Author:Dedekind, MODate:1994Turbine blades which are designed with airfoil cooling are subject to thermo-mechanical fatigue as well as creep damage. These problems arise due to thermal cycling and high operating temperatures in service. An implementation of fatigue and ...Read more
Author:Pienaar, Harrison H; Xu, Y; Braune, E; Cao, J; Dzikiti, Sebinasi; Jovanovic, NZDate:Aug 2021This review paper on groundwater protection measures in South Africa focuses on the actual implementation of groundwater protection measures, in particular, the resource-directed measures (RDM) as described in Chapter 3 of the National Water ...Read more
Author:Litvin, IADate:Feb 2012In this work the author proposes an implementation of a new intra-cavity beam shaping technique to vary the intensity distribution of the fundamental mode in a resonator cavity while maintaining a constant intensity distribution at the output. ...Read more
Author:Van Zyl, TL; Ehlers, EM; Marais, EDate:2010The paper reports on the original concept of introducing Resource-Negotiating (RN) agents into telemanufacturing. Human users submit a design file that they want manufactured. The machine that will be selected to manufacture the design file ...Read more
Author:Van der Merwe, JN; Wojno, L; Toper, AZDate:Feb 2001Several new mining, rock engineering and environmental control technologies aimed at improving safety have been developed in the past decade or so. Since several of these developments have either not been implemented properly or only implemented ...Read more
Author:Venter, CJ; Grobler, H; AlMalki, KADate:Dec 2011The Cell-Averaging Constant False-Alarm Rate (CA-CFAR) algorithm was implemented and optimized in software on the NVIDIA Tesla C1060 GPU architecture for application in pulsed-Doppler radar signal processors. A systematic approach was followed ...Read more
Author:Paige-Green, PDate:Mar 2004This document describes the implementation of the Gautrans LTPP protocol. Three LTPP sections at existing HVS test sites have been located and market out in accordance with the LTPP protocol developed for Gautrans. Much of the initial ...Read more
Author:Dlungwana, Wilkin S; Roux, E; Setswalo, L; Lazarus, SDate:Nov 2008South Africa is a technology colony. A technology colony is merely a stage of technological development of a country and should neither be something to be ashamed of, nor necessarily seen as a disaster. Remaining one should not be a fate to ...Read more
Author:Duvenhage, B; Delport, JP; De Villiers, JDate:Jun 2010Image registration forms the basis of many computer vision tasks. The Lucas-Kanade image registration algorithm is known to efficiently solve the sub-problem of rigid image registration. It is therefore often used in image stabilisation ...Read more
Author:Choudhary, SK; Konrad, T; Uys, HDate:Jan 2013Unsharp positive operator-valued measurements allow a variety of measurement applications which minimally disrupt the state of the quantum system. Experimental schemes are proposed for implementing unsharp measurements on the qubit levels of ...Read more
Author:Ilgner, Hartmut; Pienaar, SDate:Nov 2016Non-invasive monitoring of slurry pipelines with a new embedded system is described to complement existing remote sensing techniques via satellites. The behavior of the slurry inside the pipeline may cause sedimentation which may lead to ...Read more
Author:Arnold, Kathryn A; Le Roux, Alize; Makhanya, Sibusisiwe ADate:Sep 2018Climate-related natural disasters have been steadily increasing in both incidence and intensity across the globe over the last century. This is especially true for Ethiopia given the country’s high and recurrent exposure to extreme droughts ...Read more
Author:Le Roux, WHDate:Jun 2006As part of Modelling and Simulation-based Acquisition Decision Support to a Ground-Based Air Defence acquisition programme, dedicated simulations have been used to evaluate and develop tactical doctrine, define measures of performance and ...Read more
Author:Oosthuizen, Rudolph; Grobbelaar, SDate:Oct 2021This paper aims to inform the course curriculum development for a master's degree in Engineering Management. Implementing a bibliometric analysis with topic modelling performed on relevant publications in the field ...Read more
Author:Dudley, Angela L; Majola, N; Chetty, N; Forbes, ADate:Feb 2016The coherent superposition of a Gaussian beam with an optical vortex can be mathematically described to occupy the complex plane. The authors provide a simple analogy between the mathematics, in the form of the complex plane, and the visual ...Read more
Author:Van Dyk, FEDate:Aug 2005This paper presents the concerns for the safety of consumers, in relation to phytosanitary issues; residues of crop protection products and bio-terrorism. Traceability gives the ability to trace and follow a food, feed, food-producing animal ...Read more
Author:Velupillai, HM; Van Heerden, Renier P; Vorster, JDate:Sep 2007Wireless networks face innovative intrusion methods that have never been focused on wired networks. This paper describes a simple inexpensive way to implement a wireless intrusion detection system. The system takes advantage of the unique ...Read more
Author:Mwenge Kahinda, Jean-Marc; Meissner, Richard; Engelbrecht, FADate:Oct 2015A three-phase study was initiated as a way to promote Integrated Catchment Management approaches in the Limpopo River basin. This paper presents the situational assessment, which should enable De Beers to understand how their Venetia Mine ...Read more