Author:Suliman, Ridhwaan; Mtsweni, Jabu SDate:Jun 2022The SARS-CoV-2 pandemic has wreaked havoc globally, with over half a billion people infected and millions of lives lost. The pandemic has also interrupted every aspect of our lives, with most governments imposing various interventions and ...Read more
Author:Dawood, Zubeida C; Mkuzangwe, Nenekazi NPDate:Mar 2022There is a growth of cyber-attacks in South Africa. Seeing that there are over 38 million Internet users in South Africa, this is no surprise. The South African government has published the National Cybersecurity Policy Framework (NCPF) and ...Read more
Author:Meyers, Bronwyn C; Grobler, Jan-Hendrik; Snedden, GCDate:Jul 2023A combustor was designed for a 200N micro-gas turbine [1, 2] using the NREC preliminary combustor design method [1, 2, 3]. During the design process, there are various aspects where there are no definitive methodologies for specifying the ...Read more
Author:Kgaphola, Motsoko J; Ramoelo, Abel; Odindi, J; Mwenge Kahinda, Jean-Marc; Seetal, Ashwin RDate:Mar 2023Land degradation (LD) is a global issue that affects sustainability and livelihoods of approximately 1.5 billion people, especially in arid/semi-arid regions. Hence, identifying and assessing LD and its driving forces (natural and anthropogenic) ...Read more
Author:Musvoto, Constansia D; Kgaphola, Motsoko J; Mwenge Kahinda, Jean-MarcDate:Dec 2021Agroforestry-based sustainable land management (SLM) interventions provide opportunities for tackling land degradation and its associated socio-economic issues. Agroforestry is not a guaranteed SLM fix as every agroforestry practice is not ...Read more
Author:Ndlovu, Z; Desai, D; Pandelani, Thanyani A; Ngwangwa, H; Nemavhola, FDate:Feb 2022This study assesses the modelling capabilities of four constitutive hyperelastic material models to fit the experimental data of the porcine sclera soft tissue. It further estimates the material parameters and discusses their applicability ...Read more
Author:Ndlovu, Z; Desai, D; Pandelani, Thanyani A; Ngwangwa, H; Nemavhola, FDate:Feb 2022This study assesses the modelling capabilities of four constitutive hyperelastic material models to fit the experimental data of the porcine sclera soft tissue. It further estimates the material parameters and discusses their applicability ...Read more
Author:Akpakwu, GA; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Feb 2020With the emerging applications of the Internet of Things (IoT), a congestion control mechanism becomes a critical phenomenon for efficient communication in networks of constrained devices. The Internet Engineering Task Force developed the ...Read more
Author:Mwim, EN; Mtsweni, Jabu S; Chimbo, BDate:Mar 2023Human related vulnerability challenges continue to increase as organisations intensify their use of interconnected technologies for operations particularly due to the emergence of COVID-19 pandemic. Notwithstanding the challenge of a human ...Read more
Author:Pieterse, HeloiseDate:Dec 2021The world is witnessing a rise in cyber-related incidents. As information technology improves and the reliance on technology increases, the frequency and severity of cyber incidents escalate. The impact is felt globally, and South Africa is ...Read more
Author:Veerasamy, NamoshaDate:Feb 2021The outbreak of the novel corona virus or Covid-19 has sparked a wave of changes. Social-distancing and remote working meant that increasingly employees and individuals were reliant on Information Communication Technologies (ICT) to connect ...Read more
Author:Mkuzangwe, Nenekazi N; Dawood, Zubeida CDate:Jun 2020Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, are essential to combatting today's increasingly frequent and sophisticated cyber-attacks. Several cyber-threat information-sharing standards ...Read more
Author:Mutemwa, Muyowa; Mtsweni, Jabu SDate:Mar 2022A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond ...Read more
Author:Magidimisha, Edwin; Faniso-Mnyaka, Zimbini; Naidoo, Seelenthren; Nana, Muhammad ADate:Apr 2023The severity of wildland vegetation fires is expected to grow in response to climate change. Therefore, the price of combating fires will likewise go up while still posing a serious risk to the firefighters. Various countries have invested ...Read more
Author:Ngejane, Hombakazi C; Eloff, JHP; Sefara, Tshephisho J; Marivate, VNDate:Mar 2021Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful behaviour for the attention of law enforcement units. ...Read more
Author:Veerasamy, NamoshaDate:Mar 2022A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond ...Read more
Author:Mwim, EM; Mtsweni, Jabu S; Chimbo, BDate:Jul 2023The healthcare sector has become a high target of cyber threats due to the nature of the industry and the potential of personal and confidential information. Human related factors have proven to be the major contributor to the challenges ...Read more