Author:Chichowicz, ADate:Jan 1997The project was initiated to create techniques for processing falls of ground (FOG) data. Those techniques were tested with data from east rand proprietary mines (ERPM). The first part of this report concerns seismic events that caused falls ...Read more
Author:Van 't Wout, Magdalena CDate:Mar 2019The current year, 2017, has already seen an excessive amount of cyber security disasters, apart from the continuation of standard corporate breaches. In the first half of the year, there had already been full-on campaign hacking, leaks of spy ...Read more
Author:Adams, DJDate:May 1995Literature and industry surveys were invaluable in establishing the presently used methods and experienced in designing bracket pillars. Example of successful and unsuccessful brakect pillars adjacent to dykes and faults were collected for ...Read more
Author:Hecker, GFKDate:Jan 2004The initial project objective was to correlate the level of internal broken wire indications, obtained using a magnetic rope test instrument, with rope strength loss and then to propose a given indication level at which non-spin ropes are to ...Read more
Author:York, G; Canbulat, I; Kabeya, KK; Le Bron, K; Watson, BP; Williams, SBDate:Dec 1998The design of hard rock pillars, in shallow to intermediate depth hard rock mines, has been redefined as the determination of the pillar system load bearing capacity. This entails the ability to design each of the components of the pillar ...Read more
Author:Haile, AT; Jager, AJDate:Dec 1995The overall view of the research being conducted at Impala platinum was to improve pillar design techniques through a rock testing programme, underground instrumentation and back analysis. The laboratory rock testing programme has provided a ...Read more
Author:Oberholzer, JWDate:Jul 1998This report describes the process followed in establishing training aids to make employees aware of the dangers of frictional hazards. The actual outputs of the project are training aids that will be used by trainers to transfer the knowledge. ...Read more
Author:Van der Merwe, JNDate:Jul 2001The original intention of this project was to sponsor a number of non-researchers to
attend the workshop. In this particular case, that would have been of little benefit as
no definite knowledge in a practically usable form was released. ...Read more
Author:Ottermann, RW; Von Wielligh, AJ; Burger, NDL; Kononov, VADate:Oct 2000The purpose of this project was to develop tele-controls to control drilling operations from a distance. The controls were fitted to the prototype quiet rock drill and demonstrated to be working. Noise is a generic hazard common to all ...Read more
Author:De Wet, Febe; De Waal, A; Van Huyssteen, GBDate:Aug 2011Afrikaans is one of the eleven official languages of South Africa. It is classified as an under-resourced language. No annotated broadband speech corpora currently exist for Afrikaans. This article reports on the development of speech resources ...Read more
Author:Labuschagne, William A; Grobler, Marthie MDate:Jun 2017With the increase in technology adoption, quality assurance in terms of the technical skill level of cybersecurity experts working on a task is crucial. Educating employees and ensuring that they have the necessary tools and skills required ...Read more
Author:Salerno, S; Ouma, S; Botha, AdèleDate:Sep 2015Gamification and digital badging are new concepts to the educational environment, where on completion of specific tasks, an individual can earn a badge or badges showing their achievement. Currently Mozilla Open Badges is the standard for the ...Read more
Author:Raborife, M; Zerbian, S; Ewert, SDate:Nov 2011The authors report on a study that involved the development of a corpus used to verify the performance of two tone labelling algorithms, with one algorithm being an improvement on the other. These algorithms were developed for speech synthesis ...Read more
Author:Mutemba, M; Mtsweni, Jabu S; Mkhonto, NNDate:Mar 2017Cyber attacks are on the increase in severity, complexity and frequency, negatively affecting the citizens, government, and businesses. Adversely, the security and Defence role-players in developing countries, such as South Africa, are short ...Read more
Author:Leenen, L; Alberts, R; Britz, K; Gerber, A; Meyer, TDate:Mar 2011In this paper we describe a research project to develop an optimal information retrieval system in an Information Operations domain. Information Operations is the application and management of information to gain an advantage over an opponent ...Read more
Author:Hohls, DR; Verryn, SVDate:Nov 2008CSIR research group has developed a web-based information system on tree breeding, which will link national and international partners, which data dating back more than 80 years. Tree breeding relies heavily on managing and exploiting data. ...Read more