Author:Brink, S; Dorfling, C; Aldrich, CDate:May 2016Relatively small rocks that detach from stope hanging walls during periods when miners are working in the vicinity pose a lethal risk, and contribute significantly to underground fatalities in the South African mining industry, totalling 89 ...Read more
Author:Ramotsoela, DT; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Apr 2019The threat to critical water system infrastructure has increased in recent years as is evident from the increasing number of reported attacks against these systems. Preventative security mechanisms are often not enough to keep attackers out ...Read more
Author:Ramotsoela, TD; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Oct 2020There has been an increasing number of attacks against critical water system infrastructure in recent years. This is largely due to the fact that these systems are heavily dependent on computer networks meaning that an attacker can use ...Read more
Author:Pratt, Lawrence E; Matheus, Jana; Klein, RDate:Dec 2023Electroluminescence (EL) images enable defect detection in solar photovoltaic (PV) modules that are otherwise invisible to the naked eye, much the same way an x-ray enables a doctor to detect cracks and fractures in bones. This paper presents ...Read morecbnd
Author:Rangata, Mapitsi R; Sefara, Tshephisho JDate:Feb 2024The amount of data online is increasing as companies generate news articles daily. These news articles contain headlines that have a level of exaggeration aimed to win the readers. In addition, these companies are competing against one another; ...Read more
Author:Matusowsky, M; Ramotsoela, DT; Abu-Mahfouz, Adnan MIDate:May 2020Data integrity in wireless sensor networks (WSN) is very important because incorrect or missing values could result in the system making suboptimal or catastrophic decisions. Data imputation allows for a system to counteract the effect of ...Read more
Author:Adedeji, KB; Abu-Mahfouz, Adnan MI; Kurien, AMDate:Jul 2023In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices having been exploited to carry out attacks. Due to their inherent ...Read more
Author:Pratt, Lawrence E; Govender, Devashen; Klein, RDate:Nov 2021Electroluminescence (EL) images enable defect detection in solar photovoltaic (PV) modules that are otherwise invisible to the naked eye, much the same way an x-ray enables a doctor to detect cracks and fractures in bones. The prevalence of ...Read more
Author:Kukuni, TG; Markus, E; Kotze, B; Abu-Mahfouz, Adnan MIDate:Aug 2022The application of machine learning in resolving complex cyber-security challenges in smart manufacturing plant is growing. Network intrusion and anomaly detection is posing high risks in sensory data integrity and optimisation of processes ...Read more
Author:Ngejane, Hombakazi C; Eloff, JHP; Sefara, Tshephisho J; Marivate, VNDate:Mar 2021Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful behaviour for the attention of law enforcement units. ...Read more
Author:Twala, BDate:2009Increasing the awareness of how incomplete data affects learning and classification accuracy has led to increasing numbers of missing data techniques. This paper investigates the robustness and accuracy of seven popular techniques for tolerating ...Read more
Author:Mboweni, IV; Ramotsoela, DT; Abu-Mahfouz, Adnan MIDate:Apr 2023The protection of critical infrastructure such as water treatment and water distribution systems is crucial for a functioning economy. The use of cyber-physical systems in these systems presents numerous vulnerabilities to attackers. To enhance ...Read more
Author:Adeleke, Jude Adekunle; Moodley, Deshendran; Rens, Gavin; Adewumi, AODate:Apr 2017Proactive monitoring and control of our natural and built environments is important in various application scenarios. Semantic Sensor Web technologies have been well researched and used for environmental monitoring applications to expose ...Read more
Author:Mabunda, HD; Ramotsoela, DT; Abu-Mahfouz, Adnan MIDate:Jun 2022Water distribution systems (WDS) are designed to supply potable water to businesses, industries and people in any area or location. Cyber-Physical systems (CPS) are used in water distribution systems and come with aided benefits, however, ...Read more
Author:Brandt, P; Moodley, D; Pillay, AW; Seebregts, CJ; De Oliveira, TDate:2014The development of drug resistance is a major factor impeding the efficacy of antiretroviral treatment of South Africa’s HIV infected population. While genotype resistance testing is the standard method to determine resistance, access to these ...Read more
Author:Olatinwo, DD; Hancke, G; Myburgh, H; Abu-Mahfouz, Adnan MIDate:Mar 2023Internet of things (IoT)-enabled wireless body area network (WBAN) is an emerging technology that combines medical devices, wireless devices, and non-medical devices for healthcare management applications. Speech emotion recognition (SER) is ...Read more
Author:Machaka, RonaldDate:Feb 2021“The answer to the question “why HEAs exhibit such exceptional properties” lies in their phases” [1]. The implementation of machine learning (ML) approaches for the classification of solid solution high-entropy alloy (HEA) phases is, therefore, ...Read more
Author:Kleebauer, M; Marz, Christopher A; Reudenbach, C; Braun, MDate:Dec 2023In the realm of solar photovoltaic system image segmentation, existing deep learning networks focus almost exclusively on single image sources both in terms of sensors used and image resolution. This often prevents the wide deployment of such ...Read more