Author:Matusowsky, M; Ramotsoela, DT; Abu-Mahfouz, Adnan MIDate:May 2020Data integrity in wireless sensor networks (WSN) is very important because incorrect or missing values could result in the system making suboptimal or catastrophic decisions. Data imputation allows for a system to counteract the effect of ...Read more
Author:Adedeji, KB; Abu-Mahfouz, Adnan MI; Kurien, AMDate:Jul 2023In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices having been exploited to carry out attacks. Due to their inherent ...Read more
Author:Pratt, Lawrence E; Govender, Devashen; Klein, RDate:Nov 2021Electroluminescence (EL) images enable defect detection in solar photovoltaic (PV) modules that are otherwise invisible to the naked eye, much the same way an x-ray enables a doctor to detect cracks and fractures in bones. The prevalence of ...Read more
Author:Botha, Natasha; Marais, Stephen TDate:Nov 2021This study developed a Graphical User Interface (GUI) aimed at teaching the concepts of Machine Learning (ML) algorithms which form the backbone of Artificial Intelligence (AI). This is done by means of tutorial videos and allowing the student ...Read more
Author:Schwegmann, Colin P; Kleynhans, Waldo; Salmon, BPDate:May 2017The usage of remote sensing to observe environments necessitates interdisciplinary approaches to derive effective, impactful research. One remote sensing technique, Synthetic Aperture Radar, has shown significant benefits over traditional ...Read more
Author:Kukuni, TG; Markus, E; Kotze, B; Abu-Mahfouz, Adnan MIDate:Aug 2022The application of machine learning in resolving complex cyber-security challenges in smart manufacturing plant is growing. Network intrusion and anomaly detection is posing high risks in sensory data integrity and optimisation of processes ...Read more
Author:Ngejane, Hombakazi C; Eloff, JHP; Sefara, Tshephisho J; Marivate, VNDate:Mar 2021Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful behaviour for the attention of law enforcement units. ...Read more
Author:Sefara, Tshephisho Joseph; Rangata, Mapitsi RDate:Dec 2023Most general sentiment analysers degrade quality when tested on Tweets in the broadcast domain. This domain covers both radio and television broadcast. This paper proposes domain-specific data in the broadcast domain. Furthermore, it proposes ...Read more
Author:Ngxande, Mkhuseli; Tapamo, J-R; Burke, Michael GDate:Nov 2017This paper presents a literature review of driver drowsiness detection based on behavioral measures using machine learning techniques. Faces contain information that can be used to interpret levels of drowsiness. There are many facial features ...Read more
Author:Sefara, Tshephisho JDate:Nov 2019Speech emotion recognition systems require features to be extracted from the speech signal. These features include Time, Frequency, and Cepstral-domain features. To normalise features, it is a challenging task to select an appropriate ...Read more
Author:Davel, MH; Barnard, EDate:Oct 2004Bootstrapping techniques have significant potential for the efficient generation of linguistic resources such as electronic pronunciation dictionaries. The authors describe a system and an approach to bootstrapping for the development of such ...Read more
Author:Davel, MH; Barnard, EDate:Oct 2004The authors focus on factors related to the underlying rule-extraction algorithms, and demonstrate variants of the Dynamically Expanding Context algorithm, which are beneficial for this application. They show that continuous updating of the ...Read more
Author:Sefara, Tshephisho J; Mokgonyane, TBDate:Nov 2020Speaker recognition is a method which recognise a speaker from characteristics of a voice. Speaker recognition technologies have been widely used in many domains. Most speaker recognition systems have been trained on normal clean recordings, ...Read more
Author:Twala, BDate:2009Increasing the awareness of how incomplete data affects learning and classification accuracy has led to increasing numbers of missing data techniques. This paper investigates the robustness and accuracy of seven popular techniques for tolerating ...Read more
Author:Marivate, Vukosi N; Moorosi, NyallengDate:Aug 2017Data from online job boards and online professional networks present an opportunity to understand job markets as well as how professionals transition from one job/career to another. We propose a data driven approach to begin to understand a ...Read more
Author:Molale, P; Twala, B; Seeletse, SDate:Nov 2011In this study, the application of classifiers to problems in fingerprint prediction is investigated. Six supervised learning and two statistical fingerprint classification methods (classifiers) are considered: linear discriminant analysis ...Read more
Author:Sefara, Tshephisho J; Mokgonyane, TB; Manamela, MJ; Modipa, TIDate:Aug 2019Text-to-speech (TTS) synthesis systems are of benefit towards learning new or foreign languages. These systems are currently available for various major languages but not available for low-resourced languages. Scarcity of these systems may ...Read more
Author:Featherstone, Coral; Van der Poel, EDate:Jul 2017There are some aspects of visualisation that are uniquely human. This is because data visualisation is heavily influenced by the science of human visual perception, much of which emerged from the Gestalt School of Psychology. Humans can ...Read more