Author:Weiss, M; Botha, Adèle; Herselman, Martha EDate:Jan 2019mHealth solutions, in resource constrained public healthcare settings, are often an extension of the reach of the government health system. As such, mHealth is subjected to demands resulting from not only restrictions due to constrained health ...Read more
Author:Khumalo, N; Oyerinde, O; Mfupe, Luzango PDate:Sep 2019The fifth generation (5G) of wireless network ecosystem which is expected to be deployed in 2020 promises to provide higher speeds, higher capacity and lower latency than the current mobile networks. 5G also promises to revolutionise the ...Read more
Author:Madhoo, H; Khatri, A; Willemse, T; Oosthuizen, D; Coetzee, LDate:Apr 2015The “Internet of Things” (IoT) is a concept where animate and inanimate objects have the ability to collect and exchange data over a network without requiring human-to-human or human-to-computer interaction. Through the utilisation of IoT and ...Read more
Author:Olatinwo, DD; Abu-Mahfouz, Adnan MI; Hancke, GPDate:Mar 2021This study proposes a hybrid MAC protocol that can efficiently and effectively optimize the communication channel access of a WBAN multi-class system. The proposed protocol consists of two major processes that include the contention phase ...Read more
Author:Linklater, G; Smith, C; Connan, J; Herbert, A; Irwin, Barry VWDate:Sep 2017Attribute-based Access Control (ABAC) is an access control model where authorization for an action on a resource is determined by evaluating attributes of the subject, resource (object) and environment. The attributes are evaluated against ...Read more