GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing Modelling and digital science by Title

Sort by: Order: Results:

  • MacLucas, David A; Gledhill, Irvy MA (SAIP, 2014-07)
    Computational Fluid Dynamics is routinely used in clearance of stores for carriage and release from aircraft in the transonic range of flight. A well-known validation case is modelled in this study, for which aerodynamic ...
  • Botha, N (2012-10)
    This presentation outlines how the intraocular pressure inside the human eye can be estimated using numerical techniques. This can be used as a risk indicator in the diagnosis of glaucoma.
  • Grobler, MM; Von Solms, SH (2009-06)
    This paper discusses the development of a South African model for Live Forensic Acquisition - Liforac. The Liforac model is a comprehensive model that presents a range of aspects related to Live Forensic Acquisition. The ...
  • Ntlangu, Mbulelo Brenwen; Baghai-Wadji, A (Association for Computing Machinery (ACM), 2017-12)
    With the advent of Internet of Things (IoT) technology, the need for tools which facilitate the development and management of network based services has become increasingly important. Issues such as network security and ...
  • Britz, K; Heidema, J; Meyer, T (Springer Verlag, 2009-12)
    The authors present a semantic model of typicality of concept members in description logics (DLs) that accords well with a binary, globalist cognitive model of class membership and typicality. The authors define a general ...
  • Britz, K; Heidema, J; Meyer, T (Pub Zone scientific publication discussion forum, 2009-07)
    The authors presents a semantic model of typicality of concept members in description logics that accords well with a binary, globalist cognitive model of class membership and typicality. The authors define a general ...
  • Ngobeni, S; Venter, H; Burke, Ivan D (J.UCS Consortium, 2012-06)
    Over the past decade, wireless mobile communication technology based on the IEEE 802.11 Wireless Local Area Networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, ...
  • Lysko, Albert A (2010-03)
    The paper discusses aspects of a novel impedance matrix compressing technique and applies the technique to a coil-loaded monopole. The technique can reduce the number of variables required for modelling of structures with ...
  • Grobler, Jan H; de Villiers, R; Cooper, Antony K (2010-01)
    A method is proposed for the modelling of fluid-solid interaction in applications where fluid forces dominate. Data are transferred between two stand-alone codes: a dedicated computational fluid dynamics (CFD) code capable ...
  • Kleinhans, A; Thill, S; Rosman, Benjamin S; Detry, R; Tripp, B (IEEE, 2014-09)
    The neural circuits that control grasping and perform related visual processing have been studied extensively in Macaque monkeys. We are developing a computational model of this system, in order to better understand its ...
  • Kok, S (2011-01)
    A new method is proposed to predict the irradiation induced property changes in nuclear; graphite, including the effect of a change in irradiation temperature. The currently used method; to account for changes in irradiation ...
  • Jansen van Vuuren, JC; Leenen, L; Grobler, MM; Chan, KFP; Khan, ZA (2015-03)
    Acquiring, representing, and managing knowledge effectively has a considerable impact on constructing accurate and intelligent systems. A challenge faced by domain experts is the manner in which information about the ...
  • Nortje, R; Britz, K; Meyer, T (CAIR (Centre for Artificial Intelligence Research), 2013-07)
    In this paper we investigate the module-theoretic properties of bot and top-reachability modules in terms of inseparability relations for the DL SRIQ. We show that, although these modules are not depleting or self-contained, ...
  • Veerasamy, Namosha; Eloff, JHP (2010-06)
    Individual users and organisations need to be warned about the latest face of warfare that is not only being played out in the military networks, but also on the Internet and cyberspace. Consequently, Network Warfare has ...
  • Veerasamy, Namosha (2010-08)
    Cyberterrorism represents the convergence of the virtual world of cyberspace and the intimidation techniques of terrorism. To better understand why cyber terrorist acts are committed, this paper investigates the motivation ...
  • Swart, I; Irwin, B; Grobler, M (Academic Bookshop, UK, 2015-03)
    A proliferation of cyber security strategies have recently been published around the world with as many as thirty five strategies documented since 2009. These published strategies indicate the growing need to obtain a clear ...
  • Claessens, R; De Waal, A; De Villiers, P; Penders, A; Pavlin, G; Tuyls, K (2015-05)
    The proposed framework for Multi-Agent Target Tracking supports i) tracking of objects and ii) search and rescue based on the fusion of very heterogeneous data. The system is based on a novel approach to fusing sensory ...
  • Brown, K; Bradshaw, K (IEEE, 2016-05)
    The lack of multi-biometric fusion guidelines at the feature-level are addressed in this work. A feature-fusion framework is geared toward improving human identification accuracy for both single and multiple biometrics. ...
  • Musehane, Ndivhuwo M; Oxtoby, Oliver F; Reddy, DB (Curran Associates, Inc., 2016-10)
    In this work, droplet-droplet interaction is modelled using a multiphase flow computational fluid dynamics approach coupled with a reduced order surface thin-film model. An existing multiphase flow model based on a multiple ...
  • Musehane, Ndivhuwo M; Oxtoby, Oliver F; Reddy, BD (Academic Press, 2018-11)
    In this work, droplet–droplet interaction is modelled using a multi-scale approach which couples multiphase flow simulation using a volume of fluid method to a surface thin film model operating on the sub-grid scale. The ...

Search ResearchSpace


Advanced Search

Browse

My Account