Author:Mamushiane, Lusani; Mwangama, J; Lysko, Albert A; Kobo, Hlabishi IDate:Aug 2022The global impact of COVID-19 has been unprecedented, with over-the-top (OTT) services consumption growing at a staggering rate. While OTT does consume revenue-generating data, OTT services are gradually substituting the traditional primary ...Read more
Author:Brink, S; Dorfling, C; Aldrich, CDate:May 2016Relatively small rocks that detach from stope hanging walls during periods when miners are working in the vicinity pose a lethal risk, and contribute significantly to underground fatalities in the South African mining industry, totalling 89 ...Read more
Author:Mgabile, T; Msiza, IS; Dube, EDate:Oct 2012This manuscript presents a supervised machine learning approach in the identification of network attacks on a fingerprint biometric system. To reduce the problem of malicious acts on a biometric system, this manuscript proposes an intrusion ...Read more
Author:Ramotsoela, DT; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Apr 2019The threat to critical water system infrastructure has increased in recent years as is evident from the increasing number of reported attacks against these systems. Preventative security mechanisms are often not enough to keep attackers out ...Read more
Author:Ramotsoela, TD; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Oct 2020There has been an increasing number of attacks against critical water system infrastructure in recent years. This is largely due to the fact that these systems are heavily dependent on computer networks meaning that an attacker can use ...Read more
Author:Pratt, Lawrence E; Matheus, Jana; Klein, RDate:Dec 2023Electroluminescence (EL) images enable defect detection in solar photovoltaic (PV) modules that are otherwise invisible to the naked eye, much the same way an x-ray enables a doctor to detect cracks and fractures in bones. This paper presents ...Read morecbnd
Author:Oosthuizen, RudolphDate:Sep 2021Management of Technology (MoT) has evolved since its inception in the 1980s and definitions from the 1990s. However, the field's definition may not be keeping up with the ever-increasing changes in our world. This paper implements bibliometrics, ...Read more
Author:Rangata, Mapitsi R; Sefara, Tshephisho JDate:Feb 2024The amount of data online is increasing as companies generate news articles daily. These news articles contain headlines that have a level of exaggeration aimed to win the readers. In addition, these companies are competing against one another; ...Read more
Author:Naidoo, Thegaran; Verster, Jacobus J; Marais, Stephen TDate:Nov 2022A cloud-based road infrastructure analysis system was developed to assist as an information management system for detecting and managing information about road defects and road assets. The system uses computer vision and machine learning ...Read more
Author:Mokoatle, Mpho; Coleman, Toshka; Mokilane, Paul MDate:Dec 2023The likelihood that an earthquake will occur in a specific location, within a specific time frame, and with ground motion intensity greater than a specific threshold is known as a seismic hazard. Predicting these types of hazards is crucial ...Read more
Author:Sithole, Happy M; Ubbink, OnnoDate:Oct 2017This presentation discusses how high-performance computing (HPC) combined with machine learning and artificial intelligence, present opportunities to non-traditional
industries. It showcases how the CSIR’s renewed focus on industrialisation ...Read more
Author:Zandamela, Frank; Ratshidaho, Terence; Nicolls, F; Stoltz, George GDate:Nov 2022Deep learning has gained traction due its supremacy in terms of accuracy and ability to automatically learn features from input data. However, deep learning algorithms can sometimes be flawed due to many factors such as training dataset, ...Read more
Author:Matusowsky, M; Ramotsoela, DT; Abu-Mahfouz, Adnan MIDate:May 2020Data integrity in wireless sensor networks (WSN) is very important because incorrect or missing values could result in the system making suboptimal or catastrophic decisions. Data imputation allows for a system to counteract the effect of ...Read more
Author:Adedeji, KB; Abu-Mahfouz, Adnan MI; Kurien, AMDate:Jul 2023In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices having been exploited to carry out attacks. Due to their inherent ...Read more
Author:Pratt, Lawrence E; Govender, Devashen; Klein, RDate:Nov 2021Electroluminescence (EL) images enable defect detection in solar photovoltaic (PV) modules that are otherwise invisible to the naked eye, much the same way an x-ray enables a doctor to detect cracks and fractures in bones. The prevalence of ...Read more
Author:Botha, Natasha; Marais, Stephen TDate:Nov 2021This study developed a Graphical User Interface (GUI) aimed at teaching the concepts of Machine Learning (ML) algorithms which form the backbone of Artificial Intelligence (AI). This is done by means of tutorial videos and allowing the student ...Read more
Author:Schwegmann, Colin P; Kleynhans, Waldo; Salmon, BPDate:May 2017The usage of remote sensing to observe environments necessitates interdisciplinary approaches to derive effective, impactful research. One remote sensing technique, Synthetic Aperture Radar, has shown significant benefits over traditional ...Read more
Author:Kukuni, TG; Markus, E; Kotze, B; Abu-Mahfouz, Adnan MIDate:Aug 2022The application of machine learning in resolving complex cyber-security challenges in smart manufacturing plant is growing. Network intrusion and anomaly detection is posing high risks in sensory data integrity and optimisation of processes ...Read more