Author:Landman, KDate:Nov 2006In the past five years the numbers of enclosed neighbourhoods have significantly increased in South Africa. These are existing neighbourhoods that are closed off through gates and booms across the roads. Many of these neighbourhoods are fenced ...Read more
Author:Botha, J; Eloff, MM; Swart, IDate:Mar 2016Data breaches remain a common occurrence affecting both companies and individuals alike, despite promulgated data protection legislation worldwide. It is unlikely that factors causing data breaches such as incorrect device configuration or ...Read more
Author:Benade, R; Berman, R; Kienhöfer, F; Nordengen, Paul ADate:Nov 2016In this work a pro-forma approach is developed for assessing truck and centre-axle tag-trailer or 50/50 car-carrier designs in terms of their compliance with the South African Performance-Based Standards (PBS) pilot project requirements. ...Read more
Author:Benade R, Berman R; Kienhofer F,Date:Jul 2015The Australian performance-based standards (PBS) scheme is being evaluated in South Africa as an alternative means of regulating heavy vehicles, allowing for a relaxation of length and mass limits. This has proven to provide economic benefits ...Read more
Author:Grobler, MMDate:May 2010The best Information Security infrastructure cannot guarantee that intrusions or other malicious acts will not happen. It is necessary to know the facts and prepare beforehand knowing cyber threats and trends; knowing the broadband impact on ...Read more
Author:Govender, Natasha; Warrell, J; Keaikitse, M; Torr, P; Nicolls, FDate:2015Bayesian methods have proved effective in many active sensing scenarios, including object recognition from a mobile platform, tracking and medical diagnostics. Despite its importance though, models for active object recognition have concentrated ...Read more
Author:Govender, Natasha; Warrell, J; Torr, P; Nicolls, FDate:Aug 2014Shape recognition is essential for robots to perform tasks in both human and industrial environments. Many algorithms have been developed for shape recognition with varying results. However, few of the proposed methods actively look for ...Read more
Author:Govender, Natasha; Warrell, J; Torr, P; Nicolls, FDate:Sep 2013For mobile robots to perform certain tasks in human environments, fast and accurate object verification and recognition is essential. Bayesian approaches to active object recognition have proved effective in a number of cases, allowing ...Read more
Author:Clarke, Anria; Sabatta, DDate:Sep 2018Vehicle preview models have gained increasing popularity in recent years as a means of predicting potentially hazardous vehicle control inputs and attempting to mitigate their effects. These models are even more important in the field of ...Read more
Author:Moes, HDate:May 2008The paper reviews the various levels of probability of bottom touching and risk criteria which are being used. This leads to a relationship between the statistically expected number of vertical ship motions in the channel during a single ...Read more
Author:Berndt, Robert J; Nel, Willem AJ; Abdul Gaffar, MY; O’Hagan, DDate:Dec 2021Helicopter main rotor blade flashes in radar measurements are an oft-used feature for target classification. While focus is often placed on being able to detect them, little attention has been given to what is required to ensure that they are ...Read more
Author:Passmoor, S; Cress, C; Faltenbacher, A; Johnston, R; Smith, M; Ratsimbazafy, A; Hoyle, BDate:Nov 2012The relationship between the clustering of dark matter and that of luminous matter is often described using the bias parameter. Here, we provide a new method to probe the bias of intermediate-to-high-redshift radio continuum sources for which ...Read more
Author:Adekunle, AS; Pillay, J; Ozoemena, KIDate:May 2010The electrochemical decoration of edge plane pyrolytic graphite electrode (EPPGE) with cobalt and cobalt oxide nanoparticles integrated with and without single-walled carbon nanotubes (SWCNTs) is described. Successful modification of the ...Read more
Author:Melchior, SA; Palaniyandy, Nithyadharseni; Sigalas, I; Iyuke, SE; Ozoemena, KIDate:Feb 2019The performance of MXenes (Ti2CTx) combined with electrolytic manganese dioxide (EMD) in three different weight ratios (i.e. MXene:EMD = 20:80; 50:50; 80:20) were examined as anode material for Lithium-ion batteries (LIBs). A study of the ...Read more
Author:Moolman, FS; Cloete, TE; Thantsha, MSDate:Nov 2005Prebiotics is a non-digestible food ingredient that beneficially affects the host by selectively stimulating the growth and/or activity of one or a limited number of bacteria in the colon (Roberfroid, 1998; Theuer et al., 1998; Young, 1998; ...Read more
Author:Adeyeye, MO; Musa, AG; Botha, AdèleDate:2014The browser war is far from over, and the HTML5 <video> tag has not improved video access despite its promises to work without specifying a plug-in. This chapter discusses m-learning with respect to video. It outlines the m-learning paradigm ...Read more
Author:Glisson, FJ; Kullmann, DDate:Aug 1998This report deals with the factors affecting the effective use of rapid yielding hydraulic props (RYHP’s) in the South African gold mines. Wherever possible, such factors have been quantified in an attempt to provide guidelines for obtaining ...Read more
Author:Botha, PB; Semmelink, CJ; Raubenheimer, JDate:Oct 2005Stabilized layers are used extensively in South-Africa in the construction of roads. The layers are usually stabilized with hydrated road lime, cement, slag, fly-ash, bitumen emulsion, foamed asphalt or a combination of several of these agents. ...Read more
Author:Sililo, OTN; Conrad, JE; Dohse, TE; Tredoux, G; Du Plessis, MHDate:15 Jan 2001A procedure is presented for deriving qualitative contaminant attenuation maps from available soils information. Unfortunately, in South Africa, no soil map with national coverage exists at a scale larger than 1:2 500 000. However, 1:250 000 ...Read more
Author:Sibiya, G; Venter, HS; Fogwill, TDate:Sep 2012Cloud computing is a novel computing paradigm that presents new research opportunities in the field of digital forensics. Cloud computing is based on the following principles: on-demand self-service, broad network access, resource pooling, ...Read more