Author:Shafuda, F; McDonald, Andre Martin; Van Wyk, MA; Versfeld, JDate:Nov 2019In this paper, we investigate the correlation Toeplitz (CTOP) and averaging Toeplitz (AVTOP) decorrelation techniques, as applied towards direction of arrival (DOA) estimation of coherent narrowband sources with the multiple signals classi ...Read more
Author:Mashaba, Nikiwe P; Griffith, DJDate:Nov 2020Near infrared detectors have gained popularity, mainly in the military, because of their capability of detecting wildfires. The Council for Scientific and Industrial Research (CSIR) focuses on the development and deployment of wildfire detectors ...Read more
Author:Nelufule, Nthatheni; Mabuza-Hocquet, Gugulethu P; De Kock, Antonie JDate:Jan 2020In most biometric modalities, recognition and authentication methods for adults have already been fully designed, developed and commercially available. However, for infants and children who are the most vulnerable population to abduction, ...Read more
Author:Nelufule, Nthatheni; Mabuza-Hocquet, Gugulethu P; De Kock, Antonie JDate:Jan 2020In most biometric modalities, recognition and authentication methods for adults have already been fully designed, developed and commercially available. However, for infants and children who are the most vulnerable population to abduction, ...Read more
Author:Veerasamy, NamoshaDate:Feb 2021The outbreak of the novel corona virus or Covid-19 has sparked a wave of changes. Social-distancing and remote working meant that increasingly employees and individuals were reliant on Information Communication Technologies (ICT) to connect ...Read more
Author:Mkuzangwe, Nenekazi N; Khan, ZubeidaDate:Jun 2020Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, are essential to combatting today's increasingly frequent and sophisticated cyber-attacks. Several cyber-threat information-sharing standards ...Read more
Author:Ngejane, Hombakazi C; Eloff, JHP; Sefara, Tshephisho J; Marivate, VNDate:Mar 2021Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful behaviour for the attention of law enforcement units. ...Read more
Author:Skosana, Vusi J; Ngxande, MDate:Jan 2020Edge-preserving smoothing filters have been shown to improve generalisation performance on the HOG features with a SVM classifier. However, not all smoothing filters and parameters lead to better performance. The effects of smoothing filters ...Read more
Author:Botha, Johannes G; Pieterse, HeloiseDate:Mar 2020Fake news, often referred to as junk news or pseudo-news, is a form of yellow journalism or propaganda created with the purpose of distributing deliberate disinformation or false news using traditional print or online social media. Fake news ...Read more
Author:Harikrishnan, D; Kumar, NS; Joseph, RS; Nair, Kishor KDate:Apr 2021In the digital authentication system, the emerging technology is fingerprint authentication, which have been concentrated more attraction towards security and control. Existing authentication systems such as Biometric cryptosystems, Cancellable ...Read more
Author:Moganedi, Mapoung S; Pottas, DDate:Aug 2020Statista suggests that there would be 368.2 million wearables shipped globally in 2020 with a projection of 500 million by 2024. These predictions are becoming a reality considering the fast growing of Intent of Things (IoT) do-main. These ...Read more
Author:Rapiya, XL; Malik, Humna H; Pretorius, JHCDate:Sep 2020In the product development process, needs analysis is the first stage of the process and without the need analysis, you are risking your product to fail. The needs analysis involves a process of understating the market broadly. Understanding ...Read more
Author:Stoltz, George G; Nel, ALDate:Oct 2020In this paper, we improve image reconstruction in a single-pixel scanning system by selecting an detector optimal field of view. Image reconstruction is based on compressed sensing and image quality is compared to interpolated staring arrays. ...Read more
Author:Mtsweni, Jabu S; Modiba, FSDate:Oct 2020African communities suffer a series of socio-economic challenges that seem difficult to eradicate. The challenges include lack of access to essential services and infrastructure; high levels of poverty, and unemployment, especially amongst ...Read more
Author:Roodt, JH; Leenen, L; Van Vuuren, JJ; Dawood, Zubeida CDate:Jul 2020Complex societal problems require a multidisciplinary and multi-method approach to develop models that can support the development of solutions. General morphological analysis is a qualitative method to extract information from experts through ...Read more
Author:McDonald, Andre M; Van Wyk, MDate:Oct 2020A new approach to solving a more general formulation of the inverse Frobenius-Perron problem, which requires the construction of a one-dimensional ergodic map with prescribed invariant probability density function and power spectral density, ...Read more
Author:Mgaga, Sboniso S; Tapamo, JRDate:Dec 2020Latent fingerprints are fingerprint impressions left on the surfaces a finger comes into contact with. They are found in almost every crime scene. Conventionally, latent fingerprints have been obtained using chemicals or physical methods, ...Read more
Author:Bergh, J; Snedden, Glen; Dunn, DwainDate:Apr 2020This paper presents the predicted, as well as final experimental results for the design of an automatically optimized non-axisymmetric endwall and as such, attempts to close the loop between design and practice, providing additional information ...Read more
Author:Stoltz, George G; Stoltz, MDate:Sep 2020In this paper, we model a real-time feasible rosette imager, consisting of a rosette scanner, an optical sensor and a deterministic image reconstruction algorithm. We fine-tune the rosette imager through selecting the appropriate sensor field ...Read more