GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing Defence, peace, safety & security by Title

Sort by: Order: Results:

  • Spocter, M (Sun Media, 2012-03)
    Gated developments, more commonly known as gated communities, have become a feature of urban living throughout the world. Gated developments in South African cities are a ubiquitous feature of the contemporary urban landscape ...
  • Shatalov, MY (2008-05)
    A general model of operation of vibratory gyroscopes, which is applicable to a broad class of instruments, including cylindrical, disc and micro-machined gyros, is formulated on the basis of analysis of dynamics and control ...
  • Belyi, VN; Khilo, NA; Forbes, A; Ryzhevich, AA (Society of Photo-optical Instrumentation Engineers (SPIE), 2009-08)
    Linear and nonlinear processes of transferring optical singularities from anisotropic crystals onto the wavefront of Bessel light beams (BLBs) are investigated. The generation of high-order vortices at the propagation of ...
  • Ait-Ameur, K; Naidoo, Darryl; Ngcobo, S; Fromager, M; Litvin, I; Hasnaoui, A; Harfouche, A; Forbes, A (SPIE, 2015-02)
    A great number of laser applications need in place of the usual Gaussian beam a flat-top intensity profile in the focal plane of a focusing lens. In general the transformation of the laser beam from the Gaussian to the ...
  • Duvenhage, B (PRASA, 2014-11)
    The real-time super-resolution technique discussed in this paper increases the effective pixel density of an image sensor by combining consecutive image frames from a video. In surveillance, the higher pixel density lowers ...
  • De Saxe, Christopher C; Berman, Robert J (2018-07)
    The road space utilised by a heavy goods vehicle during low-speed manoeuvring has direct safety and operational implications. This is especially true for vehicles which are longer/wider than usual, such as abnormal loads ...
  • Grobler, M; Dlamini, Z (IIMC International Information Management Corporation, 2012-05)
    Cyber trends are a reality across the globe. Not only are technology and electronic devices and media used more regularly in easing everyday activities, but these technological advances are also used in sophisticated ...
  • Botha, Johannes G; Grobler, MM; Eloff, MM (2017-06)
    Data breaches have gained extensive coverage as businesses and organisations of all sizes become more dependent on digital data, cloud computing and workforce mobility. Companies store sensitive or confidential data on ...
  • Burmeister, O; Phahlamohlaka, J; Al-Saggaf, Y (IGI Global, 2015)
    Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a ...
  • Pretoria News (Pretoria News, 2008-08-27)
    The head of the CSIR safety and security competency area, Dr Barend Taute, says that about 10 years ago the CSIR considered what could be done about crime in South Africa. They established a crime prevention centre which ...
  • Jansen van Vuuren, JC; Phahlamohlaka, J; Leenen, L (Academic Conferences Limited, 2012-07)
    This paper investigates different government organisational structures created for the control of national cybersecurity in selected countries of the world. The main contribution is a proposed structure that could be ...
  • Jamison, Kevin A (ICAS, 2018-09)
    The analysis of the separation of a Precision Guided Munition (PGM) from many configurations of an advanced jet trainer was performed using aerodynamic data from wind-tunnel tests characterised using the grid method. As ...
  • Lück-Vogel, Melanie (EE Publishers, 2018-04)
    This article provides guidance to technical and non-technical coastal practitioner regarding the required precision of airborne lidar data for the typical coastal applications, output formats and value-added products. It ...
  • Strydom, JJ; Cilliers, Jacques E; Gouws, M; Naicker, D; Olivier, K (The Institution of Engineering and Technology (IET), 2012-10)
    This paper describes the development and testing of a digital radio frequency memory (DRFM) kernel, as well as some of the functionality which has been added to the system to make it a fully-fledged hardware in the loop ...
  • Strydom, JJ; Cilliers, Jacques E; McDonald, A; Olivier, K (2012-09)
    This presentation gives an overview of the testing and evaluation of seaborne search radars and the advances in DRFM technology.
  • Van der Watt, R; Erasmus, Louwrence (INCOSE, 2016-07)
    A public multi-disciplinary primary-level hospital delivers clinical services to both in and out patients within its catchment area. A multi-disciplinary hospital is a healthcare facility of which the commissioning or ...
  • Arhete, LE; Erasmus, Louwrence (International Association for Management of Technology (IAMOT) & the Graduate School of Technology Management, University of Pretoria, 2016-05)
    Despite the end of apartheid decades ago, the South African healthcare system continues to face significant challenges. Although efforts were made in the past to address the crisis, the system is said to be performing below ...
  • Cilliers, A; Nel, WAJ (IEEE, 2008-09)
    A technique based on time-frequency and tomographic analysis to extract helicopter blade parameters for the purposes of radar non-cooperative target recognition (NCTR) is investigated. The proposed algorithm shows that ...
  • Botha, RC; Strauss, HJ; Bollig, C; Koen, W; Collett, O; Kuleshov, NV; Esser, MJD; Combrinck, L; Von Bergmann, HM (Optical Society of America, 2013-03)
    A 1314 nm Nd:YLF laser was designed and operated both CW and passively Q-switched. Maximum CW output of 10.4 W resulted from 45.2 Wof incident pump power. Passive Q-switching was obtained by inserting a V:YAG saturable ...
  • Khutlang, Rethabile; Khanyile, Nontokozo P; Makinana, Sisanda; Nelwamondo, Fulufhelo V (IEEE, 2016-05)
    Biometric fingerprint scanners scan the external skin features onto a 2D image. The performance of the automatic fingerprint identification system suffers if the finger skin is wet, worn out, fake fingerprint is used et ...

Search ResearchSpace


Advanced Search

Browse

My Account