Author:Kebede, Mesfin A; Palaniyandy, Nithyadharseni; Koao, LF; Ezema, FI; Mhlongo, MRDate:Nov 2021Lithium-ion batteries (LIBs) are the most suitable and preferred energy storage system for powering electric vehicles (EVs), plug-in hybrid electric vehicles (PHEVs), and stationary applications owing to their attractive properties including ...Read more
Author:Anandjiwala, RDDate:Dec 2006Natural fibres and their products were prevalent since the early civilization of our society. Since then, the utilization and economic impact of natural fibre cultivation and down stream processing and products have been well established all ...Read more
Author:Nkosi, N; Muzenda, E; Zvimba, J; Pilusa, JDate:Apr 2013This paper, a continuation and expansion of the work of Muzenda et al, 2012 [1] looks at the current waste generation and management trends in South Africa. The waste tyre problem in South Africa is also briefly discussed. Solid waste management ...Read more
Author:Mvelase, P; Dlodlo, N; Williams, Q; Adigun, MDate:Jul 2011Small, Medium, and Micro enterprises (SMMEs) usually do not have adequate funds to acquire ICT infrastructure and often use cloud computing. In this paper, the authors discuss the implementation of virtual enterprises (VE) to enable SMMEs to ...Read more
Author:Mvelase, P; Dlodlo, N; Williams, Q; Adigun, MDate:Jul 2011Small, Medium, and Micro enterprises (SMMEs) usually do not have adequate funds to acquire ICT infrastructure and often use cloud computing. In this paper, the authors discuss the implementation of virtual enterprises (VE) to enable SMMEs to ...Read more
Author:Iyawa, GE; Herselman, Martha E; Coleman, ADate:2016Software methodologies provide guidelines for the development of software applications. Studies reveal that customer interaction in the software development process improves the chances that software applications will meet customers’ needs. ...Read more
Author:Notayi, M; Engelbrechts, JAA; Lee, ME; Goosen, WE; Hunter, Lawrance; Botha, Anton FDate:Dec 2013Mohair belongs to a class of animal fibers collectively called speciality fibers, due to the fact that these fibres are luxurious, rare and often expensive relative to sheep wool. South Africa produces more than 50% of the world total mohair ...Read more
Author:Greene, GJ; Fischer, BDate:Sep 2016Open source code contributions contain a large amount of technical skill information about developers, which can help to identify suitable candidates for a particular development job and therefore impact the success of a development team. We ...Read more
Author:Theron, Maritha; Van Rooyen, Corney; Ivanchev, LHDate:Oct 2007A 4kW CW Nd:YAG laser was used for lap welding of three different dissimilar sheet metal combinations, namely 316L S/S - Ti64, 316L S/S - Al 5251 and Al 1200 – Cu (99.85%). A welding matrix of laser power, travel speed and spot sizes was ...Read more
Author:Zohary, T; Pais-Madeira, AM; Robarts, RD; Hambright, KDDate:1995Phytoplankton species composition and abundance were recorded weekly or biweekly for nearly 7 years in a hypertrophic lake ( Hartbeespoort Dam, South Africa), together with a range of physical and chemical parameters. A total of 73 species ...Read more
Author:Naidoo, KovelinDate:Oct 2017This presentation gives a short history of cybercrimes, and also discusses the main global cybersecurity issues and trends.Read more
Author:Aschmann, M; Jansen van Vuuren, J; Leenen, LDate:Mar 2015Information in the Global Digital Industrial Economic Age is viewed as a strategic resource. This article focus on the establishment of cyber armies within the World Wide Web, commonly known as the Grid, with the emphases on an unseen military ...Read more
Author:Grobler, M; Flowerday, S; Von Solms, R; Venter, HDate:May 2011Cyber space, cyber awareness and cyber security play an important role in the online experience of individuals, and need to be addressed accordingly. The paper looks at some of the current cyber security awareness initiatives in South Africa, ...Read more
Author:Grobler, M; Jansen van Vuuren, J; Zaaiman, JDate:Mar 2012South Africa does not have a coordinated approach in dealing with cyber security, and the various structures that have been established to deal with cyber security issues are inadequate to deal with the issues holistically. It is further noted ...Read more
Author:Von Solms, R; Von Solms, SDate:Jul 2015Cyber safety has become critical in today's world. Young children specifically need to be educated to operate in a safe manner in cyberspace and to protect themselves in the process. Unfortunately, African and developing countries do not ...Read more
Author:Von Solms, R; Von Solms, SDate:2015Cyber safety has become critical in today's world. Young children specifically need to be educated to operate in a safe manner in cyberspace and to protect themselves in the process. Unfortunately, African and developing countries do not ...Read more
Author:Von Solms, R; Von Solms, SDate:Jul 2015Cyber safety has become critical in today's world. Young children specifically need to be educated to operate in a safe manner in cyberspace and to protect themselves in the process. Unfortunately, African and developing countries do not ...Read more
Author:Dlamini, Z; Modise, MDate:Mar 2012Technological advances have changed the manner in which ordinary citizens conduct their daily activities. Many of these activities are carried out over the Internet. These include filling tax returns, online banking, job searching and general ...Read more
Author:Phahlamohlaka, Letlibe J; Jansen van Vuuren, JC; Coetzee, AJDate:May 2011The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives, ...Read more
Author:Phahlamohlaka, Letlibe J; Jansen van Vuuren, JC; Coetzee, AJDate:May 2011The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed Cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives ...Read more