Author:Naidoo, Kavendra; Skews, BWDate:Jul 2007This paper reports the development of an experimental facility for the investigation of dynamic, two-dimensional shock reflection phenomena generated by a rapidly pitching wedge in proximity of an ideal wall. CFD simulations of the rapidly ...Read more
Author:Karunarathna, B; Jayakody, RS; Karunanayake, L; Govender, Krishna KDate:Jan 2021Segmented polyurethanes show extraordinary physicochemical properties, mainly owing to the nature and the chemistry of the hard segment domains. There are yet many inexplicable physiochemical properties of MDI-BDO–based hard polyurethane ...Read more
Author:Fatoba, OS; Farotade, GA; Popoola, API; Pityana, Sisa LDate:Apr 2016Laser alloying is a material processing method which utilizes the high power density available from defocused laser beam to melt both metal coatings and a part of the underlying substrate. Since melting occur solitary at the surface, large ...Read more
Author:Mafusire, C; Forbes, A; Snedden, Glen CDate:Aug 2010When a metal horizontal pipe is heated and spun along its axis, a graded refractive index distribution is generated which is can be used as a lens, thus its name, the spinning pipe gas lens (SPGL). Previous experimental results of its performance ...Read more
Author:Patanaik, A; Anandjiwala, RDate:Jul 2011This chapter deals with the application of computational fluid dynamics (CFD) modeling in reducing yarn hairiness during the ring spinning process and thereby “engineering” yarn with desired properties. Hairiness significantly affects the ...Read more
Author:Makatsa, TJ; Baloyi, Siwela J; Masuku, CMDate:Jul 2021Catalytic wet-air oxidation is an attractive solution to treating refractory wastewater. The process has been demonstrated at laboratory scale over a low-cost pillared clay catalyst in a trickle-bed reactor. However, complex interaction of ...Read more
Author:Sitek, MA; Cwik, M; Gizejowski, MA; Goliger, Adam MDate:Sep 2013Wind flow influence on a high-rise building is analyzed. The research covers full-scale tests, wind-tunnel experiments and numerical simulations. In the present paper computational model used in simulations is described and the results, which ...Read more
Author:Marondedze, EF; Govender, Krishna; Govender, PPDate:Jan 2020Timely and accurate diagnosis of Alzheimer's disease (AD) remains a major challenge in the medical arena. β-amyloid (Aβ) imaging techniques such as positron emission tomography and single photon emission computed tomography require the use ...Read more
Author:Ngoepe, PE; Catlow, CRADate:Sep 2005The authors review computational modelling studies in materials resulting from the National Research Foundation-Royal Society collaboration. Initially, investigations were confined to transport and defect properties in fluorine and oxygen ion ...Read more
Author:Vermeulen, E; Grobbelaar, SS; Botha, Adèle; Nolte, KDate:Oct 2021Running-related injuries, specifically overuse injuries, are complex and multifaceted. A different way of thinking is required to fully comprehend why, and how, these injuries occur. The systems thinking perspective offers tools and techniques ...Read more
Author:Anandjiwala, RD; Gonsalves, JWDate:Feb 2006The fabric buckling model proposed by Grosberg and Swani has been modified by incorporating Huang’s bilinear bending rule. The proposed model is an extension of the present model and also covers the special cases. The numerical results appear ...Read more
Author:Modiba, Rosinah M; Chauke, HR; Ngoepe, PEDate:Sep 2017The ab initio density functional theory approach was employed to study the effect of Ni, Ir or Pd addition to the TiPt shape memory alloy. The supercell approach in VASP was used to substitute Pt with 6.25, 18.75, 25.00, 31.25 and 43.75 at.% ...Read more
Author:Modiba, Rosinah M; Chauke, HR; Ngoepe, PEDate:Sep 2017The ab initio density functional theory approach was employed to study the effect of Ni, Ir or Pd addition to the TiPt shape memory alloy. The supercell approach in VASP was used to substitute Pt with 6.25, 18.75, 25.00, 31.25 and 43.75 at.% ...Read more
Author:Govender, Natasha; Kuun, C; Zimu, V; Barnard, E; Davel, MDate:Apr 2006Two related issues were investigated in the computational modeling of Nguni prosody, based on annotated databases of isiZulu and isiXhosa speech. Firstly, authors show that a simple template can be used to describe the tonal characteristics ...Read more
Author:Wahab, OO; Olasunkanmi, LO; Govender, Krishna K; Govender, PPDate:Feb 2022The mechanisms of hydroxyl radical (·OH) degradation of disperse red 73 (DR73) dye were investigated using density functional theory (DFT) calculations. Comparative feasibility of ·OH attack at the azo (N=N) site or on a > C–N group was ...Read more
Author:Oxtoby, Oliver F; Malan, AG; Heyns, Johan ADate:Oct 2015We describe a semi-implicit volume-of-fluid free-surface-modelling methodology for flow problems involving violent free-surface motion. For efficient computation, a hybrid-unstructured edge-based vertex-centred finite volume discretisation ...Read more
Author:Viljoen, A; Visser, AG; Groenwold, ADate:May 2005The computationally efficient analysis and optimum design of the buckling of stiffened, thin-walled shear panels in aircraft structures is discussed. Namely, the postbuckling behaviour of these panels is assessed using the iterative procedure ...Read more
Author:Beyers, RN; Koorbanally, Nicoli ADate:Jul 2010South Africa, and similar economies, cannot afford to lose another generation in the current schooling system, by failing to adequately equip youth to take advantage of life in a modern knowledge economy. This paper adopts a more philosophical ...Read more
Author:Malan, DF; Napier, JALDate:15 Aug 1995Microscopic observations indicate that intra- and transgranular fracturing are ubiquitous processes in the damage of rock fabrics. Extensive modelling of intergranular fracturing has been carried out previously using the distinct-element ...Read more
Author:Van Heerden, Renier P; Irwin, B; Burke, Ivan D; Leenen, LDate:2012Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of automated classification ...Read more