GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing Modelling and digital science by Title

Sort by: Order: Results:

  • Halland, K; Britz, K (Sun SITE Central Europe (CEUR), 2012-06)
    The formal definition of abduction asks what needs to be added to a knowledge base to enable an observation to be entailed by the knowledge base. An observation which is not entailed by the knowledge base will result in ...
  • Muronga, Khangwelo; Ruxwana, Nkqubela (www.satc.org.za, 2017-07)
    Naturalistic Driving Studies (NDS) is a research methodology that has the potential to improve existing approaches for collecting data about driver behaviour and performance in normal driving conditions. Analysis of ...
  • Rakitianskaia, AS; Olivier, MS; Cooper, Antony K (2011-08)
    Online social spaces have become very popular in the past couple of decades. With the great numbers of users in the online environments it becomes obvious that the human factor plays an important role in the social structure ...
  • De Vries, M; Gerber, A; Van der Merwe, A (Springer, 2014-05)
    Enterprise engineering originated as a practice with most publications focusing on the practical facets without the underlying scientific foundation. Foundational works emerged from different authors in recent years, ...
  • Mouton, F; Malan, MM; Kimppa, KK; Venter, HS (Elsevier, 2015-11)
    Social engineering is deeply entrenched in the fields of both computer science and social psychology. Knowledge is required in both these disciplines to perform social engineering based research. Several ethical concerns ...
  • Sweeney, M; Irwin, Barry VW (2017-09)
    As networks have grown, so has the data available for monitoring and security purposes. This increase in volume has raised significant challenges for administrators in terms of how to identify threats in amongst the large ...
  • Senekal, FP; Vorster, JS (2007-07)
    A large computer network such as the Internet contains millions of computers, services and users, interconnected in a complicated and ever changing web. This article provides an introduction to network mapping and usage ...
  • Louw, Johannes A (Ruzica Piskac, 2019-12)
    Recent work in sequence-to-sequence neural networks with attention mechanisms, such as the Tacotron 2 and DCTTS architectures, have brought on substantial naturalness improvements in synthesised speech. These architectures ...
  • Rens, G; Meyer, T (AAAI Publications, 2015-05)
    One way for an agent to deal with uncertainty about its beliefs is to maintain a probability distribution over the worlds it believes are possible. A belief change operation may recommend some previously believed worlds ...
  • Shaik, AA; Tlale, NS; Bright, G (Inderscience, 2012-05)
    Industrial robot arms are an essential part of automated manufacturing. They automate tasks such as component assembly, welding, light machining and spray painting due to their repeatability, speed and accuracy. The serial ...
  • Lysko, Albert A (2011-08)
    A new method of moments (MoM) code is discussed. The code supports standard functionality, e.g. fully automatic re-meshing and variable’s assignment, ground plane and symmetry planes. In addition, the code realizes several ...
  • Hinkelmann, K; Karagiannis, D; Thoenssen, B; Woitsch, R; Gerber, A; Van der Merwe, A (Elsevier, 2015-08)
    The ability to react timeously to continuous and unexpected change is called agility and is an essential quality of the modern enterprise. Being agile has consequences for the engineering of enterprises and enterprise ...
  • Roos, TH; Harms, TM (Elsevier, 2014-06)
    In the popular Discrete Ordinates Method (DOM) formulation of the Equation of Radiative Transfer (ERT), the 4 pi solid angle range of directions is divided into a finite number of discrete directions or ordinates. This ...
  • Booth, R; Meyer, T; Varzinczak, IJ (2009-06)
    Standard belief contraction assumes an underlying logic containing full classical propositional logic, but there are good reasons for considering contraction in less expressive logics. In this paper, researchers focus on ...
  • Sembolini, F; Yepes, CG; Pearce, FR; Knebe, A; Kay, ST; Power, C; Cui, W; Beck, AM; Borgani, S; Vecchia, CD; Dave, R; Elahi, PJ; February, S; Huang, S; Hobbs, A; Katz, N; Lau, E; McCarthy, IG; Murante, G; Nagai, D; Nelson, K; Newton, RDA; Puchwein, E; Read, JI; Saro, A; Schaye, J; Thacker, RJ (Oxford University Press, 2016-02)
    We have simulated the formation of a galaxy cluster in a cold dark matter universe using 13 different codes modelling only gravity and non-radiative hydrodynamics (RAMSES, ART, AREPO, HYDRA and nine incarnations of ...
  • Sembolini, F; Elahi, PJ; Pearce, FR; Power, C; Knebe, A; February, Sean (Oxford University Press on behalf of the Royal Astronomical Society, 2016-04)
    We have simulated the formation of a massive galaxy cluster (M(supcrit)(sub200) = 1.1×10(sup15)h(sup-1)M) in a CDM universe using 10 different codes (RAMSES, 2 incarnations of AREPO and 7 of GADGET), modeling hydrodynamics ...
  • Makondo, Ndivhuwo; Hiratsuka, M; Rosman, Benjamin S; Hasegawa, O (Fuji Technology Press, 2018-04)
    The number and variety of robots active in real-world environments are growing, as well as the skills they are expected to acquire, and to this end we present an approach for non-robotics-expert users to be able to easily ...
  • Casini, G; Mosca, A (Springer, 2013-06)
    The Object Role Modeling language (ORM2) is nowadays the most widespread fact-based conceptual modeling language in the business world. Recently, it has been proposed an encoding of the core fragment of ORM2 (called ORM2zero) ...
  • Casini, G; Meyer, T; Moodley, K; Varzinczak, I (CAIR (Centre for Artificial Intelligence Research), 2013-07)
    The introduction of defeasible reasoning in Description Logics has been a main research topic in the field in the last years. Despite the fact that various interesting formalizations of nonmonotonic reasoning for the TBox ...
  • Ranchod, P; Rosman, Benjamin S; Konidaris, G (IEEE, 2015-10)
    We present a method for segmenting a set of unstructured demonstration trajectories to discover reusable skills using inverse reinforcement learning (IRL). Each skill is characterised by a latent reward function which the ...

Search ResearchSpace


Advanced Search

Browse

My Account