GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Defence, peace, safety & security

 

News

CSIR Research Space is constantly being developed and populated. If you find any errors or have any questions re this collection, please contact Adele van der Merwe.

Collections in this community

Recent Submissions

  • Aschmann, MJ; Leenen, Louise; Jansen van Vuuren, Johanna C (Academic Conferences and Publishing Limited, 2017-03)
    The Internet offers anonymity and a disregard of national boundaries. Most countries are deeply concerned about the threat cyberspace and in particular, cyberterrorism, are posing to national security. The Deep and Dark ...
  • Olivier, Marius (2016-09)
    It is well known that reacting explosives emit light of varying intensity across the light spectrum. Measurement of this emitted light could have many applications, i.a. the creation of a database of characteristic light ...
  • Snyman, Izak M; Olivier, Marius (2016-09)
    Computational analyses of explosive events became commonplace over the last twenty years or so. The input parameters used by these computational tools to calculate the material response requires extensive testing in most ...
  • Peter, Xolani; Jiba, Zetu; Olivier, Marius; Snyman, Izak M; Mostert, Frikkie M; Sono, Tleyane (2016-09)
    The thermochemical computer code EXPLO5 has been used for simple calculations of detonation properties and energy of an important class of organic explosives, namely nitro-aromatic energetic compounds such as cast TNT and ...
  • Schietekat, Sunelle; De Waal, Alta; Gopaul, Kevin G (INCOSE, 2016-09)
    This paper provides a methodology for Validation and Verification (V&V) of a Bayesian Network (BN) model for aircraft vulnerability against Infrared (IR) missile threats. The model considers that the aircraft vulnerability ...
  • Venter, Karien; Labuschagne, Kobus; Phasha, S; Gxowa, M; Khoza, S (2016-07)
    In 2015, the Road Traffic Management Corporation undertook a pilot study to investigate how prevalent driver inattention and distraction is in South Africa. Driver inattention and distraction is the leading factor in ...
  • Arhete, LE; Erasmus, Louwrence (International Association for Management of Technology (IAMOT) & the Graduate School of Technology Management, University of Pretoria, 2016-05)
    Despite the end of apartheid decades ago, the South African healthcare system continues to face significant challenges. Although efforts were made in the past to address the crisis, the system is said to be performing below ...
  • Sikhondze, NC; Erasmus, Louwrence (International Association for Management of Technology (IAMOT), 2016-05)
    Most medical records are kept on paper. This makes it difficult to use the available information for management of care, measuring of quality of care and improving care delivery. The healthcare industry is mostly data ...
  • Reinecke, J David; Beetge, FJ; Horsfall, I; Miyambo, Mangalani (Springer, 2015-07)
    Buried blast threats have been used for many years in both conventional and unconventional warfare. They are cheap, easily hidden, remain viable for extremely long periods after deployment and are effective, focusing the ...
  • MacLucas, David A; Gledhill, Igle MA (SAIP, 2014-07)
    Computational Fluid Dynamics is routinely used in clearance of stores for carriage and release from aircraft in the transonic range of flight. A well-known validation case is modelled in this study, for which aerodynamic ...
  • Mouton, Francois; Pillay, K; Van‘t Wout, MC (Centre for Security, Communications and Network Research (CSACN), 2016-07)
    Psychological operations or PsyOps is a multi-disciplinary capability that requires technology in the social sciences, as well as in areas of design, Information and Communication Technology (ICT), electronics, broadcasting ...
  • Mouton, Francois; Leenen, Louise; Venter, HS (Elsevier, 2016-06)
    The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to manipulation and thus the human ...
  • Masango, Mfundo; Mouton, Francois; Nottingham, Alastair; Mtsweni, Jabu (IEEE, 2016-08)
    Android smart devices have become an integral part of peoples lives, having evolved beyond the capability of just sending a text message or making a call. Currently, smart devices have applications that can restrict access ...
  • De Villiers, J Pieter; Jousselme, A-L; De Waal, A; Pavlink, G; Laskeyz, K; Blasch, E; Costa, P (IEEE, 2016-07)
    In this paper, the principle taxonomy of the fusion process, the decision loop, is unified with uncertainty quantification and representation. A typical flow of information in the decision loop takes the form of raw ...
  • Blasch, E; Costa, PCG; De Villiers, J Pieter; Laskey, KB; Llinas, J; Jousselme, A-L (IEEE, 2016-07)
    Over the course of Dave Hall's career, he highlighted various concerns associated with the implementation of data fusion methods. Many of the issues included the role of uncertainty in data fusion, practical implementation ...
  • Van der Merwe, Johannes R; Strydom, Jurgen J; Cilliers, Jacques E (IEEE, 2016-10)
    This paper proposes a practical implementation for the generation of real-time K-Distributed correlated sea-clutter in firmware. The method uses a dual cumulative distribution function (CDF) based look-up method to transpose ...
  • Malik, HH; Erasmus, Louwrence; Pretorius, J-HC (INCOSE South Africa Chapter, 2016-09)
    The purpose of this study is to explore and gain a broad perspective on the systems engineering methods currently employed at a South African research council. The aim is to question if these methods are ideal by comparing ...
  • Khutlang, Rethabile; Khanyile, Nontokozo P; Makinana, Sisanda; Nelwamondo, Fulufhelo V (IEEE, 2016-05)
    Biometric fingerprint scanners scan the external skin features onto a 2D image. The performance of the automatic fingerprint identification system suffers if the finger skin is wet, worn out, fake fingerprint is used et ...
  • Sharma, Ameeth; Singh, Ann; Roberts, Ted; Ramokolo, Rocky; Van der Westhuizen, Corrie (CSIR, 2016-11)
    The optical coherence technique (OCT) technique, which was demonstrated by Fercher and Huang in the early 90s, has made significant strides in bio-medical diagnostic applications in the fields of dermatology, dentistry and ...
  • Sharma, Ameeth (South African Institute of Physics (SAIP), 2016-07)
    Light based techniques continue to gain momentum in different spheres of diagnostic and therapeutic applications as a result of their non-invasive, noncontact properties. One such technique is Optical Coherence tomography ...

View more