Author:Oosthuizen, SJDate:Nov 2011This paper examines innovation in relation to the availability of a new material: the metal titanium. The paper aims to highlight the need for the inclusion of entrepreneurial innovation as a necessary focus area in the development of a ...Read more
Author:Creig-Smith, SDate:Apr 2001Underground steel water pipelines that are not suitably coated and lined will corrode after a certain period of time, externally where the steel is in contact with the soil and internally where the steel is in contact with water. Such corrosion ...Read more
Author:Du Plessis, WP; Odendaal, JW; Joubert, JDate:Jan 2010The matching required between the two directions through a retrodirective cross-eye jammer is considered using both the traditional phase-front analysis and an extended analysis. The design parameters to achieve a specified tracking error are ...Read more
Author:Agnew, M; Leach, J; McLaren, M; Roux, FS; Boyd, RWDate:Dec 2011Systems entangled in high dimensions have recently been proposed as important tools for various quantum information protocols, such as multibit quantum key distribution and loophole-free tests of nonlocality. It is therefore important to have ...Read more
Author:Murambadoro, M; Faccer, KDate:Nov 2011Members of the South African Risk and Vulnerability Atlas were involved in a meeting aimed at the development of a toolkit towards improved integration of climate change into local government's integrated development planning (IDP) process.Read more
Author:Edwards, AL; Franz, RM; Schutte, PC; Steenkamp, TDate:Jul 2009Some of the main reasons for occupational health and safety deficiencies in small-scale mining are unawareness of risks of chronic occupational diseases and inadequately implemented education and training. The key needs of the sector is to ...Read more
Author:Fernandes, PJLDate:Sep 1996A gear is a machine element designed to transmit force and motion from one mechanical unit to another. The design and function of gears are usually closely associated, since gears are designed for a specific function. Various types of gears ...Read more
Author:Milford, RV; Goliger, Adam MDate:Nov 1997A tornado risk model for transmission line design has been developed. The risk model is based on the McDonald model for point structures and has been developed such that it can be simplified for applications in codes of practice and design ...Read more
Author:Jovanovic, Nebojsa; Jarmain, C; De Clercq, WP; Vermeulen, T; Fey, MVDate:Oct 2011Accurate quantification of the water balance, in particular evapotranspiration, is fundamental in managing water resources, especially in semi-arid areas. The objective of this study was to compare evaporation from endemic vegetation in the ...Read more
Author:Ojijo, Vincent O; Ray, Suprakas S; Sadiku, RDate:Apr 2013Polylactide and poly(butylene succinate-coadipate) (PLA/PBSA) were melt-blended in the presence of triphenyl phosphite (TPP). An increase in the torque during melt mixing was used to monitor the changes in viscosity as compatibilization of ...Read more
Author:Winschiers-Theophilus, H; Bidwell, NJDate:Mar 2013Current human–computer interaction (HCI) paradigms are deeply rooted in a Western epistemology that attests its partiality and bias of its embedded assumptions, values, definitions, techniques, and derived frameworks and models. Thus tensions ...Read more
Author:Wei, M; Wang, C; Yao, Y; Yu, S; Liao, W-H; Ren, Jianwei; Sun, R; Wong, C-PDate:Jan 2019Hybrids of graphite nanosheet-supported CoMoS4 (GN-CoMoS4) were synthesized through a hydrothermal method. The CoMoS4 nanoparticles are uniformly distributed on the graphite nanosheets, leading to large specific surface area and good electrical ...Read more
Author:De Beer, Morris; Maina, JW; Van Rensburg, Yvette; Greben, JMDate:Oct 2012Optimization of road pavement design, especially towards the surface of the pavement, requires a more rational approach to modeling of truck tire-road contact stresses. Various road surfacing failures are given in this paper as examples, and ...Read more
Author:Harikrishnan, D; Kumar, NS; Joseph, S; Nair, Kishor KDate:Oct 2019Fingerprint-based authentication systems in general are prone to several security vulnerabilities. Authentication systems such as Biometric crypto systems, Cancellable templates and Bio-hashing provide a solution for addressing these ...Read more
Author:Chipangura, B; Van Biljon, JA; Botha, AdèleDate:Oct 2012Developing countries in general, and South Africa in particular has shown phenomenal growth in the mobile cellular technology sector. Providing mobile cellular access to information and services has ushered a new era of challenges and ...Read more
Author:Masemola, C; Cho, Moses A; Ramoelo, AbelDate:Aug 2020Invasive alien plants (IAPs) threaten biodiversity and critical ecosystem services worldwide. There is, therefore, an urgent need to develop intervention measures to control the spread of IAPs. Efforts to control and monitor the spread of ...Read more