GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing Modelling and digital science by Title

Sort by: Order: Results:

  • Mabaso, Matsilele A; Withey, Daniel J; Twala, B (Springer Verlag, 2019-08)
    This paper developed and evaluated a method for the detection of spots in microscopy images. Spots are subcellular particles formed as a result of biomarkers tagged to biomolecules in a specimen and observed via fluorescence ...
  • Gololo, KV; Majozi, T (2010-09)
    Cooling water systems are generally designed with a set of heat exchangers arranged in parallel. This arrangement results in higher cooling water flowrate and low cooling water return temperature thus reducing cooling tower ...
  • Raccanelli, A; Zhao, G-B; Bacon, DJ; Jarvis, MJ; Percival, WJ; Norris, RP; Rottgering, H; Abdalla, FB; Cress, CM; Kubwimana, J-C; Lindsay, S; Nichol, RC; Santos, MG; Schwarz, DJ (Royal Astronomical Society, 2012-08)
    We present forecasts for constraints on cosmological models that can be obtained using the forthcoming radio continuum surveys: the wide surveys with the Low Frequency Array (LOFAR) for radio astronomy, theAustralian ...
  • Raccanelli, A; Zhao, G-B; Bacon, DJ; Jarvis, MJ; Percival, WJ; Norris, RP; Rottgering, H; Abdalla, FB; Cress, CM; Kubwimana, J-C; Lindsay, S; Nichol, RC; Santos, MG; Schwarz, DJ (Oxford University Press, 2012-08)
    We present forecasts for constraints on cosmological models that can be obtained using the forthcoming radio continuum surveys: the wide surveys with the Low Frequency Array (LOFAR) for radio astronomy, theAustralian ...
  • Veerasamy, Namosha; Grobler, M (CSIR. Defence Peace Safety and Security, 2010-10)
    Cyberterrorism addresses the convergence of the fear-causing world of terrorism with the abstract realm of cyberspace, computers and networks. While cyberterrorism can be executed using various technical security exploits, ...
  • Haelterman, R; Bogaers, Alfred EJ; Degroote, J; Cracana, S (International Association of Engineers (IAENG), 2017-03)
    Many physics problems can only be studied by coupling various numerical codes, each modeling a subaspect of the physics problem that is addressed. Often, each of these codes needs to be considered as a black box, either ...
  • Teleka, R; Green, J; Dickens, J (IEEE Xplore, 2013)
    The South African mining industry is plagued by accidents ranging from vehicle incidents to roof/rock falls. In the attempt to carry out its mandate of improving the quality of life of South African citizens, the Council ...
  • CSIR (CSIR, 2008-03)
    The CSIR plans to address the challenges associated with intelligent mobile autonomous mapping of dynamic and unstructured environments through focused scientific research in the domains of intelligent autonomous localisation ...
  • Taute, Barend JE (CSIR, 2017-10)
    This presentation discusses the work that has been done by the CSIR in order to improve cybersecurity in the South African industry. The CSIR's cybersecurity track record, RDI focus areas, key R&D partnerships as well as ...
  • Keet, CM; Suarez-Figueroa, MC; Poveda-Villalon, M (KEOD'13, 2013-09)
    A growing number of ontologies are already available thanks to development initiatives in many different fields. In such ontology developments, developers must tackle a wide range of difficulties and handicaps, which can ...
  • Greene, GJ; Fischer, B (Association for Computing Machinery (ACM), 2016-09)
    Open source code contributions contain a large amount of technical skill information about developers, which can help to identify suitable candidates for a particular development job and therefore impact the success of a ...
  • Grobler, M; Flowerday, S; Von Solms, R; Venter, H (2011-05)
    Cyber space, cyber awareness and cyber security play an important role in the online experience of individuals, and need to be addressed accordingly. The paper looks at some of the current cyber security awareness initiatives ...
  • Grobler, M; Jansen van Vuuren, J; Zaaiman, J (2012-03)
    South Africa does not have a coordinated approach in dealing with cyber security, and the various structures that have been established to deal with cyber security issues are inadequate to deal with the issues holistically. ...
  • Dlamini, Z; Modise, M (Academic Conferences International, 2012-03)
    Technological advances have changed the manner in which ordinary citizens conduct their daily activities. Many of these activities are carried out over the Internet. These include filling tax returns, online banking, job ...
  • Phahlamohlaka, Letlibe J; Jansen van Vuuren, JC; Coetzee, AJ (2011-05)
    The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National ...
  • Veerasamy, Namosha (2017-06)
    Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a ...
  • Strauss, P (CSIR, 2017-10)
    This presentation discusses cybercrimes in the banking sector, and how these crimes are profoundly different to traditional crime.
  • Gcaza, Noluxolo (Lulu Press, 2018-08)
    Information and communication technologies (ICTs) are responsible for the transformation of societies, nations and the world at large. ICTs are considered to improve the quality of life for citizens as they bring about ...
  • Veerasamy, Namosha (Academic Press, 2020-09)
    Technological advancements continue to progress and so too grows the prospect of cyberterrorism. Hacking tools are growing in sophistication, and agitated terrorist groups may look for an innovative outlet for their ...
  • Jansen van Rensburg, Gerhardus J; Kok, S; Wilke, DN (Curran Associates, 2016-10)
    A constitutive model that captures the dominant strengthening and softening physics or microstructural changes of metallic materials is needed within a numerical environment for the effective prediction and simulation of ...

Search ResearchSpace


Advanced Search

Browse

My Account