on literature, users from MRAs can benefit from using hand-writing based UIs for text-based entry which mimics pen and paper environment for literate users who have experience with writing. Finally, the use of numbered options can assist illiterate users in tasks that requires users to choose options and for navigation. Therefore, consistency in UIs designed to be used by MRA users can improve usability of these interfaces and thus, improving the overall UX.Item Design and implementation of a multi-agent opportunistic grid computing platform(University of Fort Hare, 2016) Muranganwa, RaymondOpportunistic Grid Computing involves joining idle computing resources in enterprises into a converged high performance commodity infrastructure. The research described in this dissertation investigates the viability of public resource computing in offering a plethora of possibilities through seamless access to shared compute and storage resources. The research proposes and conceptualizes the Multi-Agent Opportunistic Grid (MAOG) solution in an Information and Communication Technologies for Development(ICT4D)initiative to address some limitations prevalent in traditional distributed system implementations. Proof-of-concept software components based on JADE (Java Agent Development Framework) validated Multi-Agent Systems (MAS) as an important tool for provisioning of Opportunistic Grid Computing platforms. Exploration of agent technologies within the research context identified two key components which improve access to extended computer capabilities. The first component is a Mobile Agent (MA) compute component in which a group of agents interact to pool shared processor cycles. The compute component integrates dynamic resource identification and allocation strategies by incorporating the Contract Net Protocol (CNP) and rule based reasoning concepts. The second service is a MAS based storage component realized through disk mirroring and Google file-system’s chunking with atomic append storage techniques. This research provides a candidate Opportunistic Grid Computing platform design and implementation through the use of MAS. Experiments conducted validated the design and implementation of the compute and storage services. From results, support for processing user applications; resource identification and allocation; and rule based reasoning validated the MA compute component. A MAS based file-system that implements chunking optimizations was considered to be optimum based on evaluations. The findings from the undertaken experiments also validated the functional adequacy of the implementation, and show the suitability of MAS for provisioning of robust, autonomous, and intelligent platforms. The context of this research, ICT4D, provides a solution to optimizing and increasing the utilization of computing resources that are usually idle in these contexts.Item Development of a Stemmer for the IsiXhosa Language(University of Fort Hare, 2016) Nogwina, Mnoneleli; Shibeshi, Z.S.IsiXhosa language is one of the eleven official languages and the second most widely spoken language in South Africa. However in terms of computational linguistics, the language did not get attention and natural language related work is almost non-existent. Document retrieval using unstructured queries requires some kind of language processing, and an efficient retrieval of documents can be achieved if we use a technique called stemming. The area that inlvolves document storage and retrieval is called Information Retrieval (IR). Basically, IR systems make use of a Stemmer to index document representations and also terms in users’ queries to retrieve matching documents. In this dissertation, we present the developed Stemmer that can be used in both conditions. The Stemmer is used in IR systems, like Google to retrieve documents written in isiXhosa. In the Eastern Cape Province of South Africa many public schools take isiXhosa as a subject and also a number of Universities in South Africa teach isiXhosa. Therefore, for a language important such as this, it is important to make valuable information that is available online accessible to users through the use of IR systems. In our efforts to develop a Stemmer for the isiXhosa language, an investigation on how others have developed Stemmers for other languages was carried out. From the investigation we came to realize that the Porter stemming algorithm in particular was the main algorithm that many of other Stemmers make use of as a reference. We found that Porter’s algorithm could not be used in its totality in the development of the isiXhosa Stemmer because of the morphological complexity of the language. We developed an affix removal that is embedded with rules that determine which order should be followed in stripping the affixes. The rule is that, the word under consideration is checked against the exceptions, if it’s not in the exceptions list then the stripping continue in the following order; Prefix removal, Suffix removal and finally save the result as stem. The Stemmer was successfully developed and was tested and evaluated in a sample data that was randomly collected from the isiXhosa text books and isiXhosa dictionary. From the results obtained we concluded that the Stemmer can be used in IR systems as it showed 91 % accuracy. The errors were 9 % and therefore these results are within the accepted range and therefore the Stemmer can be used to help in retrieval of isiXhosa documents. This is only a noun Stemmer and in the future it can be extended to also stem verbs as well. The Stemmer can also be used in the development of spell-checkers of isiXhosa.