Author:Dlodlo, N; Hunter, Lawrance; Botha, Anton F; Metelerkamp, RGMDate:Sep 2009This article describes the concept and development of a knowledge-based advisory system for the optimum utilisation of South African wool for the benefit of present and potential investors and other interested partiesRead more
Author:Webb, L; Mathekga, Mmamolatelo EDate:Dec 2014Biometrics, particularly fingerprints, are becoming widely used in the information security field due to the fact that they cannot be lost or stolen as easily as a password or Personal Identification Number (PIN). A challenge with the use of ...Read more
Author:Schietekat, Sunelle; De Waal, Alta; Gopaul, Kevin GDate:Sep 2016This paper provides a methodology for Validation and Verification (V&V) of a Bayesian Network (BN) model for aircraft vulnerability against Infrared (IR) missile threats. The model considers that the aircraft vulnerability depends both on a ...Read more