GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing Modelling and digital science by Title

Sort by: Order: Results:

  • Pieterse, Heloise; Olivier, M (Academic Conferences and Publishing International Ltd, 2013-03)
    The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. A mobile botnet is defined as ...
  • Dlamini, I; Olivier, M (2009-07)
    Currently, network evidence used in a court of law can be lacking and inadequate for prosecution purposes, due to a loss of packets during the network transmission. This packet loss in turn may be caused by the congestion ...
  • Pennefather, S; Bradshaw, K; Irwin, Barry VW (SATNAC, 2017-09)
    Currently, network analytics requires direct access to network packets, normally through a third-party application, which means that obtaining realtime results is difficult. We propose the NFP-CPU heterogeneous framework ...
  • Beharie, MM; Pedro, JO; Dala, L (Cambridge University Press, 2015)
    This paper presents the design, development and construction of a flight test stand for a quadrotor UAV. As opposed to alternate forms of UAV, the power plant in the case of the quadrotor serves a dual purpose of control ...
  • Ngobeni, SJ; Venter, HS (2009-07)
    The proliferation of wireless mobile communication technology has emerged and this has resulted in the increase of the wireless users. On the other hand, cyber crime in WLANs has appeared to be gradually increasing world ...
  • Sabatta, DG (2009-11)
    Before a robot may be classed as an autonomous system, it must be able to move unaided in an environment. In a known environment or with pre-recorded trajectories, this reduces to the problem of path following. In order ...
  • De Villiers, M (University of KwaZulu-Natal, 2011-02)
    This research project proposes the development of an autonomous, omnidirectional vehicle that will be used for general indoor service applications. A suggested trial application for this service robot will be to deliver ...
  • Labuschagne, WA; Burke, Ivan D; Veerasamy, Namosha; Eloff, MM (2011-08)
    Social networking sites are a popular medium of interaction and communication. Social networking sites provide the ability to run applications and games to test users’ knowledge. The popularity of social networks makes it ...
  • Xungu, Sipho A; Notununu, Lwando G; Mbizeni, Asanda; Dickens, John S (IEEE, 2017-11)
    Locomotives are at risk to collisions and derailment due to obstacles on the track. Trains do not have the ability to steer around obstacles, they are confined to the track and depend on stopping to avoid hazards. These ...
  • Viljoen, NM; Van Zyl, R (Department of Visual Arts, University of Pretoria, 2009)
    This paper explores the potential of design thinking in the seemingly disparate discipline of Operations Research/Management Science (OR/MS). OR/MS develops mathematical models for analysis based on quantitative logic as ...
  • Keet, CM (2012-10)
    OWL 2 DL is a very expressive language and has many features for declaring complex object property expressions. Standard reasoning services for OWL ontologies assume the axioms in the "object property box" to be correct ...
  • Keaikitse, M; Brink, W; Govender, Natasha (2012-10)
    Object detection is an essential first stage in a surveillance system, primarily because it focuses all the subsequent processes. The standard approach to object detection is background subtraction. At the core of ...
  • Veerasamy, Namosha; Labuschagne, WA (Academic conferences, 2014-07)
    The ubiquity of the Internet has become part of everyday life. The Intenet allows for the searching of information on topics that are relevant at that particular time. The possession of valuable information by members of ...
  • Phaphana, HM; Cooper, Antony K; Wenhold, F (2014-10)
    Research shows that food choices are affected by the food environment. Similarly, the presence of fruit and vegetables in the home results in greater fruit and vegetable consumption by children. A food desert is an area ...
  • Van 't Wout, Magdalena C (ACPI, 2019-03)
    The current year, 2017, has already seen an excessive amount of cyber security disasters, apart from the continuation of standard corporate breaches. In the first half of the year, there had already been full-on campaign ...
  • Labuschagne, William A; Grobler, Marthie M (Academic Conferences and Publishing, 2017-06)
    With the increase in technology adoption, quality assurance in terms of the technical skill level of cybersecurity experts working on a task is crucial. Educating employees and ensuring that they have the necessary tools ...
  • Leenen, L; Alberts, R; Britz, K; Gerber, A; Meyer, T (2011-03)
    In this paper we describe a research project to develop an optimal information retrieval system in an Information Operations domain. Information Operations is the application and management of information to gain an advantage ...
  • Ledwaba, LPI; Hancke, GP; Isaac, Sherrin J; Venter, HS (IEEE, 2019-07)
    The ability for the smart microgrid to allow for the independent generation and distribution of electrical energy makes it an attractive solution towards enabling universal access to electricity within developing economies. ...
  • Van Heerden, Renier P; Pieterse, Heloise; Burke, Ivan D; Irwin, B (IEEE Xplore, 2013-11)
    Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphere ESXi ...
  • Grobler, M (2010-03)
    This paper presents a Digital Forensic (DF) governance framework and its mapping on the SANS ISO/IEC 38500:2009 Corporate governance of information technology structure. DF governance assists organisations in guiding the ...

Search ResearchSpace


Advanced Search

Browse

My Account