GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Modelling and digital science

 

News

CSIR Research Space is constantly being developed and populated. Please report any errors to Siphethile Muswelanto Constructive criticism and suggestions would be welcome.

Collections in this community

Recent Submissions

  • Chan, Ke Fai Peter; De Souza, Pedro (2017-03)
    This research paper investigates a technique to transform network simulation data into linked data through the use of ontology models. By transforming the data, it allows one to use semantic reasoners to infer and reason ...
  • Saxe, AM; Earle, AC; Rosman, Benjamin S (Proceedings of Machine Learning Research, 2017-08)
    Hierarchical architectures are critical to the scalability of reinforcement learning methods. Most current hierarchical frameworks execute actions serially, with macro-actions comprising sequences of primitive actions. We ...
  • James, S; Konidaris, G; Rosman, Benjamin S (Association for the Advancement of Artificial Intelligence, 2017-02)
    Monte Carlo Tree Search (MCTS) is a family of directed search algorithms that has gained widespread attention in recent years. Despite the vast amount of research into MCTS, the effect of modifications on the algorithm, ...
  • Van der Merwe, H; Thachuk, O; Nel, S; Van der Merwe, B; Visser, W (ACM, 2015-11)
    Software applications are developed to be executed in a specific environment. This environment includes external/ native libraries to add functionality to the application and drivers to fire the application execution. For ...
  • Rossouw, M; Rautenbach, C; Page, P; Harribhai, J (Geo-Information Society of South Africa (GISSA), 2015-04)
    The present study addressed aspects of the highly interrelated study area of coastal safety and vulnerability, climate change and setback lines for South African coast. A medium resolution numerical wave analysis was ...
  • Van der Walt, Christiaan M; Barnard, E (Association for the Advancement of Artificial, 2017-02)
    Estimating the joint probability density function of a dataset is a central task in many machine learning applications. In this work we address the fundamental problem of kernel bandwidth estimation for variable kernel ...
  • Hwabamungu, B; Brown, I; Williams, Q (Association for Information Systems Special Interest Group for ICT in Global Development (SIG GlobDev), 2015-05)
    Information Systems (IS) strategizing research conducted mostly in the private sector setting indicates that there are many challenges to the implementation of Information Systems strategy and that there is need for further ...
  • Giwa, O; Davel, MH (IEEE, 2015-11)
    Text-based language identification (T-LID) of isolated words has been shown to be useful for various speech processing tasks, including pronunciation modelling and data categorisation. When the words to be categorised are ...
  • De Vries, M; Gerber, A; Van der Merwe, A (SpringerLink, 2015-06)
    Enterprise engineering (EE) is emerging as a new discipline to address the design of the enterprise in a holistic way. Although existing knowledge on enterprise design is dispersed and fragmented across different disciplines ...
  • Greene, GJ; Fischer, B (IEEE, 2015-09)
    Version control repositories contain a wealth of implicit information that can be used to answer many questions about a project’s development process. However, this information is not directly accessible in the version ...
  • Vorster, JS; Van Heerden, Renier P (Peregrine Technical Solutions, 2015-10)
    Depending on the graphical password schema, the key-space can be even bigger than alpha-numeric passwords. However, in conventional passwords, users will re-use letters within a password. This study investigates graphical ...
  • Featherstone, Coral; Van der Poel, E (2017-07)
    There are some aspects of visualisation that are uniquely human. This is because data visualisation is heavily influenced by the science of human visual perception, much of which emerged from the Gestalt School of Psychology. ...
  • Khutlang, Rethabile; Machaka, Pheeha; Singh, Ann; Nelwamondo, Fulufhelo V (Intech, 2017-08)
    Biometric fingerprint scanners scan the external skin's features onto a 2-D image. The performance of the automatic fingerprint identification system suffers first and foremost if the finger skin is wet, worn out or a fake ...
  • Asiru, OF; Dlamini, Moses T; Blackledge, M (2017-06)
    Computer viruses have become complex and operates in a stealth mode to avoid detection. New viruses are argued to be created each and every day. However, most of these supposedly ‘new’ viruses are not completely new. Most ...
  • Mvelase, PS; Dlamini, ZZ; Dludla, A; Sithole, HM (International Information Management Corporation (IIMC), 2015-11)
    The acceptance of cloud computing is increasing in a fast pace in distributed computing environment. The use of cloud environments for storage and data processing needs is on the rise. On the other hand, mobile devices ...
  • Mabuza-Hocquet, Gugulethu P; Nelwamondo, Fulufhelo V; Marwala, T (Springer, 2017-02)
    Research in iris biometrics has been focused on utilizing iris features as a means of identity verification and authentication. However, not enough research work has been done to explore iris textures to determine soft ...
  • Dabrowski, JJ; De Villiers, JP (Elsevier, 2015-11)
    A unified Bayesian model that simultaneously performs behavioural modelling, information fusion and classification is presented. The model is expressed in the form of a dynamic Bayesian network (DBN). Behavioural modelling ...
  • Swart, I; Irwin, B; Grobler, M (Academic Bookshop, UK, 2015-03)
    A proliferation of cyber security strategies have recently been published around the world with as many as thirty five strategies documented since 2009. These published strategies indicate the growing need to obtain a clear ...
  • Botes, FH; Leenen, Louise; De La Harpe, R (Academic Publishing, 2017-06)
    In the ashes of Moore’s Law, companies have to acclimatise to the vast increase of data flowing through their networks. Reports on information breaches and hackers claiming ransom for company data are rampant. We live in ...
  • Veerasamy, Namosha (2017-06)
    Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a ...

View more