Author:Darlow, LN; Webb, L; Botha, NDate:May 2016Fingerprint recognition systems are prevalent in high-security applications. As a result, the act of spoofing these systems with artificial fingerprints is of increasing concern. This research presents an automatic means for spoof-detection ...Read more
Author:Heyns, R; Ndiaye, M; Abu-Mahfouz, Adnan MIDate:Jun 2021In this work, we proposed an automated smart cart system for use in the shopping industry. A smart cart equipped with sensors and computing resources would classify as an edge device for the Industrial Internet of Things (IIoT). In our design ...Read more
Author:Sikhakhane, K; Rimer, S; Gololo, M; Ouahada, K; Abu-Mahfouz, Adnan MIDate:Sep 2023Ultrasound imaging uses reflected echo signals from high-frequency sound waves transmitted into a body with high water content to create images of the internal soft tissue, bone, and blood flow. Different kinds of noise are introduced during ...Read more
Author:Henriques, R; Lelek, M; Fornasiero, EF; Valtorta, F; Zimmer, C; Mhlanga, MusaDate:May 2010QuickPALM in conjunction with the acquisition of control features provides a complete solution for the acquisition, reconstruction and visualization of 3D PALM or STORM images, achieving resolutions of ~40 nm in real time. This software package ...Read more
Author:Thiede, RN; Fabris-Rotelli, IN; Stein, A; Debba, Pravesh; Li, MDate:Nov 2019Informal unpaved roads in developing countries arise naturally through human movement without government authorities being informed. These roads are not authorized nor maintained by council, nor reliably mapped in quality-controlled online ...Read more