GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Modelling and digital science

 

Collections in this community

Recent Submissions

  • Featherstone, Coral (IEEE, 2019-08)
    World wide, there is a concerning use of social media to sway public opinion through the use of disinformation campaigns. Elections, political decisions such as the Brexit referendum and topics such as vaccination have all ...
  • Skosana, Vusi J; Kunene, Dumisani C (ACM, 2019-09)
    Edge-preserving smoothing filters have had many applications in the image processing community, such as image compression, restoration, deblurring and abstraction. However, their potential application in computer vision ...
  • Reynolds, QG; Olsen, JE; Erwee, MW; Oxtoby, Oliver F (SAIMM, 2019-06)
    The extraction of molten products and wastes through smelting furnace tap-holes during the tapping process is a complex procedure involving many coupled thermophysical effects. Insight into the fluid flow behaviour in such ...
  • Botha, Johannes G; Van ‘t Wout, Magdalena C; Leenen, L (Academic Conferences and Publishing International, 2019-07)
    Mobile messaging or chat Applications (Apps) have gained increasing popularity over the past decade. Large amounts of data are being transmitted over the internet when people make use of these Apps. Metadata and personal ...
  • Anochie-Boateng, Joseph; Mvelase, GM (2019-07)
    Flat and elongated particle ratio is a shape characteristic for coarse aggregates used in pavements. The ASTM D 4791 is the standard test method to determine flat and elongated coarse aggregate particles in asphalt mixes. ...
  • Olukanmi, PO; Nelwamondo, Fulufhelo V; Marwala, T (IEEE, 2019-01)
    Using benchmark datasets, we study the performances of three efficient clustering algorithms which find cluster centers using a fixed number of random samples. The algorithms are also compared with two other (well-known) ...
  • Olukanmi, PO; Nelwamondo, Fulufhelo V; Marwala, T (IEEE, 2019-01)
    The Partitioning Around Medoids (PAM) clustering algorithm is well-known for its robustness and accuracy, but it is computationally expensive. This paper proposes a fast and accurate version, named PAM-lite. Like CLARA ...
  • Nkosi, Mpho C (2018-06)
    It is anticipated that Fifth Generation (5G) networks will provide cheaper and diverse services, which will support vertical markets, such as agriculture, health care and, as depicted in Figure 1, many others. 5G network ...
  • Olaitan, O; Herselman, Martha E; Wayi, N (AOSIS, 2019-07)
    Background: There are different uses of data in an organisation. Data are required for reporting purposes, decision-making and providing access to vital facts to enable work processes across business units. Data are central ...
  • Gangire, Y; Da Veiga, A; Herselman, Martha E (IEEE, 2019-03)
    The increase in threats to information systems resources in organisations has been attributed to the failure by employees to adhere to information security policies. Research into the information security behaviour of ...
  • Nair, Kishor K; Abu-Mahfouz, Adnan MI; Lefophane, Samuel (IEEE, 2019-03)
    Internet of Things (IoT) has the potential to enable the interconnection of small foot-print devices, which can offer valuable information for various critical use cases. It is expected to enable interconnections of ...
  • Nair, Kishor Krishan; Helberg, Albert; Van der Merwe, Johannes J (2017-04)
    Magnetic stripe card technology has been deployed for more than six decades worldwide and is extensively used in banking. Data embedded in them are often relied upon as a benchmark for user authentication. As such reliance ...
  • Dawood, ZC (Academic Conferences and Publishing (ACPI)., 2019-02)
    Behavioural biometrics are increasingly being used to authenticate users for various applications. As active research is being conducted for behavioural biometrics, researchers face difficulty in sharing and annotating ...
  • Khan, Zubeida C (Academic Conferences and Publishing (ACPI)., 2019-03)
    Computer Security Incident Response Teams (CSIRTs) are responsible for data collection and analysis concerning cyber security threat incidents. In order to provide the best service support for cyber security breaches, ...
  • Ngxande, Mkhuseli; Tapamo, J; Burke, Michael (IEEE, 2019-01)
    Recent work has shown significant progress in the direction of synthetic data generation using Generative Adversarial Networks (GANs). GANs have been applied in many fields of computer vision including text-to-image ...
  • Mashiane, Charmaine T; Dlamini, Innocentia Z; Mahlangu, Thabo (Academic Conferences and Publishing (ACPI), 2019-02)
    It is important that government, private sectors and the citizens are cybersecurity savvy. This is often a challenge as the size of the target group is large and the expertise is diverse. This is coupled with limited ...
  • Maliwatu, R; Lysko, Albert A; Johnson, DL (IEEE, 2018-11)
    The paper considers usage of an existing TV broadcasting transmitter for analyzing propagation and tuning existing propagation models to local conditions for improved accuracy. A comparison of measured signal strength ...
  • Aharonson, V; Schlesinger, I; McDonald, Andre M; Dubowsky, S; Korczyn, AD (American Society of Mechanical Engineers (ASME), 2018-02)
    We present PAMM II, the Personal Aid for Mobility and Monitoring II, an instrumented walker for Parkinson’s Disease (PD) patients’ gait monitoring. The objective of the walker is to aid in the diagnosis and monitoring of ...
  • Daykin, JW; Groult, R; Guesnet, G; Lecroq, T; Lefebvre, A; Léonard, L; Mouchard, L; Prieur-Gaston, E; Watson, Bruce (Prague Stringology Club, 2018-08)
    Online exact string matching consists in locating all the occurrences of a pattern in a text where only the pattern can be preprocessed. Classical online exact string matching algorithms scan the text from start to end ...
  • Berglund, Martin; Bester, W; van der Merwe, B (Springer Cham, 2018-10)
    Whereas Perl-compatible regular expression matchers typically exhibit some variation of leftmost-greedy semantics, those conforming to the posix standard are prescribed leftmost-longest semantics. However, the posix standard ...

View more