Institutional Repository

Browsing College of Science, Engineering and Technology by Title

Browsing College of Science, Engineering and Technology by Title

Sort by: Order: Results:

  • Molepo, Isaih Kgabe (2016-04)
    This dissertation describes the development, design, implementation and evaluation of a data acquisition system, with the main aim of using it for data collection on a laboratory pilot ball mill. An open-source prototype ...
  • Muwawa, Jean Nestor Dahj (2018-11)
    This research study focuses on the application models of Data Mining and Machine Learning covering cellular network traffic, in the objective to arm Mobile Network Operators with full view of performance branches (Services, ...
  • Cooper, AK (1987)
    Geographical information consists of non-spatial information (alphanumeric) and spatial information (vector and raster), the relationships between the non-spatial information and the spatial information, as well as the ...
  • Cooper, A.K. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Geographical information consists of non-spatial information (alphanumeric) and spatial information (vector and raster), the relationships between the non-spatial information and the spatial information, as well as ...
  • Schach, Stephen R. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Three levels of traces for data structures (as opposed to simple variables) are defined. A machine-code core dump is essentially a low level trace. A high level trace reflects the high level language in which the data ...
  • Currin, Desmond C. (Computer Society of South Africa (on behalf of SAICSIT), 1983)
    Generalized network problems involve the optimization of a flow through a network. In contrast to normal networks, generalized networks include multipliers which alter the flow as it passes through the arcs. This enables ...
  • Venter, BH (South African Institute of Computer Scientists and Information Technologists, 1990)
    A programming language data model is introduced, based on the notions that variables are functions and types are sets of values. It is shown that, despite the simplicity of the underlying mathematical formalism, the data ...
  • Heidema, J; Labuschagne, W.A. (South African Institute of Computer Scientists and Information Technologists, 1990)
    The theory of semantic information is sketched in an algebraic setting, and automorphisms characterising various degrees of incompatibility are introduced. Data-dependent measures of semantic information are defined in ...
  • Viktor, HL; Rennhackkamp, MH (South African Institute of Computer Scientists and Information Technologists, 1991)
    A recovery technique, to facilitate the recovery from system failures should ensure a consistent database state at all times. The UNIX write system call uses a delayed-write policy. Data blocks are kept in a buffer cache ...
  • King, M. C. F.; Naude, G.; von Solms, S. H. (Computer Society of South Africa (on behalf of SAICSIT), 1979)
    Aspects are discussed of the pract.Ical applicat.Ion of recent relatlonal theory The relevant defirut.Ions, extracted from vanous papers, have been restated usmg a common notat.Ion An attempt is made to descnbe unambiguously ...
  • Podevyn, D. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    A knowledge engineering tool called GESS (General Expert System Shell) is presented which is used for building different types of expert systems. Knowledge representation is based on direct extensions of the idea of decision ...
  • Abdulrab, H; Ngomo, M; Drissi-Talbi, A (South African Computer Society (SAICSIT), 1999)
    LOP (Logic, Object, Parallelism) is a system that integrates object-oriented and constraint logic programming. It is entirely designed and implemented, using object-oriented methodology, under the form of hierarchical ...
  • Abdulrab, H; Ngomo, M; Drissi-Talbi, A (South African Computer Society (SAICSIT), 2000)
    The aim of this paper is to introduce temporal processes and linear constraints on naturals for solving temporal discrete simulations problems. We first describe a new approach for solving such constraints, based on the ...
  • Eisinger, N; Ohlbach, HJ (South African Computer Society (SAICSIT), 1993)
    A general theory of deduction systems is presented The theory is illustrated with deduction systems based on the resolution calculus, in particular with clause graphs. This theory distinguishes four constituents of a ...
  • Mathevula, Langutani Eulenda (2014-01)
    Thermal control in spacecraft will be increasingly important as the spacecraft grows smaller and more compact. Such spacecraft with low thermal mass will have to be designed to retain or reject heat more efficiently. The ...
  • Govender, I. (Irene) (1998-06)
    In this dissertation a formalisation of nonmonotonic reasoning, namely Default logic, is discussed. A proof theory for default logic and a variant of Default logic - Prioritised Default logic - is presented. We also pursue ...
  • Da Veiga, Adele; Martins, Nico (Computers & Security (Elsevier Journal), 2017-05-12)
    consider the possibility of several information security subcultures that could be present in the organisation. This means that different geographical, ethnic or age groups of employees could have different assumptions, ...
  • Da Veiga, Adele; Astakhova, Liudmila V.; Botha, Adele; Herselman, Marlien (Elsevier, 2020-01-08)
    The ideal or strong information security culture can aid in minimising the threat of humans to informa- tion protection and thereby aid in reducing data breaches or incidents in organisations. This research sets out to ...
  • Masithulela, Fulufhelo; Ramdass, Kemlall (SAJIE, 2015-11-30)
    The Mechanical Testing Facility, which is a division within TT Pty (Ltd), provides component mechanical testing to other divisions tasked with implementing new components in the railway system. The records over seven years ...

Search UnisaIR


Browse

My Account