Author:Meyer, T (ed); Taylor, K (ed)Date:Dec 2009In 2004, a small team of investigators undertook a prototype development effort to explore how semantics could be inserted in several existing scientific data systems being supported by the High Altitude Observatory at the National Centre for ...Read more
Author:Burke, Ivan D; Van Heerden, Renier PDate:Mar 2016Cyber awareness training has become a growing industry, with more and more organisations starting to focus on training personnel on how to behave in a secure manner when engaging in cyber operations. Cyber challenges place participants in ...Read more
Author:Emeruem, C; Keet, CM; Dawood, Zubeida C; Wang, SDate:Aug 2022Foundational ontologies are known to have a steep learning curve, which hampers casual use by domain ontology developers to use them for domain ontology development. Foundational ontology developers have not provided methods or tools to lower ...Read more
Author:Dawood, Zubeida CDate:Mar 2019Computer Security Incident Response Teams (CSIRTs) are responsible for data collection and analysis concerning cyber security threat incidents. In order to provide the best service support for cyber security breaches, information about how ...Read more
Author:Keet, CM; Suarez-Figueroa, MC; Poveda-Villalon, MDate:Sep 2013A growing number of ontologies are already available thanks to development initiatives in many different fields. In such ontology developments, developers must tackle a wide range of difficulties and handicaps, which can result in the appearance ...Read more
Author:Mkuzangwe, Nenekazi N; Dawood, Zubeida CDate:Jun 2020Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, are essential to combatting today's increasingly frequent and sophisticated cyber-attacks. Several cyber-threat information-sharing standards ...Read more
Author:Dawood, Zubeida CDate:Feb 2019Behavioural biometrics are increasingly being used to authenticate users for various applications. As active research is being conducted for behavioural biometrics, researchers face difficulty in sharing and annotating experimental data. This ...Read more
Author:Nortje, R; Britz, K; Meyer, TDate:Dec 2009Module extraction plays an important role in the reuse of ontologies as well as in the simplification and optimization of some reasoning tasks such as finding justifications for entailments. In this paper the authors focus on the paper of ...Read more
Author:Meyer, T; Moodley, K; Varzinczak, IDate:Aug 2010Description Logics (DLs) are widely accepted as an appropriate class of knowledge representation languages to represent and reason about ontologies. Tools for performing standard reasoning tasks such as satisfiability and consequence checking ...Read more
Author:Dawood, Zubeida C; Keet, CMDate:Sep 2013A purpose of a foundational ontology is to solve interoperability issues among domain ontologies and they are used for ontology- driven conceptual data modelling. Multiple foundational ontologies have been developed in recent years, and most ...Read more
Author:Gerber, A; Meyer, T; Seebregts, C; Britz, A; Pretorius, L; Alberts, R; Moodley, D; Halland, KDate:Nov 2008Integrating a mechanism to store, retrieve and use clinical data with a system to manage medical records enables better utilisation of medical data and improved healthcare. This poster introduces a research project that aims to extend OpenMRS ...Read more
Author:Mtsweni, Jabu S; Biermann, E; Pretorius, LDate:Jul 2014The benefits of incorporating Semantic Web Services in web applications are well documented. However, both the real-world implementation and adoption of these services are still rather limited in practice. This is despite the promises that ...Read more
Author:Coetzer, W; Moodley, D; Gerber, ADate:Nov 2014We modeled expert knowledge of arthropod flower-visiting behavioral ecology and represented this in an event-centric domain ontology, which we describe along with the ontology construction process. Two smaller domain ontologies were created ...Read more
Author:Coetzer, W; Moodley, D; Gerber, ADate:Nov 2017Semantic heterogeneity hampers efforts to find, integrate, analyse and interpret ecological data. An application case-study is described, in which the objective was to automate the integration and interpretation of heterogeneous, flower-visiting ...Read more
Author:Roodt, JH; Leenen, L; Van Vuuren, JJ; Dawood, Zubeida CDate:Jul 2020Complex societal problems require a multidisciplinary and multi-method approach to develop models that can support the development of solutions. General morphological analysis is a qualitative method to extract information from experts through ...Read more
Author:Jansen van Vuuren, JC; Leenen, L; Grobler, MM; Chan, Ka Fai P; Dawood, Zubeida CDate:Mar 2015Acquiring, representing, and managing knowledge effectively has a considerable impact on constructing accurate and intelligent systems. A challenge faced by domain experts is the manner in which information about the cybersecurity environment ...Read more
Author:Nortje, R; Britz, K; Meyer, TDate:Jul 2013In this paper we investigate the module-theoretic properties of bot and top-reachability modules in terms of inseparability relations for the DL SRIQ. We show that, although these modules are not depleting or self-contained, they share the ...Read more
Author:Chan, Ka Fai P; Theron, J; Van Heerden, Renier P; Leenen, LDate:Mar 2015In modern warfare it is no longer sufficient to only focus on physical attacks and counter-measures; the threat against cyber networks is becoming increasingly significant. Modern military forces have to provide counter measures against these ...Read more
Author:Moodley, D; Seebregts, CJ; Pillay, AW; Meyer, TDate:Aug 2013eHealth governance and regulation are necessary in low resource African countries to ensure effective and equitable use of health information technology and to realize national eHealth goals such as interoperability, adoption of standards and ...Read more
Author:Moodley, D; Pillay, AW; Seebregts, CJDate:Aug 2011Most African countries have limited health information systems infrastructure. Some health information system components are implemented but often on an adhoc, piecemeal basis, by foreign software developers and designed to solve specific ...Read more