86 results on '"Venter, A."'
Search Results
2. Radio Frequency Engineering Advancements for the Ghana Radio Telescope
- Author
-
Jocias A. Malan and Mariet Venter
- Subjects
Physics ,Noise temperature ,business.industry ,Electrical engineering ,law.invention ,Radio telescope ,Telescope ,Orthomode transducer ,law ,Radio-frequency engineering ,Radio frequency ,Antenna (radio) ,business ,Noise (radio) - Abstract
This paper presents recent radio frequency (RF) engineering work performed for the Ghana Radio Telescope, specifically concerning receiver and electromagnetic component design and analysis. An upgraded so-called Mark II receiver, currently nearing the end of its development phase, improves the bandwidth by approximately 100% and 30% for the 5 and 6.7 GHz bands, respectively. A proposed new wideband orthomode transducer (OMT) design is presented to replace the existing Intermediate Circular Orbit (ICO) satellite system components, which are known to add extra noise. Also contributing to the system noise temperature is the antenna and spillover temperatures. Electromagnetic simulation data is used to determine these parameters, showing that the antenna can contribute up to 32 K to the system noise temperature near the horizon. The resulting predicted sensitivity of the telescope is presented and is in the range of 4.6 to 5 m2/K assuming a receiver temperature of 90 K and an aperture efficiency of 70%.
- Published
- 2021
3. Battery Tripping Unit for Space Constrained Substation Container Applications
- Author
-
Johan Venter and Daniel Rodrigues van Niekerk
- Subjects
Battery charger ,Rectifier ,business.industry ,Computer science ,Tripping ,Power module ,Electrical engineering ,Thyristor ,Battery (vacuum tube) ,business ,Lead–acid battery ,Circuit breaker - Abstract
Protecting power and distribution equipment from major faults will aid in preventing infrastructure damage and unnecessary power supply losses. Battery operated tripping units are used to open (trip) or re-close HT breakers in a substation during power supply failures. Short bursts of high currents from a battery bank in the substation switch room is used to energize open and close coils of HT breakers. A proposed 30 V, 10 A charger with an adequate battery bank can be an ideal sized unit for HT breaker tripping applications in a space constrained substation container (750 mm x570 mm x280 mm), placed in remote areas. To ensure easy unit access and serviceability, the batteries, control system and battery charger power module are all integrated into a single enclosed mountable cabinet unit. The dimensions and mass of the proposed housing cabinet was minimized to optimize space utilization and easy mobility. The housing cabinet can then be wall mounted or even placed on the floor, allowing it to be easily moved in the substation from one location to another. The PC board is also conformal coated to protect against corrosion due to humidity and a properly designed solder mask avoids unintentional short circuits. The battery charger makes use of a thyristor controlled full-wave bridge rectifier to charge the battery bank and will also include appropriate diagnostic faultfinding warning alarms. The proposed 30 V, 10 A battery charger system addresses some shortcomings of current battery charger implementations at remote substations, especially when the system is required to operate at higher ambient temperatures. This proposed battery charger system makes it possible to use up to 25 nickel cadmium cells or 15 lead acid cells to continuously supply 30 V at 10 A for fast charging and/or standing loads or both. In addition, several features have been added to assist technicians in determining potential battery charger faults in order to reduce breakdown times.
- Published
- 2021
4. Mobile Cloud Computing Adoption Model as a Feasible Response to Countries’ Lockdown as a Result of the COVID-19 Outbreak and Beyond
- Author
-
H.S Venter and Ndaedzo Rananga
- Subjects
Coronavirus disease 2019 (COVID-19) ,Process (engineering) ,Computer science ,business.industry ,Mobile computing ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Cloud computing ,Usability ,computer.software_genre ,Computer security ,Mobile cloud computing ,Videoconferencing ,business ,computer ,Private network - Abstract
The COVID-19 outbreak has been declared as one of the worst global disasters. The impact of COVID-19 is visible in many sectors, such as health, logistics, and many other critical aspects of our daily lives. Due to the continuous rapid spread of COVID-19, many countries have imposed lockdown measures. As a result of the lockdown, many organizations are devising measures to remain operational during this period and beyond. One of the visible challenges of the lockdown to organizations lies in their technological readiness strategies, to operate this period. One of the feasible responses, many organizations are implementing is allowing workers to work from home and long-distance learning. Technologies such as Virtual Private Networks (VPNs) and Video Conferencing can enable workers to work from home. During this period cloud service providers have also noticed a big rise in the usage of cloud-based solutions. On the other hand, due to cost-effectiveness and usability, the concept of Mobile Cloud Computing (MCC) is rapidly gaining ground in the cloud and mobile computing communities. Cloud-based solutions, such as MCC can be deemed a possible solution to the damage that can be caused by the lockdown and beyond, to many organizations. Currently, however, there is no feasible MCC adoption model that guides the process of its adoption, thus the need to propose one. In this paper, an MCC adoption model is proposed, as well as a case scenario to which MCC can be useful is demonstrated.
- Published
- 2020
- Full Text
- View/download PDF
5. Computational Design for Inflated Shape of a Modular Soft Robotic Actuator
- Author
-
Gerhard Venter, Martin P. Venter, and David Rostin Ellis
- Subjects
Orientation (computer vision) ,business.industry ,Computer science ,Soft robotics ,Mechanical engineering ,Solid modeling ,Modular design ,business ,Actuator ,Finite element method ,Modular unit ,Plane stress - Abstract
A soft robotic actuator of modular construction has been designed where multiple repeated asymmetric deforming units are connected in series to alter the final deformed shape. Using a Genetic Algorithm that can change the orientation of each articulating unit by 180°, a combination of orientations is calculated to yield what best resembles the desired profile that is specified by means of a continuous function. To improve simulation run times for the finite element analyses, a reduced order model is presented where the 3D model is simplified to that of a 2D plane strain approximation. This preliminary work shows that by using an advanced computational design tool interesting behaviour can be achieved whilst using only a very simple asymmetric deforming modular unit. A physical actuator was manufactured and the deformation compared to the numerical models.
- Published
- 2019
6. Gamification in STEM programming courses: State of the art
- Author
-
Marisa Venter
- Subjects
Higher education ,Computer science ,business.industry ,05 social sciences ,Programming knowledge ,Computer programming ,050301 education ,Student engagement ,Economic shortage ,02 engineering and technology ,Resource (project management) ,020204 information systems ,ComputingMilieux_COMPUTERSANDEDUCATION ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics education ,State (computer science) ,business ,0503 education - Abstract
Computer programming courses are an essential facet of STEM education, confronted by many pressing challenges. Higher education (HE) students struggle to master programming principles resulting in unsatisfactory pass rates, student retention and low levels of student engagement. Gamification in programming courses has been recognized as a prospective technique that could improve student participation as well as impact learning in a positive way. There is currently a shortage of review studies published in the last two years (2018-2019) that focus specifically on the gamification of programming courses in HE. The aim of this paper is to bridge this gap and to provide a comprehensive review of literature concerning studies that focused on the usage of gamification systems in the teaching of programming courses in HE from 2014 until 2019. Results indicate that the most popular gamification elements that were used in the reviewed studies were leaderboards, followed by points, badges and levels. Additionally, in terms of the tools or instruments that were used to implement gamification solutions, it was discovered that the development of a new gamification platform and the usage of existing gamification tools were the most wide-spread method for gamification implementation. Lastly, from the studies that were reviewed, it was evident that gamification of HE programming courses had a very positive impact on student engagement, student programming knowledge and student motivation. This review paper fills a void in existing literature and could therefore serve as a valuable resource for academe that consider gamifying HE programming courses.
- Published
- 2020
7. Proactive Forensics: Keystroke Logging from the Cloud as Potential Digital Evidence for Forensic Readiness Purposes
- Author
-
Richard Adeyemi Ikuesan, Nickson M. Karie, Victor R. Kebande, Sheunesu M. Makura, and Hein S. Venter
- Subjects
Computer science ,Process (engineering) ,business.industry ,Digital forensics ,Cloud computing ,computer.software_genre ,Keystroke logging ,Computer security ,Digital evidence ,Code (cryptography) ,Malware ,business ,computer ,Chain of custody - Abstract
The relationship between negative and positive connotations with regard to malware in the cloud is rarely investigated according to the prevailing literature. However, there is a significant relationship between the use of positive and negative connotations. A clear distinction between the two emanates when we use the originally considered malicious code, for positive connotation like in the case of capturing keystrokes in a proactive forensic purpose. This is done during the collection of digital evidence for Digital Forensic Readiness (DFR) purposes, in preparation of a Digital Forensic Investigation (DFI) process. The paper explores the problem of having to use the keystrokes for positive reasons as a piece of potential evidence through extraction and digitally preserving it as highlighted in ISO/IEC 27037: 2012 (security approaches) and ISO/IEC 27043: 2015 (legal connotations). In this paper, therefore, the authors present a technique of how DFR can be achieved through the collection of digital information from the originally considered malicious code. This is achieved without modifying the cloud operations or the infrastructure thereof, while preserving the integrity of digital information and possibly maintain the chain of custody at the same time. The paper proposes that the threshold of malicious code intrusion in the cloud can be transformed to an efficacious process of DFR through logical acquisition and digitally preserving keystrokes. The experiment-tested keystrokes have shown a significant approach that could achieve proactive forensics.
- Published
- 2020
8. Ontology for Reactive Techniques in Digital Forensics
- Author
-
Dagney Ellison, Hein S. Venter, and Richard Adeyemi Ikuesan
- Subjects
Information retrieval ,Computer science ,Process (engineering) ,business.industry ,media_common.quotation_subject ,Digital forensics ,Ontology (information science) ,Field (computer science) ,Resource (project management) ,Knowledge base ,Function (engineering) ,business ,Axiom ,media_common - Abstract
Techniques applied in response to detrimental digital incidents vary in many respects according to their attributes. Models of techniques exist in current research but are typically restricted to some subset with regards to the discipline of the incident. An enormous collection of techniques is actually available for use. There is no single model representing all these techniques. There is no current categorisation of digital forensics reactive techniques that classify techniques according to the attribute of function and nor is there an attempt to classify techniques in a means that goes beyond a subset. In this paper, an ontology that depicts digital forensic reactive techniques classified by function is presented. The ontology itself contains additional information for each technique useful for merging into a cognate system where the relationship between techniques and other facets of the digital investigative process can be defined. A number of existing techniques were collected and described according to their function – a verb. The function then guided the placement and classification of the techniques in the ontology according to the ontology development process. The ontology contributes to a knowledge base for digital forensics – essentially useful as a resource for the various people operating in the field of digital forensics. The benefit of this that the information can be queried, assumptions can be made explicit, and there is a one-stop-shop for digital forensics reactive techniques with their place in the investigation detailed.
- Published
- 2019
9. Performance Costs of Software Cryptography in Securing New-Generation Internet of Energy Endpoint Devices
- Author
-
Hein S. Venter, Lehlogonolo P. I. Ledwaba, Sherrin J. Isaac, and Gerhard P. Hancke
- Subjects
General Computer Science ,Internet of Energy ,Computer science ,business.industry ,020208 electrical & electronic engineering ,Embedded Security ,General Engineering ,Elliptic Curve Digital Signature Algorithm ,020206 networking & telecommunications ,Cryptography ,02 engineering and technology ,Public-key cryptography ,Industrial Internet of Things ,Microcontroller ,Smart grid ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,The Internet ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Smart Grid ,business ,lcsh:TK1-9971 ,System bus - Abstract
In past years, cryptography has been considered a difficult task to achieve on sensor nodes for the Internet of Energy (IoE) owing to the resource-constrained nature of 8- and 16-bit microcontroller units (MCUs). Previous attempts at implementing cryptographic services on wireless sensor nodes have resulted in high power consumptions, long operating times, and the depletion of memory resources. Over the last decade, however, processors for the IoT and IoE have improved; with increased operating power and memory resources, longer data bus widths and low-power consumption. With the improvements made to processors suitable for building IoT devices, the question remains whether endpoint nodes should still be considered capable of only supporting the most lightweight of cryptographic mechanisms. We evaluate the capabilities of a device family (Cortex-M series processors) commonly found in programmable logic controllers to implement standard, verified software cryptographic libraries in terms of execution times, memory occupation, and power consumption in order to determine their adequacy for use in smart grid applications. It was seen that the MCUs were easily capable of running standard cryptographic algorithms. However, the use of public key cryptography may still require the inclusion of a hardware crypto accelerator or the use of a secure MCU implementing public key cryptography; as the relatively long execution times seen during the operation of ECDSA, for example, could be intolerable within a real time IoE application.
- Published
- 2018
10. Simulation of a predominantly passive natural air cooling system
- Author
-
M. van Eldik, P.v.Z. Venter, 10681949 - Van Eldik, Martin, and 12330825 - Venter, Philip Van Zyl
- Subjects
Air cooling ,business.industry ,Nuclear engineering ,Transient cooling ,Heat sink ,Coefficient of performance ,Simulation models ,Control volume ,Flow conditions ,Air conditioning ,Heat exchanger ,Environmental science ,Dynamic pressure ,business ,Earth to air heat exchanger - Abstract
Climate control is an everyday challenge. With the rapid surge in electricity prices over the past few years, air conditioning operating expenses necessarily increased. The effects, furthermore, of global warming result in increased cooling, and therefore, energy demand. The purpose of this paper is to propose two models that simulate a natural air cooling system. The first model simulates cooling through an earth to air heat exchanger, utilising the soil as a heat sink. The second model simulates the transient cooling of a control volume, which receives cooled air and is open to the environment. A scale model of an earth-to-air heat exchanger system was designed, constructed and used to verify results from the proposed models. Following verification, a real-life size heat exchanger was simulated in order to cool down a room of 60 m3 within one hour, using only the underground soil as a heat sink. Results showed that a room at an initial 30 °C can be cooled down to 20.5 °C with a 1.2 m underground heat exchanger and down to 17.8 °C if the length is increased to 2.0 m. Only fan power is needed to increase the air's dynamic pressure, resulting in flow conditions. As a result a coefficient of performance between 60 and 80 can be achieved.
- Published
- 2018
11. Requirements for IoT Forensics
- Author
-
Hein S. Venter and Jaco-Louis Kruger
- Subjects
Body of knowledge ,business.industry ,Computer science ,Digital forensics ,Encryption ,business ,Internet of Things ,Data science - Abstract
The main objective of this paper is to determine the requirements for IoT forensics. The development of requirements for Internet of Things (IoT) forensics will make a groundbreaking contribution to the current body of knowledge. The secondary objective of the paper is the formulation of a Digital Forensic Readiness (DFR) model for the implementation of IoT forensics. The model aims to address the shortfalls of the requirements, as well as incorporate various Digital Forensic (DF) techniques that can be used in IoT environments. The model is presented in theoretical as well as graphical form. The model is then discussed to highlight various areas of possible new research. The model is furthermore evaluated to determine the level of contribution it makes to the current body of research.
- Published
- 2019
12. Developing a Secure, Smart Microgrid Energy Market using Distributed Ledger Technologies
- Author
-
Sherrin J. Isaac, Lehlogonolo P. I. Ledwaba, Hein S. Venter, and Gerhard P. Hancke
- Subjects
Industry 4.0 ,Computer science ,End user ,business.industry ,Distributed computing ,Node (networking) ,020208 electrical & electronic engineering ,05 social sciences ,02 engineering and technology ,Data exchange ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Energy market ,Electricity ,Microgrid ,business ,Database transaction ,050203 business & management - Abstract
The ability for the smart microgrid to allow for the independent generation and distribution of electrical energy makes it an attractive solution towards enabling universal access to electricity within developing economies. Distributed Ledger Technologies (DLTs) are being considered as an enabling technology for the secure energy trade market however the high processing, energy and data exchange requirements may make them unsuitable for the Industrial Internet of Things technologies used in the implementation of the microgrid and the limited connectivity infrastructure in developing technologies. This work serves to assess the suitability of DLTs for IIoT edge node operation and as a solution for the microgrid energy market by considering node transaction times, operating temperature, power consumption, processor and memory useage, in addition to mining effort and end user costs.
- Published
- 2019
13. Towards an Integrated Digital Forensic Investigation Framework for an IoT-Based Ecosystem
- Author
-
Victor R. Kebande, Nickson M. Karie, Antonia Michael, Semaka Malapane, Ivans Kigwana, H.S. Venter, and Ruth D. Wario
- Subjects
Digital evidence ,Computer science ,business.industry ,Digital forensics ,Law enforcement ,Internet of Things ,business ,Data science ,Digital forensic investigation - Abstract
Internet of Things (IoT) is a relatively new wave of technology that is increasingly becoming popular in many different organisations globally. In essence, IoT is synonymous to networking technology, which allows individuals to connect to different devices in order to facilitate easy sharing of resources as well as communication. However, the one major difference between computer networking technology and IoT is the heterogeneity of data involved and distributed nature of IoT that involves self-actuating devices. Furthermore, the heterogeneity and distributed nature of IoT further brings complexity of the IoT ecosystem. For this reason, IoT ecosystem presents a big challenge to both Digital Forensic (DF) investigators and Law Enforcement Agencies (LEAs) when trying to implement DF techniques. What makes digital forensic investigations even harder in IoT ecosystem is its vastness and the rapidity with which it is expanding globally. This paper, thus, proposes an Integrated Digital Forensic Investigation Framework (IDFIF-IoT) for an IoT ecosystem which is an extension of an initially proposed generic Digital Forensic Investigation Framework for Internet of Things (DFIF-IoT). Note that, the main emphasis in this paper is on proposing an integrated framework with acceptable digital forensic techniques that are able to analyse Potential Digital Evidence (PDE) from the IoT-based ecosystem that may be used to prove a fact.
- Published
- 2018
14. CVSS Metric-Based Analysis, Classification and Assessment of Computer Network Threats and Vulnerabilities
- Author
-
Ruth Wario, Hein S. Venter, Ivans Kigwana, Victor R. Kebande, and Nickson M. Karie
- Subjects
Network security ,business.industry ,Computer science ,Vulnerability ,Similarity measure ,computer.software_genre ,Euclidean distance ,Ranking ,Vulnerability assessment ,CVSS ,Metric (unit) ,Data mining ,business ,computer - Abstract
This paper provides a Common Vulnerability Scoring System (CVSS) metric-based technique for classifying and analysing the prevailing Computer Network Security Vulnerabilities and Threats (CNSVT). The problem that is addressed in this paper, is that, at the time of writing this paper, there existed no effective approaches for analysing and classifying CNSVT for purposes of assessments based on CVSS metrics. The authors of this paper have achieved this by generating a CVSS metric-based dynamic Vulnerability Analysis Classification Countermeasure (VACC) criterion that is able to rank vulnerabilities. The CVSS metric-based VACC has allowed the computation of vulnerability Similarity Measure (VSM) using the Hamming and Euclidean distance metric functions. Nevertheless, the CVSS-metric based on VACC also enabled the random measuring of the VSM for a selected number of vulnerabilities based on the [Ma-Ma], [Ma-Mi], [Mi-Ci], [Ma-Ci] ranking score. This is a technique that is aimed at allowing security experts to be able to conduct proper vulnerability detection and assessments across computer-based networks based on the perceived occurrence by checking the probability that given threats will occur or not. The authors have also proposed high-level countermeasures of the vulnerabilities that have been listed. The authors have evaluated the CVSS-metric based VACC and the results are promising. Based on this technique, it is worth noting that these propositions can help in the development of stronger computer and network security tools.
- Published
- 2018
15. Transboundry Movement of Electronic Waste, Issues and Challenges in African Countries
- Author
-
Ramadile Isaac Moletsane and Carin Venter
- Subjects
Economic growth ,Human health ,Harm ,Face (sociological concept) ,Developing country ,Lack of knowledge ,Business ,Electronic waste ,Electronic equipment - Abstract
Proper management of electronic waste is becoming a major challenge for many developing countries, particularly African countries. This paper reviews the movement of e-waste between nations, and primarily to African countries. It also focuses on the challenges and issues that these countries then face to manage the e-waste in a safe manner, i.e. so that it does not harm the environment and human health. The researchers argues that, in most African countries, e-waste is often improperly managed—this is due to lack of knowledge and awareness on how e-waste impacts upon the environment and people's health. They conclude that people must be educated on the harmful effects posed by e-waste on the environment and human health.
- Published
- 2018
16. Electronic Waste and its Negative Impact on Human Health and the Environment
- Author
-
Ramadile Isaac Moletsane and Carin Venter
- Subjects
Human health ,Risk analysis (engineering) ,Hazardous waste ,business.industry ,Information technology ,Business ,Electronic waste ,Electronic equipment ,Incineration - Abstract
This paper reviews electronic waste and its disposal methods. It also explores hazardous effects that e-waste have on human health, animals and the environment; it contains, for example, toxic metals. The ever-increasing growth of e-waste is one of the biggest threats of the 21st century; it is therefore a priority worldwide. There is no single best method to eradicate e-waste and related problems. Lack of suitable education, resulting in low levels of awareness, drives improper management of e-waste. This study therefore concludes that awareness and suitable education is the most important aspect that influences appropriate and proper management of e-waste, i.e. good (“green”) information technology practices.
- Published
- 2018
17. An integrated model for the continuous use intention of Microsoft Office simulation software
- Author
-
Arthur James Swart and Marisa Venter
- Subjects
Medical education ,Higher education ,business.industry ,05 social sciences ,Information quality ,Student engagement ,Usability ,02 engineering and technology ,Microsoft Office ,020204 information systems ,0502 economics and business ,ComputingMilieux_COMPUTERSANDEDUCATION ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,Web application ,business ,Psychology ,050203 business & management ,Digital literacy - Abstract
Web based training software has been used extensively as one of the instruction methods to train users in basic digital literacy skills. One such example is the simulated online learning environment. Due to the fact that students are able to interact with real time simulations, these environments are referred to as Interactive Online Learning Environments (IOLEs). At most universities in South Africa, students from all faculties are obligated to take an introductory digital literacy course during their first year of study. Due to the large numbers of students in these introductory courses, universities are predominantly making use of IOLEs to assist with the teaching and assessment of MS Office skills. Limited research has been conducted on the constructs that may contribute to the continuous use intention of MS Office IOLEs by students in higher education. The main objective of this paper is to propose a model for the continuous use intention of IOLEs. Three theoretical models were combined in order to develop this model, and include Flow Theory, Information System Expectation-Confirmation Model and the DeLone and McLean Information Systems Success Model. Results reveal that the following constructs should be included in the model to predict continuous use intention: satisfaction, perceived usefulness, perceived enjoyment, perceived ease of use and focused immersion. In addition, students' satisfaction toward MS Office IOLEs was determined by information quality, perceived usefulness and perceived enjoyment. Understanding the constructs that influence students continuous use towards MS Office IOLEs could be used by institutions, businesses and instructors to focus their efforts on improving specific aspects of these platforms that would lead to higher levels of student engagement with them. This, in turn, could lead to higher levels of academic success as students engage more with the course content and improve their MS Office skills, one of the most important skills required by all types of employers today.
- Published
- 2018
18. Automated RAM analysis mechanism for windows operating system for digital investigation
- Author
-
Charl Meyers, Hein S. Venter, and Adeyemi Richard Ikuesan
- Subjects
Random access memory ,business.industry ,Computer science ,Digital forensics ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Python (programming language) ,Memory forensics ,Digital forensic investigation ,Microsoft Windows ,Memory analysis ,Software engineering ,business ,computer ,computer.programming_language - Abstract
Analysing memory can be a daunting task. This is especially apparent for a digital forensic investigator that may not have the technical expertise to perform the memory analysis. A solution to this is a one-click tool that can scan and analyze a memory image and produce useful information in a digital forensic investigation. Such a tool can be created as a plug-in for the well-known investigative tools. This study, therefore, developed a tool that can be used as a plug-in for Autopsy (or any python-based forensic tool). The developed tool is evaluated based on the existing metrics of tool evaluation, and the result shows the applicability of the tool for memory analysis. By automating the analysis of a memory image, this study asserts that the number of mistakes made during an investigation can be reduced. Furthermore, the study asserts that the time and task complexity required for a memory forensics can be reduced by the automated process.
- Published
- 2017
19. Self morphing soft-robotic gripper for handling and manipulation of delicate produce in horticultural applications
- Author
-
Steven Dirven and Dean Venter
- Subjects
0209 industrial biotechnology ,Computer science ,business.industry ,Soft robotics ,Mechanical engineering ,Robotics ,02 engineering and technology ,021001 nanoscience & nanotechnology ,Morphing ,020901 industrial engineering & automation ,Application domain ,Grippers ,Point (geometry) ,Artificial intelligence ,0210 nano-technology ,Contact area ,Actuator ,business - Abstract
The task of autonomously gripping delicate objects such as fresh produce remains a challenge even in modern robotics. Current robotics grippers are mostly made of mechanical linkages and actuators which follow very structured trajectories. As these exhibit little mechanical compliance they can readily apply too much pressure as a point load, leading to blemishing or bruising of produce (eg. kiwifruit). In order to overcome this, this paper proposes a soft-robotic approach, which has the ability to morph and conform around the grasped object. This increases the contact area between the object and the gripper, resulting in a more equal distribution of force, and a lower effective contact pressure. Additionally, this allows for a more secure grip to be achieved. The proposed gripper design is inspired by the soft-touch of the human hand, which is presently the most suitable manipulator for fruit-picking tasks. The soft robotic device is manufactured from a composite of Ecoflex 00–30 Room Temperature Vulcanisation Rubber and polymer mesh. This paper describes the specification, design, manufacture and validation of the novel soft robotic gripper as it emerged from the conceptual phase into its application domain (kiwifruit gripping and manipulation). The physical results are crossexamined with those from FEA analysis.
- Published
- 2017
20. A multiphysics analysis of dish reflector antennas for radio astronomy applications
- Author
-
Martin P. Venter, D. J. Ludick, Gerhard Venter, and David B. Davidson
- Subjects
Physics ,Electromagnetics ,business.industry ,Astrophysics::High Energy Astrophysical Phenomena ,Multiphysics ,Astrophysics::Instrumentation and Methods for Astrophysics ,Reflector (antenna) ,Astrophysics::Cosmology and Extragalactic Astrophysics ,02 engineering and technology ,Solid modeling ,Deformation (meteorology) ,021001 nanoscience & nanotechnology ,01 natural sciences ,010309 optics ,Radio telescope ,Gravitation ,Optics ,0103 physical sciences ,Aerospace engineering ,0210 nano-technology ,business ,Radio astronomy - Abstract
This work considers a combined structural-electromagnetic analysis of large dish reflector antennas typically used in radio astronomy. The effect of gravitational deformation on the radio telescope is quantified by a structural analysis conducted with a finite element solver. The deformed geometry is then analysed using a computational electromagnetic package from which the performance degradation can be assessed. This offers key insights into the operation of the radio telescope under the influence of external forces, such as gravity.
- Published
- 2016
21. W-band capacitively loaded slow-wave transmission line phase shifter in 130nm CMOS
- Author
-
Johannes J. P. Venter and Tinus Stander
- Subjects
Materials science ,business.industry ,020208 electrical & electronic engineering ,Electrical engineering ,Phase (waves) ,020206 networking & telecommunications ,02 engineering and technology ,Microstrip ,law.invention ,Capacitor ,W band ,CMOS ,law ,Transmission line ,0202 electrical engineering, electronic engineering, information engineering ,Optoelectronics ,Insertion loss ,business ,Phase shift module - Abstract
We present a novel full-band W-band capacitively loaded transmission line phase shifter. A classical slow-wave microstrip (S-MS) transmission line is loaded with tunable FET capacitors to enable continuous phase tuning. The design is implemented in GlobalFoundries US 8HP 130 nm SiGe BiCMOS process with the 7 metal layer option. A maximum phase shift of 95.59° is achieved with an insertion loss of −5 dB ± 1.5 dB across the band, yielding a FoM of 17.3. The design occupies a chip area of 0.67 mm2. This solid-state solution presents a suitable alternative to micro-electromechanical systems (MEMS) loaded line phase shifters without the need for high tuning voltages.
- Published
- 2017
22. Electromagnetic modelling of the 32-m Ghana radio telescope
- Author
-
Pietro Bolli, Mariet Venter, ITA, and ZAF
- Subjects
Radio telescope ,Physics ,Optics ,business.industry ,Aperture ,Maximum gain ,Very-long-baseline interferometry ,Cassegrain reflector ,business ,Rotation (mathematics) ,Electromagnetic modelling ,Radio astronomy - Abstract
This paper presents the electromagnetic modelling and supporting results of the African VLBI Network (AVN) Ghana radio telescope at the operating frequencies of 5 and 6.7 GHz. Working from limited technical data, we establish suitable geometrical parameters for the unshaped version of the Cassegrain system, including modelling and rotation of the four mirrors within the slanted beam-waveguide (BWG). The geometry implemented in GRASP (General Reflector Antenna Software Package) produces several performance values including the effects of the BWG, struts and mechanical tolerances. It is shown that the theoretical maximum gain and aperture efficiency at 5 GHz are 63.09 dBi and 72.56%, respectively. The corresponding values at 6.7 GHz are 65.80 dBi and 75.42%, respectively.
- Published
- 2017
23. An analysis on vibration damping in turning through passive shunt circuits using a nonlinear model
- Author
-
Maíra Martins da Silva and Giuliana Sardi Venter
- Subjects
0209 industrial biotechnology ,Engineering ,business.industry ,Chaotic ,Mechanical engineering ,02 engineering and technology ,021001 nanoscience & nanotechnology ,Piezoelectricity ,Vibration ,Nonlinear system ,020901 industrial engineering & automation ,Control theory ,Nonlinear model ,0210 nano-technology ,business ,Surface finishing ,Shunt (electrical) ,Electronic circuit - Abstract
The use of slender tool holders is inherent to boring and turning operations. As a result, large vibrations, known as chatter, may arise, resulting in poor surface finishing and decrease in the tool life. Therefore, chatter is a recurring issue that is in need of modeling and controlling in order to improve the industry's productivity. The nonlinear and cutting friction forces, together with the mode coupling that arises from a symmetric tool holder, can lead to these extreme vibrations and possibly chaotic motion under a certain set of parameters. These nonlinearities must be studied and experimentally analyzed to be considered in chatter control mechanisms in turning. It is well known that passive shunt circuits increase the system's damping and can be used to control chatter. This paper presents a simple lumped nonlinear model of the tool holder embedded to a piezoelectric patch and an analysis of such model with and without the passive shunt circuit. The set of parameters is chosen in order to simulate a chatter condition. The resulting phase diagrams are qualitatively compared to experimental data obtained from a real turning operation made using a CNC lathe. The results show that the model is capable of appropriately simulating the chatter vibration.
- Published
- 2017
24. Cloud-Centric Framework for isolating Big data as forensic evidence from IoT infrastructures
- Author
-
Victor R. Kebande, Nickson M. Karie, and Hein S. Venter
- Subjects
Engineering ,business.industry ,Business process ,Big data ,Digital forensics ,Data security ,Cloud computing ,Computer security ,computer.software_genre ,Cybercrime ,Radio-frequency identification ,business ,computer ,Digitization - Abstract
Cloud computing paradigm continues to revolutionize the way business processes are being conducted through the provision of massive resources, reliability across networks and ability to offer parallel processing. However, miniaturization, proliferation and nanotechnology within devices has enabled digitization of almost every object which eventually has seen the rise of a new technological marvel dubbed Internet of Things (IoT). IoT enables self-configurable/smart devices to connect intelligently through Radio Frequency Identification (RFID), WI-FI, LAN, GPRS and other methods by further enabling timeously processing of information. Based on these developments, the integration of the cloud and IoT infrastructures has led to an explosion of the amount of data being exchanged between devices which have in turn enabled malicious actors to use this as a platform to launch various cybercrime activities. Consequently, digital forensics provides a significant approach that can be used to provide an effective post-event response mechanism to these malicious attacks in cloud-based IoT infrastructures. Therefore, the problem being addressed is that, at the time of writing this paper, there still exist no accepted standards or frameworks for conducting digital forensic investigation on cloud-based IoT infrastructures. As a result, the authors have proposed a cloud-centric framework that is able to isolate Big data as forensic evidence from IoT (CFIBD-IoT) infrastructures for proper analysis and examination. It is the authors' opinion that if the CFIBD-IoT framework is implemented fully it will support cloud-based IoT tool creation as well as support future investigative techniques in the cloud with a degree of certainty.
- Published
- 2017
25. How an IoT-enabled 'smart refrigerator' can play a clandestine role in perpetuating cyber-crime
- Author
-
Semaka M.G. Malapane, Nickson M. Karie, Victor R. Kebande, Antonia Michael, and H.S. Venter
- Subjects
business.industry ,Computer science ,Digital forensics ,020206 networking & telecommunications ,02 engineering and technology ,Data loss ,Computer security ,computer.software_genre ,Filter (software) ,Spamming ,Home automation ,Identity theft ,0202 electrical engineering, electronic engineering, information engineering ,Robot ,020201 artificial intelligence & image processing ,The Internet ,business ,Telecommunications ,computer - Abstract
The need to interconnect devices over the Internet has led to the development of smart devices, home automation and the Internet of Things (IoT), which at the time of writing this paper is still an emerging phenomenon. As a result of IoT explosion, home appliances are able to be fully connected and controlled through an Intelligent Digital Network (IDN). Nevertheless, futuristic refrigerators will be able to connect to the Internet, which in turn will be able to accept a number of applications. While this brings effectiveness and convenience of connecting household appliances to the Internet, the threat level that is posed by interconnecting these appliances is high because a number of vulnerabilities exist that have potential to be exploited. In this paper, the authors show how a “smart refrigerator” can be used as an instrument that is able to propagate digital crimes like identity theft, spamming, privacy, data loss and so forth through creation of IoT bot. IoT bot is a robot network that can target connected multimedia centres. As a result, the authors have proposed a Smart Refrigerator Crime Propagation (SRCP) Model that shows how vulnerabilities are able to be exploited. Additionally, the authors have identified possible countermeasures as a route that can help to protect sensitive and critical information in an IoT-based environment. The proposed approaches/countermeasures have digital forensic capabilities that are able to filter periodic communication to and from the refrigerator in a forensic readiness approach. It is the authors' opinion that if the approaches are adhered to fully they may help to proactively prevent propagation of IoT-based digital crimes using connected home appliances.
- Published
- 2017
26. A proposed digital forensic investigation framework for an eGovernment structure for Uganda
- Author
-
Victor R. Kebande, Hein S. Venter, and Ivans Kigwana
- Subjects
Structure (mathematical logic) ,050210 logistics & transportation ,Government ,Knowledge management ,Process (engineering) ,Computer science ,business.industry ,International standard ,05 social sciences ,Digital forensics ,Law enforcement ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,020207 software engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Digital forensic investigation ,Digital evidence ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer - Abstract
So much research that has been done concerning eGovernment (eGov) frameworks. However, little focus has been put towards the use of Digital Forensics (DF) to conduct a proper Digital Forensic Investigation (DFI) in eGovernment frameworks. One reason for this may be because current DF tools were not developed to handle different eGov frameworks and their setup specifically. Therefore, gathering, examining and the general analysis of potential digital evidence when presented in courts of law becomes a great challenge to law enforcement officers/agencies and DF investigators (DFi). The problem addressed in this paper is, at the time of writing this paper, there exists no properly acceptable DFI framework that can be used to carry out a standard DFI in an eGovernment platform specifically for the case of the Republic of Uganda. Therefore, the author of this paper proposes a digital forensic investigation framework for eGov structure specifically focussing on Uganda. The proposed framework is based on the international standard for digital forensic investigation ISO/lEC 27043:2015. The author of this paper is of the belief that in future, the proposed framework can easily be incorporated into future DF tools development thereby facilitating the design of effective DFI tools in eGov platforms. Also, this research is meant to capture the attention of government officials in Uganda so as to fully develop and adopt a standard eGov forensic investigation process for Uganda.
- Published
- 2017
27. Tactile sensor based intelligent grasping system
- Author
-
Abdul Md Mazid and Justin Venter
- Subjects
0209 industrial biotechnology ,Engineering ,business.industry ,020208 electrical & electronic engineering ,Robotics ,02 engineering and technology ,Slip (materials science) ,020901 industrial engineering & automation ,Control system ,0202 electrical engineering, electronic engineering, information engineering ,In real life ,Robot ,Computer vision ,Artificial intelligence ,business ,Tactile sensor ,Simulation - Abstract
This paper offers the design and prototype technology of a tactile sensor, based on the principle of surface texture recognition, capable of monitoring slip in robotic grasping. The sensor has been mounted onto a parallel gripper jaw of a robot. The integrated system of tactile sensor, gripper, robot and the system control, in real life experiments, has proven itself capable of slip detection and adjusting adequate grasping force preventing objects from falling down. Several experiments have been carried out with the newly developed system for grasping a number of various object-samples. Success rate of the system for testing in slip detection and adjusting adequate grasping force in experiments was about 85% in average.
- Published
- 2017
28. High-level online user attribution model based on human Polychronic-Monochronic tendency
- Author
-
Shukor Abd Razak, Hein S. Venter, Ikuesan Richard Adeyemi, and Mazleena Salleh
- Subjects
business.industry ,Computer science ,Process (engineering) ,02 engineering and technology ,Machine learning ,computer.software_genre ,Logistic model tree ,Identification (information) ,020204 information systems ,Server ,Human dynamics ,0202 electrical engineering, electronic engineering, information engineering ,Profiling (information science) ,020201 artificial intelligence & image processing ,The Internet ,Artificial intelligence ,business ,Attribution ,computer - Abstract
User attribution process based on human inherent dynamics and preference is one area of research that is capable of elucidating and capturing human dynamics on the Internet. Prior works on user attribution concentrated on behavioral biometrics, 1-to-1 user identification process without consideration for individual preference and human inherent temporal tendencies, which is capable of providing a discriminatory baseline for online users, as well as providing a higher level classification framework for novel user attribution. To address these limitations, the study developed a temporal model, which comprises the human Polyphasia tendency based on Polychronic-Monochronic tendency scale measurement instrument and the extraction of unique human-centric features from server-side network traffic of 48 active users. Several machine-learning algorithms were applied to observe distinct pattern among the classes of the Polyphasia tendency, through which a logistic model tree was observed to provide higher classification accuracy for a 1-to-N user attribution process. The study further developed a high-level attribution model for higher-level user attribution process. The result from this study is relevant in online profiling process, forensic identification and profiling process, e-learning profiling process as well as in social network profiling process
- Published
- 2017
29. Using visual texture analysis to classify raw coal components
- Author
-
H. C. Dorland, P. Erasmus, W.C. Venter, Pieter A. Van Vuuren, M. I. Dorland, Q.P. Campbell, M. Le Roux, 10732926 - Van Vuuren, Pieter Andries, 10192247 - Campbell, Quentin Peter, 12413887 - Le Roux, Marco, and 10063218 - Venter, Willem Christiaan
- Subjects
Pixel ,business.industry ,Computer science ,Feature vector ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Coal ore classification ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Pattern recognition ,Image processing ,Sample (graphics) ,Texture (geology) ,Image texture ,Pattern recognition (psychology) ,Coal ,Artificial intelligence ,business ,Visual texture - Abstract
Coal ore isn't a uniform material. In order to optimize the coal liberation process it is necessary to classify a coal ore sample into its constituent components as quickly and cheaply possible. This paper investigates whether it is feasible to employ image processing and pattern recognition to segment a photographic image of coal ore into its various mineral components prior to the sample being crushed. The key to solving this classification problem is to model the visual texture of the various coal components by means of a low-dimensional texture space consisting of two main dimensions, namely: roughness and regularity. The regularity of each texture is estimated by means of a novel model-based approach. The distribution of the various coal components in the resultant feature space is modelled by means of a mixtures model and a simple nearest-neighbour decision rule is used to classify each pixel in the image. The performance of the classification system is encouraging and shows the feasibility of our idea.
- Published
- 2015
30. A generic Digital Forensic Readiness model for BYOD using honeypot technology
- Author
-
Hein S. Venter, Nickson M. Karie, and Victor R. Kebande
- Subjects
Honeypot ,business.industry ,Computer science ,Cost effectiveness ,Digital forensics ,Bring your own device ,Information technology ,020206 networking & telecommunications ,02 engineering and technology ,Computer security model ,Computer security ,computer.software_genre ,01 natural sciences ,010104 statistics & probability ,Digital evidence ,0202 electrical engineering, electronic engineering, information engineering ,0101 mathematics ,business ,computer ,Mobile device - Abstract
Proliferation and mobility trends on digital devices has seen a significant realization of Bring Your Own Device (BYOD) which is a phenomenon that allows employees in an organizational enterprise network to access computing resources through their personal mobile devices irrespective of their location. This technology has enabled cost effectiveness in organizations through increased accessibility of digital devices in daily business activities. However, the development of this technology faces a number of security challenges due to lack of effective proactive security model with digital forensic capability that is able to plan and prepare before potential security incidents occur in an organization that has allowed BYOD. It is on this premise that the authors have proposed a generic Digital Forensic Readiness (DFR) model that uses honeypot technology to detect and trap potential security incidents. In this paper, therefore, a significant security model with DFR capability has been proposed. The model is aimed at harvesting, encrypting and digitally preserving potential digital evidence (PDE) based on the DFR processes and guidelines that have been highlighted in the ISO/IEC 27043: 2015 international standard for information technology, security techniques, incident investigation principles and processes. Finally, the proposed model is meant to reduce the effort required to conduct Digital Forensic Investigation (DFI) by capturing potential digital evidence and make it available when needed by digital forensic investigators which eventually saves cost and time. A generic DFR model for BYOD using honeypot technology is the main focus of this paper.
- Published
- 2016
31. Proactive digital forensics in the cloud using virtual machines
- Author
-
H.S. Venter and D. Ras
- Subjects
Engineering ,Underpinning ,business.industry ,Cloud systems ,Digital forensics ,Cloud computing ,computer.software_genre ,Computer security ,Cloud computing systems ,Virtual machine ,Cloud testing ,Cloud forensics ,business ,computer - Abstract
With the advent of cloud computing systems it has become possible to provision large scale systems in a short time with little effort. The systems underpinning these cloud systems have to deal with massive amounts of data in order to function. Should an indecent occur that requires some form of forensic investigation it can be very challenging for an investigator to conduct the investigation. This is due, in large part, to the volatility of data in cloud systems.
- Published
- 2015
32. Noise reduction by pixel circuit optimization in 4-T pixel structure detectors using integrated circuit technologies
- Author
-
Saurabh Sinha and Johan Venter
- Subjects
Engineering ,Pixel ,business.industry ,Noise reduction ,Transistor ,Detector ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Electrical engineering ,Integrated circuit ,law.invention ,law ,Logic gate ,Electronic engineering ,Resistor ,business ,Reset (computing) ,ComputingMethodologies_COMPUTERGRAPHICS ,Hardware_LOGICDESIGN - Abstract
The most commonly used pixel structure in integrated circuit technologies is the three-transistor pixel structure (3-T). This structure consists of a pixel, a reset transistor, a source follower and a pixel select transistor. An extension to this is the 4-T pixel structure where an extra transistor is included to enable current steering in the readout phase and reset phase. This greatly reduces current consumption compared to the conventional 3-T pixel structure. Simulation results depicting this optimization is provided to support the technical contribution of this paper.
- Published
- 2015
33. An investigation of the use of mobile mathematics applications: An African perspective
- Author
-
L De Wet, Marisa Venter, A. B. van der Walt, and Arthur James Swart
- Subjects
business.industry ,Computer science ,Connected Mathematics ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,Context (language use) ,Mobile telephony ,Core-Plus Mathematics Project ,business ,Mobile device ,Science education ,Mathematics ,School education - Abstract
A report published in 2014 by the World Economic Forum ranked the quality of South Africa's mathematics and science education in the last place out of 148 countries. Educational experts believe that learners can benefit from educational mathematical applications. Senior post-graduate students at the Central University of Technology in South Africa, therefore, embarked on a socio-constructivist project to develop appropriate educational mathematics applications for primary school learners in their community. This paper focuses on the first stage of this project where the aim was to investigate the use of mobile mathematics applications by primary school learners within the South African context. Quantitative and qualitative data was collected by using a survey targeting mathematics teachers and parents of children in grade 1 to 3 in the Free State province of South Africa. The results indicate that 64% of grade 1 to 3 learners have access to mobile devices and that both teachers and parents have a very positive perception towards the use of mathematics applications by their learners and children. In addition 30% of parents have downloaded mobile mathematics applications for learners to use at home. The most important reason why parents are not downloading mobile mathematics applications is because they do not know where to find them, or they do not have time to search for appropriate applications. High costs associated with Internet connectivity and the fact that not all learners have access to mobile devices were two key obstacles mentioned by teachers involved with the use of mobile mathematics applications in primary school education.
- Published
- 2015
34. Adding event reconstruction to a Cloud Forensic Readiness model
- Author
-
Victor R. Kebande and Hein S. Venter
- Subjects
Focus (computing) ,Process (engineering) ,Computer science ,business.industry ,Event (computing) ,Digital forensics ,Cloud computing ,Computer security ,computer.software_genre ,Data science ,Digital evidence ,Degree of certainty ,business ,computer ,Event reconstruction - Abstract
During post-event response, proactive forensics is of critical importance in any organisation when conducting digital forensic investigations in cloud environments. However, there exist no reliable event reconstruction processes in the cloud that can help in analysis and examination of Digital Evidence (DE) aspects, during Digital Forensic Readiness (DFR) process, as defined in the standard of ISO/IEC 27043:2015. The problem that this paper addresses is the lack of an easy way of performing digital event reconstruction process when the cloud is forensically ready in preparation of a Digital Forensic Investigation (DFI). During DFR approaches, event reconstruction helps in examination and pre-analysis of the characteristics of potential security incidents. As a result, the authors have proposed an Enhanced Cloud Forensic Readiness (ECFR) process model with event reconstruction process that can support future investigative technologies with a degree of certainty. We also propose an algorithm that shows the methodology that is used to reconstruct events in the ECFR. The main focus of this work is to examine the addition of event reconstruction to the initially proposed Cloud Forensic Readiness (CFR) model, by providing a more enhanced and detailed cloud forensic readiness model.
- Published
- 2015
35. Improving power generation from fluctuating off-gas productions
- Author
-
P.v.Z. Venter, M. van Eldik, and SE Terblanche
- Subjects
Upstream (petroleum industry) ,Engineering ,Outgassing ,Electricity generation ,Resource (project management) ,Waste management ,Process (engineering) ,business.industry ,Production (economics) ,Raw material ,Process engineering ,business ,Energy source - Abstract
Engineering plants typically have a variety of interlinked production chains, where process flows are dependent on upstream events and operated by default or manual settings. Burnable off-gasses are mostly utilized as energy sources. Raw material feeds may fluctuate over time, resulting in fluctuating off-gas production and potentially in inefficient energy resource usage.
- Published
- 2015
36. A model for the design of next generation e-supply chain digital forensic readiness tools
- Author
-
Hein S. Venter and D.J.E. Masvosvere
- Subjects
business.industry ,Computer science ,Business process ,Supply chain ,Digital forensics ,Information security ,Computer security ,computer.software_genre ,System requirements ,Engineering management ,Information and Communications Technology ,Information system ,The Internet ,business ,computer - Abstract
The internet has had a major impact on how information is shared within supply chains, and in commerce in general. This has resulted in the establishment of information systems such as e-supply chains amongst others which integrate the internet and other information and communications technology (ICT) with traditional business processes for the swift transmission of information between trading partners. Many organisations have reaped the benefits of adopting the eSC model, but have also faced the challenges with which it comes. One such major challenge is information security. Digital forensic readiness is a relatively new exciting field which can prepare and prevent incidents from occurring within an eSC environment if implemented strategically. With the current state of cybercrime, tool developers are challenged with the task of developing cutting edge digital forensic readiness tools that can keep up with the current technological advancements, such as (eSCs), in the business world. Therefore, the problem addressed in this paper is that there are no DFR tools that are designed to support eSCs specifically. There are some general-purpose monitoring tools that have forensic readiness functionality, but currently there are no tools specifically designed to serve the eSC environment. Therefore, this paper discusses the limitations of current digital forensic readiness tools for the eSC environment and an architectural design for next-generation eSC DFR systems is proposed, along with the system requirements that such systems must satisfy. It is the view of the authors that the conclusions drawn from this paper can spearhead the development of cutting-edge next-generation digital forensic readiness tools, and bring attention to some of the shortcomings of current tools.
- Published
- 2015
37. Digital forensics in the Cloud: The state of the art
- Author
-
George Sibiya, Thomas Fogwill, and Hein S. Venter
- Subjects
Engineering ,Focus (computing) ,business.industry ,Digital forensics ,Cloud computing ,Computer security ,computer.software_genre ,Data science ,State (computer science) ,Zoom ,Digital forensic process ,Architecture ,business ,computer ,Implementation - Abstract
The advent of cloud computing has brought new challenges to digital forensics. To address these challenges, new approaches in conducting digital forensic are required. In this paper, challenges that are faced by digital forensic investigator when faced with cloud based incident scenes are presented. The presented challenges are obtained from survey articles that explore outstanding and future challenges in digital forensics in general. In this paper we zoom in into cloud forensics as it is the main focus of the paper. Based on the challenges brought to light by the considered survey articles, we present requirements that should be met by digital forensic systems that aim to investigate cloud environments. Existing architectures and implementations of digital forensic systems are evaluated based on these requirements. Through this evaluation, gaps that are left out by the evaluated architectures are brought to light.
- Published
- 2015
38. Digital forensic readiness for branchless banking
- Author
-
Hein S. Venter and Yusuf Mitha
- Subjects
Financial inclusion ,business.industry ,Digital forensics ,Internet privacy ,Unbanked ,Branchless banking ,Service provider ,Computer security ,computer.software_genre ,Digital evidence ,Mobile phone ,SMS banking ,Business ,computer - Abstract
Mobile phone's short message services technology is being leveraged to provide branchless banking in developed countries. These SMS-based services reach areas where bank branches or auto telling machines would not be feasible thereby enabling financial inclusion among the unbanked and low-income earners. However, the vulnerability of its service delivery platform makes it attractive to fraudsters. Lack of digital forensic readiness (DFR) scheme, specifically designed for BB, to capture and preserve potential evidence for further investigation of fraud remains a challenge in this domain. The availability of digital evidence maximises the potential of an organisation to successfully conduct investigation at a reduced cost. Therefore, branchless banking service providers should consider incorporating digital forensic readiness in their security strategies. In this paper, the authors propose a digital forensic readiness scheme that addresses the problem of fraud in branchless banking.
- Published
- 2015
39. The DC house for low power households - DC-DC converter analysis
- Author
-
M. Adonis, Atanda K. Raji, and Christo Venter
- Subjects
Power optimizer ,Electric power system ,Engineering ,Base load power plant ,business.industry ,Distributed generation ,Power module ,AC adapter ,Electrical engineering ,Power engineering ,Power factor ,business - Abstract
Renewable energy generation is achieving ever deeper penetration into the power grid because of its advantages. Renewable power sources are becoming more and more popular and renewable energies have many advantages including reduced environmental impact. This paper presents a design framework to implement a DC powered house. Different aspects of this solution will be described. A possible standard voltage for a DC house will be determined as well as the amount of power used by a small household. As the prices on renewable energy generators such as photovoltaic panels' decreases, it makes DC power systems more attractive. The paper also covers the design and simulation of a DC-DC converter used in the solution to provide DC power to a household. Load tests are simulated and show the effects of load changes on the stability of the DC network.
- Published
- 2015
40. Silicon-on-insulator (SOI) nanowire hot carrier electroluminescence
- Author
-
Monuko du Plessis and Petrus J. Venter
- Subjects
Materials science ,business.industry ,Nanowire ,Silicon on insulator ,Optoelectronics ,Electroluminescence ,business - Published
- 2014
41. A digital forensic model for providing better data provenance in the cloud
- Author
-
Philip M. Trenwith and Hein S. Venter
- Subjects
World Wide Web ,Set (abstract data type) ,Information retrieval ,business.industry ,Computer science ,Header ,Digital forensics ,Process (computing) ,Cloud computing ,business ,Scale (map) ,Chain of custody ,TRACE (psycholinguistics) - Abstract
The cloud has made digital forensic investigations exceedingly difficult due to the fact that data may be spread over an ever-changing set of hosts and data centres. The normal search and seizure approach that digital forensic investigators tend to follow does not scale well in the cloud because it is difficult to identify the physical devices that data resides on. In addition, the location of these devices is often unknown or unreachable. A solution to identifying the physical device can be found in data provenance. Similar to the tags included in an email header, indicating where the email originated, a tag added to data, as it is passed on by nodes in the cloud, identifies where the data came from. If such a trace can be provided for data in the cloud it may ease the investigating process by indicating where the data can be found. In this research the authors propose a model that aims to identify the physical location of data, both where it originated and where it has been as it passes through the cloud. This is done through the use of data provenance. The data provenance records will provide digital investigators with a clear record of where the data has been and where it can be found in the cloud.
- Published
- 2014
42. A package-integratable six-port reflectometer for power devices
- Author
-
Razvan G. Venter, null Rui Hou, Koen Buisman, Marco Spirito, Klaus Werner, and Leo C.N. de Vreede
- Subjects
Heterodyne ,Engineering ,Reliability (semiconductor) ,business.industry ,Time-domain reflectometer ,Amplifier ,Smith chart ,RF power amplifier ,Object-relational impedance mismatch ,Electrical engineering ,Electronic engineering ,Power semiconductor device ,business - Abstract
Semiconductor power devices have a growing popularity in industrial, scientific and medical (ISM) band applications, such as microwave-heating, drying and plasma generation. A distinguishable property of these applications is the relentless pursuit of reliability, ruggedness, or the ability to withstand a mismatched loading condition without failure. Mismatch detection right at device output, preferably integrated in package, could provide critical information to avoid device breakdown and to enable performance optimization. In this work, the in-package mismatch detection and load monitoring is enabled by a specially designed six-port reflectometer. Compared with conventional reflection measurement techniques based on heterodyne receivers, the proposed design is passive, simple, compact and inexpensive. A hardware prototype is implemented with a size of 36 mm2. Loading conditions over the entire Smith chart are generated by a calibrated active-load-pull system and measured by the proposed system, yielding a root-mean-square error below -32 dB full-scale. This compact reflectometer enables the in-package accurate mismatch detection for the first time. The result of this study has been accepted for publication in the 2014 International Microwave Symposium, and nominated to be a finalist for its annual best paper award.
- Published
- 2014
43. Case study Mauritius: Successful implementation of innovative public revenue management solutions
- Author
-
Hannes Venter
- Subjects
Revenue management ,Business ,Marketing - Published
- 2014
44. Digital forensic readiness in a cloud environment
- Author
-
Thomas Fogwill, Sipho Ngobeni, George Sibiya, and Hein S. Venter
- Subjects
Network forensics ,Engineering ,Cloud computing security ,business.industry ,Security as a service ,Internet privacy ,Digital forensics ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Cloud computing ,Computer forensics ,Service provider ,Computer security ,computer.software_genre ,The Internet ,business ,computer - Abstract
Although cloud computing is maturing, security issues are still prevalent. Most of the security issues that are in the cloud have existed since the advent of the Internet. These issues are escalated in a cloud environment due to its distributed nature, multi-tenancy and the sensitive and large amount of data that is transmitted over the Internet and hosted by third parties. The security aspect that this paper focuses on concerns digital forensics. The cloud spans over multi-jurisdictions. As such, service providers hosting the data that may be required for digital forensic investigation may be reluctant to comply with foreign law enforcement agencies. Even if they comply, this may be a costly and time-consuming exercise, given the amount of hosted data that belongs to multi-tenants. In this paper we present a forensic readiness model that makes use of a Forensic Service hosted in the cloud. The model is aimed at minimizing costs associated with conducting a digital forensic investigation in a distributed cloud environment. The scope of this paper however is limited to examining the impact that a forensic readiness mechanism put in place may have on other hosted cloud services. Preliminary results have shown a negligible effect in performance of cloud services by a having our proposed digital forensic readiness mechanism in place.
- Published
- 2013
45. Digital forensic readiness in the cloud
- Author
-
Hein S. Venter and Philip M. Trenwith
- Subjects
Focus (computing) ,Digital forensics cloud computing ,Process (engineering) ,Computer science ,business.industry ,Digital forensics ,Key (cryptography) ,Cloud computing ,Computer security ,computer.software_genre ,business ,computer ,Digital forensic investigation - Abstract
The traditional digital forensic investigation process has always had a post-event driven focus. This process is perhaps too long for the cloud. This paper investigates how digital forensic readiness can be used to quicken and update the traditional digital forensic investigation process to better suit cloud computing environments. John Tans states that centralized logging is the key to efficient forensic strategies. The author proposes a model that considers centralised logging of all activities of all the participants within the cloud in preparation of an investigation. This approach will quicken the acquisition of evidential data when an investigation is required, allowing the investigator to start the analysis and examination almost immediately.
- Published
- 2013
46. Selection and ranking of remote hosts for digital forensic investigation in a Cloud environment
- Author
-
Hein S. Venter, Thomas Fogwill, and George Sibiya
- Subjects
Network forensics ,Cloud computing security ,Computer science ,business.industry ,Digital forensics ,Cloud computing ,Troubleshooting ,Computer security ,computer.software_genre ,Identification (information) ,Digital forensic process ,business ,Host (network) ,computer - Abstract
Cloud computing is a new computing paradigm which presents challenges for digital forensic investigators. Digital forensics is a branch of computer security that makes use of electronic evidence to build up a criminal case or for troubleshooting purposes. Advances have been made since the advent of Cloud computing in addressing issues that came with the Cloud including that of security. However, not all aspects of security are advancing. Developments in digital forensics still leave a lot to be desired in terms of standards and appropriate digital forensic tools that are applicable in the Cloud. To achieve that, standards as well as standard tools are required for successful evidence collection, preservation, analysis and conviction in case of a criminal case. This paper contributes towards addressing issues in digital forensics by presenting an algorithm that can be used in the evidence identification phase of a digital forensic process. Data in Cloud environments exist in the Internet or in networked environments and data is always accessed remotely. There is therefore at least one connection to a host that exists in a Cloud environment. In a case of a computer system that hosts a Cloud service, the number of connections from clients can be very large. In such a scenario it is very hard to identify an attacker from both active and recently disconnected connections to a host. This may require an investigator to probe all individual IP addresses connected to the host which can be time consuming and costly. There is therefore a need for a mechanism that can identify and rank remote hosts that are connected to a victim host and that may be associated with a malicious activity. In this paper we present an algorithm that uses probabilities to identify and rank suspicious remote hosts connected to a victim host. This algorithm helps minimize the effort required of investigators to probe each IP address that is connected to a victim as connected IP addresses will be prioritized according to their rank.
- Published
- 2013
47. An investigation into voltage transformers used for tariff metering of medium and high voltage loads and standard guidelines for its application
- Author
-
R.T. Harris, W. Phipps, C. Venter, and A.G. Roberts
- Subjects
Engineering ,Ferroresonance in electricity networks ,business.industry ,Ground ,Electrical engineering ,Tariff ,High voltage ,Current transformer ,Reliability engineering ,law.invention ,law ,Metering mode ,business ,Transformer ,Voltage - Abstract
For certain VT connections and unknown consumer earthing practices, metering errors will occur during unbalanced loading. Because of the small load offered by modern numerical tariff meters and relays, VT burden ratings may be inappropriate and the VT may not operate within its accuracy range. This can give rise to the ferroresonance phenomenon and neutral inversion for certain system and VT conditions. VTs used for tariff metering were investigated based on limb design, parameters, earthing and connection methods. To compare the accuracy, case studies were created and calculations performed with the aid of an Excel iterative program. The calculations compared the actual real power supplied to a load with the real power seen by the voltage and current transformers. From the results and theoretical research, optimum VT earthing, connections, ratings and standards were determined and compiled in a concise Code of Practice.
- Published
- 2013
48. Realization of a '3 & 6 phase' induction machine
- Author
-
P. Venter, A. A. Jimoh, and Josiah L. Munda
- Subjects
Engineering ,business.industry ,Volume (computing) ,Phase (waves) ,Control engineering ,System dynamics ,Compensation (engineering) ,Reliability (semiconductor) ,MATLAB ,business ,computer ,Realization (systems) ,Induction motor ,computer.programming_language - Abstract
Induction motors have been the workhorse of industry since decades. With the rapid advancement in industry and transport the need exists for machines with higher power per volume, efficient and better reliability to widen the application range and drive bigger and crucial loads. Higher phase order machines have been identified as a viable solution to meet these needs. This paper is on the concept of using a six phase machine as different devices consisting of three or six phases. A study is done using a symmetrical six phase structure and configuring it to operate as a three phase motor, six phase motor and three phase motor with reactive compensation. Some parts of mathematical modeling are presented as well as Matlab/Simulink simulation results.
- Published
- 2012
49. Harmonised digital forensic investigation process model
- Author
-
Hein S. Venter and Aleksandar Valjarevic
- Subjects
Process modeling ,Computer science ,Process (engineering) ,business.industry ,Digital forensics ,Information technology ,Computer forensics ,Information security ,Computer security ,computer.software_genre ,Data science ,Field (computer science) ,business ,computer ,Chain of custody - Abstract
Digital forensics gained significant importance over the past decade, due to the increase in the number of information security incidents over this time period, but also due to the fact that our society is becoming more dependent on information technology. Performing a digital forensic investigation requires a standardised and formalised process to be followed. There is currently no international standard formalising the digital forensic investigation process, nor does a harmonised digital forensic investigation process exist that is acceptable in this field. This paper proposes a harmonised digital forensic investigation process model. The proposed model is an iterative and multi-tier model. The authors introduce the term “parallel actions”, defined as the principles which should be translated into actions within the digital forensic investigation process (i.e. principle that evidence's integrity must be preserved through the process and that chain of evidence must be preserved). The authors believe that the proposed model is comprehensive and that it harmonises existing state-of-the-art digital forensic investigation process models. Furthermore, we believe that the proposed model can lead to the standardisation of the digital forensic investigation process.
- Published
- 2012
50. Measuring semantic similarity between digital forensics terminologies using web search engines
- Author
-
Nickson M. Karie and Hein S. Venter
- Subjects
Information retrieval ,Semantic similarity ,Computer science ,business.industry ,Digital forensics ,Semantic search ,The Internet ,Computer forensics ,Computational linguistics ,business ,Task (project management) ,Domain (software engineering) - Abstract
Semantic similarity between different terminologies is becoming a generic problem that extends across numerous domains, touching applications developed for computational linguistics, artificial intelligence, cognitive science and, in the case of this paper, digital forensics. Despite the usefulness of semantic similarity measures in different domains, accurately measuring semantic similarity between any two terms remains a challenging task. The main difficulty lies in developing a computational method with the ability to generate satisfactory results close to how human beings perceive these terminologies, especially when used in their domain of expertise.
- Published
- 2012
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.