Author:Johannes, PT; Bahia, HU; Mturi, George AJDate:Aug 2015The use of bitumen emulsions in surface treatments has become prevalent due to advancements in emulsifier development, formulation techniques, and design of surface treatments. However, current practice for testing and selecting emulsion ...Read more
Author:Keet, CM; Suarez-Figueroa, MC; Poveda-Villalon, MDate:Sep 2013A growing number of ontologies are already available thanks to development initiatives in many different fields. In such ontology developments, developers must tackle a wide range of difficulties and handicaps, which can result in the appearance ...Read more
Author:Rangasamy, T; Leach, AR; Van Vuuren, JJ; Cook, AP; Brummer, RDate:Aug 2001The primary output of the project was the design of an easy to use guidebook that will enable the end user to simply and quickly estimate the optimum hydraulic barrier pillar width using water management criteria applicable to the mines.Read more
Author:Ren, Jianwei; Musyoka, Nicholas M; Langmi, Henrietta W; Mathe, Mahlanyane K; Liao, SDate:Jan 2016Effective hydrogen storage solutions have been pursued for decades, and materials-based hydrogen storage is a research frontier of much current interest. Yet, no researched materials to date have come close to the DOE 2020 targets for hydrogen ...Read more
Author:Zazaza, Lelethu; Venter, Hein S; Sibiya, Mhlupheki GDate:Aug 2018Consent management is a significant function in electronic health information systems as it allows patients to manage the privacy preferences regarding their health information. Placing patients in control of the privacy of their health ...Read more
Author:Jonker Klunne, WDate:May 2012The article will investigate the different barriers in southern Africa toward (rural) electrification and the application of renewable energy technologies in general and to those hampering the uptake of small hydropower in particular. The ...Read more
Author:Jonker Klunne, WDate:Jan 2015Large potential exists for small and micro hydropower in the southern African region, both for grid as well as off-grid applications. Within the region a good understanding exists on the potential for large scale hydro and a substantial number ...Read more
Author:Kebede, Mesfin A; Palaniyandy, Nithyadharseni; Koao, LF; Ezema, FI; Mhlongo, MRDate:Nov 2021Lithium-ion batteries (LIBs) are the most suitable and preferred energy storage system for powering electric vehicles (EVs), plug-in hybrid electric vehicles (PHEVs), and stationary applications owing to their attractive properties including ...Read more
Author:Anandjiwala, RDDate:Dec 2006Natural fibres and their products were prevalent since the early civilization of our society. Since then, the utilization and economic impact of natural fibre cultivation and down stream processing and products have been well established all ...Read more
Author:Nkosi, N; Muzenda, E; Zvimba, J; Pilusa, JDate:Apr 2013This paper, a continuation and expansion of the work of Muzenda et al, 2012 [1] looks at the current waste generation and management trends in South Africa. The waste tyre problem in South Africa is also briefly discussed. Solid waste management ...Read more
Author:Mvelase, P; Dlodlo, N; Williams, Q; Adigun, MDate:Jul 2011Small, Medium, and Micro enterprises (SMMEs) usually do not have adequate funds to acquire ICT infrastructure and often use cloud computing. In this paper, the authors discuss the implementation of virtual enterprises (VE) to enable SMMEs to ...Read more
Author:Mvelase, P; Dlodlo, N; Williams, Q; Adigun, MDate:Jul 2011Small, Medium, and Micro enterprises (SMMEs) usually do not have adequate funds to acquire ICT infrastructure and often use cloud computing. In this paper, the authors discuss the implementation of virtual enterprises (VE) to enable SMMEs to ...Read more
Author:Iyawa, GE; Herselman, Martha E; Coleman, ADate:2016Software methodologies provide guidelines for the development of software applications. Studies reveal that customer interaction in the software development process improves the chances that software applications will meet customers’ needs. ...Read more
Author:Notayi, M; Engelbrechts, JAA; Lee, ME; Goosen, WE; Hunter, Lawrance; Botha, Anton FDate:Dec 2013Mohair belongs to a class of animal fibers collectively called speciality fibers, due to the fact that these fibres are luxurious, rare and often expensive relative to sheep wool. South Africa produces more than 50% of the world total mohair ...Read more
Author:Greene, GJ; Fischer, BDate:Sep 2016Open source code contributions contain a large amount of technical skill information about developers, which can help to identify suitable candidates for a particular development job and therefore impact the success of a development team. We ...Read more
Author:Theron, Maritha; Van Rooyen, Corney; Ivanchev, LHDate:Oct 2007A 4kW CW Nd:YAG laser was used for lap welding of three different dissimilar sheet metal combinations, namely 316L S/S - Ti64, 316L S/S - Al 5251 and Al 1200 – Cu (99.85%). A welding matrix of laser power, travel speed and spot sizes was ...Read more
Author:Zohary, T; Pais-Madeira, AM; Robarts, RD; Hambright, KDDate:1995Phytoplankton species composition and abundance were recorded weekly or biweekly for nearly 7 years in a hypertrophic lake ( Hartbeespoort Dam, South Africa), together with a range of physical and chemical parameters. A total of 73 species ...Read more
Author:Naidoo, KovelinDate:Oct 2017This presentation gives a short history of cybercrimes, and also discusses the main global cybersecurity issues and trends.Read more
Author:Aschmann, M; Jansen van Vuuren, J; Leenen, LDate:Mar 2015Information in the Global Digital Industrial Economic Age is viewed as a strategic resource. This article focus on the establishment of cyber armies within the World Wide Web, commonly known as the Grid, with the emphases on an unseen military ...Read more
Author:Grobler, M; Flowerday, S; Von Solms, R; Venter, HDate:May 2011Cyber space, cyber awareness and cyber security play an important role in the online experience of individuals, and need to be addressed accordingly. The paper looks at some of the current cyber security awareness initiatives in South Africa, ...Read more