Academic literature on the topic 'Computer network protocols – South Africa'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer network protocols – South Africa.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer network protocols – South Africa"

1

Mosepele, Mosepele, Cecilia Kanyama, David Meya, et al. "PO 8719 INTRODUCING A NEW AFRICA MENINGITIS NETWORK – A NORTH-SOUTH COLLABORATION." BMJ Global Health 4, Suppl 3 (2019): A63.1—A63. http://dx.doi.org/10.1136/bmjgh-2019-edc.165.

Full text
Abstract:
BackgroundCentral nervous system infections, including meningitis, continue to cause significant morbidity in Africa. HIV has contributed to the epidemiology of CNS infections in this setting. Notable advances in the study of CNS infections by several groups have demonstrated the utility of new diagnostic strategies and impact of novel treatment strategies. However, efforts to coordinate meningitis research in Africa, and between Africa and the rest of the world remain very limited.MethodsIn a bid to promote a coordinated study of CNS infections across Africa, and in collaboration with other m
APA, Harvard, Vancouver, ISO, and other styles
2

Irons, Alastair, and Jacques Ophoff. "Aspects of Digital Forensics in South Africa." Interdisciplinary Journal of Information, Knowledge, and Management 11 (2016): 273–83. http://dx.doi.org/10.28945/3576.

Full text
Abstract:
This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics. The paper paints a picture of the cybercrime threats facing South Africa and argues for the need to develop a skill base in digital forensics in order to counter the threats through detection of cybercrime, by analyzing cybercrime reports, consideration of current legislation, and an analysis of computer forensics course provision in South African universi
APA, Harvard, Vancouver, ISO, and other styles
3

Kwofie, Titus Ebenezer, Clinton Ohis Aigbavboa, and Wellington Didibhuku Thwala. "Communication performance challenges in PPP projects: cases of Ghana and South Africa." Built Environment Project and Asset Management 9, no. 5 (2019): 628–41. http://dx.doi.org/10.1108/bepam-11-2018-0137.

Full text
Abstract:
Purpose The need to gain theoretical and practical understanding into the communication performance challenges in public private partnership (PPP) projects is considered as a precursor to effective communication strategies, management, planning and improvement in PPP models in both developed and developing countries. Hence, the purpose of this paper is to investigate the nature of communication performance challenges in PPP projects. Design/methodology/approach By adopting a deductive research design, a questionnaire survey of participants in the communication network of PPP projects in two co
APA, Harvard, Vancouver, ISO, and other styles
4

Kok, Illasha, Petra Bester, and Hennie Esterhuizen. "Late Departures from Paper-Based to Supported Networked Learning in South Africa." International Journal of Distance Education Technologies 16, no. 1 (2018): 56–75. http://dx.doi.org/10.4018/ijdet.2018010104.

Full text
Abstract:
Fragmented connectivity in South Africa is the dominant barrier for digitising initiatives. New insights surfaced when a university-based nursing programme introduced tablets within a supportive network learning environment. A qualitative, explorative design investigated adult nurses' experiences of the realities when moving from paper-based learning towards using tablets within a blended learning environment. Purposive sampling was applied. 45 (N) participants were included, each receiving a preloaded tablet (15 running on iOS, 15 on Android 4.2.2 Jelly Bean and 15 on Windows® 8 operating sys
APA, Harvard, Vancouver, ISO, and other styles
5

Cooper, C. J. "Energy and transport issues for Gauteng, South Africa." Journal of Energy in Southern Africa 18, no. 2 (2007): 11–15. http://dx.doi.org/10.17159/2413-3051/2007/v18i2a3369.

Full text
Abstract:
Rapid urbanisation brings unwelcome negative impacts, and places excessive pressure on infra-structure development and maintenance. In partic-ular, transport networks become congested with negative impacts on energy logistics. The liquid fuel situation of South Africa and Gauteng is briefly examined. The paper considers the impact of con-strained oil supply, and supply infrastructure, on transport. The author further suggests that the authorities in Gauteng should critically examine an ultra light rail option in order to reduce reliance on imported oil, while helping reduce road congestion. A
APA, Harvard, Vancouver, ISO, and other styles
6

Mabasa, Brighton, Meena D. Lysko, Henerica Tazvinga, Sophie T. Mulaudzi, Nosipho Zwane, and Sabata J. Moloi. "The Ångström–Prescott Regression Coefficients for Six Climatic Zones in South Africa." Energies 13, no. 20 (2020): 5418. http://dx.doi.org/10.3390/en13205418.

Full text
Abstract:
The South African Weather Service (SAWS) manages an in situ solar irradiance radiometric network of 13 stations and a very dense sunshine recording network, located in all six macroclimate zones of South Africa. A sparsely distributed radiometric network over a landscape with dynamic climate and weather shifts is inadequate for solar energy studies and applications. Therefore, there is a need to develop mathematical models to estimate solar irradiation for a multitude of diverse climates. In this study, the annual regression coefficients, a and b, of the Ångström–Prescott (AP) model, which can
APA, Harvard, Vancouver, ISO, and other styles
7

Okoh, D. I., L. A. McKinnell, and P. J. Cilliers. "Developing an ionospheric map for South Africa." Annales Geophysicae 28, no. 7 (2010): 1431–39. http://dx.doi.org/10.5194/angeo-28-1431-2010.

Full text
Abstract:
Abstract. The development of a map of the ionosphere over South Africa is presented in this paper. The International Reference Ionosphere (IRI) model, South African Bottomside Ionospheric Model (SABIM), and measurements from ionosondes in the South African Ionosonde Network, were combined within their own limitations to develop an accurate representation of the South African ionosphere. The map is essentially in the form of a computer program that shows spatial and temporal representations of the South African ionosphere for a given set of geophysical parameters. A validation of the map is att
APA, Harvard, Vancouver, ISO, and other styles
8

Masembe, Angela. "Reliability benefit of smart grid technologies: A case for South Africa." Journal of Energy in Southern Africa 26, no. 3 (2015): 2–9. http://dx.doi.org/10.17159/2413-3051/2015/v26i3a2124.

Full text
Abstract:
The South African power industry faces many challenges, from poor performing networks, a shortage of generation capacity to significant infrastructure backlog and an ageing work force. According to the Development Bank of South Africa (DBSA), the key challenge facing the industry is ageing infrastructure. Smart grid technologies are a class of technologies that are being developed and used by utilities to deliver electrical systems into the 21st century using computer-based remote control and automation. The main motive towards smart grid technologies is to improve reliability, flexibility, ac
APA, Harvard, Vancouver, ISO, and other styles
9

Pillay, Sureshnee, Jennifer Giandhari, Houriiyah Tegally, et al. "Whole Genome Sequencing of SARS-CoV-2: Adapting Illumina Protocols for Quick and Accurate Outbreak Investigation during a Pandemic." Genes 11, no. 8 (2020): 949. http://dx.doi.org/10.3390/genes11080949.

Full text
Abstract:
The COVID-19 pandemic has spread very fast around the world. A few days after the first detected case in South Africa, an infection started in a large hospital outbreak in Durban, KwaZulu-Natal (KZN). Phylogenetic analysis of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) genomes can be used to trace the path of transmission within a hospital. It can also identify the source of the outbreak and provide lessons to improve infection prevention and control strategies. This manuscript outlines the obstacles encountered in order to genotype SARS-CoV-2 in near-real time during an urgen
APA, Harvard, Vancouver, ISO, and other styles
10

Robinson, Bryan Michael Kenneth, and Siân Stephens. "moderating and mediating role of local government in the community engagement strategy of a renewable energy company in South Africa." Journal of Energy in Southern Africa 32, no. 3 (2021): 14–23. http://dx.doi.org/10.17159/2413-3051/2021/v32i3a9403.

Full text
Abstract:
Adopting a qualitative case study approach of a renewable energy company in South Africa, the research investigated community engagement within the tripartite relationship of a wind farm, the communities, and the local government. It was found that local government played a moderating role in the community engagement efforts of the wind farm which had to comply with certain engagement protocols determined by local government. Local government also played a mediating role in corporate community engagement, as the wind farm developed their engagement strategy in alignment with local government’s
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer network protocols – South Africa"

1

Lutshete, Sizwe. "An analysis of the correlation beween packet loss and network delay on the perfomance of congested networks and their impact: case study University of Fort Hare." Thesis, University of Fort Hare, 2013. http://hdl.handle.net/10353/d1006843.

Full text
Abstract:
In this paper we study packet delay and loss rate at the University of Fort Hare network. The focus of this paper is to evaluate the information derived from a multipoint measurement of, University of Fort Hare network which will be collected for a duration of three Months during June 2011 to August 2011 at the TSC uplink and Ethernet hubs outside and inside relative to the Internet firewall host. The specific value of this data set lies in the end to end instrumentation of all devices operating at the packet level, combined with the duration of observation. We will provide measures for the no
APA, Harvard, Vancouver, ISO, and other styles
2

Gerber, Tian Johannes. "VoIP : a corporate governance approach to avoid the risk of civil liability." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1016272.

Full text
Abstract:
Since the deregulation of Voice over Internet Protocol (VoIP) in 2005, many South African organizations are now attempting to leverage its cost saving and competitive values. However, it has been recently cited that VoIP is one of the greatest new risks to organizations and this risk is cited to increase Information Security insurance premiums in the near future. Due to the dynamic nature of the VoIP technology, regulatory and legislative concerns such as lawful interception of communications and privacy may also contribute to business risk. In order to leverage value from the VoIP implementat
APA, Harvard, Vancouver, ISO, and other styles
3

Tarwireyi, Paul. "Design and implementation of a network revenue management architecture for marginalised communities." Thesis, University of Fort Hare, 2007. http://hdl.handle.net/10353/72.

Full text
Abstract:
Rural Internet connectivity projects aimed at bridging the digital divide have mushroomed across many developing countries. Most of the projects are deployed as community centred projects. In most of the cases the initial deployment of these projects is funded by governments, multilateral institutions and non-governmental organizations. After the initial deployment, financial sustainability remains one of the greatest challenges facing these projects. In the light of this, externally funded ICT4D interventions should just be used for “bootstrapping” purposes. The communities should be “groomed
APA, Harvard, Vancouver, ISO, and other styles
4

De, Bruyn Daniel Nicholas. "Investigation and development of a system for secure synchronisation in a wireless mesh network." Thesis, [Bloemfontein?] : Central University of Technology, Free State, 2010. http://hdl.handle.net/11462/132.

Full text
Abstract:
Thesis (M. Tech.(Electrical Engineering)) -- Central University of technology, Free State, 2010<br>This dissertation gives an overview of the research done in developing a protocol to synchronise information in a secure wireless mesh network. Alternative methods to control wireless devices were investigated in the non-controlled frequency spectrum. The aim of the research was to develop a protocol that can be loaded on a micro-controller with limited intelligence, controlling endpoints. The protocol minimises human interference and automatically negotiates which device becomes the master c
APA, Harvard, Vancouver, ISO, and other styles
5

Murisa, Wesley Vengayi. "Deploying DNSSEC in islands of security." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1003053.

Full text
Abstract:
The Domain Name System (DNS), a name resolution protocol is one of the vulnerable network protocols that has been subjected to many security attacks such as cache poisoning, denial of service and the 'Kaminsky' spoofing attack. When DNS was designed, security was not incorporated into its design. The DNS Security Extensions (DNSSEC) provides security to the name resolution process by using public key cryptosystems. Although DNSSEC has backward compatibility with unsecured zones, it only offers security to clients when communicating with security aware zones. Widespread deployment of DNSSEC is
APA, Harvard, Vancouver, ISO, and other styles
6

Coleman, Alfred. "Developing an e-health framework through electronic healthcare readiness assessment." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1519.

Full text
Abstract:
The major socio-economic development challenges facing most African countries include economic diversification, poverty, unemployment, diseases and the unsustainable use of natural resources. The challenge of quality healthcare provisioning is compounded by the HIV/AIDS pandemic in Sub Saharan Africa. However, there is a great potential in using electronic healthcare (e-health) as one of the supportive systems within the healthcare sector to address these pressing challenges facing healthcare systems in developing countries, including solving inequalities in healthcare delivery between rural a
APA, Harvard, Vancouver, ISO, and other styles
7

Wells, Daniel David. "Network management for community networks." Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006587.

Full text
Abstract:
Community networks (in South Africa and Africa) are often serviced by limited bandwidth network backhauls. Relative to the basic needs of the community, this is an expensive ongoing concern. In many cases the Internet connection is shared among multiple sites. Community networks may also have a lack of technical personnel to maintain a network of this nature. Hence, there is a demand for a system which will monitor and manage bandwidth use, as well as network use. The proposed solution for community networks and the focus within this dissertation, is a system of two parts. A Community Access P
APA, Harvard, Vancouver, ISO, and other styles
8

Mjikeliso, Yolanda. "Guidelines to address the human factor in the South African National Research and Education Network beneficiary institutions." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/9946.

Full text
Abstract:
Even if all the technical security solutions appropriate for an organisation’s network are implemented, for example, firewalls, antivirus programs and encryption, if the human factor is neglected then these technical security solutions will serve no purpose. The greatest challenge to network security is probably not the technological solutions that organisations invest in, but the human factor (non-technical solutions), which most organisations neglect. The human factor is often ignored even though humans are the most important resources of organisations and perform all the physical tasks, con
APA, Harvard, Vancouver, ISO, and other styles
9

Twele, Nombulelo. "A feasibility study of wireless network technologies for rural broadband connectivity." Thesis, University of Fort Hare, 2013. http://hdl.handle.net/10353/d1016167.

Full text
Abstract:
The adoption of wireless broadband technologies to provide network and Internet connectivity in rural communities has conveyed the possibility to overcome the challenges caused by marginalization and many other characteristics possessed by these rural communities. With their different capabilities, these technologies enable communication for rural communities internally within the community and externally on a global scale. Deployment of these technologies in rural areas requires consideration of different factors - these are in contrast, to those considered when deploying these technologies i
APA, Harvard, Vancouver, ISO, and other styles
10

Mooi, Roderick David. "A model for security incident response in the South African National Research and Education network." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1017598.

Full text
Abstract:
This dissertation addresses the problem of a lack of a formal incident response capability in the South African National Research and Education Network (SA NREN). While investigating alternatives it was found that no clear method exists to solve this problem. Therefore, a second problem is identified: the lack of a definitive method for establishing a Computer Security Incident Response Team (CSIRT) or Computer Emergency Response Team (CERT) in general. Solving the second problem is important as we then have a means of knowing how to start when building a CSIRT. This will set the basis for add
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer network protocols – South Africa"

1

IEEE Intelligent Network Workshop (2000 Cape Town, South Africa). 2000 IEEE Intelligent Network Workshop proceedings: Intelligent network solutions for the new millennium : IN2000 : 7-11 May 2000, Cape Town, South Africa. IEEE, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer network protocols – South Africa"

1

Galpin, Vashti. "Women in Technology in Sub-Saharan Africa." In Global Information Technologies. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-939-7.ch122.

Full text
Abstract:
International research has shown that in most countries, there are few women studying towards information technology (IT) careers (Galpin, 2002), and there is much research, particularly in the United States (U.S.), United Kingdom (UK) and Australia into why this is the case (Gürer &amp; Camp, 2002). This article considers the situation in sub-Saharan Africa and focuses on women’s involvement in the generation and creation of information and communication technologies (ICTs) in sub-Saharan Africa, as opposed to ICT use in sub-Saharan Africa, which is considered elsewhere in this volume. There are a number of aspects to the generation and creation of ICTs: how women are involved in this process as IT professionals and how they are educated for these careers, as well how technology can be used appropriately within the specific conditions of sub-Saharan Africa. ICTs will be considered in the broadest sense of the word, covering all electronic technologies, from computers and networking to radio and television. Women’s participation is important: The World Summit on the Information Society (WSIS) Gender Caucus (www.genderwsis.org) has identified women’s involvement in the design and development of technology as well as technology management policy, as key principles for the information society. Marcelle (2001) emphasizes the necessity for African women to become involved in technological and scientific areas, including “computer science, software engineering, network design, network management and related disciplines” (Marcelle, 2001, para. 15) to create an information society appropriate for African women. The diversity of those involved in design leads to higher-quality and more appropriate technological solutions (Borg, 2002; Lazowska, 2002). Background Sub-Saharan Africa has a population of 641 million, young (almost half under 15) and rural (35% urban). Significant problems are undernourishment, poverty and HIV/AIDS (United Nations Development Programme (UNDP), 2004). All the countries in sub-Saharan Africa are classified as developing countries. Some countries are relatively wealthy, such as Mauritius, South Africa, and Nigeria, but have large wealth disparities within their populations. Women in sub-Saharan Africa are expected to focus on the home, they have less access to education and health, and their contribution to family and community is not valued (Huyer, 1997).
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer network protocols – South Africa"

1

Burke, Ivan Daniel, Renier van Heerden, and Martin S. Olivier. "Analysing the fairness of trust-based Mobile Ad hoc Network protocols: Comparing the fairness of AODV and TAODV protocols in scenario driven simulations." In 2011 Information Security for South Africa (ISSA). IEEE, 2011. http://dx.doi.org/10.1109/issa.2011.6027528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!