Author:Marais, Laurette; Wilken, IlanaDate:Nov 2021Research attempting to describe and quantify the differences between spoken and written language has been done for languages such as English, but not for isiZulu. In this paper, we present a quantitative investigation into such differences ...Read more
Author:Loedolff, C.JDate:20 Jan 2011The use of oxidation pounds (or sewage lagoons) by small communities as a system of sewage purification has been provisionally accepted in Southern Africa for many reason, the most important being the low cost when compared with the conventional ...Read more
Author:Veerasamy, Namosha; Eloff, JHPDate:Jun 2010Individual users and organisations need to be warned about the latest face of warfare that is not only being played out in the military networks, but also on the Internet and cyberspace. Consequently, Network Warfare has various facets which ...Read more
Author:Veerasamy, NamoshaDate:Aug 2010Cyberterrorism represents the convergence of the virtual world of cyberspace and the intimidation techniques of terrorism. To better understand why cyber terrorist acts are committed, this paper investigates the motivation behind terrorism ...Read more
Author:Steyn, WJVDate:Nov 2004This paper focus on the general guidelines regarding maximum unevenness from bridge deck joints for typical South African heavy vehicles, in order to minimize the generation of moving variable loads. In a recent investigation it was found ...Read more
Author:Smith, SimoneDate:Jan 2021The chapter is centred around the core of Blue Economy and the disciplines that may support the Blue Economy activities as an attempt to indicate the direct and indirect impacts the Blue Economy activities and the disciplines that supports ...Read more
Author:Swart, I; Irwin, B; Grobler, MDate:Mar 2015A proliferation of cyber security strategies have recently been published around the world with as many as thirty five strategies documented since 2009. These published strategies indicate the growing need to obtain a clear view of a country’s ...Read more
Author:Claessens, R; De Waal, A; De Villiers, P; Penders, A; Pavlin, G; Tuyls, KDate:May 2015The proposed framework for Multi-Agent Target Tracking supports i) tracking of objects and ii) search and rescue based on the fusion of very heterogeneous data. The system is based on a novel approach to fusing sensory observations, intelligence ...Read more
Author:Brown, K; Bradshaw, KDate:May 2016The lack of multi-biometric fusion guidelines at the feature-level are addressed in this work. A feature-fusion framework is geared toward improving human identification accuracy for both single and multiple biometrics. The foundation of the ...Read more
Author:Van der Merwe, JR; Malan, J; Maasdorp, FDV; Du Plessis, WPDate:Sep 2014Multi-channel software-defined radios (SDRs) can be utilised as inexpensive prototyping platforms for transceiver arrays. The application for multi-channel prototyping is discussed and measured results of coherent channels for both receiver ...Read more
Author:Mfupe, Luzango P; Mekuria, Fisseha; Mzyece, MjumoDate:Mar 2017National regulatory authorities (NRAs) in developing countries need an accelerated means to formulate technical regulations for the telecommunications sector. This will enable countries to gain maximum benefits from the rapid advances in ...Read more
Author:Linde, LP; Vlok, JDDate:Sep 2007This paper presents bit-error-rate (BER) performance results of an upwards-expandable Multidimensional super-orthogonal modulation alternative to M-ary quadrature amplitude modulation wideband codedivision-multiple-access (M-QAM WCDMA), ...Read more
Author:Denneman, E; Marais, H; Sadzik, ESDate:Jul 2008The Marshall method is still the method of choice for the design of Hot-Mix Asphalt (HMA) in South Africa. During the validation of a HMA mix design, considerable variability was encountered in Marshall test results for the same mix supplied ...Read more
Author:Abu-Mahfouz, Adnan MI; Steyn, LP; Isaac, Sherrin J; Hancke, GPDate:Jun 2012Wireless sensor networks (WSNs) have been used in different types of applications and deployed within various environments. Simulation tools are essential for studying WSNs, especially for exploring large-scale networks. However, WSN testbeds ...Read more
Author:Govender, AvashnaDate:May 2022Voice conversion (VC) is an important technique for the development of text-to-speech voices in the use case of lacking speech resources. VC can convert an audio signal from a source speaker to a specific target speaker whilst maintaining the ...Read more
Author:Malherbe, Johan; Engelbrecht, F; Landman, W; Engelbrecht, CDate:Sep 2010An analysis was performed on the simulations of various Global Circulation Models regarding the change in favourability of broad circulation anomalies in the lower atmosphere for landfall and further westward penetration of tropical systems ...Read more
Author:Landman, WA; Beraki, Asmerom FDate:Feb 2012Southern African December-January-February (DJF) probabilistic rainfall forecast skill is assessed over a 22-year retroactive test period (1980/1981 to 2001/2002) by considering multi-model ensembles consisting of downscaled forecasts from ...Read more