GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Modelling and digital science: Recent submissions

  • Nkosi, Mpho C (2018-06)
    It is anticipated that Fifth Generation (5G) networks will provide cheaper and diverse services, which will support vertical markets, such as agriculture, health care and, as depicted in Figure 1, many others. 5G network ...
  • Olaitan, O; Herselman, Martha E; Wayi, N (AOSIS, 2019-07)
    Background: There are different uses of data in an organisation. Data are required for reporting purposes, decision-making and providing access to vital facts to enable work processes across business units. Data are central ...
  • Gangire, Y; Da Veiga, A; Herselman, Martha E (IEEE, 2019-03)
    The increase in threats to information systems resources in organisations has been attributed to the failure by employees to adhere to information security policies. Research into the information security behaviour of ...
  • Nair, Kishor K; Abu-Mahfouz, Adnan MI; Lefophane, Samuel (IEEE, 2019-03)
    Internet of Things (IoT) has the potential to enable the interconnection of small foot-print devices, which can offer valuable information for various critical use cases. It is expected to enable interconnections of ...
  • Nair, Kishor Krishan; Helberg, Albert; Van der Merwe, Johannes J (2017-04)
    Magnetic stripe card technology has been deployed for more than six decades worldwide and is extensively used in banking. Data embedded in them are often relied upon as a benchmark for user authentication. As such reliance ...
  • Dawood, ZC (Academic Conferences and Publishing (ACPI)., 2019-02)
    Behavioural biometrics are increasingly being used to authenticate users for various applications. As active research is being conducted for behavioural biometrics, researchers face difficulty in sharing and annotating ...
  • Khan, Zubeida C (Academic Conferences and Publishing (ACPI)., 2019-03)
    Computer Security Incident Response Teams (CSIRTs) are responsible for data collection and analysis concerning cyber security threat incidents. In order to provide the best service support for cyber security breaches, ...
  • Ngxande, Mkhuseli; Tapamo, J; Burke, Michael (IEEE, 2019-01)
    Recent work has shown significant progress in the direction of synthetic data generation using Generative Adversarial Networks (GANs). GANs have been applied in many fields of computer vision including text-to-image ...
  • Mashiane, Charmaine T; Dlamini, Innocentia Z; Mahlangu, Thabo (Academic Conferences and Publishing (ACPI), 2019-02)
    It is important that government, private sectors and the citizens are cybersecurity savvy. This is often a challenge as the size of the target group is large and the expertise is diverse. This is coupled with limited ...
  • Maliwatu, R; Lysko, Albert A; Johnson, DL (IEEE, 2018-11)
    The paper considers usage of an existing TV broadcasting transmitter for analyzing propagation and tuning existing propagation models to local conditions for improved accuracy. A comparison of measured signal strength ...
  • Aharonson, V; Schlesinger, I; McDonald, Andre M; Dubowsky, S; Korczyn, AD (American Society of Mechanical Engineers (ASME), 2018-02)
    We present PAMM II, the Personal Aid for Mobility and Monitoring II, an instrumented walker for Parkinson’s Disease (PD) patients’ gait monitoring. The objective of the walker is to aid in the diagnosis and monitoring of ...
  • Daykin, JW; Groult, R; Guesnet, G; Lecroq, T; Lefebvre, A; Léonard, L; Mouchard, L; Prieur-Gaston, E; Watson, Bruce (Prague Stringology Club, 2018-08)
    Online exact string matching consists in locating all the occurrences of a pattern in a text where only the pattern can be preprocessed. Classical online exact string matching algorithms scan the text from start to end ...
  • Berglund, Martin; Bester, W; van der Merwe, B (Springer Cham, 2018-10)
    Whereas Perl-compatible regular expression matchers typically exhibit some variation of leftmost-greedy semantics, those conforming to the posix standard are prescribed leftmost-longest semantics. However, the posix standard ...
  • Vorster, J; Irwin, B; Van Heerden, Renier P (Academic Conferences and Publishing International, 2018-03)
    During the past decade, the sophistication and maturity of Enterprise-level Information Security (EIS) Standards and Systems has increased significantly. This maturity, particularly in the handling of enterprise-wide ...
  • Setshedi, Itumeleng; Long, Craig S; Loveday, Philip W; Wilke, Daniel N (SACAM, 2018-09)
    Permanently installed monitoring systems, which make use of guided wave ultrasound, can monitor long distances of rail track from a single transducer location.
  • Nwanebu, Docas (Academic Conferences and Publishing International, 2019-03)
    Securing information is a paramount feature in the world of internet where there is consistence enormous flow of information. With everyone having access to the same internet, sensitive information needs concealment from ...
  • Shozi, Nobubele A; Mtsweni, Jabu (IEEE, 2017-06)
    Social media sites have provided us with the ability to share information about our daily activities. However, users do not understand the implications of sharing their personal data on social media sites. Individuals on ...
  • Reddy, Reeshen; Burmeister, Brian; Manamela, Selolo S; Mewalal, Ushik; Kathree, Umur (2018-11)
    Network Centric Operations describe the modern form of military action in the information age. Networked Sensors allow for information superiority acting as a force multiplier, greater lethality and increased survivability. ...
  • McDonald, Andre M; Van Wyk, MA (2018-09)
    A novel random signal generator design that accommodates the specification of both the sample probability distribution as well as the signal bandwidth is presented in this paper. The generator achieves a high degree of ...
  • Mashiane, T; Pillay, N (2014-11)
    Password cracking is the term commonly used to describe the illegal action of gaining access to clear text versions of user passwords. Hackers are notorious for stealing encrypted passwords and cracking them. The same ...

Search ResearchSpace


Advanced Search

Browse

My Account