Author:Wazna, TM; Balamesh, AS; Abdul Gaffar, MYDate:Oct 2015In Inverse Synthetic Aperture Radar (ISAR) imaging, the Range Instantaneous Doppler (RID) method is used to compensate for the nonuniform rotational motion of the target that degrades the Doppler resolution of the ISAR image. The Instantaneous ...Read more
Author:Setshedi, I; Peter, Xolani K; Fouché, Gerda; Myer, M; Dewar, JDate:01 Sep 2010The genus Sceletium is classified as part of the Family Mesembryanthemaceae and belongs to the sub-family Mesembryanthemoideae. Some of the names used when referring to this genus are ‘living skeletons’ or ‘skeleton plants’ (http://ujdigisp ...Read more
Author:Chikwamba, Rachel KDate:29 Sep 2006The presentation outlines the global status of food security and implications for meeting the Millennium Development Goals targets, with particular focus on Sub-Saharan Africa; trends in hunger, food availability, food distribution, consumption; ...Read more
Author:Helbig, M; Engelbrecht, APDate:Jun 2013In recent years a number of algorithms were proposed to solve dynamic multi-objective optimisation problems. However, a major problem in the field of dynamic multi-objective optimisation is a lack of standard performance measures to quantify ...Read more
Author:Van Zyl, TL; Parbhoo, C; Moodley, D; Cwela, B; Umuhoza, D; Shabangu, P; Vahed, AnwarDate:May 2009The paper focuses on the information technology infrastructure required for the evaluation and monitoring of risk relating to floods in South Africa. It may be argued that in the context of developing countries, flood preparedness is more ...Read more
Author:Malatji, Tsholofelo MDate:Sep 2017Infrared (IR) guided missiles remain a threat to both military and civilian aircraft, and as such, the development of effective countermeasures against this threat remains vital. A simulation has been developed to assess the effectiveness of ...Read more
Author:Ramadeen, P; Uys, D; Duvenhage, ADate:01 Sep 2010The command, control and information warfare competency of Defence, Peace, Safety and Security (DPSS), an operating unit of the CSIR is using systems modelling and simulation in its Joint Command and Control (JC2) research. JC2 encompasses ...Read more
Author:Olwal, TO; Djouani, K; Kogeda, OP; Van Wyk, BJDate:Sep 2012Wireless Backbone Networks (WBNs) equipped with Multi-Radio Multi-Channel (MRMC) configurations do experience power control problems such as inter-channel and co-channel interference, high energy consumption at the multiple queues and unscalable ...Read more
Author:Chapman, ADate:Sep 2007By the 1850s, European settlers were over-exploiting of South Africa’s indigenous forest resources for timber. As a result of rising concerns, authorities began a programme of afforestation (usually a grassland or fynbos conversion) using ...Read more
Author:Mtsweni, Jabu SDate:Mar 2022Cybersecurity has evolved over the years, and today cyberattacks instigated by cyber-criminals, nation states, or insider threat actors are part of regular headline news. In South Africa and around the world, the number of cyberattacks or ...Read more
Author:Bosscha, Peter ADate:Nov 2022The development, manufacturing and deployment of a South African engineered Continuous Positive Airway Pressure Ventilator is described. The CSIR L.I.F.E. (Lung Inspiratory Flow Enabler) Ventilator was developed during the COVID Pandemic in ...Read more
Author:Gledhill, Irvy MA; Diale, M; Tibane, MM; Maphanga, RR; Thaoge, MLDate:Aug 2014The progress from 2005 to now is evident. The journey has been a slow uphill with numbers increasing in the country. Different universities have graduated a woman in physics PhD while there are women professors in different institutions. ...Read more
Author:Diale, M; Maphang, RR; Tibane, MM; Thaoge, ML; Gledhil, IDate:Aug 2014The progress from 2005 to now is evident. The journey has been a slow uphill with numbers increasing in the country. Government structures have recognized the importance of women in science that the Department of Science and Technology (DST) ...Read more
Author:Linklater, G; Smith, C; Connan, J; Herbert, A; Irwin, Barry VWDate:Sep 2017Attribute-based Access Control (ABAC) is an access control model where authorization for an action on a resource is determined by evaluating attributes of the subject, resource (object) and environment. The attributes are evaluated against ...Read more
Author:Muswelanto, S; Van Deventer, Martha J; Van der Merwe, AdèleDate:Jul 2009With the establishment of an Institutional Repository (IR) one of the first questions the organisation should ask is: ‘How could we promote Open Access (OA) and still adhere to the restrictions of copyright? The Council for Scientific and ...Read more
Author:Viljoen, NM; Celik, M; Cao, W; Swann, J; Ergun, ODate:Sep 2012Donor breastmilk could potentially save thousands of neonatal lives and save millions of Rands in treatment costs annually. A facility location-allocation model will be used to develop a strategic national network expansion plan based on an ...Read more
Author:Lunga, D; Ersoy, ODate:Oct 2011Modern remote sensing imaging sensor technology provides detailed spectral and spatial information that enables precise analysis of land cover usage. From a research point of view, traditional widely used statistical models are often limited ...Read more
Author:Van der Walt, CM; Barnard, EDate:Dec 2013We investigate the performance of conventional bandwidth estimators for non-parametric kernel density estimation on a number of representative pattern-recognition tasks, to gain a better understanding of the behaviour of these estimators in ...Read more
Author:Ashton, P; Hardwick, DDate:Nov 2008The paper discusses geographic reality; water availability and water security as well as the challenges and opportunities facing water resource managers and the importance of good governanceRead more