Author:Mathebula, I; Isong, B; Gasela, N; Abu-Mahfouz, Adnan MIDate:Nov 2020Software-Defined Wireless Sensor Networks (SDWSN) has received significant attention in recent years due to its inherent challenges such as network security, trust management, inefficient energy consumption, and so on. In particular, inefficient ...Read more
Author:Nair, Kishor K; Abu-Mahfouz, Adnan MI; Lefophane, SamuelDate:Mar 2019Internet of Things (IoT) has the potential to enable the interconnection of small foot-print devices, which can offer valuable information for various critical use cases. It is expected to enable interconnections of participating IoT entities ...Read more
Author:Moganedi, Mapoung S; Mtsweni, Jabu SDate:Jun 2017The significant growth of the Internet of Things (IoT) is revolutionizing the way people live by transforming everyday Internet-enabled objects into an interconnected ecosystem of digital and personal information accessible anytime and anywhere. ...Read more
Author:Van Vuuren, JJ; Plint, G; Leenen, L; Zaaiman, J; Kadyamatimba, A; Phahlamohlaka, Letlibe JDate:2016With the advancement of technology and proliferation of mobile and computing devices through all levels of society, cyber power is becoming an increasingly prominent driver in the attainment of national security for any state. This paper ...Read more
Author:Nkosi, MT; Mekuria, FissehaDate:Nov 2010Mobile devices are being considered as service platforms for mobile health information delivery, access and communication. However mobiles face challenges with regard to delivering secure multimedia based health services due to limitations ...Read more
Author:Gueli, RJDate:May 2007This paper proposes that improving national infrastructure networks and enhancing service delivery to ordinary people may be an important strategy for the international community and for Africa to help prevent, reduce or manage violent conflict. ...Read more
Author:Pritchard, SW; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Jun 2018The Software-Defined Wireless Sensor Networking (SDWSN) paradigm aims to solve inherent issues present in Wireless Sensor Networks (WSN), such as resource constraints, by adopting a Software-Defined Networking (SDN) approach to the management ...Read more
Author:Ledwaba, LPI; Hancke, GP; Isaac, Sherrin J; Venter, HSDate:Jul 2019The ability for the smart microgrid to allow for the independent generation and distribution of electrical energy makes it an attractive solution towards enabling universal access to electricity within developing economies. Distributed Ledger ...Read more
Author:Harikrishnan, D; Kumar, NS; Joseph, RS; Nair, Kishor KDate:Apr 2021In the digital authentication system, the emerging technology is fingerprint authentication, which have been concentrated more attraction towards security and control. Existing authentication systems such as Biometric cryptosystems, Cancellable ...Read more
Author:Pretoria NewsDate:27 Aug 2008The head of the CSIR safety and security competency area, Dr Barend Taute, says that about 10 years ago the CSIR considered what could be done about crime in South Africa. They established a crime prevention centre which eventually became the ...Read more
Author:Sharma, Ameeth; Singh, Ann; Roberts, Ted; Ramokolo, Lesiba R; Strauss, Hencharl JDate:Jul 2016Light-based techniques continue to gain momentum in different spheres of diagnostic and therapeutic applications due to their non-invasive, non-contact properties. One such technique is Optical Coherence tomography (OCT). Since first being ...Read more
Author:Brown, Dane; Bradshaw, KDate:May 2016The traditional texture-based fingerprint recognition system known as FingerCode is improved in this work. Texture-based fingerprint recognition methods are generally more accurate than other methods, but at the disadvantage of increased ...Read more
Author:Eloff, JHP; Eloff, MM; Dlamini, Moses T; Zielinski, MPDate:Dec 2009The Future Internet will consist of billions of people, things and services having the potential to interact with each other and their environment. This highly interconnected global network structure presents new types of challenges from a ...Read more
Author:Linklater, G; Smith, C; Connan, J; Herbert, A; Irwin, Barry VWDate:Sep 2017Attribute-based Access Control (ABAC) is an access control model where authorization for an action on a resource is determined by evaluating attributes of the subject, resource (object) and environment. The attributes are evaluated against ...Read more
Author:Dlodlo, NDate:Apr 2011Cloud computing is a sufficiently new research area. Since it is in its development stages, the information on the field is slowly being compiled by the researchers and practitioners from their experiences. Some of the areas in which there ...Read more
Author:Maspero, EL; Van Dyk, FE; Ittmann, HWDate:Nov 2008As a direct result of the 9-11 New York attack all modes of freight and passenger transportation were scrutinised for vulnerabilities. Over 90% of international trade takes place via sea transport for at least some part of the supply chain ...Read more
Author:Kasum, J; Pilic, M; Jovanovic, Nebojsa; Pienaar, Harrison HDate:Oct 2019Forensic science plays a vital role in the work of judicial bodies. The contents, knowledge, and specialized expertise permit the identification of facts essential to law enforcement and judicial disputes. Hydrography is an applied science ...Read more
Author:Mtetwa, SN; Sibeko, N; Tarwireyi, P; Abu-Mahfouz, Adnan MIDate:Nov 2020LoRaWAN is one of the LPWAN technologies that has become popular in both industries and research. LoRaWAN aims to provide long-range communication and empowers lowpowered devices to last for years in the field. LoRaWAN relies on the symmetric ...Read more
Author:De Villiers, JP; Bachoo, AK; Nicolls, FC; Le Roux, FPJDate:Apr 2011Omnidirectional camera systems are used to supplement RADAR in tracking small craft close in to the ship in a maritime environment. They can simultaneously track multiple targets to provide a more complete situational awareness. Due to their ...Read more