Author:Ramotsoela, TD; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Oct 2020There has been an increasing number of attacks against critical water system infrastructure in recent years. This is largely due to the fact that these systems are heavily dependent on computer networks meaning that an attacker can use ...Read more
Author:Pratt, Lawrence E; Matheus, Jana; Klein, RDate:Dec 2023Electroluminescence (EL) images enable defect detection in solar photovoltaic (PV) modules that are otherwise invisible to the naked eye, much the same way an x-ray enables a doctor to detect cracks and fractures in bones. This paper presents ...Read morecbnd
Author:Oosthuizen, RudolphDate:Sep 2021Management of Technology (MoT) has evolved since its inception in the 1980s and definitions from the 1990s. However, the field's definition may not be keeping up with the ever-increasing changes in our world. This paper implements bibliometrics, ...Read more
Author:Rangata, Mapitsi R; Sefara, Tshephisho JDate:Feb 2024The amount of data online is increasing as companies generate news articles daily. These news articles contain headlines that have a level of exaggeration aimed to win the readers. In addition, these companies are competing against one another; ...Read more
Author:Naidoo, Thegaran; Verster, Jacobus J; Marais, Stephen TDate:Nov 2022A cloud-based road infrastructure analysis system was developed to assist as an information management system for detecting and managing information about road defects and road assets. The system uses computer vision and machine learning ...Read more
Author:Mokoatle, Mpho; Coleman, Toshka; Mokilane, Paul MDate:Dec 2023The likelihood that an earthquake will occur in a specific location, within a specific time frame, and with ground motion intensity greater than a specific threshold is known as a seismic hazard. Predicting these types of hazards is crucial ...Read more
Author:Sithole, Happy M; Ubbink, OnnoDate:Oct 2017This presentation discusses how high-performance computing (HPC) combined with machine learning and artificial intelligence, present opportunities to non-traditional
industries. It showcases how the CSIR’s renewed focus on industrialisation ...Read more
Author:Zandamela, Frank; Ratshidaho, Terence; Nicolls, F; Stoltz, George GDate:Nov 2022Deep learning has gained traction due its supremacy in terms of accuracy and ability to automatically learn features from input data. However, deep learning algorithms can sometimes be flawed due to many factors such as training dataset, ...Read more
Author:Matusowsky, M; Ramotsoela, DT; Abu-Mahfouz, Adnan MIDate:May 2020Data integrity in wireless sensor networks (WSN) is very important because incorrect or missing values could result in the system making suboptimal or catastrophic decisions. Data imputation allows for a system to counteract the effect of ...Read more
Author:Adedeji, KB; Abu-Mahfouz, Adnan MI; Kurien, AMDate:Jul 2023In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices having been exploited to carry out attacks. Due to their inherent ...Read more
Author:Pratt, Lawrence E; Govender, Devashen; Klein, RDate:Nov 2021Electroluminescence (EL) images enable defect detection in solar photovoltaic (PV) modules that are otherwise invisible to the naked eye, much the same way an x-ray enables a doctor to detect cracks and fractures in bones. The prevalence of ...Read more
Author:Botha, Natasha; Marais, Stephen TDate:Nov 2021This study developed a Graphical User Interface (GUI) aimed at teaching the concepts of Machine Learning (ML) algorithms which form the backbone of Artificial Intelligence (AI). This is done by means of tutorial videos and allowing the student ...Read more
Author:Schwegmann, Colin P; Kleynhans, Waldo; Salmon, BPDate:May 2017The usage of remote sensing to observe environments necessitates interdisciplinary approaches to derive effective, impactful research. One remote sensing technique, Synthetic Aperture Radar, has shown significant benefits over traditional ...Read more
Author:Kukuni, TG; Markus, E; Kotze, B; Abu-Mahfouz, Adnan MIDate:Aug 2022The application of machine learning in resolving complex cyber-security challenges in smart manufacturing plant is growing. Network intrusion and anomaly detection is posing high risks in sensory data integrity and optimisation of processes ...Read more
Author:Ngejane, Hombakazi C; Eloff, JHP; Sefara, Tshephisho J; Marivate, VNDate:Mar 2021Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful behaviour for the attention of law enforcement units. ...Read more
Author:Sefara, Tshephisho Joseph; Rangata, Mapitsi RDate:Dec 2023Most general sentiment analysers degrade quality when tested on Tweets in the broadcast domain. This domain covers both radio and television broadcast. This paper proposes domain-specific data in the broadcast domain. Furthermore, it proposes ...Read more
Author:Ngxande, Mkhuseli; Tapamo, J-R; Burke, Michael GDate:Nov 2017This paper presents a literature review of driver drowsiness detection based on behavioral measures using machine learning techniques. Faces contain information that can be used to interpret levels of drowsiness. There are many facial features ...Read more
Author:Sefara, Tshephisho JDate:Nov 2019Speech emotion recognition systems require features to be extracted from the speech signal. These features include Time, Frequency, and Cepstral-domain features. To normalise features, it is a challenging task to select an appropriate ...Read more