GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing Defence, peace, safety & security by Title

Sort by: Order: Results:

  • Reinecke, JD; Snyman, IM; Ahmed, R; Beetge, FJ (CSIR, 2008-11)
    The understanding of shallow-buried near-field anti-vehicular mine explosions is crucial to the research, development and validation of vehicle and occupant protection systems. This paper presents research executed on ...
  • Reinecke, JD; Snyman, IM; Ahmed, R; Beetge, FJ (CSIR, 2008-11)
    The objective of this paper is to provide an overview of vehicle landmine protection validation testing in South Africa. A short history of validation test standards is given, followed by a summary of current open test ...
  • Holtmann, BM (The Da Vinci Institute for Technology Management, 2009-12)
    This thesis will propose a strategy for a Safe South Africa through the implementation of a model for a “Safe Community of Opportunity”. The model is the outcome of work undertaken over the course of the past five years ...
  • Ahmed, R (2012-10)
    This presentation details mobility and protection packages for peace-keeping and border safe-guarding.
  • Holtmann, B; Jansen Van Vuuren, C (2007-07)
    There is a tendency to think of road or transport safety as a separate subject from safety and security, yet the two are closely interwoven. The paper will make some of these connections, referring to local and where ...
  • Taute, BJE (CSIR, 2008-11)
    This paper reviews Safety and Security in the CSIR since the initiative was started towards the end of 1996. Motivated by the reality of high levels of crime and violence, the CSIR vision is to be a national centre of ...
  • Grundling, W (2012-10)
    The purpose of this particular test is to evaluate and identify the behaviour of pressure in a semi-confined space, after which it has been partially confined by making use of a ballistic pendulum. The approach ...
  • Mostert, FJ; Olivier, Marius (American Institute of Physics, 2011-10)
    It is well known that an intense flash of light is emitted when an explosive charge is detonated. The light emission continues well beyond the actual detonation process due to shock excitation of the air molecules around ...
  • Delport, JP (CSIR, 2010-09-01)
    Atmospheric turbulence is a naturally occurring phenomenon that can severely degrade the quality of long-range surveillance video footage. Major effects include image blurring, image warping and temporal wavering of objects ...
  • Hanslo, Ridewaan; Mnkandla, E (Polish Information Processing Society, 2018-09)
    Scrum has been the most widely adopted Agile methodology over the past decade with Scrum and Scrum variants offering alternatives to the old software development methods. While Scrum plays an important role in the success ...
  • Carroll, M; Van der Merwe, A; Kotzé, Paula (2011-08)
    Cloud computing presents a new model for IT service delivery and it typically involves over-a-network, on-demand, self-service access, which is dynamically scalable and elastic, utilising pools of often virtualized resources. ...
  • Ngako, Kgothatso (Academic Conferences and Publishing Limited, 2018-06)
    With the rise of the IOT botnets which exploit vulnerable IOT devices, consumers with devices such as IP cameras accessible on the Internet might be involved in the next DDoS attack without even knowing it. Due to the ...
  • Botha, P; Vawda, Shazia; Ramadeen, P; Terlunen, A (2015-03)
    Military information systems require high levels of security to protect sensitive information within these systems. Encrypted private networks are a common method of securing such systems. However these networks are not ...
  • Lefophane, S; Van der Merwe, Johannes J (Academic Conferences International, 2015-03)
    The widely used ISO/IEC 14443 product standard of Radio Frequency Identification (RFID) technology is currently increasingly penetrating the government and public sector applications in South Africa (e.g. National e-ID and ...
  • Molotsi, K (2012-10)
    This paper gives an overview of the security risks arising from the use of PSDs, and further provides possible security countermeasures to help organisations and users to protect their digital assets.
  • Pieterse, H; Olivier, MS (IEEE Xplore, 2013-08)
    Smartphones are an important asset for people living in the 21st century.With functionality similar to computers, smartphones have become all-in-one portable devices providing interconnectivity and device-to-device ...
  • Botha, Johannes G; Von Solms, S (Academic Conferences and Publishing International, also Curran, 2018-06)
    Multifunctional devices are employed in office networks for functionality and comfort, most often considered only as peripheral devices enabling the printing, copying and scanning of documents. Based on a study performed ...
  • Khutlang, Rethabile; Nelwamondo, FV; Singh, A (IEEE, 2015-07)
    Lifting latent fingerprints through means that do not make contact with the surface where the fingerprint is imprinted, is advantageous in many ways. Some of these advantages include: being able to lift the print multiple ...
  • Abdul Gaffar, MY; Nel, WAJ; Inggs, MR (IEEE, 2009-09)
    Inverse synthetic aperture radar (ISAR) imaging of sea vessels is a challenging task because their 3-D rotational motion over the coherent processing interval (CPI) often leads to blurred images. The selection of the ...
  • De Witt, JJ; Van Rooyen, GJ (IEEE, 2008-01)
    A quadrature mixing front-end is well-suited toward software define radio (SDR) applications, due to its low complexity and the inherent flexibility that it affords the radio front-end. Its performance is, however, severely ...

Search ResearchSpace


Advanced Search

Browse

My Account