Institutional Repository

Browsing College of Science, Engineering and Technology by Title

Browsing College of Science, Engineering and Technology by Title

Sort by: Order: Results:

  • Kambanis, J (South African Institute of Computer Scientists and Information Technologists, 1991)
    This paper describes a conceptual framework and an implementation medium for constructing multi-paradigm knowledge bases. The idea of a concept network is used as a basis for storing knowledge in different knowledge ...
  • Trakulsuk, P; Avatchanakorn, V (South African Computer Society (SAICSIT), 1999)
    This paper presents a conceptual model of analyzing huge amount of information from a data warehouse into Multidimensional Database (MDDB) using multidimensional data (MDD)model. The major advantages of this model are: 1) ...
  • Mukeru, Bahizire Martin (2021-12)
    Glycerol is considered as the major waste from biodiesel production since every 1L of biodiesel produced is accompanied by 0.1 L of glycerol by-product. Utilizing this waste as a biorefinery feedstock will not only ...
  • Litheko, Lefu Andrew (2017-10)
    This dissertation develops a systematic targeting method based on the C-H-O ternary diagram for the conceptual design of gasification-based biorefineries. The approach is applied using dimethyl ether (DME) as case study. ...
  • Da Veiga, Adele; Martins, Nico; Maguraushe, Kudakwashe (Kalpa Publications in Computing, 2019)
    In this research, an information privacy culture is proposed to be embedded in three basic concepts: students’ privacy expectations, privacy awareness and confidence in universities’ capability to uphold information privacy. ...
  • van der Merwe, O. R.; Van Biljon, Judy; Pilkington C, / (Springer, 2022-07-07)
    Developing and presenting a well-formulated research argument is core to the learning journey of a graduate student. In open distance e-learning, computer-supported learning is instrumental in providing a platform for ...
  • Ocloo, Charles; Kroeze, Jan H; Da Veiga, Adele (Springer, Cham, 2021-07)
    Education institutions within and outside Ghana continue to experience mass information leakages at an alarming rate even with the huge investment made in information technology infrastructure to secure their information ...
  • Huisman, HM (1998)
    The software crisis has been well documented. Software is being delivered late, over budget and full of residual faults. In an attempt to solve these problems, CASE technology has been developed. CASE technology provides ...
  • Pilkington, Colin; Pretorius, Laurette (SCITEPRESS, 2015-11)
    Recognising the need for the development of research capacity and changing learning paradigms that include online and collaborative approaches, an ontology of research methodology needs to be developed to allow for the ...
  • Padayachee, Keshnee (2014-01-29)
    Abstract: The aim of this paper is to provide a conceptual framework to mitigate the insider threat from an opportunity-based perspective. Although both motive and opportunity are required to commit maleficence, this paper ...
  • Da Veiga, Adele (Springer, Cham, 2020)
    The information privacy concern of consumers concerning the processing of their personal information by online organizations (websites) is investigated in this study by means of a quantitative approach. An overview of ...
  • Da Veiga, Adele; Ophoff, Jacques (Springer, IFIP Advances in Information and Communication Technology, Human Aspects of Information Security and Assurance 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings, 2020-07-08)
    Abstract. Individuals have differing levels of information privacy concern, formed by their expectations and the confidence they have that organisations meet this in practice. Variance in privacy laws and national factors ...
  • Da Veiga, Adele; Ophoff, Jacques (Springer, Cham, 2020)
    Individuals have differing levels of information privacy concern, formed by their expectations and the confidence they have that organisations meet this in practice. Variance in privacy laws and national factors may also ...
  • Ighedo, Oghenetega (2013-11)
    We study ideals of pointfree function rings. In particular, we study the lattices of z-ideals and d-ideals of the ring RL of continuous real-valued functions on a completely regular frame L. We show that the lattice of ...
  • Deacon, A (1991)
    In conventional systems, transaction management has been thoroughly investigated and is now considered to be well understood. Transaction management in multidatabase systems, however, is less well understood. A multidatabase ...
  • Mueller, C.S.M. (Computer Society of South Africa (on behalf of SAICSIT), 1984)
    Why concurrency in itself should be seen as a method of programming, is discussed. Current approaches to concurrent programming are evaluated in terms of e~e qt programming. The properties required to decompose the ...
  • Mamba, B.B.; Khumalo, Nonhlanhla P; Nthunya, Lebea N.; De Cank, E; Deres, S; Verliefde, A.R.D.; Kuvarega, A.T.; Mhlanga, Sabelo D.; Dlamini, D.S. (Elsevier, 2018-03-18)
    The ability to use the membrane distillation (MD) technique is envisaged as a promising approach to attain sustainable and reliable clean water supply. In this work, polytetrafluoroethylene/polyvinylidene fluoride (PVDF/PTFE) ...
  • Nieuwoudt, C; Botha, EC (South African Computer Society (SAICSIT), 1999)
    We implement and evaluate the performance of a state-of-the-art connected digit recognition system for spoken Afrikaans digits. The creation of a database for our purpose is discussed. Results indicate that an efficient ...
  • Short, R. (Computer Society of South Africa (on behalf of SAICSIT), 1985)
    Formalisms comprise the essential bricks and mortar that we need in order to construct information systems. Not surprisingly therefore the invention and refinement of formalisms has formed and continues to form a ...
  • Patrice Umenne; V.V Srinivasu (Acta Physica Polonica A, 2018-07-01)
    In this paper we report on the development of a new application of the femtosecond laser, namely, the fabrication of micron, sub-micron and nano sized constrictions on YBCO superconductive thin films. The fabricated micron, ...

Search UnisaIR


Browse

My Account