Author:Gangire, Y; Da Veiga, A; Herselman, Martha EDate:Oct 2021This paper outlines the development of a validated questionnaire for assessing information security behaviour. The purpose of this paper is to present data from the questionnaire validation process and the quantitative study results.Read more
Author:Mathibe, Motshedisi; Mochenje, Tonderai; Masonta, Moshe TDate:Dec 2021As the Coronavirus disease (COVID-19) pandemic changed how people and business interact, its impact severely impacted the global economy. The government imposed heavy lockdown regulations further damaged an already struggling informal sector ...Read more
Author:Govender, Devashen; Moodley, Jayandren; Balmahoon, ReevanaDate:Oct 2021In today’s era, enormous amounts of data are generated and the means to visualize this data is becoming a challenge. Data visualization is an important support tool that allows one to make informed decisions. This paper attempts to provide a ...Read more
Author:Adetunji, RO; Strydom, MA; Herselman, Martha E; Botha, AdèleDate:Oct 2022As global health concerns become more complex, technological intervention is needed to achieve the Sustainable Development Goal. This study explores the use of the internet of things (IoT) and augmented reality (AR) applications for medication ...Read more
Author:Onumanyi, Adeiza J; Molokomme, Daisy N; Isaac, Sherrin J; Abu-Mahfouz, Adnan MIDate:2022The elbow technique is a well-known method for estimating the number of clusters required as a starting parameter in the K-means algorithm and certain other unsupervised machine-learning algorithms. However, due to the graphical output nature ...Read more
Author:Le Roux, E; Ndiaye, M; Abu-Mahfouz, Adnan MIDate:Jun 2021The article proposes a gate automation system based on automatic number plate recognition (ANPR). The system uses a convolutional neural network (CNN) to identify and classify each number plate which is then compared to a database of authorized ...Read more
Author:Ramotsoela, TD; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Oct 2020There has been an increasing number of attacks against critical water system infrastructure in recent years. This is largely due to the fact that these systems are heavily dependent on computer networks meaning that an attacker can use ...Read more
Author:Pratt, Lawrence E; Matheus, Jana; Klein, RDate:Dec 2023Electroluminescence (EL) images enable defect detection in solar photovoltaic (PV) modules that are otherwise invisible to the naked eye, much the same way an x-ray enables a doctor to detect cracks and fractures in bones. This paper presents ...Read morecbnd
Author:Maremi, Keneilwe J; Thulare, Tumiso; Herselman, Martha EDate:May 2022The objective of this paper is to provide insight into how the successful implementation of Digital Transformation (DT) can help address the challenges and hindrances in South Africa's e-Government. It is essential to aid South Africa's ...Read more
Author:Ramazhamba, Pardon T; Venter, HDate:Oct 2023Criminal justice systems around the world encounter missing case dockets and digital evidence. Problems are also posed by the mechanisms used to share criminal case data, especially email and paper documents that provide exposure to illegal ...Read more
Author:Mtetwa, NS; Tarwireyi, P; Sibeko, CN; Abu-Mahfouz, Adnan MI; Adigun, MDate:Jan 2022The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying ...Read more
Author:Isong, B; Vhahangwele, T; Abu-Mahfouz, Adnan MIDate:Jun 2023Client-server-based healthcare systems are unable to manipulate a high data volume, prone to a single failure point, limited scalability, and data integrity. Particularly, several measures introduced to help curb the spread of Covid-19 were ...Read morecbnd
Author:Wilken, Ilana; Marais, LauretteDate:Nov 2023South Africa is facing a literacy crisis, with the latest PIRLS results showing that 8 out of 10 learners cannot read for basic comprehension by the time they leave the foundation phase. In this climate, the development of strategies to assist ...Read more
Author:Gbadamosi, SA; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Oct 2020Narrowband Internet of Things (NB-IoT) is a type of low-power wide-area (LPWA) technology standardized by the 3 rd - Generation Partnership Project (3GPP) and based on long-term evolution (LTE) functionalities. NB-IoT has attracted significant ...Read more
Author:Hussien, HM; Katzis, K; Mfupe, Luzango P; Bekele, ETDate:Jun 2022The coverage and capacity of exploiting TV White Spaces (TVWS) from High Altitude Platforms (HAPs) with multiple antenna payloads using uniform rectangular phased array (URA) antennas are explored in this article. A scenario is suggested in ...Read more
Author:Adetunji, KE; Hofsajer, IW; Abu-Mahfouz, Adnan MI; Cheng, LDate:Feb 2021Distributed generation (DG) units are power generating plants that are very important to the architecture of present power system networks. The primary benefits of the addition of these units are to increase the power supply and improve the ...Read more
Author:Naicker, Denver; Moodley, MackaylanDate:Mar 2024Self-sovereign identity is an emerging blockchain technology field. Its use cases primarily surround identity and credential management and advocate the privacy of user details during the verification process. Our endeavor was to test and ...Read more
Author:Rangata, Mapitsi R; Sefara, Tshephisho JDate:Feb 2024The amount of data online is increasing as companies generate news articles daily. These news articles contain headlines that have a level of exaggeration aimed to win the readers. In addition, these companies are competing against one another; ...Read more