Author:Sephton, Bereneice; Dudley, Angela L; Forbes, ADate:Jul 2016Q-plates (QP) have become ubiquitous in experiments requiring the generation of vortex beams since its development in 2006. It consequently follows that it is important to characterize the vortex beams created by this geometric-phase optical ...Read more
Author:Djonon Tsague, Hippolyte; Twala, BDate:Dec 2016From inception, side channel leakage has been widely used for the purposes of extracting secret information, such as cryptographic keys, from embedded devices. However, in a few instances it has been utilized for extracting other information ...Read more
Author:Mzila, PhiwaDate:Feb 2016With new advances in technologies, biometrics is becoming emerging technology for verification and authentication of individuals. However, the storage of biometric templates still needs necessary attention since it poses major threats to user ...Read more
Author:Walters, Laticha EM; Mars, M; Scott, REDate:Oct 2016The aim of the study is to learn from documented history and current state of teledermatology in South Africa.Read more
Author:Sebake, Thandi NDate:Sep 2008The World Green Building Council (WGBC) has 10 existing members including the United Kingdom, Taiwan, Australia and America. These members have adopted building rating systems, such as Building Research Establishment Environmental Assessment ...Read more
Author:Masengo Wa Umba, S; Abu-Mahfouz, Adnan MI; Ramotsoela, TD; Hancke, GPDate:Jun 2019Wireless communications and Wireless Sensor Networks (WSNs) are intensively used in manufacturing industries, in medical devices, for the determination of the position and for the guidance of military drones and bombs. Given the scope of ...Read more
Author:Masengo, Wa Umba, S; Abu-Mahfouz, Adnan MI; Ramotsoela, TD; Hancke, GPDate:Jun 2019Wireless communications and Wireless Sensor Networks (WSNs) are intensively used in manufacturing industries, in medical devices, for the determination of the position and for the guidance of military drones and bombs. Given the scope of ...Read more
Author:Gay, NCDate:Jun 1997This report was commissioned to assess the improvement of the wellbeing of workers in the mining industry and also verify, if the research findings are successfully implemented in the minesRead more
Author:Canbulat, I; Jack, BDate:May 1999This research report summarizes an extensive literature survey on roofbolt support design methods used worldwide, and presents the findings of extensive underground roof monitoring conducted in 29 sites at five collieries. An analysis of fall ...Read more
Author:Mnguni, S; Abu-Mahfouz, Adnan MI; Mudali, P; Adigun, MODate:Aug 2019Internet of Things (IoT) is expected to grow exponentially such that devices connected to the internet reach 125 billion during the year 2030. For data transmission to the internet IoT end node devices rely on Gateways and to ensure coverage ...Read more
Author:Roodt, JH; Koen, HildegardeDate:Jul 2020The world is experiencing the fourth industrial revolution, and developing countries are experiencing it differently than developed countries. Developed countries have an advantage over developing countries in that they adopted industrialisation ...Read more
Author:Afachao, K; Abu-Mahfouz, Adnan MIDate:2022The Internet of Things is fast expanding with paradigms to describe its new frontiers. A more closely tied term to the Internet of Things is Edge Computing, which describes empowering devices at the edge with intelligence. One characteristic ...Read more
Author:Tlake, LC; Markus, ED; Abu-Mahfouz, Adnan MIDate:Sep 2021Technology is expanding at a higher rate and because of this expansion there is a global transition from 4 th Generation (4G) to 5 th Generation (5G) due to the steep rise in the demand of users and challenges which are not addressed effectively ...Read more
Author:Van Heerden, Renier P; Bester, IM; Burke, Ivan DDate:Aug 2012This study focuses on the security concerns of IPv6. We make a broad introduction to IPv6 then briefly look at the differences between the IPv6 and IPv4 protocols, their known vulnerabilities and identify some security concerns when implementing ...Read more
Author:Marais, JM; Abu-Mahfouz, Adnan MI; Hancke, GPDate:Nov 2019Several wireless technologies are enabling the growth of the Internet of Things (IoT) industry. One of these, namely Long Range Wide Area Network (LoRaWAN), is very popular in the research community whose focus is on optimising the LoRaWAN ...Read more
Author:Mattheus, J; Grobler, H; Abu-Mahfouz, Adnan MIDate:Nov 2020Motion segmentation has applications in, amongst others, robotics, traffic monitoring, sports analysis, inspection, video surveillance, compression, and video indexing. However, the performance of most methods is limited compared to human ...Read more
Author:Handley, MFDate:Feb 2002The Safety in Mines Research Advisory Committee (SIMRAC) has managed research on behalf of the mining industry since 1993, and is now becoming concerned that the industry may not have implemented many of the results. SIMRAC selected six ...Read more
Author:Holding, WDate:Sep 1994A statistical review is given of the frequency of fires and flammable gas ignitions in South African underground coal mines, both on a simple numerical basis and in relation to underground coal production, for the years 1970-1992.previously ...Read more
Author:Venter, Karien; Sinclair, MDate:Jun 2015A driver constantly needs to be aware of his or her driving within a specific traffic environment. “Situational Awareness’ is the term used to describe the level of awareness drivers have to apply in the driving environment, specifically to ...Read more