Author:Botha, Johannes G; Pieterse, HeloiseDate:Mar 2020Fake news, often referred to as junk news or pseudo-news, is a form of yellow journalism or propaganda created with the purpose of distributing deliberate disinformation or false news using traditional print or online social media. Fake news ...Read more
Author:Robbins, SL; Heyns, PS; Heyns, Johan ADate:May 2020The majority of condition monitoring techniques employed today consider the acquisitioning and analysis of structural responses as a means of profiling machine condition and performing fault detection. Modern research and newer technologies ...Read more
Author:Harikrishnan, D; Kumar, NS; Joseph, RS; Nair, Kishor KDate:Apr 2021In the digital authentication system, the emerging technology is fingerprint authentication, which have been concentrated more attraction towards security and control. Existing authentication systems such as Biometric cryptosystems, Cancellable ...Read more
Author:Rapiya, XL; Malik, Humna H; Pretorius, JHCDate:Sep 2020In the product development process, needs analysis is the first stage of the process and without the need analysis, you are risking your product to fail. The needs analysis involves a process of understating the market broadly. Understanding ...Read more
Author:Nelufule, Nthatheni; De Kock, Antoine JDate:Mar 2023This study examines the application of infant iris biometrics as a method of identification for newborns and young children. Infant iris photos were collected using an IriShield-USB BK 2121U camera at a variety of locations, including public ...Read more
Author:McDonald, Andre M; Van Wyk, M; Chen, GDate:Aug 2021The inverse Frobenius-Perron problem (IFPP) is a collective term for a family of problems that requires the construction of an ergodic dynamical system model with prescribed statistical characteristics. Solutions to this problem draw upon ...Read more
Author:Mbele, CM; Malik, Humma H; Pretorius, JHCDate:Jun 2022Pipeline structural integrity challenges highlight the need for pipeline operators to prioritise inline inspection technologies as part of risk-based condition assessment. This initiative is motivated by increased regulatory and economic ...Read more
Author:Phahlamohlaka, Letlibe J; Théron, J; Aschmann, MJDate:2022Cybersecurity has evolved over the years, and today cyberattacks instigated by cyber-criminals, nation states, or insider threat actors are part of regular headline news. In South Africa and around the world, the number of cyberattacks or ...Read more
Author:Badenhorst, Danielle PDate:06 Sep 2023Reliance on digital technologies for innovation management is unavoidable in current contexts. While digital processes and business models have been prioritised as key factors to drive innovation and value creation within firms, cybersecurity ...Read more
Author:Bergh, J; Snedden, Glen; Dunn, DwainDate:Apr 2020This paper presents the predicted, as well as final experimental results for the design of an automatically optimized non-axisymmetric endwall and as such, attempts to close the loop between design and practice, providing additional information ...Read more
Author:Cebekhulu, Eric; Onumanyi, Adeiza J; Isaac, Sherrin JDate:Feb 2022The use of machine learning (ML) algorithms for power demand and supply prediction is becoming increasingly popular in smart grid systems. Due to the fact that there exist many simple ML algorithms/models in the literature, the question arises ...Read more
Author:Berndt, Robert J; Nel, Willem AJ; Abdul Gaffar, MY; O’Hagan, DDate:Dec 2021Helicopter main rotor blade flashes in radar measurements are an oft-used feature for target classification. While focus is often placed on being able to detect them, little attention has been given to what is required to ensure that they are ...Read more
Author:Mostert, Frikkie J; Rwexwana, A; Tseki, PFDate:Jul 2020The interactions between cyanoacrylate type of glue and model compounds for dinitrotoluene (DNT) and trinitrotoluene (TNT) are investigated using mainly spectroscopic techniques. Electrostatic fields emanating from dispersion and dipole ...Read more
Author:Faniso, Zimbini; Magimisha, E; Malatji, TDate:Jul 2021This paper presents the analysis of Aerosol Optical Depth (AOD) level data monitored through the Cimel CE 318A Sun-photometer over the year seasons of 2014. The data was collected at the Council for Scientific and Industrial Research (CSIR), ...Read more
Author:Pandelani, Thanyani A; Modungwa, Dithoto MDate:Apr 2022Objective: Antivehicular landmines (AVLs) and underbelly improvised explosive devices (IEDs) are found to be some of the major threats for military vehicles and their occupants. Anthropomorphic test devices (ATDs) such as the 50th percentile ...Read more
Author:Mwim, EM; Mtsweni, Jabu S; Mwim, OSDate:Aug 2022The evolution in digital technologies and the Internet, in particular, has had a profound effect on the way healthcare institutions operate, assist patients, and manage personal healthcare data. In the same vein, various healthcare systems, ...Read more
Author:Rushambwa, MC; Suvendi, R; Pandelani, Thanyani A; Palaniappan, R; Vijean, V; Nabi, FGDate:Jan 2023Recent advances in medical imaging include integrating photoacoustic and optoacoustic techniques with conventional imaging modalities. The developments in the latter have led to the use of optics combined with the conventional ultrasound ...Read more
Author:Mthethwa, Sthembile NDate:Aug 2023The tremendous growth of the Internet of Things (IoT) connected devices calls for a way for manufacturers to standardise the newly created devices for security purposes. As these devices are getting smaller and smaller so does the computational ...Read more
Author:Goncalves, Duarte PDDate:Nov 2023South Africa's infrastructure faces a barrage of security attacks that has led to the promulgation of the Critical Infrastructure Protection Act (CIPA) No. 8 of 2019. Residual risk (i.e. after the threats have been mitigated) must be assessed ...Read more