Author:Steynberg, L; Erasmus, Louwrence D; Pretorius, LDate:Aug 2022There are opportunities for disruptive applications of blockchain technology in outbound logistics management, especially with peer-to-peer networking support to keep records of verified transactions in distributed ledgers without control by ...Read more
Author:Dlamini, ZI; Phahlamohlaka, Letlibe JDate:Sep 2021This chapter shares some methods that could be employed in order to construct and deploy a local cyber smart community in a developing economy, where the notion of smart communities seems to be fitting and significant compared to that of smart ...Read more
Author:Mtsweni, Jabu S; Thaba, James MDate:2022Cyberspace has been designated by organizations such as NATO as the fifth domain for battlespace, and many nations are already having and/or building their capabilities in the cyber defence environment in order to protect and defend their ...Read more
Author:Akpakwu, GA; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Feb 2020With the emerging applications of the Internet of Things (IoT), a congestion control mechanism becomes a critical phenomenon for efficient communication in networks of constrained devices. The Internet Engineering Task Force developed the ...Read more
Author:Mashaba, Nikiwe P; Griffith, DJDate:Nov 2020Near infrared detectors have gained popularity, mainly in the military, because of their capability of detecting wildfires. The Council for Scientific and Industrial Research (CSIR) focuses on the development and deployment of wildfire detectors ...Read more
Author:Nelufule, Nthatheni; Mabuza-Hocquet, Gugulethu P; De Kock, Antonie JDate:Jan 2020In most biometric modalities, recognition and authentication methods for adults have already been fully designed, developed and commercially available. However, for infants and children who are the most vulnerable population to abduction, ...Read more
Author:Nelufule, Nthatheni; Mabuza-Hocquet, Gugulethu P; De Kock, Antonie JDate:Jan 2020In most biometric modalities, recognition and authentication methods for adults have already been fully designed, developed and commercially available. However, for infants and children who are the most vulnerable population to abduction, ...Read more
Author:Zandamela, Frank; Ratshidaho, Thikhathali T; Kunene, Dumisani C; Nana, Muhammad ADate:Sep 2021In literature, several approaches have been used to evaluate the performance of deblurring algorithms on synthetically generated image datasets. The used image datasets only consist of motion-blurred images and do not consider depth variation. ...Read more
Author:Gonçalves, Duarte PDDate:Sep 2021INCOSE has expressed its vision for transdisciplinary approach for systems engineering to address complex societal problems. While the concept of ‘system’ has been dealt with at length, the purpose of this article is to surface assumptions ...Read more
Author:Gonçalves, Duarte PDDate:Sep 2021INCOSE has expressed its vision for transdisciplinary approach for systems engineering to address complex societal problems. While the concept of ‘system’ has been dealt with at length, the purpose of this article is to surface assumptions ...Read more
Author:Modungwa, Dithoto M; Mekuria, Fisseha; Kekana, Mzuzwezulu ZDate:Sep 2021The design of an autonomous underwater robot based on biomimicry is presented in this paper. The systematic design of the robot focuses on integrating 5G-AI-IoT- as effective technological tools to autonomously monitor and harvest invasive ...Read more
Author:Mwim, EN; Mtsweni, Jabu S; Chimbo, BDate:Mar 2023Human related vulnerability challenges continue to increase as organisations intensify their use of interconnected technologies for operations particularly due to the emergence of COVID-19 pandemic. Notwithstanding the challenge of a human ...Read more
Author:Meissner, R; Gonçalves, Duarte PDDate:Jan 2022Actors’ worldviews are critical when developing strategies; not every actor holds the same problem perception and solution. This is the case with wildlife trafficking. Not only does the state have an interest in safeguarding South Africa’s ...Read more
Author:Zandamela, Frank; Ratshidaho, Terence; Nicolls, F; Stoltz, George GDate:Nov 2022Deep learning has gained traction due its supremacy in terms of accuracy and ability to automatically learn features from input data. However, deep learning algorithms can sometimes be flawed due to many factors such as training dataset, ...Read more
Author:Pieterse, HeloiseDate:Dec 2021The world is witnessing a rise in cyber-related incidents. As information technology improves and the reliance on technology increases, the frequency and severity of cyber incidents escalate. The impact is felt globally, and South Africa is ...Read more
Author:Veerasamy, NamoshaDate:Feb 2021The outbreak of the novel corona virus or Covid-19 has sparked a wave of changes. Social-distancing and remote working meant that increasingly employees and individuals were reliant on Information Communication Technologies (ICT) to connect ...Read more
Author:Mkuzangwe, Nenekazi N; Dawood, Zubeida CDate:Jun 2020Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, are essential to combatting today's increasingly frequent and sophisticated cyber-attacks. Several cyber-threat information-sharing standards ...Read more
Author:Mutemwa, Muyowa; Mtsweni, Jabu SDate:Mar 2022A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond ...Read more
Author:Thaba, James M; Mtsweni, Jabu SDate:Nov 2023The domains of warfare have become complex, where cyberspace is declared as the fifth domain. The complexity of cyber space is that it is borderless, and war could be launched from anywhere, and is a serious concern for national security. ...Read more
Author:Magidimisha, Edwin; Faniso-Mnyaka, Zimbini; Naidoo, Seelenthren; Nana, Muhammad ADate:Apr 2023The severity of wildland vegetation fires is expected to grow in response to climate change. Therefore, the price of combating fires will likewise go up while still posing a serious risk to the firefighters. Various countries have invested ...Read more