Institutional Repository

Browsing College of Science, Engineering and Technology by Title

Browsing College of Science, Engineering and Technology by Title

Sort by: Order: Results:

  • Moodley, Lohini (1999-01)
    For a graph G = (V (G), E (G)), a set S ~ V (G) dominates G if each vertex in V (G) \S is adjacent to a vertex in S. The domination number I (G) (independent domination number i (G)) of G is the minimum cardinality ...
  • Marsden, G; Jones, M (2001)
    Embedded interactive computer systems, such as those found in cellular handsets, can be hard to use. The combination of small form factor - limited input and output potential - and an increasing feature set, result in ...
  • Venter, IM; Blignaut, RJ (1995)
    The rapidly changing·end-user computing environment requires an informed recipient of information who can play an active role in the design of information systems to capture. retrieve and interpret data [6). We need our ...
  • Warren, P (South African Computer Society (SAICSIT), 1999)
    The paper proposes a framework for discussing methodologies for developing interactive computer systems. It uses this framework for a sample of systems and shows how certain insights about missing aspects of the methodologies ...
  • Sebatjane, Phuti (2016-06)
    The term aggregation refers to overdispersion and both are used interchangeably in this thesis. In addressing the problem of prevalence of infectious parasite species faced by most rural livestock farmers, we model the ...
  • Gundidza, Patricia Tapiwa (2021-10-01)
    The conventional approach in determining HIV risk factors fails to consider the influence behavioural and biological factors may have when modelled jointly. This study investigates the extent of influence behavioural and ...
  • Stevens, Charles Cater (1996-11)
    Redundancy in plaintext is a fertile source of attack in any encryption system. Compression before encryption reduces the redundancy in the plaintext, but this does not make a cipher more secure. The cipher text is still ...
  • Philips, M.J.; Berman, Sonia (South African Institute of Computer Scientists and Information Technologists, 1991)
    The universal relation is a way of overcoming users' prime database access difficulty, namely navigation through database structures. As a result there is reduced user involvement with the underlying logical database ...
  • Mlati, Malavi Clifford (2019-10)
    Real-Time Rollover prevention of Unmanned Ground Vehicle (UGV) is very paramount to its reliability and survivability mostly when operating on unknown and rough terrains like mines or other planets.Therefore this research ...
  • Shaw, V (South African Institute of Computer Scientists and Information Technologists, 1991)
    The UNINET Academic and Research Network is a collaborative project among Universities, Research Councils and the FRD for the development, implementation and promotion of an academic and research network of computers ...
  • Twinomurinzi, H; Msweli, N. T. (Unisa Press and NEMISA, 2021-01)
    The findings revealed the great extent to which multifaceted change and flexibility is needed at institutional and individual levels if MOOCs are to be adopted successfully and cross-accredited across higher education ...
  • Adebesin, Tawakkaltu Funmilola (2011-03)
    The Digital Doorway (DD) is a non-standard computer system deployed to promote computer literacy amongst the underpriviledged communities in South Africa. Since its inception there has been no usability evaluation of the ...
  • Van Dyk, Tobias Jan (1999-06)
    Usability refers to the study and measurement of the quality of human-computer interaction. Internet-based banking is a task-oriented, goal-directed, Web-based, E-commerce application where users access and manipulate ...
  • Ssemugabi, Samuel; De Villiers, M.R. (Ruth) (2007)
    With rapid advances in information and communication technology, e-learning is playing a major role in education and training. Aspects of usability, as well as learning issues, need to be considered in the development and ...
  • Van Wyk, Etienne; De Villiers, M.R. (Ruth) (2008)
    the context in which it is used, and its appropriateness to that context. According to the ISO definition of usability, the context of use includes the users, tasks, equipment (hardware, software and materials), and the ...
  • Jooste, Chrisna; Van Biljon, Judy; Mentz, Jan (South African Computer Journal (SACJ), 2014-09-01)
    Business Intelligence (BI) applications provide business information to drive decision support. Usability is one of the factors determining the optimal use and eventual bene t derived from BI applications. The documented ...
  • Ssemugabi, Samuel (2009-08-25)
    Despite widespread use of web-based e-learning applications, insufficient attention is paid to their usability. There is a need to conduct evaluation using one or more of the various usability evaluation methods. Given ...
  • Nyang'or, Julius Omondi (2012-06)
    The use of interactive e-learning tutorials is an effective form of teaching and learning. It is therefore important that attention is paid to their usability. This research relates to the evaluation of a CD-based e-learning ...
  • De Villiers, M.R. (Ruth) (2004)
    Computing systems require rigo rous evaluation both of functionality and usability. Evaluation of software within the growing e-learning sector is currently receiving attention. Relevant aspects are evaluation paradigms, ...
  • Fadiran, Olakumbi Anthonia (2019-01)
    There is growing evidence that knowledge co-creation and interactivity during learning interventions aid knowledge acquisition and knowledge transfer. However, learners have mostly been passive consumers and not co-creators ...

Search UnisaIR


Browse

My Account