Author:Schmitz, P; Cooper, Antony KDate:Dec 2000This paper describes a method that uses a desktop geographical information system (GIS) to plot cellular telephone conversations made when crimes are committed, such as hijackings, hostage taking, kidnapping, rape and murder. The maps produced ...Read more
Author:Schmitz, P; Cooper, Antony K; De Jong, T; Rossmo, DKDate:Jul 2015This article discusses how the use of cellular networks by a criminal offender produces spatio-temporal data that reveals his/her activities and activity space. The methods aim to establish possible paths that the criminal will use to move ...Read more
Author:Napier, Mark; Crankshaw, Beth PDate:Oct 2018Relevant, empirical research creates the foundation for better informed decisions. Poor research that employs inappropriate methods or is without a broader theoretical foundation can lead to poor decision making and the misallocation of ...Read more
Author:Gregory, MA; McClurg, TP; Brouckaert, CJDate:Jan 2003Marine pollution monitoring surveys often include the measurement of heavy metals and other trace elements in sediments from multiple stations around marine outfalls. EDX may offer a supplementary, relatively cheap and rapid screening method ...Read more
Author:Rouault, Marjolaine J; Mouche, A; Collard, F; Johannessen, JA; Chapron, BDate:Oct 2010Over 2 years of surface current information collected in the Agulhas Current region and derived from the Doppler centroid anomalies of Envisat’s advanced synthetic aperture radar (ASAR) are examined. The sources of errors and potential use ...Read more
Author:Van de Merwe, J; Mouton, FrancoisDate:Nov 2017Social engineering attacks present a material threat to the security of information systems. To date security professionals only manage the potential effects of a social engineering attack. Security professionals consider such attacks as ...Read more
Author:Khuluse, SDate:Nov 2013An objective in mapping air quality attributes such as concentrations of airborne particles (particulate matter – PM) is to determine those areas which can be considered as hotspots and determine factors that contribute to their formation. ...Read more
Author:Mantlana, Khanyisa B; Maoela, Malebajoa ADate:Dec 2019The set of 17 Sustainable Development Goals (SDGs) and 169 targets aims to move the world to a sustainable trajectory of economic development, environmental sustainability, and social inclusion. This paper presents a review of relevant reports ...Read more
Author:Van Heerden, Renier P; Pieterse, Heloise; Irwin, BDate:Sep 2012This paper presents 8 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented ...Read more
Author:Khuluse, S; Dowdeswell, M; Debba, Pravesh; Stein, ADate:Nov 2010Flooding is often associated with heavy rainfall. Hence quantifying the probability associated with heavy rainfall events is useful in hydrology for design flood estimation and mapping Rainfall varies over time and space, therefore it is ...Read more
Author:Malahlela, OE; Cho, Moses A; Mutanga, ODate:Jul 2015Globally, subtropical forests are rich in biodiversity. However, the native biodiversity in these forests is threatened by the presence of invasive species such as Chromolaena odorata (L.) King and Robinson, which thrives in forest canopy ...Read more
Author:Meyer, I; Braby, L; Krug, Marjolaine J; Backeberg, Bjorn-ChristophDate:Apr 2017The potential for energy extraction from the fast-flowing Agulhas Current along South Africa’s East Coast is examined. Potentially suitable regions are evaluated using state-of-the-art satellite remote-sensing, predictive modelling, and in ...Read more
Author:Meyer, I; Braby, L; Krug, Marjolaine J; Backeberg, Bjorn-ChristophDate:Apr 2017The potential for energy extraction from the fast-flowing Agulhas Current along South Africa’s East Coast is examined. Potentially suitable regions are evaluated using state-of-the-art satellite remote-sensing, predictive modelling, and in ...Read more
Author:Rouget, M; Richardson, DM; Nel, JL; Le Maitre, David C; Egoh, Benis N; Mgidi, TDate:Sep 2004Most national or regional initiatives aimed at managing biological invasions lack objective protocols for prioritizing invasive species and areas based on likely future dimensions of spread. South Africa has one of the most ambitious national ...Read more
Author:Schutte, ICDate:Jul 2005The Maputo Development Corridor (MDC) project was initiated with a number of specific objectives. These objectives consisted of a mixture of “enabling factors” (e.g. investment in transport infrastructure and institutional arrangements with ...Read more
Author:Letsie, M; Allopi, DDate:Jul 2008The storage of water in the Maqalika reservoir is gradually decreasing as sediment, carried by the natural catchment run-off, accumulates in the reservoir. Moreover, water pumped into the reservoir from the Caledon River (which is heavily ...Read more
Author:De Lange, Willem J; Mahumani, BKDate:Dec 2012The advent of grid electrification in the Sandveld region of South Africa in the 1980s increased the utilisation of groundwater resources for commercial irrigation purposes. In the wake of the consequent increased pressure on the resource, ...Read more
Author:Smith, Marie E; Mbugua, JDate:Oct 2022The Marine and Coastal Operations for southern Africa and the Indian Ocean: Western Indian Ocean Coral Bleaching Monitoring ServiceRead more