Author:Salami, O; Mtsweni, Jabu SDate:May 2016Technological advancements have provided Banks several means of sending messages to their customers. In the context of business-to-customer interaction, Single Channel Messaging (SCM) model is prominently used by most Banks in Africa. SCM is ...Read more
Author:Conradie, Dirk CU; Gibberd, Jeremy T; Mentz, F; Ras, HDate:May 2007This paper describes the development of a Computational Building Simulation (CBS) tool, termed KRONOS that is being used to work on advanced architectural research questions such as user behaviour in buildings. The intention is to provide ...Read more
Author:Twinomurinzi, H; Phahlamohlaka, Letlibe J; Byrne, EDate:May 2009The road of development through Information and Communication technology (ICT4D) is lined with deep potholes and dead ends since little is done to “accumulate either knowledge or practical guidance” (Heeks and Bailur, 2007, p. 243). This paper ...Read more
Author:Labuschagne, WADate:Oct 2012As our dependence on information technology
increases, cyber attacks are becoming complex. The attack vector is growing and there are definite digital footprint dangers. Understanding of threat is critical; and security awareness is paramount ...Read more
Author:Grobler, M; Dlamini, Z; Ngobeni, Sipho J; Labuschagne, ADate:Aug 2011A large portion of the South African rural community only have intermittent access to computers and are not familiar, nor entirely comfortable, with the use of internet communication or electronic devices. The research conducted by the authors ...Read more
Author:Veerasamy, Namosha; Grobler, M; Von Solms, SDate:Aug 2012Cyberterrorism has emerged as a new threat in the Information and Communication Technology (ICT) landscape. The ease of use, affordability, remote capabilities and access to critical targets makes cyberterrorism a potential threat to cause ...Read more
Author:Dlodlo, N; Smith, Andrew C; Montsi, L; Kruger, Carel PDate:2013Energy conservation concerns call for end-users to regulate their electrical consumption and help achieve a balance between the available energy supply and demand. Therefore there is a need for rigorous research into smart home energy management ...Read more
Author:Naidoo, Mogesh; Mokonyama, Mathetha T; Nkosi, MuziDate:Oct 2016In terms of air quality management in the urban setting, an on-road vehicle emissions inventory is important, particularly in growing economies as private vehicle ownership increases. The basis of vehicle emissions inventory is an estimate ...Read more
Author:Dlamini, N; Mamushiane, Lusani; Nkosi, M; Dlamini, S; Ramaboka, TDate:Aug 2023The criminal justice system is a critical component of the South African government and its developmental and operational activities must be seamless to ensure timely delivery of justice to those who committed crimes. This study provides a ...Read more
Author:Kobo, Hlabishi I; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Oct 2017Software Defined Networking (SDN) is a developing networking paradigm that advocates a complete overhaul of the conventional networking. SDN decouples the control logic from the data forwarding functionality; which traditionally are coupled ...Read more
Author:Greeff, M; Lysko, MD; Gledhill, Irvy MA; Bezuidenhout, DF; Hattingh, Z; Jeebodh, PDate:Feb 2010The potential for post-graduate students in Physics, at universities around South Africa, may be high. Still, only a trickle of Bachelor of Science graduates venture into post-graduate studies in Physics. The influx may be on the increase ...Read more
Author:Harikrishnan, D; Kumar, NS; Joseph, S; Nair, Kishor KDate:Oct 2019Fingerprint-based authentication systems in general are prone to several security vulnerabilities. Authentication systems such as Biometric crypto systems, Cancellable templates and Bio-hashing provide a solution for addressing these ...Read more
Author:Veerasamy, Namosha; Eloff, JHPDate:Jul 2008Information warfare has surfaced as an emerging concept that affects not only military institutions but ordinary organisations as well. Information warfare in itself consists of various components ranging from its electronic and psychological ...Read more
Author:Mvelase, PS; Dlamini, IZ; Sithole, Happy M; Dlodlo, NDate:Jun 2013Worldwide governments are actively looking into cloud computing as a means of increasing efficiency of service delivery and reducing infrastructure costs. As a result of introducing cloud computing, interoperability issues arise and yet it ...Read more
Author:Trotter, DDate:Oct 2012In this presentation the author explores the key issues around the 'green economy' and its implications for a developing country like South Africa.Read more
Author:Britz, K; Varzinczak, IDate:Jul 2014We investigate the notion of dilation of a propositional theory based
on neighbourhoods in a generalized approximation space.We take both a semantic
and a syntactic approach in order to define a suitable notion of theory dilation
in the ...Read more
Author:Landman, S; Marx, E; Landman, WA; Mason, SJDate:Sep 2013An empirical downscaling technique to predict daily fog occurrence at Cape Town International Airport from low-level atmospheric circulation is developed by using the Principal Component Regression option of the Climate Predictability Tool. ...Read more
Author:Chipangura, B; Van Biljon, JA; Botha, AdèleDate:Oct 2012Developing countries in general, and South Africa in particular has shown phenomenal growth in the mobile cellular technology sector. Providing mobile cellular access to information and services has ushered a new era of challenges and ...Read more
Author:Botha, Adèle; Batchelor, J; Traxler, J; De Waard, I; Herselman, Martha EDate:May 2012The rapid spread and penetration of mobile devices to every layer of society has confronted the educational community with many new opportunities and responsibilities. As mobile computing and its disruptive aftermath enter the education arena, ...Read more