Author:Oosthuizen, MA; Pretorius, E; Oberholzer, HM; Van der Spuy, WJDate:Oct 2010Engineered nanoparticles are designed to perform specific functions and therefore have specific properties that could potentially be harmful. Nanoparticles such as titanium dioxide have the potential to become transparent and are therefore ...Read more
Author:Oosthuizen, MA; Pretorius, E; Oberholzer, HM; Van der Spuy, WJDate:Oct 2010Engineered nanoparticles are designed to perform specific functions and therefore have specific properties that could potentially be harmful. Nanoparticles such as titanium dioxide have the potential to become transparent and are therefore ...Read more
Author:Beyers, RDate:Aug 2006The Ulwazi concept is based on the digital inclusion of geographically separated classrooms being linked by broadband radio connections to enable virtual interactive and collaborative lessons using SMART technologies. What started out as a ...Read more
Author:Wallis, JDate:Oct 2012In this presentation the author describes the development of a low-cost, umbilical blood-flow monitoring device suitable for use by nurses in a primary health care setting, showing the impact that can be made for both patients and the health ...Read more
Author:Veerasamy, Namosha; Eloff, JHPDate:Aug 2011The aim of this paper is to clarify the concept of Network Warfare by looking at a typical example that illustrates both the exploitation and protection of information using various aspects of Information and Communication Technology (ICT). ...Read more
Author:Marais, Laurette; Van Zijl, LDate:Jul 2016We investigate self-verifying nondeterministic finite automata, in the case of unary symmetric difference nondeterministic finite automata (SV-XNFA). We show that there is a family of languages Ln=2 which can always be represented non-trivially ...Read more
Author:De Villiers, J Pieter; Jousselme, A-L; De Waal, A; Pavlink, G; Laskeyz, K; Blasch, E; Costa, PDate:Jul 2016In this paper, the principle taxonomy of the fusion process, the decision loop, is unified with uncertainty quantification and representation. A typical flow of information in the decision loop takes the form of raw information, uncertainty ...Read more
Author:Mutanga, Shingirirai S; Lunga, WDate:Jul 2021The increasing frequency of disasters induced by anthropogenic and natural hazards has epitomised the complex nature of dealing with uncertainty. Cyclone Idai-induced floods in Southern Africa had a series of foreseeable and unforeseeable ...Read more
Author:Mutanga, Shingirirai S; Lunga, W; Mutanga, Shingirirai SDate:Jul 2021The increasing frequency of disasters induced by anthropogenic and natural hazards has epitomised the complex nature of dealing with uncertainty. Cyclone Idai-induced floods in Southern Africa had a series of foreseeable and unforeseeable ...Read more
Author:Thiede, RN; Fabris-Rotelli, IN; Stein, A; Debba, Pravesh; Li, MDate:Nov 2019Informal unpaved roads in developing countries arise naturally through human movement without government authorities being informed. These roads are not authorized nor maintained by council, nor reliably mapped in quality-controlled online ...Read more
Author:De Villiers, Johan P; Laskey, K; Jousselme, A-L; Blasch, E; Pavlin, G; Costa, PDate:Jul 2015Mathematical and uncertainty modelling is an important component of data fusion (the fusion of unprocessed sensor data) and information fusion (the fusion of processed or interpreted data). If uncertainties in the modelling process are not ...Read more
Author:Scholes, RJDate:Sep 2002This paper describes a simple, quick, non data-intensive quantitative approach for sorting certain types of environmental issues into those that are unlikely to be problems; those likely to be problems; and those requiring further, more ...Read more
Author:Ramanantsoa, JD; Penven, P; Krug, Marjolaine J; Gula, J; Rouault, MDate:Feb 2018Cruise data sets, satellite remote sensing observations, and model data analyses are combined to highlight the existence of a coastal surface poleward flow in the southwest of Madagascar: the Southwest MAdagascar Coastal Current (SMACC). The ...Read more
Author:Sahraeian, R; van Compernolle, D; De Wet, FebeDate:Sep 2015Conventional acoustic modeling involves estimating many parameters to effectively model feature distributions. The sparseness of speech and text data, however, degrades the reliability of the estimation process and makes speech recognition a ...Read more
Author:Greben, JM; Meyer, R; Kimmie, ZaheedDate:Oct 2011The potential application of MRS technology in locating water bearing fractures in underground mines is studied. The determination of the presence of water ahead of mining is important to prevent accidents and to ensure higher efficiency in ...Read more
Author:Hlophe, K; Green, JDate:Jul 2011Platform pose (localization and orientation) information is a key requirement for autonomous mobile systems. The severe natural conditions and complex terrain of underground mines diminish the capability of most pose estimation systems, ...Read more
Author:Green, JJDate:Nov 2012The Council for Scientific and Industrial Research (CSIR) in South Africa is currently developing a robot for the inspection of the ceiling (hanging-wall) in an underground gold mine. The robot autonomously navigates the 30 meter long by 3 ...Read more
Author:James, S; Verrinder, RA; Sabatta, D; Shahdi, ADate:Oct 2012One of the major issues in the field of mobile robotics is localisation and navigation in an unknown environment. These tasks become even more challenging in an underground environment where no GPS signals or stationary landmark towers are ...Read more
Author:Joughin, WC; Human, JL; Terbrugge, PJDate:Apr 2002The nature of this project requires that various types of shotcrete be applied to a tunnel and that the performance thereof under extensive deformation be monitored over a period of time. In order to achieve this, one of the most critical ...Read more
Author:Mouton, Francois; Nottingham, Alastair T; Leenen, Louise; Venter, HSDate:Aug 2017Information security is a fast-growing discipline, and relies on continued improvement of security measures to protect sensitive information. In general, human operators are often highly susceptible to manipulation, and tend to be one of the ...Read more