Author:Mkuzangwe, Nenekazi NP; Nelwamondo, Fulufhelo VDate:Sep 2019Real Transmission Control Protocol synchronise (TCP SYN) packet counts availability will be of great benefit in anomaly detection. TCP SYN packet counts can beused for training intrusion detection system to detect a denial of service attack ...Read more
Author:Manara, G; Nepa, P; Kouyoumjian, RG; Taute, BJEDate:Nov 1998The diffraction of an inhomogeneous plane wave by an impedance wedge embedded in a lossy medium is analyzed. The rigorous integral representation for the field is asymptotically evaluated in the context of the uniform geometrical theory of ...Read more
Author:Twinomurinzi, H; Phahlamohlaka, Letlibe J; Byrne, EDate:2010This chapter reviews the context of the South African government and its conspicuous inclination to the way of life, Ubuntu. Ubuntu is growing in popularity and is increasingly being applied as an African solution to African problems such as ...Read more
Author:Masina, Bathusile N; Forbes, Andrew; Mwakikunga, Bonex W; Bodkin, RDate:May 2011At present it is known that diamond tools degrade with time as it is normally used at high temperatures. One of the questions the authors like to answer in this study is whether thermally induced problems in diamond tool arise as a result of ...Read more
Author:Sevenster, PGDate:1958It was found necessary to conduct the investigation described in this paper when information on diffusion coefficients of some strongly adsorbed gases was required in the course of other studies on coal at the Institute.Read more
Author:Van der Walt, WDate:Feb 2011This document describes Open Source Software newly-developed under the NAP project. The software comprises a digital audio editor for the blind.Read more
Author:Mabila, J; Herselman, Martha E; Van Biljon, JDate:Nov 2016Government initiatives have been undertaken to provide ICT infrastructure including digital content to public schools in South Africa, however the educators’ views on the sustainability of integrating tablet technology into teaching in resource ...Read more
Author:Ngcobo, Sandile; Litvin, I; Burger, L; Forbes, ADate:Feb 2014In this paper we outline a simple laser cavity which produces customised on-demand digitally controlled laser modes by replacing the end-mirror of the cavity with an electrically addressed reflective phase-only spatial light modulator as a ...Read more
Author:Chipangura, B; Van Biljon, J; Botha, AdèleDate:Sep 2012Developing countries and South Africa in specific have shown phenomenal growth in the mobile sector. This has resulted in some challenges and opportunities for alleviating digital poverty through distance education. One of these challenges ...Read more
Author:Phahlamohlaka, Letlibe J; Modise, M; Nengovhela, NDate:Oct 2010Since it was coined in the early eighties following the Maitland commission for worldwide telecommunications development, much has been written about the concept of digital divide. Everything to date in the literature about the subject point ...Read more
Author:Smith, R; Cambridge, G; Gush, Kim LDate:Feb 2006The Digital Doorway is a joint project between the Department of Science and Technology (DST) and the Meraka Institute, with a vision of making a fundamental difference to computer literacy and associated skills in Africa. Underpinning this ...Read more
Author:Cambridge, GDate:Nov 2008The Digital Doorway is a joint project between the South African Department of Science and Technology (DST) and the Meraka Institute of the CSIR. The project aims at promoting computer literacy and associated skills in Africa. The Digital ...Read more
Author:Sibiya, G; Venter, HS; Fogwill, TDate:May 2012The advent of cloud computing provides good opportunities for both good and malicious use. Cloud computing is at its infancy stage and its security is still an open research issue. Malicious users take advantage of the current lack of advanced ...Read more
Author:Sibiya, G; Fogwill, T; Venter, HS; Ngobeni, Sipho JDate:Sep 2013Although cloud computing is maturing, security issues are still prevalent. Most of the security issues that are in the cloud have existed since the advent of the Internet. These issues are escalated in a cloud environment due to its distributed ...Read more
Author:Grobler, MMDate:May 2010With the explosion of digital crime, digital forensics is more often applied. The digital forensic discipline developed rather rapidly, but up to date very little international standardization with regard to processes, procedures or management ...Read more
Author:Sibiya, G; Venter, HS; Fogwill, TDate:May 2015The advent of cloud computing has brought new challenges to digital forensics. To address these challenges, new approaches in conducting digital forensic are required. In this paper, challenges that are faced by digital forensic investigator ...Read more
Author:Ngejane, Hombakazi C; Eloff, JHP; Sefara, Tshephisho J; Marivate, VNDate:Mar 2021Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful behaviour for the attention of law enforcement units. ...Read more