Institutional Repository

Browsing 1996 National Research and Development Conference by Title

Browsing 1996 National Research and Development Conference by Title

Sort by: Order: Results:

  • Watzenboeck, M (1996)
    Automating network management is regarded as a prerequisite for further plant automation. Artificial intelligence techniques, such as case based reasoning, topological reasoning and automated learning enable automated ...
  • Walker, AJ (1996)
    This paper presents an overview of a national project to develop a checklist to support audits and assessments of quality management systems in the field of software in terms of the compliance requirements of the ISO 9001 ...
  • Pillay, N (1996)
    Development software is one of the courses that first year students studying towards a Diploma in Financial Studies enrol for. This course contains an appreciable amount of RMCOBOL programming. Past experience is indicative ...
  • Renaud, K; Kotze, P (1996)
    In many applications today multiple pre-existing database systems are integrated into a single multiple database system called a multidatabase system. There are various characteristics of these systems which distinguish ...
  • Hansen, AC; Lyne, PWL (1996)
    There is a rapidly growing awareness in the world of the need to modify the educational process at all levels of human development. In South Africa the situation is made worse by a substantial backlog in education. ...
  • Leonard, AC (1996)
    An IT/end user relationship is described as intriguing and complex and is based on a physical and abstract dimension. These two dimensions enable one to fully describe the holistic nature of such a relationship and encapsulate ...
  • Erwin, GJ; Blewett, CN (1996)
    Changes in South African society have brought about changes in the background of student audiences and these have stimulated a review of the areas of governance, syllabus, curriculum, teaching methods and research in ...
  • Geldenhuys, J (1996)
    The exploration of states is an important element of many problems. Many problems share properties which allow the formulation of general strategies for state exploration. This article examines these strategies with reference ...
  • Parkinson, E; Warren, PR (1996)
    We investigate the performance of simulated annealing and tabu search, two new general problem solving heuristics, on an examination timetabling problem. These two techniques are described here and issues arising from ...
  • Scott, TG; Hattingh, JM; Steyn, T (1996)
    The simplex method is one way of solving a linear programming problem (LP-problem). The simplex method needs a basic feasible solution to start the solution process. This requires an available non-singular basis. Normally ...
  • Moodley, D; Ram, V (1996)
    This paper examines and provides an overview of feature extraction techniques that are currently used in neural networks for image recognition. These include moment invariants, Zemike moments, Fourier descriptor techniques, ...
  • Viktor, HL; Cloete, I (1996)
    Computational intelligent programs are capable of discovering interesting relationships contained in "raw" data. These programs, including artificial neural networks, set covering algorithms and decision trees, have been ...
  • Venter, H (1996)
    Given a complete, formal description of the semantics of a programming language, it should be possible to generate a compiler for the language using an automated process. This is highly desirable, since it reduces the work ...
  • Morris, A (1996)
    The independent online is the Internet service of Independent Newspapers, South Africa's largest newspaper group. This paper is a case study of the events of the past year, including the lessons, successes and failures ...
  • Van der Walt, TJ (1996)
    Cooperation between industry, academia and government is increasingly viewed to be of key importance for economies to be globally competitive. In a world where research and technology development, and the diffusion and ...
  • Von Solms, R (1996)
    Information security has moved a long way from the early days when physical security, together with a set of backups, fonned the backbone of a company's security controls. Today, infonnation security is all about policies, ...
  • Hart, ML; Vavatzanidis, K (1996)
    A decision of increasing importance to many organisations is whether to use internal or outside resources, assistance and expertise to address information technology and information systems requirements. This decision may ...
  • Smith, D (1996)
    As changes in Information Technology and organisations move into the sophisticated areas of client/server computing and open, integrated architectures, the IS professional needs to develop an increasing range of skills and ...
  • Mazhindu_Shumba, R (1996)
    This paper presents the lessons learned from using the C++ programming language and an object-oriented design methodology for the development of a prototype analysis tool for inheritance relationships in object-oriented ...
  • Diani, OA; Seipone, T (1996)
    A low-cost microcomputer-based online system has been developed for the basic In-patient Medical Records functions of a General Hospital. Its basic functions are: to access patient data, register and admit a patient, enter ...

Search UnisaIR


Browse

My Account