Author:Anochie-Boateng, JosephDate:Sep 2011The author of this article is conducting research in South Africa which addresses the difficulties in pavement design in developing methods and procedures for accurate quantification of aggregate shape and surface properties, which are well ...Read more
Author:Grobler, MM; Von Solms, SHDate:Jul 2009The development of the Live Forensic discipline instigates the development of a method that allows forensically sound acquisition to stand fast in a court of law. The study presents the development of a comprehensive model for forensically ...Read more
Author:Kekwick, SVDate:Jul 2005Although accelerated laboratory curing of bitumen-emulsion and foamed bitumen treated materials is undertaken widely, there is not an accepted standard procedure. A major contributing factor to this situation is undoubtedly the complex ...Read more
Author:Pretorius, Morne; Ngejane, Hombakazi CDate:Dec 2019The South African Government’s National Cybersecurity Policy Framework (NCPF) of 2012 provides for the establishment of a national computer security incident response team (CSIRT) in the form of the National Cybersecurity Hub— more correctly ...Read more
Author:Barnard, HC; Venter, KarienDate:Jul 2023Vulnerable road user fatalities continue to make up the bulk of road traffic related deaths in South Africa. Safe System-based measures aim to improve the safety of the road environment for all road users including vulnerable road users. Safe ...Read more
Author:Lessing, MMDate:Sep 2008A Security Maturity Model (SMM) provides an organisation with a distinct Information Security framework. Organisations that conform to these models are likely to pursue satisfactory Information Security. Additionally, the use of Security ...Read more
Author:Kunene, Dumisani C; Vadapalli, HDate:Sep 2017Human detection on static images remains a challenging research problem. This work evaluates the significance of using infrared imaging (IIR) over several human detection systems. Larger complexities arise when detecting people in colour ...Read more
Author:Lessing, MDate:Nov 2008This is a conference presentation looking at the differences between dead and live forensics, and also at the advantages and disadvantages of the two. Also a discussion of how to achieve forensic soundnessRead more
Author:Gitau, S; Diga, K; Bidwell, NJ; Marsden, GDate:2010Non-governmental organizations (NGOs), especially those based at the community level, have been identified as pivotal tools in the field of social economic development. They are known to have structured frameworks through which they dispense ...Read more
Author:Bischof-Niemz, Tobias; Van den Berg, JDate:Nov 2016Solar PV and wind are the two cheapest new-build options in South Africa per energy unit today. Significant technology cost reductions in recent years combined with world class solar and wind (>35% load factor achievable in almost 70% of South ...Read more
Author:Nahman, Anton; Mahumani, BK; De Lange, Willem JDate:Feb 2016Worldwide, there is increasing recognition of the need for countries to pursue a "green economy". Given the broad (economic, social and environmental) objectives of a green economy, and the limitations associated with mainstream measures of ...Read more
Author:Van Zyl, TDate:Oct 2012The paper presents the problems associated with current geographic information system (GIS) and the need for their integration with other specialised tooling such as statistics in R or matrix algebra of Octave. The authors take the stance ...Read more
Author:Moganedi, Mapoung S; Mtsweni, Jabu SDate:Jun 2017The significant growth of the Internet of Things (IoT) is revolutionizing the way people live by transforming everyday Internet-enabled objects into an interconnected ecosystem of digital and personal information accessible anytime and anywhere. ...Read more
Author:Mitchell, P; Plug, I; Bailey, G; Charles, R; Esterhuysen, A; Thorp, JL; Parker, A; Woodborne, SDate:Mar 2011The activities of hunter-gatherers are often captured in rockshelters, but here the authors present a study of a riverside settlement outside one, with a rich sequence from 1300 BC to AD 800. Thanks to frequent flooding, periods of occupation ...Read more
Author:Van Rensburg, J; Du Buisson, U; Cronje, B; Marais, Mario A; Haruperi, EDate:Jun 2014This paper describes essential, real-world activities and processes needed to develop and deploy people-centred networks enabled with innovative technologies that in turn produce “essential knowledge economy functions in service of systemic ...Read more
Author:Emeruem, C; Keet, CM; Dawood, Zubeida C; Wang, SDate:Aug 2022Foundational ontologies are known to have a steep learning curve, which hampers casual use by domain ontology developers to use them for domain ontology development. Foundational ontology developers have not provided methods or tools to lower ...Read more
Author:Cronje, JDate:Nov 2011A fast local image feature detector and descriptor that is implementable on the GPU is proposed. This method is the first GPU implementation of the popular FAST detector. A simple but novel method of feature orientation estimation which can ...Read more
Author:Malherbe, Johan; Landman, WA; Engelbrecht, FADate:Jun 2014The association between bi-decadal rainfall variability over southern Africa and the rainfall contributed by tropical cyclonic systems from the Southwest Indian Ocean (SWIO) provides a potential means towards understanding decadal-scale ...Read more
Author:Dlamini, I; Olivier, M; Sibiya, SDate:Aug 2009Network forensics involves capturing, recording and analysing network activity in discovering the source of security policy violations or information assurance. The network forensic system that is described in this paper is called the ...Read more