GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing Modelling and digital science by Issue Date

Sort by: Order: Results:

  • Vogt, DR (University of York, 2000-09)
    In this thesis, Radio Tomography is the name of a geophysical technique for imaging the attenuation of high frequency continuous wave radio waves in the plane between two boreholes in the earth. One of the central problems ...
  • Fedotov, I; Katskov, D; Shatalov, MY; Marais, J (Springer Science, 2006)
    A one-dimensional model is developed to describe atomic diffusion in a graphite tube atomizer for electrothermal atomic adsorption spectrometry. The underlying idea of the model is the solution of an inhomogeneous ...
  • Venter, JP; De Waal, A; Willers, N (SpringerLink.com, 2007-01)
    Forensic analysis requires a keen detective mind, but the human mind has neither the ability nor the time to process the millions of bytes on a typical computer hard disk. Digital forensic investigators need powerful tools ...
  • Senekal, FP; Vorster, JS (2007-07)
    A large computer network such as the Internet contains millions of computers, services and users, interconnected in a complicated and ever changing web. This article provides an introduction to network mapping and usage ...
  • Namoshe, M; Kumile, CM; Tlale, NS (2007-10)
    An increase in the number of mobile robot users has lead to the design and implementation of cooperative autonomous mobile robots. Autonomous robots require the ability to build maps of an unknown environment while ...
  • CSIR (CSIR, 2008-03)
    The CSIR plans to address the challenges associated with intelligent mobile autonomous mapping of dynamic and unstructured environments through focused scientific research in the domains of intelligent autonomous localisation ...
  • Shatalov, MY (2008-05)
    A general model of operation of vibratory gyroscopes, which is applicable to a broad class of instruments, including cylindrical, disc and micro-machined gyros, is formulated on the basis of analysis of dynamics and control ...
  • Gouws, JF; Majozi, T (Water Research Council, 2008-07)
    Wastewater minimisation in chemical processes has always been the privilege of continuous rather than batch plants. However, this situation is steadily changing, since batch plants have a tendency to generate much more ...
  • Shatalov, M; Greeff, JC; Joubert, SV; Fedotov, I (Buffelspoort TIME 2008 Peer-reviewed Conference Proceedings, 2008-09)
    In this paper a mathematical model describing the interaction of a lion population with that of the zebra and wildebeest populations is considered. The traditional method uses a model with known coefficients and a CAS ...
  • Motsepe, K; Fedotov, I; Shatalov, M; Joubert, SV (Buffelspoort TIME2008 Peer-reviewed Conference Proceedings, 2008-09)
    Students of mathematical physics, engineering, natural and biological sciences sometimes need to use special functions that are not found in ordinary mathematical software. In this paper a simple universal numerical algorithm ...
  • Shatalov, M; Fedotov, I; Joubert, SV (Buffelspoort TIME 2008 Peer-reviewed Conference Proceedings, 2008-09)
    A novel method of function approximation using an initial value, linear, ordinary differential equation (ODE) is presented. The main advantage of this method is to obtain the approximation expressions in a closed form. ...
  • Booth, R; Meyer, T (2008-09)
    In studies of multi-agent interaction, especially in game theory, the notion of equilibrium often plays a prominent role. A typical scenario for the belief merging problem is one in which several agents pool their beliefs ...
  • Chifura, A; Nkomo, P; Chadwick, J (2008-09)
    The increase in internet connectivity has created new avenues for smart cards to be used as identity tokens in distributed on-line web-services. To make this possible, one must be able to read the card and communicate with ...
  • Ngobeni, SJ; Venter, HS (2008-09)
    There are currently many different types of wireless crime investigation tools designed for different purposes in order to track down intruders of wireless crime, like Intrusion Detection Systems (IDSs), Wlan-Jack, HotSpotter, ...
  • Lebelo, RS; Fedotov, I; Shatalov, M (Buffelspoort TIME2008 Peer-reviewed Conference Proceedings, 2008-09)
    In this paper, the method of approximating solutions of partial differential equations with variable coefficients is studied. This is done by considering heat flow through a one-dimensional model with variable cross-sections. ...
  • Miya, WS; Mpanza, LJ; Marwala, T; Nelwamondo, FV (Institute of Electrical and Electronics Engineers (IEEE), 2008-10)
    In this paper, a comparison between Extension Neural Network (ENN), Gaussian Mixture Model (GMM) and Hidden Markov model (HMM) is conducted for bushing condition monitoring. The monitoring process is a two-stage implementation ...
  • Debba, Pravesh (2008-10)
    A presentation was done at the Chinese Academy of Geological Science in October 2008 on optimal field sampling for both exploration targets and sampling for geochemicals in mine tailing areas
  • Msiza, IS; Nelwamondo, FV; Marwala, T (Academy Publisher, 2008-11)
    Computational Intelligence techniques have been proposed as an efficient tool for modeling and forecasting in recent years and in various applications. Water is a basic need and as a result, water supply entities have the ...
  • Senekal, FP (PRASA 2008, 2008-11)
    This paper presents a new technique for the recognition of road traffic signs. The technique is based on colour and shape analysis of a single image. It is aimed at the detection and classification of triangular traffic ...

Search ResearchSpace


Advanced Search

Browse

My Account