Author:Machaka, P; Nelwamondo, Fulufhelo VDate:Aug 2016This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service ...Read more
Author:Khutlang, Rethabile; Machaka, Pheeha; Singh, Ann; Nelwamondo, Fulufhelo VDate:Aug 2017Biometric fingerprint scanners scan the external skin's features onto a 2-D image. The performance of the automatic fingerprint identification system suffers first and foremost if the finger skin is wet, worn out or a fake fingerprint is used. ...Read more
Author:Msiza, IS; Mistry, J; Leke-Betechuoh, B; Nelwamondo, Fulufhelo V; Marwala, TDate:Jul 2011The concept of fingerprint classification is an important one because of the need to, before executing a database search procedure, virtually break the fingerprint template database into smaller, manageable partitions. This is done in order ...Read more