Author:Magidimisha, Edwin; Faniso-Mnyaka, Zimbini; Naidoo, Seelenthren; Nana, Muhammad ADate:Apr 2023The severity of wildland vegetation fires is expected to grow in response to climate change. Therefore, the price of combating fires will likewise go up while still posing a serious risk to the firefighters. Various countries have invested ...Read more
Author:Thaba, James M; Mtsweni, Jabu SDate:Jun 2023The evolution of technology in the African battlespace continues to pose a significant challenge to the African militaries. This evolution increases the need for the African militaries to be able to operate in the cyberspace strategically and ...Read more
Author:Ngejane, Hombakazi C; Eloff, JHP; Sefara, Tshephisho J; Marivate, VNDate:Mar 2021Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful behaviour for the attention of law enforcement units. ...Read more
Author:Ramazhamba, Pardon T; Venter, HSDate:Sep 2022The South African Local Government uses the tendering system to deliver some of the basic services to the surrounding communities to promote social and industrial or environmental policies. However, this process still relies heavily on a ...Read more
Author:Skosana, Vusi J; Ngxande, MDate:Jan 2020Edge-preserving smoothing filters have been shown to improve generalisation performance on the HOG features with a SVM classifier. However, not all smoothing filters and parameters lead to better performance. The effects of smoothing filters ...Read more
Author:Veerasamy, NamoshaDate:Mar 2022A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond ...Read more
Author:Botha-Badenhorst, Danielle P; Veerasamy, NamoshaDate:Apr 2023Globally, women are underrepresented in the fields of Science, Technology, Engineering and Mathematics (STEM). In Sub-Saharan Africa (SSA), this underrepresentation is even more prevalent, as fewer women pursue STEM careers in SSA when compared ...Read more
Author:Mwim, EM; Mtsweni, Jabu S; Chimbo, BDate:Jul 2023The healthcare sector has become a high target of cyber threats due to the nature of the industry and the potential of personal and confidential information. Human related factors have proven to be the major contributor to the challenges ...Read more
Author:Botha, Johannes G; Pieterse, HeloiseDate:Mar 2020Fake news, often referred to as junk news or pseudo-news, is a form of yellow journalism or propaganda created with the purpose of distributing deliberate disinformation or false news using traditional print or online social media. Fake news ...Read more
Author:Robbins, SL; Heyns, PS; Heyns, Johan ADate:May 2020The majority of condition monitoring techniques employed today consider the acquisitioning and analysis of structural responses as a means of profiling machine condition and performing fault detection. Modern research and newer technologies ...Read more
Author:Jamison, Kevin A; Naidoo, Purusha; Ramotsabi, KatlehoDate:Nov 2022The South African government is investing in the use of hydrogen fuel as a pathway towards decarbonising transport sectors. Hydrogen is likely to be a viable option for decarbonising air transport and it is being investigated intensively ...Read more
Author:Young, Gertruida MDate:Oct 2023This paper explores the use of a systems engineering approach to establish a canine system for application as one of the force multipliers to address complex challenges such as illicit wildlife trafficking, policing and border management. ...Read more
Author:Harikrishnan, D; Kumar, NS; Joseph, RS; Nair, Kishor KDate:Apr 2021In the digital authentication system, the emerging technology is fingerprint authentication, which have been concentrated more attraction towards security and control. Existing authentication systems such as Biometric cryptosystems, Cancellable ...Read more
Author:Chauke, Mapoo D; Mphadzha, Fhumulani RDate:Feb 2022Proper functioning of a nation's economy and society requires that its critical infrastructure is safe and secure. The protection of critical infrastructure is becoming a growing concern to national governments, infrastructure managers and ...Read more
Author:Botha, Johannes G; Grobler, Marthie M; Hahn, J; Eloff, MMDate:Mar 2017Data protection and management of personal information has become an integral aspect for organisations and individuals in conducting business in the modern era. It has also become a major issue for legislators, regulators and consumers worldwide ...Read more
Author:Shibambu, Ncedisa AM; Moganedi, SDate:Dec 2022The notion of working from home is not a new concept. However, it has become a buzzword amid the COVID19 pandemic. Some scholars were already engaging in the work-from-home concept a few years before the pandemic. However, contextualization ...Read more