Author:Jamison, Kevin A; Roux, Jeanne M; Zwane, LindokuhleDate:Sep 2021A development of an existing munition aimed at an entirely new target set was planned. A trade study was performed to identify the key design features and employment concepts that generate the optimum outcomes in a demanding operational ...Read more
Author:Mtsweni, Jabu SDate:Nov 2023Cybersecurity attacks are classified in the top 10 global risks by the World Economic Forum in 2023. The common cyber-incidents that affect businesses, governments, and individuals across the globe are data breaches. Recent reports indicate ...Read more
Author:Reddy, ReeshenDate:Sep 2021The Fourth Industrial Revolution or Industry 4.0 is an ongoing industrial revolution brought about by several emerging technologies expected to disrupt most business sectors. The effect of Industry 4.0 on the Electronic Warfare (EW) sector ...Read more
Author:Dawood, Zubeida C; Keet, CMDate:Dec 2020Large and complex ontologies lead to usage difficulties, thereby hampering the ontology developers’ tasks. Ontology modules have been proposed as a possible solution, which is supported by some algorithms and tools. However, the majority of ...Read more
Author:John, RS; Erasmus, Louwrence DDate:Jul 2020The objective of this study was to analyse the development of radar systems in a government research and development environment from a systems engineering perspective and identify which, if any, systems engineering tools and methods are used. ...Read more
Author:Pretorius, Morne; Mthethwa, Sthembile NDate:Sep 2019There are challenges and trade-offs associated with building secure decentralised systems that incorporate resource constrained devices into the Internet ecosystem, particularly the Internet of things. Introducing distributed ledgers solves ...Read more
Author:Mwim, EN; Mtsweni, Jabu SDate:Jul 2022There is a need to shift from a purely technological approach in addressing cybersecurity threats to a more human inclusive method. As a result, cybersecurity culture is gaining momentum in research as an approach in addressing cybersecurity ...Read more
Author:Gonçalves, Duarte P; Serfontein, Christian JDate:Nov 2022This article examines current and emerging threats to infrastructure as South Africa transitions from the National Key Points Act (NKPA), Act No. 102 of 1980 to the Critical Infrastructure Protection Act (CIPA), Act No. 8 of 2019. The aim is ...Read more
Author:Vermaak, F; Erasmus, Louwrence DDate:Oct 2023South Africa is a world-leading Platinum producer. Most of this mining takes place in an underground narrow tabular setting. Mines are heading for challenging times in the coming years because mines are becoming deeper and more expensive to ...Read more
Author:Jamison, Kevin ADate:Oct 2023Military and some civilian aircraft need to carry stores to perform their mission. There is a huge diversity of carriage aircraft and types of stores ranging from missiles, drop tanks, space launchers, and rescue equipment. Adding stores to ...Read more
Author:Pillay, Kasandra; Erasmus, Louwrence D; Pretorius, JCDate:Sep 2021The growing importance of advanced or value-added services (services over and above basic connectivity services) in national research and education networks (NRENs) is well understood in the research and education community. These services ...Read more
Author:Sebetoa, Matlapane R; Nwanebu, Docas; Malinga, Andries L; Venter, Jacobus PDate:Aug 2023Enabling Forward Air Control (FAC) through the Tactical Data Link (TDL) is an essential capability in modern military operations, providing effective Close Air Support (CAS). The modern TDL-based FAC system can enable faster, more reliable, ...Read more
Author:Malinga, Andries L; Strauss, A; Letaba, P; Pretorius, MWDate:Jun 2022It is said that 4IR requires new ways of conducting business, including planning for technological capabilities. Although technology roadmaps have been widely used for strategic technology planning, constructing and customising one for a ...Read more
Author:Malinga, Andries L; Oosthuizen, RudolphDate:Sep 2021Recent advances in technologies have changed how we live, conduct business, and interact with each other. Moreover, these advances have given rise to new complex systems and systems of systems. As the complexity of systems increases, new and ...Read more
Author:Veerasamy, NamoshaDate:Jun 2021Cyber attacks can affect the confidentiality, integrity and availability of data/ systems. Some attacks aim to steal data whereas others try cause destruction. One such vulnerability stems from the malicious use of USB chargers. When travelling ...Read more
Author:Pretorius, Morne; Dlamini, Nelisiwe P; Mthethwa, Sthembile NDate:Feb 2021Today’s internet-connected world is moving towards evermore digitisation. Consequently, the education system globally is experiencing various problems whilst trying to keep up with this disruptive and ongoing change that is introduced. One ...Read more
Author:Wessels, Gert J; Botha, Natasha; Koen, Hildegarde S; Van Eden, BeatriceDate:Nov 2022After years of drought, the rainy season is always welcomed. Unfortunately, this can also herald widespread flooding which can result in loss of livelihood, property, and human life. In this study a Bayesian network is used to develop a flood ...Read more