Browse
Recent Submissions
Item Comparative Analysis of 5G SDR-based opensource software platforms: OpenAirInterface and srsRAN(2025-02) Motaung, Morebodi; Mthethwa, Nosipho B; Nokane, Boikobo; Masonta, Moshe TThe comparative analysis of open-source platforms, OpenAirInterface (OAI) and srsRAN, is critical in advancing the development and testing of end-to-end (E2E) 5G Standalone (SA) mobile network testbeds. This paper presents a detailed comparison between these two platforms, focusing on several key aspects essential for evaluating their applicability in 5G research and development. The features and functionalities of both OAI and srsRAN are compared, emphasising their support for 5G SA architecture. Furthermore, performance metrics such as throughput and latency are analysed to assess network efficiency. The quality of software documentation, the ability to integrate with virtualised environments, ease of installation, usability, and the support for different frequency bands are also explored. By evaluating these aspects, this paper highlights the role of OAI and srsRAN as vital tools in accelerating the deployment of 5G networks. Their flexibility and customisation options make them particularly important for academic and industrial research, as they enable rapid prototyping and experimentation without the constraints of proprietary solutions. The insights provided here aim to guide researchers and developers in choosing the most suitable platform for their 5G SA testbeds.Item Sustainable adoption of technology: A people-centric approach within the South African mining industry(2025-06) Muller, R; Ntsoelengoe, Johanna S; De Kock, N; Botha, W; Pelders, Jodi L; Ramparsad, SUnderstanding and clarifying the critical success factors (CSFs) that either support or inhibit the sustainable adoption of technological solutions, is required to improve the maturity of change leadership in the South African mining industry’s (SAMI) modernisation journey. Technology is seen as an enabler for solving the everyday problems of multiple stakeholders within the mining value chain. Previous work has been conducted in the Successful Application of Technologies Centred Around People (SATCAP) programme of the Mandela Mining Precinct and at the Gordon Institute of Business Science towards demystifying these CSFs, which leads to the successful design, selection and diffusion of technologies within the context of modernisation. The technologies deployed in the SAMI’s operations must be purposeful and ready to serve the industry’s multiple stakeholders’ needs and realities. The diffusion process should be people-centric, facilitating upskilling and reskilling, as skills transformation is required for the sustainable adoption of technological solutions. Mature change leadership is needed and practised intentionally and systemically; this approach will ensure that the diffused technologies achieve their purpose, namely value creation. Considering the CSFs within a people-centric change approach will accelerate the SAMI’s modernisation journey, and leverage technology as an enabler of change. The sustainable adoption and diffusion of purposeful technologies as the means will accelerate the SAMI’s various stakeholders into a modernised world of work.Item Design and implementation of BlockAPI - a blockchain-as-a-service platform(2025-05) Kanjere, Julian; Ford, MerrylOrganisations wishing to leverage blockchain technology’s (BCTs) in their value chain processes are often deterred by the high costs to build and maintain blockchain-based solutions and infrastructure, and a lack of both organisational technical know-how and buy in from management. To remedy this, we develop BlockAPI, a lightweight Blockchain-as-a-Service (BaaS) platform, primarily for use in multi-stakeholder environments that required trusted data. BlockAPI BaaS exposes access-controlled application programming interface (API) endpoints for organisations to send data to and verify data on a blockchain network. The BlockAPI BaaS platform is used by applications in logistics, manufacturing, farming and financial services, and enables these use cases to easily and cost-effectively integrate blockchain technology as a trust registry in their SC processes and existing business systems, thereby lowering the cost and technical know-how barriers to BCT adoption in the process. Future work includes adding support for minting non-fungible tokens and conducting a robust performance evaluation.Item Assessing changes in the hydrological regime of lacustrine wetlands in the Maputaland Coastal Plain, South Africa (2024)(2024-08) Ndlovu, N; Van Deventer, Heidi; Hansen, C; Landman, WAssessing changes in the hydrological regime of lacustrine wetlands in the Maputaland Coastal Plain, South Africa.Item Sentinel 2 user-relevant water quality monitoring in small southern African water bodies (SWAM_ZA_GB)(2025-06) Smith, Maire E; Jiang, D; Spyrakos, E; Pillay, HSentinel 2 user-relevant water quality monitoring in small southern African water bodies (SWAM_ZA_GB).Item Estimating Green and Teal carbon stocks across the Gauteng Province of South Africa using a multi-source remote sensing approach(2024-09) Naidoo, L; Main, R; Van Deventer, HeidiEstimating Green and Teal carbon stocks across the Gauteng Province of South Africa using a multi-source remote sensing approach.Item Monitoring changes in the extent of lacustrine wetlands of Eswatini, Lesotho and South Africa(2024-08) Van Deventer, HeidiMonitoring changes in the extent of lacustrine wetlands of Eswatini, Lesotho and South Africa.Item Primary production in upwelling systems(2025-06) Groom, S; Jönsson, B , B; Kulk, G; Sathyendranath, S; Tilstone, T; Jackson, T; Land, P; Hockley, K; Whittle, Christo P; Smith, Marie EThis presentation focuses on primary production in upwelling systems.Item Balancing innovation and data residency- A case study of a financial institution in Southern Africa(2025-05) Mjoli, P; Eloff, JHP; Dlamini, Thandokuhle MThis paper proposes a Shared Responsibility Model to address South Africa’s data localization requirements in the financial sector, illustrated through a case study of DigiBankSA. With the POPIA and the National Cloud and Data Policy mandating data residency, this model divides security and compliance roles between cloud providers (AWS, Google Cloud, Microsoft Azure) and financial institutions to ensure adherence while unlocking cloud capabilities. DigiBankSA benefits from storing sensitive customer data within South African borders while utilizing global cloud services for advanced analytics, scalability, and cost efficiency. Additionally, the model aligns with the African Union’s Malabo Convention, promoting secure cross-border data flows across African nations, fostering regional cooperation, and enhancing DigiBankSA’s data protection strategies. This shared model provides a balanced approach to data localization and cloud utility, positioning DigiBankSA for growth while maintaining regulatory compliance. Future work will refine implementation guidelines and explore secure, regulated, cross-border data flow strategies.Item DLT-Based approach for secure and cyber resilient resource-constrained IoT devices: A survey on recent advances(2025-04) Mthethwa, Sthembile N; Dlamini, Thandokuhle M; Jembere, EDistributed Ledger Technologies (DLTs) are advancing various fields such as the financial sector, supply chain management, Internet of Things (IoTs), etc. Through its characteristics, DLTs have the potential to solve some of the challenges encountered by IoT devices as the number of connected devices continues to grow tremendously. These characteristics includes but not limited to decentralisation, traceability, security, transparency, immutability, non-repudiation, etc. There has been an increase in the body of knowledge in relation to the convergence of DLTs and IoTs. This paper examines how DLTs can enhance the security of resource-constrained IoT devices, which have limitations that prevent the implementation of traditional security measures like encryption due to size and computational power. This paper consolidates existing research by comparing techniques, technologies used, and results achieved over the years. Finally, the research identifies knowledge gaps for future exploration.Item The impact of human aspects of information and cybersecurity: A systematic literature survey(2025-06) Nelufule, NthatheniIn a rapidly evolving digital landscape, the importance of cybersecurity has increased. This is driven by the increasing frequency of sophisticated emerging cyberthreats. Despite the deployment of advanced security technologies in critical security environments, the human error continues to be one of the leading causes of cybersecurity breaches. Research findings have indicated that a significant percentage of cybersecurity incidents are linked to human errors, such as falling victim to phishing attacks, mishandling sensitive information, and neglecting basic cybersecurity protocols. This alarming trend underscores the need for organizations to prioritize the human factor in their cybersecurity frameworks. This survey paper explores the multifaceted impact of human aspects on information and cybersecurity, emphasizing the critical need to understand and address human behaviors, attitudes, and cultural dynamics that contribute to cybersecurity vulnerabilities. The primary objective of this survey paper is to illuminate the ways in which human behavior can affect cybersecurity outcomes, providing organizations with actionable insights to improve their cybersecurity strategies. One of the key findings of this survey paper is the profound influence of organizational culture on an employee behavior regarding cybersecurity practices. These organizational cultures highlight the importance of cultivating an environment in which cybersecurity is viewed as a collective responsibility rather than an individual burden.Item Trust requirements and mechanisms in peer-to-peer energy markets(2024-11) Leotlela, Boitumelo; Ledwaba, Lehlogonolo P; Coetzee, MPeer-to-peer (P2P) energy markets are emerging as a promising solution to address the challenges faced by traditional energy systems. However, the decentralised nature of these markets necessitates robust trust mechanisms to ensure secure and reliable energy transactions. This paper presents a comprehensive review of trust requirements and trust-building mechanisms in P2P energy markets. It explores the role of blockchain technology, zero-trust architecture, and reputation systems in establishing trust among market participants. It identifies several trust requirements, including security, privacy, transparency, fairness, and reputation. The study further highlights the limitations of existing works and proposes future research directions to enhance trust and security in P2P energy markets. By addressing these limitations, the full potential of P2P energy trading can be unlocked, contributing to a more sustainable and resilient energy future.Item Split Hopkinson pressure bar compression test simulation and experimental validation of commercially pure copper specimens(2024-01) Miyambo, Mangalani E; Kotole, Dieketseng M; Mokalane, Mzwandile E; Reinecke, John D; Clarke, AnriaTo address the mitigation of blast and ballistic threats, the characterisation of materials under high strain rates is essential for developing precise material failure and impact event simulations. Traditional iterative experimental evaluations are time-consuming and expensive, especially with local constraints on the cost and availability of armour steel. High-fidelity simulation models expedite development, necessitating accurate material models for impact event simulations. In this study, commercially pure copper test specimens, with well-documented properties, served as a pilot for validating experimental materials testing methods. The widely used Split Hopkinson Pressure Bar (SHPB) generated test data to parameterise constitutive material strength models; namely, the JohnsonCook (J-C) model. Material model parameterization for pure copper, based on curve fitting, required validation before application. Quasi-static compression tests established J-C model parameters. To ensure the robustness of the material model, the Council for Scientific and Industrial Research (CSIR) adopted an approach involving testing at various rates, verified by using a finite element model (FEM) of the SHPB. An LS-DYNA FEM model of the SHPB incorporated Gruneisen Equations of State (EOS) and the J-C material model for the copper specimen material. Experimental SHPB results for commercially pure copper at an average strain rate of 1 533 s-1 were compared to the SHPB FEM and published literature results, providing valuable insights into high-strain-rate material behaviour.Item Exploring integrated capability management for organizational success(2024-11) Erasmus, Louwrence D; Mphadzha, Fhumulani R; Chauke, Mapoo DThis paper provides an exploration of integrated capability management, focusing on theoretical perspectives, and practical implications for organizational success. Integrated capability management is a strategic approach that enables organizations to align and leverage their diverse capabilities to achieve strategic objectives and sustain competitive advantage. Drawing on key theoretical perspectives such as the Resource-Based View (RBV), dynamic capabilities framework, and strategic alignment model, the paper traces the historical evolution of capability management from early management theories to contemporary digital transformation frameworks. The report discusses conceptual models and frameworks, including the Capability Maturity Model (CMM), design thinking, and agile methodologies, which provide structured approaches for assessing and improving capability development processes, fostering innovation, and enabling rapid adaptation to changing market conditions. It emphasizes the need for organizations to continuously evolve and adapt their capabilities to meet the demands of a rapidly changing business environment, leveraging technology and innovation to drive organizational performance and competitiveness. Overall, this paper serves as a valuable resource for organizational leaders, managers, and practitioners seeking to enhance their understanding of integrated capability management and develop effective strategies for achieving strategic objectives and sustaining competitive advantage in today's dynamic and digital-driven landscape.Item The value of demand response in South Africa's electric power system(2025) Mdhluli, Sipho D; Makopo, Raisibe S; Mukoma, Peter; Madhoo, H; Figlan, TThe increasing adoption of grid-connected Distributed Energy Resources provided Distribution (and Transmission) Network Operators with the opportunity to procure a range of "flexibility services" from these third partyoperated assets in a way that is beneficial to the local or national electricity network—examples of flexibility services that can be procured include large-scale, grid-connected battery storage systems and demand response. This paper will explore different types of demand response interventions utilised globally, provide a South African context of the current demand response, and, lastly, use Plexos to quantify the system value that untapped demand response potential can provide to the South African electricity markets if pursued.Item Predictive analytics for proactive email security risk management: A systematic review(2024-12) Singano, Zothile T; Mudau, Tshimangadzo C; Ngejane, Hombakazi C; Ndlovu, Lungisani; Mncwango, Lungisani SIn recent years, email has become an important communication tool for sharing private messages to crucial business message exchanges. However, its widespread use makes it a major target for cyber-attacks, including phishing, spam, and malware. These growing threats highlight the urgent need to investigate email security risk management to protect against attacks and maintain the integrity of communication systems. The study reviews the literature on the challenges of email security, risk management, and the role of predictive analysis in combating these threats. Using Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA), thirty-five (35) relevant peer-reviewed research articles were identified in various open research databases. This systematic literature review (SLR) also includes relevant case studies. The findings reveal that the integration of machine learning (ML), natural language processing (NLP), and real-time data analytics into email security frameworks improves threat detection and mitigation. Furthermore, these models often lack adaptability across languages and cultures. Additionally, they do not integrate well with human-centric security measures. Therefore, it is important to develop culturally adaptive predictive models, sector-specific solutions for industries such as finance and healthcare and incorporate behavioural analytics to enhance email threat detection and prevention. In other words, a comprehensive approach that combines technical advances with behavioural insights is crucial to strengthening email security and maintaining the integrity of global digital communications amid evolving cyber threats.Item Review of Machine Learning Techniques That Enable Network Slicing in Open RAN(2025) Mthethwa, Nosipho BP; Mwangama, J; Masonta, Moshe TThe evolution of 5G networks and the anticipated capabilities of 6G have placed significant emphasis on intelligent Radio Access Network (RAN) slicing to meet the diverse and stringent requirements of services such as enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC), and massive machine-type communications (mMTC). This paper reviews state-of-the-art techniques, with a particular focus on the application of machine learning (ML) approaches in RAN slicing. The study categorises ML algorithms based on their primary functions: time series networks for traffic prediction, federated learning for security and privacy, supervised learning for slice admission control, and reinforcement learning for resource allocation and management. It also highlights the complementary nature of these techniques, as demonstrated by hybrid models such as federated deep RL and LSTM-integrated distributed deep RL.Item Intelligent system for conformity assessment testing on the energy performance of household appliances—A South African perspective(2025) Molepo, IK; Markus, E; Abu-Mahfouz, Adnan MIThe potential of AI techniques to enhance conformity assessment processes has garnered attention within the sector. Traditional methods of conformity assessment suffer from a lack of critical analytics and susceptibility to subjective data analysis, human error, inefficiency, and poor data quality. Intelligent systems will improve the accuracy and consistency of assessments when evaluating the energy performance of household appliances. This paper presents some ML approaches to energy consumption anomaly detection applied to household appliances, with the potential to improve the efficiency, accuracy, and reliability of predicting energy consumption. The study proposes an intelligent system to enhance the accuracy, precision, and quality of appliance energy performance conformity assessment testing processes with minimal human intervention. Thus, providing a quality energy assessment, aiding in the efforts to reduce energy consumption in households.Item Developing a multi-modal biometric system for children using age-weighted feature matching approach(2025) Ntshangase, Cynthia S; Baruni, Kedimotse P; Holder, Ross P; De Kock, Antonie J; Khumalo, Lethukuthula P; Chossa, BhekiThe world is getting transformed by digital technologies to ensure balanced development. Likewise, the challenges introduced by the presence of these technologies are increasing. This includes the problem of the unavailability of digital biometric systems that can be used to verify the identity of children from birth to adulthood. This problem is caused by factors such as children’s biometric traits not being fully developed as those of adults and difficulty capturing high-quality biometrics from children using traditional systems. To solve this problem, this study proposes an age-weighted feature matching algorithm that fuses multiple biometric modalities. The system aims to improve the accuracy of identity verification for children. Experimental results show that the proposed multi-modal system, with the age-weighted algorithm, maintains higher recognition rates compared to individual biometrics. The Equal Error Rate (EER) for the multi-modal system without age-weighting is 14.07%, compared to 12.65% with age-weighting applied, indicating a higher successful recognition rate with fewer wrong matches or failures to match. In comparison, the EER for ear recognition is 57.56%, for fingerprint recognition is 32.17%, and for iris recognition is 37.76%, all of which are significantly higher than the combined multi-modal system, indicating lower recognition rates when singular biometric modalities are used. These findings emphasize the system’s potential to contribute meaningfully to applications such as birth registration, healthcare, and child protection—domains where robust and inclusive identity systems are urgently needed for children.Item Nature-based Solutions for Climate Adaptation(2024) Davies, Sarah J; Ntshotsho, PhumzaNature-based solutions include ecosystem-based adaptation to climate change. True ecosystem-based adaptation encompasses the following: Helps people adapt to climate change; Uses biodiversity and ecosystems as part of the solution and is part of a broader adaptation strategy.