Assessing command and control system vulnerabilities in underdeveloped,...
Title: Assessing command and control system vulnerabilities in underdeveloped, degraded and denied operational environments Authors: Oosthuizen, R; Pretorius, L Abstract: Command and Control (C2) is a...
View ArticleA focussed dynamic path finding algorithm with constraints
Title: A focussed dynamic path finding algorithm with constraints Authors: Leenen, L; Terlunen, A Abstract: The Military Unit Path Finding Problem (MUPFP) is the problem of finding a path from a...
View ArticleAssessing the contribution of information technology to socio-economic...
Title: Assessing the contribution of information technology to socio-economic development: a case study from rural South Africa Authors: Turpin, M; Alexander, T; Phahlamohlaka, J Abstract: This paper...
View ArticleAn analysis methodology for impact of new technology in complex...
Title: An analysis methodology for impact of new technology in complex sociotechnical systems Authors: Oosthuizen, R; Pretorius, L Abstract: Systems Engineering techniques and approaches are applied to...
View ArticleOptically pumped tunable HBr laser in the mid-infrared region
Title: Optically pumped tunable HBr laser in the mid-infrared region Authors: Koen, W; Jacobs, C; Bollig, C; Strauss, HJ; Esser, MJD; Botha, LR Abstract: An optically pumped tunable HBr laser has been...
View ArticleAssessment methodology for air defence control systems
Title: Assessment methodology for air defence control systems Authors: Oosthuizen, R Abstract: In Command and Control, humans have to make sense of the situation to support decision making on the...
View ArticleNational security governance exemplified by South Africa's cyber security...
Title: National security governance exemplified by South Africa's cyber security policy implementation Authors: Burmeister, OK; Phahlamohlaka, J; Al-Saggaf, Y Abstract: There exists a paucity of...
View ArticleMulti-channel software defined radio experimental evaluation and analysis
Title: Multi-channel software defined radio experimental evaluation and analysis Authors: Van der Merwe, JR; Malan, J; Maasdorp, FDV; Du Plessis, WP Abstract: Multi-channel software-defined radios...
View ArticleBluetooth command and control channel
Title: Bluetooth command and control channel Authors: Pieterse, H; Olivier, MS Abstract: Bluetooth is popular technology for short-range communications and is incorporated in mobile devices such as...
View ArticleCascading neural networks for upper-body gesture recognition
Title: Cascading neural networks for upper-body gesture recognition Authors: Mangera, R; Senekal, F; Nicolls, F Abstract: Gesture recognition has many applications ranging from health care to...
View ArticleModelling of command and control agility
Title: Modelling of command and control agility Authors: Oosthuizen, R; Pretorius, L Abstract: Different systems engineering techniques and approaches are applied to design and develop Command and...
View ArticleModelling methodology for engineering of complex sociotechnical systems
Title: Modelling methodology for engineering of complex sociotechnical systems Authors: Oosthuizen, R; Pretorius, L Abstract: Different systems engineering techniques and approaches are applied to...
View ArticleIntegrity of a common operating picture in military situational awareness
Title: Integrity of a common operating picture in military situational awareness Authors: Robertson, J Abstract: The lack of qualification of a common operating picture (COP) directly impacts the...
View ArticleTowards a Smart Community Centre: SEIDET Digital Village
Title: Towards a Smart Community Centre: SEIDET Digital Village Authors: Phahlamohlaka, J; Dlamini, Z; Mnisi, T; Mashiane, T; Malinga, L Abstract: South African communities are constantly being...
View ArticleBluetooth command and control channel
Title: Bluetooth command and control channel Authors: Pieterse, H; Olivier, MS Abstract: Bluetooth is popular technology for short-range communications and is incorporated in mobile devices such as...
View ArticleCascading neural networks for upper-body gesture recognition
Title: Cascading neural networks for upper-body gesture recognition Authors: Mangera, R; Senekal, F; Nicolls, F Abstract: Gesture recognition has many applications ranging from health care to...
View ArticleApproach to sensor node calibration for efficient localisation in wireless...
Title: Approach to sensor node calibration for efficient localisation in wireless sensor networks in realistic scenarios Authors: Mwila, MK; Djouani, K; Kurien, A Abstract: Localisation or position...
View ArticleAn investigation of scalable anomaly detection techniques for a large network...
Title: An investigation of scalable anomaly detection techniques for a large network of Wi-Fi hotspots Authors: Machaka, P; Bagula, A Abstract: The paper seeks to investigate the use of scalable...
View ArticleModelling methodology for assessing the impact of new technology on complex...
Title: Modelling methodology for assessing the impact of new technology on complex sociotechnical systems Authors: Oosthuizen, R Abstract: Developing complex sociotechnical systems often involves...
View ArticleEvolution study of android botnets
Title: Evolution study of android botnets Authors: Pieterse, H; Burke, I Abstract: Smartphones continue to excel in the 21st century due to the constant improvements of mobile technology. Advances in...
View Article
More Pages to Explore .....