GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing Modelling and digital science by Title

Sort by: Order: Results:

  • Darlow, Luke N; Singh, Ann; Moolla, Yaseen; Ramokolo, Rocky; Van Wyk, R; Botha, Natasha; Webb-Ray, L (Infonomics Society, 2016-11)
    Fingerprints are widely used for biometric authentication, identification, and access control. However, most current acquisition devices obtain fingerprints from the surface of the skin and are thus inherently restricted ...
  • Labuschagne, WA; Eloff, MM; Veerasamy, Namosha (Springer, 2012-09)
    Social networking sites have increased in popularity and are utilized for many purposes which include connecting with other people, sharing information and creating content. Many people on social networking sites use these ...
  • Olaitan, O; Herselman, Martha E; Wayi, N (AOSIS, 2019-07)
    Background: There are different uses of data in an organisation. Data are required for reporting purposes, decision-making and providing access to vital facts to enable work processes across business units. Data are central ...
  • Mahlangu, Thabo V; January, Sinethemba; Mashiane, Charmaine T; Dlamini, Thandokuhle M; Ngobeni, Sipho J; Ruxwana, Lennox N (2019-02)
    In the cyberspace, system defenders might have an idea of their own cybersecurity defense systems, but they surely have a partial view of the cyberspace battlefield and almost zero knowledge of the attackers. Evidently, ...
  • Debba, Pravesh (2008-10)
    A presentation was done at the Chinese Academy of Geological Science in October 2008 on optimal field sampling for both exploration targets and sampling for geochemicals in mine tailing areas
  • Casini, G; Meyer, T; Varzinczak, I (2018-10)
    In this paper we present what we believe to be the first systematic approach for extending the framework for defeasible entailment first presented by Kraus, Lehmann, and Magidor—the so-called KLM approach. Drawing on the ...
  • Casini, G; Straccia, U (Association for the Advancement of Artificial Intelligence, 2013)
    Defeasible inheritance networks are a non-monotonic framework that deals with hierarchical knowledge. On the other hand, rational closure is acknowledged as a landmark of the preferential approach to non-monotonic reasoning. ...
  • Britz, K; Varzinczak, I (Centre for Artificial Intelligence Research, 2013-01)
    Nonmonotonic logics are usually characterized by the presence of some notion of `conditional' that fails monotonicity. Research on nonmonotonic logics is therefore largely concerned with the defeasibility of argument forms ...
  • Britz, K; Varzinczak, I (2012-06)
    Historically, approaches to defeasible reasoning have been concerned mostly with one aspect of defeasibility, viz. that of arguments, in which the focus is on normality of the premise. In this paper we are interested in ...
  • Moodley, K; Meyer, T; Varzinczak, IJ (ACM, 2012-10)
    Classical reasoning for logic-based KR (Knowledge Representation) systems is in general, monotonic. That is, there is an assumption in these systems that there is complete information about a domain. This means that they ...
  • Da Veiga, A; Astakhova, LV; Botha, Adèle; Herselman, Martha E (Elsevier, 2020-05)
    The ideal or strong information security culture can aid in minimising the threat of humans to information protection and thereby aid in reducing data breaches or incidents in organisations. This research sets out to ...
  • Van der Walt, Christiaan M; Barnard, E (PRASA, 2009-11)
    The authors propose a hyper-ellipsoid clustering algorithm that grows clusters from local structures in a dataset and estimates the underlying geometrical structure of data with a set of hyper-ellipsoids. The clusters are ...
  • Mvelase, PS; Dlodlo, N; Sithole, Happy M; Adigun, M (IEEE, 2015-12)
    Research and commercial efforts are currently addressing challenges and providing solutions in cloud computing. Business models are emerging to address different use scenarios of cloud computing. In this paper, we present ...
  • Ngxande, Mkhuseli; Tapamo, J; Burke, Michael (IEEE, 2019-01)
    Recent work has shown significant progress in the direction of synthetic data generation using Generative Adversarial Networks (GANs). GANs have been applied in many fields of computer vision including text-to-image ...
  • Rossouw, M; Rautenbach, C; Page, Philip R; Harribhai, Jatin (Geo-Information Society of South Africa (GISSA), 2015-04)
    The present study addressed aspects of the highly interrelated study area of coastal safety and vulnerability, climate change and setback lines for South African coast. A medium resolution numerical wave analysis was ...
  • Klarman, S; Gutierrez-Basulto, V (Oxford University Press, 2013-05)
    We introduce Description Logics of Context (DLCs) - an extension of Description Logics (DLs) for context-based reasoning. Our approach descends from J. McCarthy's tradition of treating contexts as formal objects over which ...
  • Mwila, Martin K; Mbewe, Perseverance N (IEEE, 2017-11)
    This paper describes the methodology used to develop a communication platform that enhances interoperability between different types of components irrespective of the manufacturers and of the software platform. This framework ...
  • Seid, ER; Majozi, T (ACS Publications, 2013-10)
    The increasing interest in multipurpose batch plants is evident, because of their inherent flexibility to cope with an ever changing market environment. These plants are easily reconfigured for product modifications, to ...
  • Labuschagne, WA; Eloff, MM; Veerasamy, Namosha; Mujinga, M (2011-05)
    Africa may have the lowest number of Internet users in the world, but it also has the highest growth rate and the number of users is steadily growing. A majority of the African population is still excluded from global cyber ...
  • Pieterse, Heloise; Olivier, M (The Journal of Information Warfare, 2013-05)
    The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. This study presents the design ...

Search ResearchSpace


Advanced Search

Browse

My Account