Author:Molefi, M; Markus, ED; Abu-Mahfouz, Adnan MIDate:Nov 2021A Conformal Strongly Coupled Magnetic Resonance (CSCMR) wireless power transfer (WPT) system is a small footprint technology suitable for applications such as small low power sensors and implantable medical devices. These applications require ...Read more
Author:Oladele, DA; Markus, ED; Abu-Mahfouz, Adnan MIDate:Nov 2021Background: With the projected upsurge in the percentage of people with some form of disability, there has been a significant increase in the need for assistive mobility devices. However, for mobility aids to be effective, such devices should ...Read more
Author:Mekuria, Fisseha; Mzyece, M; Mfupe, Luzango P; Odusola, ADate:Sep 2021Innovation on sustainable ICT technologies to realize affordable broadband connectivity for rural and underserved communities is a crucial component of the effort to achieve the aim of "leaving no one behind by 2030" as championed by the ...Read more
Author:Onumanyi, AJ; Abu-Mahfouz, Adnan MI; Hancke, GDate:Feb 2021Self-adaptive threshold adjustment algorithms (SATAs) are required to reconfigure their parameters autonomously (i.e. to achieve self-parameter adjustment) at runtime and during online use for effective signal detection in cognitive radio ...Read more
Author:Mathebula, I; Isong, B; Gasela, N; Abu-Mahfouz, Adnan MIDate:Nov 2020Software-Defined Wireless Sensor Networks (SDWSN) has received significant attention in recent years due to its inherent challenges such as network security, trust management, inefficient energy consumption, and so on. In particular, inefficient ...Read more
Author:Molose, RSS; Isong, B; Dladlu, N; Abu-Mahfouz, Adnan MIDate:Dec 2021Energy consumption is a typical challenge that is inherent in wireless sensors networks (WSN). Despite the proposals and the development of several routing protocols and Software-defined WSN (SDWSN) introduction to address the challenge and ...Read more
Author:Thamoethata, K; Isong, B; Dladlu, N; Abu-Mahfouz, Adnan MIDate:Nov 2021A vehicle anti-theft system is a security system that prevents authorized use of a vehicle and its theft. Vehicle theft and hijacking are skyrocketing on daily basis despite the swift technological advancements the world is witnessing. Several ...Read more
Author:Olwal, TO; Chuku, PN; Lysko, Albert ADate:Mar 2021Antennas are a critical component in any wireless link. The significance of their role continues to grow, together with the rise of machine-to-machine (M2M) communications and telecommunications starting to move from the fourth generation ...Read more
Author:Olwal, TO; Chuku, PN; Lysko, Albert ADate:Mar 2021Antennas are a critical component in any wireless link. The significance of their role continues to grow, together with the rise of machine-to-machine (M2M) communications and telecommunications starting to move from the fourth generation ...Read more
Author:Marais, LauretteDate:Sep 2021Multilingual Grammatical Framework (GF) domain grammars have been used in a variety of different applications, including question answering, where concrete syntaxes for parsing questions and generating answers are typically required for each ...Read more
Author:Gangire, Y; Da Veiga, A; Herselman, Martha EDate:Oct 2021This paper outlines the development of a validated questionnaire for assessing information security behaviour. The purpose of this paper is to present data from the questionnaire validation process and the quantitative study results.Read more
Author:Govender, Devashen; Moodley, Jayandren; Balmahoon, ReevanaDate:Oct 2021In today’s era, enormous amounts of data are generated and the means to visualize this data is becoming a challenge. Data visualization is an important support tool that allows one to make informed decisions. This paper attempts to provide a ...Read more
Author:Le Roux, E; Ndiaye, M; Abu-Mahfouz, Adnan MIDate:Jun 2021The article proposes a gate automation system based on automatic number plate recognition (ANPR). The system uses a convolutional neural network (CNN) to identify and classify each number plate which is then compared to a database of authorized ...Read more
Author:Ramotsoela, TD; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Oct 2020There has been an increasing number of attacks against critical water system infrastructure in recent years. This is largely due to the fact that these systems are heavily dependent on computer networks meaning that an attacker can use ...Read more
Author:Gbadamosi, SA; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Oct 2020Narrowband Internet of Things (NB-IoT) is a type of low-power wide-area (LPWA) technology standardized by the 3 rd - Generation Partnership Project (3GPP) and based on long-term evolution (LTE) functionalities. NB-IoT has attracted significant ...Read more
Author:Adetunji, KE; Hofsajer, IW; Abu-Mahfouz, Adnan MI; Cheng, LDate:Feb 2021Distributed generation (DG) units are power generating plants that are very important to the architecture of present power system networks. The primary benefits of the addition of these units are to increase the power supply and improve the ...Read more
Author:Dlamini, Sifiso B; Meyer, Isabella ADate:Dec 2020Resilience is a popular concept in development studies, particularly in research and development on how Information and Communication Technologies (ICTs) can be used to improve livelihoods. As much as the primary focus is on using ICTs to ...Read more