Author:Mthethwa, Sthembile; Pretorius, MorneDate:Dec 2022The ongoing push for the 4th industrial revolution is setting the stage to digitise, persist and verify identity along with credentials. Academic and skills credentials are currently verified manually and have much scope for automation using ...Read more
Author:Stoltz, M; Stoltz, George G; Obara, K; Wang, T; Bryant, DDate:Nov 2021Hidden Markov models (HMMs) are general purpose models for time-series data widely used across the sciences because of their flexibility and elegance. Fitting HMMs can often be computationally demanding and time consuming, particularly when ...Read more
Author:Suliman, Ridhwaan; Mtsweni, Jabu SDate:Jun 2022The SARS-CoV-2 pandemic has wreaked havoc globally, with over half a billion people infected and millions of lives lost. The pandemic has also interrupted every aspect of our lives, with most governments imposing various interventions and ...Read more
Author:Dawood, Zubeida C; Mkuzangwe, Nenekazi NPDate:Mar 2022There is a growth of cyber-attacks in South Africa. Seeing that there are over 38 million Internet users in South Africa, this is no surprise. The South African government has published the National Cybersecurity Policy Framework (NCPF) and ...Read more
Author:Baruni, Kedimotse P; Mokoena, Nthabiseng ME; Veeraragoo, Mahalingam; Holder, Ross PDate:Dec 2021Face recognition is one of the biometric technologies that is mostly used in surveillance and law enforcement for identification and verification. However, face recognition remains a challenge in verifying and identifying individuals due to ...Read more
Author:Shafuda, F; McDonald, Andre M; Van Wyk, MA; Versfeld, JDate:Nov 2019In this paper, we investigate the correlation Toeplitz (CTOP) and averaging Toeplitz (AVTOP) decorrelation techniques, as applied towards direction of arrival (DOA) estimation of coherent narrowband sources with the multiple signals classi ...Read more
Author:Botha, Johannes G; Botha-Badenhorst, Danielle P; Leenen, LDate:Mar 2023Blockchain and cryptocurrency adoption has increased significantly since the start of the Covid-19 pandemic. This adoption rate has overtaken the Internet adoption rate in the 90s and early 2000s, but as a result, the instances of crypto scams ...Read more
Author:Botha, Johannes G; Pederson, T; Leenen, LDate:Jun 2023Since the start of the Covid-19 pandemic, blockchain and cryptocurrency adoption has increased significantly. The adoption rate of blockchain-based technologies has surpassed the Internet adoption rate in the 90s and early 2000s. As this ...Read more
Author:Veerasamy, Namosha; Yoolla, Yaseen; Dawood, Zubeida CDate:Jun 2022Geospatial data is often perceived as only being related to maps, compasses and locations. However, the application areas of geospatial data are far wider and even extend to the field of cybersecurity. Not only is there an ability to show ...Read more
Author:Kgaphola, Motsoko J; Ramoelo, Abel; Odindi, J; Mwenge Kahinda, Jean-Marc; Seetal, Ashwin RDate:Mar 2023Land degradation (LD) is a global issue that affects sustainability and livelihoods of approximately 1.5 billion people, especially in arid/semi-arid regions. Hence, identifying and assessing LD and its driving forces (natural and anthropogenic) ...Read more
Author:Phahlamohlaka, Letlibe JDate:Sep 2021The unique approaches proposed in this book are ‘glocal’ in character, as they draw on the experiences of South Africans to address the global issue of ‘smart communities’. The book blends together social and technical aspects, and presents ...Read more
Author:Musvoto, Constansia D; Kgaphola, Motsoko J; Mwenge Kahinda, Jean-MarcDate:Dec 2021Agroforestry-based sustainable land management (SLM) interventions provide opportunities for tackling land degradation and its associated socio-economic issues. Agroforestry is not a guaranteed SLM fix as every agroforestry practice is not ...Read more
Author:Emeruem, C; Keet, CM; Dawood, Zubeida C; Wang, SDate:Aug 2022Foundational ontologies are known to have a steep learning curve, which hampers casual use by domain ontology developers to use them for domain ontology development. Foundational ontology developers have not provided methods or tools to lower ...Read more
Author:Pelser, Winnie CDate:Sep 2019Many of the administrative decisions that must be made in a military environment are complex and rely on a rational analysis of situations. Decisions within the domain of ageing systems are particularly difficult and often riddled with different ...Read more
Author:Ndlovu, Z; Desai, D; Pandelani, Thanyani A; Ngwangwa, H; Nemavhola, FDate:Feb 2022This study assesses the modelling capabilities of four constitutive hyperelastic material models to fit the experimental data of the porcine sclera soft tissue. It further estimates the material parameters and discusses their applicability ...Read more
Author:Ndlovu, Z; Desai, D; Pandelani, Thanyani A; Ngwangwa, H; Nemavhola, FDate:Feb 2022This study assesses the modelling capabilities of four constitutive hyperelastic material models to fit the experimental data of the porcine sclera soft tissue. It further estimates the material parameters and discusses their applicability ...Read more
Author:Oosthuizen, RudolphDate:Sep 2021Management of Technology (MoT) has evolved since its inception in the 1980s and definitions from the 1990s. However, the field's definition may not be keeping up with the ever-increasing changes in our world. This paper implements bibliometrics, ...Read more
Author:Nelufule, Nthatheni N; Moolla, Yasneen; Ntshangase, Cynthia S; De Kock, Antoine JDate:Mar 2023One of the first recognised and commonly used biometric modalities for men is the fingerprint, which is frequently used to register adults at home and in traffic centres. Fingerprint biometrics for babies, in particular, are not commonly used ...Read more
Author:Steynberg, L; Erasmus, Louwrence D; Pretorius, LDate:Aug 2022There are opportunities for disruptive applications of blockchain technology in outbound logistics management, especially with peer-to-peer networking support to keep records of verified transactions in distributed ledgers without control by ...Read more