Author:Mokoatle, Mpho; Coleman, Toshka; Mokilane, Paul MDate:Dec 2023The likelihood that an earthquake will occur in a specific location, within a specific time frame, and with ground motion intensity greater than a specific threshold is known as a seismic hazard. Predicting these types of hazards is crucial ...Read more
Author:Sithole, Happy M; Ubbink, OnnoDate:Oct 2017This presentation discusses how high-performance computing (HPC) combined with machine learning and artificial intelligence, present opportunities to non-traditional
industries. It showcases how the CSIR’s renewed focus on industrialisation ...Read more
Author:Zandamela, Frank; Ratshidaho, Terence; Nicolls, F; Stoltz, George GDate:Nov 2022Deep learning has gained traction due its supremacy in terms of accuracy and ability to automatically learn features from input data. However, deep learning algorithms can sometimes be flawed due to many factors such as training dataset, ...Read more
Author:Matusowsky, M; Ramotsoela, DT; Abu-Mahfouz, Adnan MIDate:May 2020Data integrity in wireless sensor networks (WSN) is very important because incorrect or missing values could result in the system making suboptimal or catastrophic decisions. Data imputation allows for a system to counteract the effect of ...Read more
Author:Adedeji, KB; Abu-Mahfouz, Adnan MI; Kurien, AMDate:Jul 2023In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices having been exploited to carry out attacks. Due to their inherent ...Read more
Author:Pratt, Lawrence E; Govender, Devashen; Klein, RDate:Nov 2021Electroluminescence (EL) images enable defect detection in solar photovoltaic (PV) modules that are otherwise invisible to the naked eye, much the same way an x-ray enables a doctor to detect cracks and fractures in bones. The prevalence of ...Read more
Author:Botha, Natasha; Marais, Stephen TDate:Nov 2021This study developed a Graphical User Interface (GUI) aimed at teaching the concepts of Machine Learning (ML) algorithms which form the backbone of Artificial Intelligence (AI). This is done by means of tutorial videos and allowing the student ...Read more
Author:Schwegmann, Colin P; Kleynhans, Waldo; Salmon, BPDate:May 2017The usage of remote sensing to observe environments necessitates interdisciplinary approaches to derive effective, impactful research. One remote sensing technique, Synthetic Aperture Radar, has shown significant benefits over traditional ...Read more
Author:Kukuni, TG; Markus, E; Kotze, B; Abu-Mahfouz, Adnan MIDate:Aug 2022The application of machine learning in resolving complex cyber-security challenges in smart manufacturing plant is growing. Network intrusion and anomaly detection is posing high risks in sensory data integrity and optimisation of processes ...Read more
Author:Ngejane, Hombakazi C; Eloff, JHP; Sefara, Tshephisho J; Marivate, VNDate:Mar 2021Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful behaviour for the attention of law enforcement units. ...Read more
Author:Sefara, Tshephisho Joseph; Rangata, Mapitsi RDate:Dec 2023Most general sentiment analysers degrade quality when tested on Tweets in the broadcast domain. This domain covers both radio and television broadcast. This paper proposes domain-specific data in the broadcast domain. Furthermore, it proposes ...Read more
Author:Ngxande, Mkhuseli; Tapamo, J-R; Burke, Michael GDate:Nov 2017This paper presents a literature review of driver drowsiness detection based on behavioral measures using machine learning techniques. Faces contain information that can be used to interpret levels of drowsiness. There are many facial features ...Read more
Author:Sefara, Tshephisho JDate:Nov 2019Speech emotion recognition systems require features to be extracted from the speech signal. These features include Time, Frequency, and Cepstral-domain features. To normalise features, it is a challenging task to select an appropriate ...Read more
Author:Davel, MH; Barnard, EDate:Oct 2004Bootstrapping techniques have significant potential for the efficient generation of linguistic resources such as electronic pronunciation dictionaries. The authors describe a system and an approach to bootstrapping for the development of such ...Read more
Author:Davel, MH; Barnard, EDate:Oct 2004The authors focus on factors related to the underlying rule-extraction algorithms, and demonstrate variants of the Dynamically Expanding Context algorithm, which are beneficial for this application. They show that continuous updating of the ...Read more
Author:Sefara, Tshephisho J; Mokgonyane, TBDate:Nov 2020Speaker recognition is a method which recognise a speaker from characteristics of a voice. Speaker recognition technologies have been widely used in many domains. Most speaker recognition systems have been trained on normal clean recordings, ...Read more
Author:Twala, BDate:2009Increasing the awareness of how incomplete data affects learning and classification accuracy has led to increasing numbers of missing data techniques. This paper investigates the robustness and accuracy of seven popular techniques for tolerating ...Read more
Author:Marivate, Vukosi N; Moorosi, NyallengDate:Aug 2017Data from online job boards and online professional networks present an opportunity to understand job markets as well as how professionals transition from one job/career to another. We propose a data driven approach to begin to understand a ...Read more