Author:Ngassam, EK; Kourie, DG; Watson, BWDate:Oct 2010Previous work on implementations of FA-based string recognizers suggested a range of implementation strategies (and therefore, algorithms) aiming at improving their performance for fast string recognition. However, an efficient exploitation ...Read more
Author:Joubert, LJ; Davel, MH; Barnard, E; Zimu, VDate:Nov 2004The need for a bootstrapping approach to the morphological decomposition of words in agglutinative languages such as isiZulu is motivated, and the complexities of such an approach are described. The authors then introduce a generic framework ...Read more
Author:Davoren, B; Sacks, N; Theron, MarithaDate:Nov 2021The interest in additive manufacturing and its unique applications has increased significantly over recent years. This has resulted in the need for alloys and composites to be optimized for these processes. In this study a multiphase parameter ...Read more
Author:Kotzé, Paula; Tsogang, M; Van der Merwe, ADate:Oct 2012The use of patterns and pattern languages in enterprise architecture (EA) is a relatively novel concept. Although both the concepts of patterns and EA are over 30 years old, the notion of design patterns is hardly applied to EA. There is a ...Read more
Author:Mabaso, M; Withey, Daniel J; Twala, BDate:Feb 2016Fluorescence microscopy imaging is an important tool in modern biological research, allowing insights into the processes of biological systems. Automated image analysis algorithms help in extracting information from these images. Validation ...Read more
Author:Chauke, Mapoo D; Mphadzha, Fhumulani RDate:Feb 2022Proper functioning of a nation's economy and society requires that its critical infrastructure is safe and secure. The protection of critical infrastructure is becoming a growing concern to national governments, infrastructure managers and ...Read more
Author:Burke, Ivan D; Naidoo, Sasha; Olivier, MSDate:Apr 2010Mobile Ad hoc Networks have become an attractive option for military and disaster-response operations. Its ad hoc nature allows for fast deployment and requires no pre-existing network infrastructure. Most of the MANET protocol development ...Read more
Author:Van Wyk, Llewellyn VDate:Oct 2018A framework for the structural reform of solid waste management is proposed based on the use of distributed grids which encompass a collection of microgrids operating together within distribution networks. The paper explores the concept with ...Read more
Author:Van 't Wout, Magdalena C; Ball, Shaun V; Oosthuizen, RudolphDate:Oct 2019Modern day conflicts give rise to complex problems that traditional military intelligence approaches and tools struggle to resolve. There is a need for prediction and/or forecasting in the military domain based on effective intelligence ...Read more
Author:Koen, H; De Villiers, JP; Pavlin, G; De Waal, A; De Oude, P; Mignet, FDate:Jul 2014Rhino poaching in South Africa is leading to a catastrophic reduction in the rhino population. In this paper a Bayesian network causal model is proposed to model the underlying (causal) relationships that lead to rhino poaching events. The ...Read more
Author:Smuts, H; Kotzé, Paula; Van der Merwe, A; Loock, MDate:Nov 2017Both information systems (IS) outsourcing and knowledge management are well-established business phenomena. The integration of shared knowledge in an IS outsourcing arrangement, represents the blending of organisational knowledge with external ...Read more
Author:Veerasamy, Namosha; Labuschagne, William ADate:Apr 2018This article describes how social media has revolutionised the way in which people communicate, interact and engage. This phenomenon has transformed the digital world with its ease, convenience and numerous capabilities for sharing, involving ...Read more
Author:Naicker, Prisha; Thopil, GADate:Jul 2019A range of varying criteria with trade-offs need consideration when selecting a suitable renewable energy technology (RET) for a specific area or location. In this study RETs in South Africa, in accordance with the national renewable energy ...Read more
Author:Erasmus, Louwrence DDate:Aug 2013In this paper a framework is proposed to perform systems engineering research within South Africa. It is proposed that within the reference of the National Research Foundation (NRF) classification of research, systems engineering is a Field ...Read more
Author:Erasmus, Louwrence DDate:Aug 2013This presentation discusses a framework which is proposed to perform systems engineering research within South Africa and the necessity for hybrid research methods in systems engineering.Read more
Author:Van Zyl, Louwrens HDate:Jun 2011The flutter analysis of T-tail aircraft poses challenges that are unique to this configuration, including the fact that the unsteady air loads are dependent on the steady load distribution and static deformation of the aircraft. In particular, ...Read more
Author:Veerasamy, Namosha; Eloff, JPDate:Sep 2007Honeypots are decoy machines that are placed on the network to attract attackers, whilst also distracting them from more important targets. Honeypots are thus an ideal medium for collecting data that can later be studied to analyse attackers’ ...Read more
Author:Jacobs, PC; Solms, SH; Grobler, MMDate:May 2015Information and Communications Technology is often seen as a critical organisational asset. To prevent loss of revenue and money, as well as to protect organisational reputation, this asset must be protected from threats and vulnerabilities. ...Read more
Author:Masonta, Moshe T; Kliks, A; Mzyece, MDate:Sep 2013The global migration of television (TV) from analogue to digital broadcast will see a large amount of TV spectrum available (called TV white space - TVWS) for other services such as mobile and broadband wireless access (BWA). Leading spectrum ...Read more
Author:Sibolla, Bolelang H; Coetzee, S; Van Zyl, TLDate:Dec 2018Sensor networks generate substantial amounts of frequently updated, highly dynamic data that are transmitted as packets in a data stream. The high frequency and continuous unbound nature of data streams leads to challenges when deriving ...Read more