Author:Suliman, Ridhwaan; Mtsweni, Jabu SDate:Jun 2022The SARS-CoV-2 pandemic has wreaked havoc globally, with over half a billion people infected and millions of lives lost. The pandemic has also interrupted every aspect of our lives, with most governments imposing various interventions and ...Read more
Author:Emeruem, C; Keet, CM; Dawood, Zubeida C; Wang, SDate:Aug 2022Foundational ontologies are known to have a steep learning curve, which hampers casual use by domain ontology developers to use them for domain ontology development. Foundational ontology developers have not provided methods or tools to lower ...Read more
Author:Nelufule, Nthatheni N; Moolla, Yasneen; Ntshangase, Cynthia S; De Kock, Antoine JDate:Mar 2023One of the first recognised and commonly used biometric modalities for men is the fingerprint, which is frequently used to register adults at home and in traffic centres. Fingerprint biometrics for babies, in particular, are not commonly used ...Read more
Author:Dlamini, ZI; Phahlamohlaka, Letlibe JDate:Sep 2021This chapter shares some methods that could be employed in order to construct and deploy a local cyber smart community in a developing economy, where the notion of smart communities seems to be fitting and significant compared to that of smart ...Read more
Author:Pieterse, HeloiseDate:Dec 2021The world is witnessing a rise in cyber-related incidents. As information technology improves and the reliance on technology increases, the frequency and severity of cyber incidents escalate. The impact is felt globally, and South Africa is ...Read more
Author:Nelufule, Nthatheni; De Kock, Antoine JDate:Mar 2023This study examines the application of infant iris biometrics as a method of identification for newborns and young children. Infant iris photos were collected using an IriShield-USB BK 2121U camera at a variety of locations, including public ...Read more
Author:McDonald, Andre M; Van Wyk, M; Chen, GDate:Aug 2021The inverse Frobenius-Perron problem (IFPP) is a collective term for a family of problems that requires the construction of an ergodic dynamical system model with prescribed statistical characteristics. Solutions to this problem draw upon ...Read more
Author:Burke, Ivan D; Motlhabi, Michael B; Netshiya, Rofhiwa; Pieterse, HeloiseDate:Feb 2021Recently, well-known and established South African organisations have experienced cyberattacks. South African Bank Risk Information Centre (SABRIC) confirmed in October 2019 that the industry had been hit by a wave of Distributed Denial of ...Read more
Author:Mgaga, Sboniso S; Tapamo, JRDate:Dec 2020Latent fingerprints are fingerprint impressions left on the surfaces a finger comes into contact with. They are found in almost every crime scene. Conventionally, latent fingerprints have been obtained using chemicals or physical methods, ...Read more
Author:Phahlamohlaka, Letlibe J; De Villiers, CDate:Sep 2021From its inception just over three decades ago, the Siyabuswa Educational Improvement and Development Trust (SEIDET) believed that to achieve its goals, it needed to put research and development at the center of its strategic and operational ...Read more
Author:Nair, Kishor K; Nair, HDate:Aug 2021Internet of Things (IoT) wireless devices has the capability to interconnect small footprint devices and its key purpose is to have seamless connection without operational barriers. It is built upon a three-layer (Perception, Transportation ...Read more
Author:Veerasamy, NamoshaDate:Jun 2021Cyber attacks can affect the confidentiality, integrity and availability of data/ systems. Some attacks aim to steal data whereas others try cause destruction. One such vulnerability stems from the malicious use of USB chargers. When travelling ...Read more