Author:Labuschagne, WA; Veerasamy, NamoshaDate:Jul 2013The paper will illustrate the dangers of social networking malware through examples. In addition, the paper will discuss propagation techniques used in social networking malware. The aim of the paper is to create user awareness to minimise ...Read more
Author:Baumbach, J; Coetzee, EM; Sieberhagen, RH; Jonker, CRDate:Jul 2011The differences in scotopic recovery time between LED illuminators and a tungsten-halogen illuminator was investigated. The spectral distribution and the luminous intensity distribution of all the supplied illuminators were measured. The ...Read more
Author:Labuschagne, WA; Eloff, MM; Veerasamy, NamoshaDate:Sep 2012Social networking sites have increased in popularity and are utilized for many purposes which include connecting with other people, sharing information and creating content. Many people on social networking sites use these platforms to express ...Read more
Author:Egidius, PM; Abu-Mahfouz, Adnan MI; Ndiaye, M; Hancke, GPDate:Feb 2019Wireless Sensor Networks (WSN) have made a substantial impact in our lives by allowing us to communicate, monitor certain environments thus enabling us to build systems such as software-defined wireless sensor networks (SDWSN) which are ...Read more
Author:Molose, R; Isong, B; Dladlu, N; Abu-Mahfouz, Adnan MIDate:Jul 2022Energy consumption and the network lifespan of wireless sensor networks (WSNs) are greatly affected by data transmission and retransmission. The challenge follows the energy limitation of sensor nodes with replaceable batteries. Albeit several ...Read more
Author:Van der Walt, Christiaan M; Barnard, EDate:Nov 2006The relationship between the distribution of data, on the one hand, and classifier performance, on the other, for non-parametric classifiers has been studied. It is shown that predictable factors such as the available amount of training data ...Read more
Author:Marengwa, Matshidiso SDate:May 2023The increase in explosive and blast incidents has resulted in the need for a method or tool to help monitor and keep track of said incidents to provide insight into the methodologies and devices used by attackers to develop counter-active ...Read more
Author:Cooper, Antony KDate:20 Apr 2006In this article, it talks about Data collection, transfer and the development of national standards – critical components necessary for the success of a GIS in South Africa. It again includes National Government’s responsibility in the creation ...Read more
Author:Cooper, Antony K; Govender, S; Lance, K; Tieszen, LLDate:Apr 2005Data content standards tend to be more accessible. Easier to understand. Used directly by many end users. Immediately applicable to Africa. More susceptible to culture and language – Hence, more important to have local standardsRead more
Author:Olaitan, O; Herselman, Martha E; Wayi, NDate:Jul 2019Background: There are different uses of data in an organisation. Data are required for reporting purposes, decision-making and providing access to vital facts to enable work processes across business units. Data are central to an organisation’s ...Read more
Author:Matusowsky, M; Ramotsoela, DT; Abu-Mahfouz, Adnan MIDate:May 2020Data integrity in wireless sensor networks (WSN) is very important because incorrect or missing values could result in the system making suboptimal or catastrophic decisions. Data imputation allows for a system to counteract the effect of ...Read more
Author:Thulare, Tumiso; Herselman, Martha E; Botha, AdèleDate:Dec 2020Poor system use, including inappropriate design of health information systems, causes difficulties in communication with patients and increased time spent by healthcare professionals in recording the necessary health information for medical ...Read more
Author:Machaka, P; Nelwamondo, Fulufhelo VDate:Aug 2016This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service ...Read more
Author:Baloyi, Ntsako; Kotzé, PDate:Sep 2018Data privacy concerns in the Internet of Things (IoT) and cyberphysical systems (CPS) are real, valid and accentuated. In this paper it is argued that data privacy compliance in IoT and CPS should be addressed at both technical and non-technical ...Read more
Author:Duncombe-Rae, CMDate:1989The first cruise of the Marion Off-shore Ecological Study (MOES-I), during April and May 1987, was a multi-disciplinary effort aimed at gaining a further understanding of the relationships between productivity and the environment in the ...Read more
Author:Badenhorst, JAC; Davel, MDate:Nov 2008When developing speech recognition systems in resource-constrained environments, careful design of the training corpus can play an important role in compensating for data scarcity. One of the factors to consider relates to the speaker composition ...Read more
Author:Cooper, Antony KDate:1988Geographical information consists of non-spatial information (alphanumeric) and spatial information (vector and raster), the relationships between the non-spatial information and the spatial information, as well as the spatial relationships ...Read more
Author:Van der Merwe, Adèle; Van Heerden, Johanna MDate:Jun 2008The CSIR (Council for Scientific and Industrial Research) is one of the leading research and development, technology and innovation institutions in Africa. The CSIR is committed to serving the development objectives of South Africa and the ...Read more
Author:Robertson, I; Froyd, CA; Walsh, RPD; Newbery, DM; Woodborne, S; Ong, RCDate:Oct 2004In a first step to obtain a proxy record of past climatic events (including the El Ni (n) over tildeo-Southern Oscillation) in the normally a seasonal tropical environment of Sabah, a radial segment from a recently fallen dipterocarp (Shorea ...Read more