Author:Mthethwa, Sthembile; Pretorius, MorneDate:Dec 2022The ongoing push for the 4th industrial revolution is setting the stage to digitise, persist and verify identity along with credentials. Academic and skills credentials are currently verified manually and have much scope for automation using ...Read more
Author:Stoltz, M; Stoltz, George G; Obara, K; Wang, T; Bryant, DDate:Nov 2021Hidden Markov models (HMMs) are general purpose models for time-series data widely used across the sciences because of their flexibility and elegance. Fitting HMMs can often be computationally demanding and time consuming, particularly when ...Read more
Author:Baruni, Kedimotse P; Mokoena, Nthabiseng ME; Veeraragoo, Mahalingam; Holder, Ross PDate:Dec 2021Face recognition is one of the biometric technologies that is mostly used in surveillance and law enforcement for identification and verification. However, face recognition remains a challenge in verifying and identifying individuals due to ...Read more
Author:Shafuda, F; McDonald, Andre M; Van Wyk, MA; Versfeld, JDate:Nov 2019In this paper, we investigate the correlation Toeplitz (CTOP) and averaging Toeplitz (AVTOP) decorrelation techniques, as applied towards direction of arrival (DOA) estimation of coherent narrowband sources with the multiple signals classi ...Read more
Author:Botha, Johannes G; Botha-Badenhorst, Danielle P; Leenen, LDate:Mar 2023Blockchain and cryptocurrency adoption has increased significantly since the start of the Covid-19 pandemic. This adoption rate has overtaken the Internet adoption rate in the 90s and early 2000s, but as a result, the instances of crypto scams ...Read more
Author:Botha, Johannes G; Pederson, T; Leenen, LDate:Jun 2023Since the start of the Covid-19 pandemic, blockchain and cryptocurrency adoption has increased significantly. The adoption rate of blockchain-based technologies has surpassed the Internet adoption rate in the 90s and early 2000s. As this ...Read more
Author:Veerasamy, Namosha; Yoolla, Yaseen; Dawood, Zubeida CDate:Jun 2022Geospatial data is often perceived as only being related to maps, compasses and locations. However, the application areas of geospatial data are far wider and even extend to the field of cybersecurity. Not only is there an ability to show ...Read more
Author:Emeruem, C; Keet, CM; Dawood, Zubeida C; Wang, SDate:Aug 2022Foundational ontologies are known to have a steep learning curve, which hampers casual use by domain ontology developers to use them for domain ontology development. Foundational ontology developers have not provided methods or tools to lower ...Read more
Author:Pelser, Winnie CDate:Sep 2019Many of the administrative decisions that must be made in a military environment are complex and rely on a rational analysis of situations. Decisions within the domain of ageing systems are particularly difficult and often riddled with different ...Read more
Author:Oosthuizen, RudolphDate:Sep 2021Management of Technology (MoT) has evolved since its inception in the 1980s and definitions from the 1990s. However, the field's definition may not be keeping up with the ever-increasing changes in our world. This paper implements bibliometrics, ...Read more
Author:Nelufule, Nthatheni N; Moolla, Yasneen; Ntshangase, Cynthia S; De Kock, Antoine JDate:Mar 2023One of the first recognised and commonly used biometric modalities for men is the fingerprint, which is frequently used to register adults at home and in traffic centres. Fingerprint biometrics for babies, in particular, are not commonly used ...Read more
Author:Steynberg, L; Erasmus, Louwrence D; Pretorius, LDate:Aug 2022There are opportunities for disruptive applications of blockchain technology in outbound logistics management, especially with peer-to-peer networking support to keep records of verified transactions in distributed ledgers without control by ...Read more
Author:Mtsweni, Jabu S; Thaba, James MDate:2022Cyberspace has been designated by organizations such as NATO as the fifth domain for battlespace, and many nations are already having and/or building their capabilities in the cyber defence environment in order to protect and defend their ...Read more
Author:Mashaba, Nikiwe P; Griffith, DJDate:Nov 2020Near infrared detectors have gained popularity, mainly in the military, because of their capability of detecting wildfires. The Council for Scientific and Industrial Research (CSIR) focuses on the development and deployment of wildfire detectors ...Read more
Author:Nelufule, Nthatheni; Mabuza-Hocquet, Gugulethu P; De Kock, Antonie JDate:Jan 2020In most biometric modalities, recognition and authentication methods for adults have already been fully designed, developed and commercially available. However, for infants and children who are the most vulnerable population to abduction, ...Read more
Author:Nelufule, Nthatheni; Mabuza-Hocquet, Gugulethu P; De Kock, Antonie JDate:Jan 2020In most biometric modalities, recognition and authentication methods for adults have already been fully designed, developed and commercially available. However, for infants and children who are the most vulnerable population to abduction, ...Read more
Author:Zandamela, Frank; Ratshidaho, Thikhathali T; Kunene, Dumisani C; Nana, Muhammad ADate:Sep 2021In literature, several approaches have been used to evaluate the performance of deblurring algorithms on synthetically generated image datasets. The used image datasets only consist of motion-blurred images and do not consider depth variation. ...Read more
Author:Gonçalves, Duarte PDDate:Sep 2021INCOSE has expressed its vision for transdisciplinary approach for systems engineering to address complex societal problems. While the concept of ‘system’ has been dealt with at length, the purpose of this article is to surface assumptions ...Read more
Author:Gonçalves, Duarte PDDate:Sep 2021INCOSE has expressed its vision for transdisciplinary approach for systems engineering to address complex societal problems. While the concept of ‘system’ has been dealt with at length, the purpose of this article is to surface assumptions ...Read more
Author:Modungwa, Dithoto M; Mekuria, Fisseha; Kekana, Mzuzwezulu ZDate:Sep 2021The design of an autonomous underwater robot based on biomimicry is presented in this paper. The systematic design of the robot focuses on integrating 5G-AI-IoT- as effective technological tools to autonomously monitor and harvest invasive ...Read more