GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Defence, peace, safety & security

Recent Submissions

  • Litvin, Igor A; Collet, Oliver JP (Optical Society of America, 2015-03)
    We propose a new technique for laser beam shaping namely the reshaping of the laser beam into a desirable beam profile by the use of a laser amplifier with a pump beam that has a modified intensity profile. We developed ...
  • Ngako, Kgothatso (Academic Conferences and Publishing Limited, 2018-06)
    With the rise of the IOT botnets which exploit vulnerable IOT devices, consumers with devices such as IP cameras accessible on the Internet might be involved in the next DDoS attack without even knowing it. Due to the ...
  • Oberholster, Paul J; Cheng, Po Hsun; Steyn, Maronel; Genthe, Bettina; De Lange, Willem J; Tancu, Yolanda; Claassen, Marius; Monjerezi, M; Kenebatho, P (2018-06)
    The project describes a self-sustainable technology requiring no chemicals or electricity. Algae is grown in algae bio-reactors and the ponds are dosed on a monthly basis for treatment. Feasibility of the treatment technology ...
  • Du Plessis, A; Sperling, P; Beerlink, A; Tshabalala, Lerato C; Hoosain, Shaik E; Mathe, Ntombizodwa R; Le Roux, SG (Elsevier, 2018-09)
    MicroCT is best known for its ability to detect and quantify porosity or defects, and to visualize its 3D distribution. However, it is also possible to obtain accurate volumetric measurements from parts – this can be used ...
  • Du Plessis, A; Sperling, P; Beerlink, A; Kruger, O; Tshabalala, Lerato C; Hoosain, Shaik E; Le Roux, SG (Elsevier, 2018-09)
    The use of microCT of 10 mm coupon samples produced by AM has the potential to provide useful information of mean density and detailed porosity information of the interior of the samples. In addition, the same scan data ...
  • Mostert, Frederik J (Elsevier, 2019-10)
    This paper presents a view of some of the challenges that are presented in investigating protection methodologies against explosive blast effects. In particular, the paper is concerned with experimental efforts that can ...
  • Jiba, Zetu; Sono, Tleyane Jonas; Mostert, Frederik Johannes (Elsevier, 2018-10)
    The effects of a fine water mist environment in a semi-confined blast chamber on the chemical and thermodynamic processes following detonation of a 20 g PE4 explosive charge have been investigated. The effects were quantified ...
  • Gcaza, Noluxolo (Lulu Press, 2018-08)
    Information and communication technologies (ICTs) are responsible for the transformation of societies, nations and the world at large. ICTs are considered to improve the quality of life for citizens as they bring about ...
  • Ntshangase, Cynthia S; Shabalala, Meshack B (Encryption using finger-code generated from fingerprints, 2018-03)
    In this paper, the literature survey of different algorithms for generating encryption keys using fingerprints is presented. The focus is on fingerprint features called minutiae points where fingerprint ridges end or ...
  • Oberholster, Paul J; Cheng, Po Hsun H (2016-09)
    This presentation discusses a low cost algae-based tertiary treatment for waste water treatment works in rural areas of developing countries. The focus areas of the presentation include water availability in Africa and ...
  • Genthe, Bettina; Oberholster, Paul J (2017-05)
    Conventional wastewater treatment processes such as activated sludge and biofilms are seldom used in rural South Africa due to lack of electricity and financial resources. This presentation focuses on phyco-remediation as ...
  • Oberholster, Paul J (2016-10)
    The focus area of this presentation is on water availability and predictions in Southern Africa.
  • Pieterse, Heloise; Olivier, M; Van Heerden, Renier P (Elsevier, 2018-03)
    Ever improving smartphone technology, along with the widespread use of the devices to accomplish daily tasks, leads to the collection of rich sources of smartphone data. Smartphone data are, however, susceptible to change ...
  • Veerasamy, Namosha; Labuschagne, William A (IGI, 2018-04)
    This article describes how social media has revolutionised the way in which people communicate, interact and engage. This phenomenon has transformed the digital world with its ease, convenience and numerous capabilities ...
  • Musehane, Ndivhuwo M; Oxtoby, Oliver F; Reddy, BD (Academic Press, 2018-11)
    In this work, droplet–droplet interaction is modelled using a multi-scale approach which couples multiphase flow simulation using a volume of fluid method to a surface thin film model operating on the sub-grid scale. The ...
  • Mathumo, TW; Swart, TG; Focke, Richard W (IEEE, 2017-09)
    The use of GNU Radio in order to explore FMCW radar is growing rapidly, where it is used for radar signal processing. In this paper we implement FMCW surveillance radar for drone detection on SDR using GNU Radio and the ...
  • Eddy, C; de Saxe, Christopher C; Cebon, D (Camera-based measurement of cyclist motion, 2018-08)
    Heavy Goods Vehicles (HGVs) are overrepresented in cyclist fatality statistics in the UK relative to their proportion of total traffic volume. In particular, the statistics highlight a problem for vehicles turning left ...
  • Meissner, Richard; Steyn, Maronel; Jacobs-Mata, Inga M; Moyo, Elliot S; Shadung, Justinus M; Sekoane, Zandile W; Nohayi, Ngowenani (Elsevier, 2018-09)
    South Africa is one of the 40 driest countries in the world with an annual average rainfall of less than 500 millimetres. In addition, South Africa's rate of economic development is closely linked to its level of water ...
  • Jansen van Vuuren, Joey; Leenen, Louise (Academic Conferences and Publishing International Ltd, 2018-03)
    Cyber Defence is a core driver in the attainment of national security for any country. Perceived Cyberpower can be determined by the analysis of the elements of cyberspace as part of national security. In this paper the ...
  • Leenen, Louise; Aschman, MJ; Grobler, MM; Van Heerden, Adelai (Academic Conferences and Publishing International Ltd, 2018-03)
    Cyber as an operational domain is widely recognised by military forces, but the process to operationalise cyber poses a number of challenges. One of the difficulties is that traditional military culture is far removed from ...

View more