Author:Mamushiane, Lusani; Mwangama, J; Lysko, Albert A; Kobo, Hlabishi IDate:Aug 2022The global impact of COVID-19 has been unprecedented, with over-the-top (OTT) services consumption growing at a staggering rate. While OTT does consume revenue-generating data, OTT services are gradually substituting the traditional primary ...Read more
Author:Molefi, M; Markus, ED; Abu-Mahfouz, Adnan MIDate:Nov 2021A Conformal Strongly Coupled Magnetic Resonance (CSCMR) wireless power transfer (WPT) system is a small footprint technology suitable for applications such as small low power sensors and implantable medical devices. These applications require ...Read more
Author:Oladele, DA; Markus, ED; Abu-Mahfouz, Adnan MIDate:Nov 2021Background: With the projected upsurge in the percentage of people with some form of disability, there has been a significant increase in the need for assistive mobility devices. However, for mobility aids to be effective, such devices should ...Read more
Author:Mekuria, Fisseha; Mzyece, M; Mfupe, Luzango P; Odusola, ADate:Sep 2021Innovation on sustainable ICT technologies to realize affordable broadband connectivity for rural and underserved communities is a crucial component of the effort to achieve the aim of "leaving no one behind by 2030" as championed by the ...Read more
Author:Baruni, Kedimotse P; Mokoena, Nthabiseng ME; Veeraragoo, Mahalingam; Holder, Ross PDate:Dec 2021Face recognition is one of the biometric technologies that is mostly used in surveillance and law enforcement for identification and verification. However, face recognition remains a challenge in verifying and identifying individuals due to ...Read more
Author:Onumanyi, Adeiza J; Abu-Mahfouz, Adnan MI; Hancke, GDate:Feb 2021Self-adaptive threshold adjustment algorithms (SATAs) are required to reconfigure their parameters autonomously (i.e. to achieve self-parameter adjustment) at runtime and during online use for effective signal detection in cognitive radio ...Read more
Author:Mathebula, I; Isong, B; Gasela, N; Abu-Mahfouz, Adnan MIDate:Nov 2020Software-Defined Wireless Sensor Networks (SDWSN) has received significant attention in recent years due to its inherent challenges such as network security, trust management, inefficient energy consumption, and so on. In particular, inefficient ...Read more
Author:Molose, RSS; Isong, B; Dladlu, N; Abu-Mahfouz, Adnan MIDate:Dec 2021Energy consumption is a typical challenge that is inherent in wireless sensors networks (WSN). Despite the proposals and the development of several routing protocols and Software-defined WSN (SDWSN) introduction to address the challenge and ...Read more
Author:Thamoethata, K; Isong, B; Dladlu, N; Abu-Mahfouz, Adnan MIDate:Nov 2021A vehicle anti-theft system is a security system that prevents authorized use of a vehicle and its theft. Vehicle theft and hijacking are skyrocketing on daily basis despite the swift technological advancements the world is witnessing. Several ...Read more
Author:Ebrahim, Rozeena; Mthethwa, Nosipho B; Lysko, Albert ADate:Nov 2022This paper looks at design considerations for an Electronically Steerable Parasitic Array Radiator (ESPAR) antenna suitable for inexpensive large-scale wireless network technologies. This can help address the demand for a cheaper, simpler, ...Read more
Author:Olwal, TO; Chuku, PN; Lysko, Albert ADate:Mar 2021Antennas are a critical component in any wireless link. The significance of their role continues to grow, together with the rise of machine-to-machine (M2M) communications and telecommunications starting to move from the fourth generation ...Read more
Author:Olwal, TO; Chuku, PN; Lysko, Albert ADate:Mar 2021Antennas are a critical component in any wireless link. The significance of their role continues to grow, together with the rise of machine-to-machine (M2M) communications and telecommunications starting to move from the fourth generation ...Read more
Author:Marais, LauretteDate:Sep 2021Multilingual Grammatical Framework (GF) domain grammars have been used in a variety of different applications, including question answering, where concrete syntaxes for parsing questions and generating answers are typically required for each ...Read more
Author:Smith, Marie E; Vhengani, Lufuno MDate:May 2023This presentation speaks to the challenges with environmental threats such as Harmful Algal Blooms (HABs) and ocean heatwaves that have the potential to negatively affect natural and farmed marine resources. Also, monitoring these events ...Read more
Author:Smith, Andrew CDate:Aug 2022Traditional electrical power sources and their long distribution networks can no longer cope with the ever-increasing need for energy. Distributed energy generation in close geographical proximity to the consumption point is an alternative ...Read more
Author:Umba, SMW; Abu-Mahfouz, Adnan MI; Ramotsoela, DDate:Apr 2022Wireless Sensor Networks (WSNs) are increasingly deployed in Internet of Things (IoT) systems for applications such as smart transportation, telemedicine, smart health monitoring and fall detection systems for the elderly people. Given that ...Read more
Author:Gangire, Y; Da Veiga, A; Herselman, Martha EDate:Oct 2021This paper outlines the development of a validated questionnaire for assessing information security behaviour. The purpose of this paper is to present data from the questionnaire validation process and the quantitative study results.Read more