Institutional Repository

Browsing College of Science, Engineering and Technology by Title

Browsing College of Science, Engineering and Technology by Title

Sort by: Order: Results:

  • Brink, Basil (2000-07)
    During the late 19th and 20th century the S A Railways and Harbours, the S A Transport Services and their recent successors Transnet and the S A Rail Commuter Corporation developed several landmarks and precincts in ...
  • Webster, MR; Harley, RG; Levy, DC; Woodward, DR (1991)
    This paper describes a software development environment currently being built at the University of Natal that provides a powerful and easy to use engineering tool for the design, simulation and implementation of high ...
  • Postma, Stef W. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Two topics are studied, related and generalised in this paper - the Knuth transform of an arbitrary tree to a binary tree, and Pfaltz' s definition of a data structure as a graph with assignments. Trees are defined in ...
  • Luvuno, Jabulani Heavenson (2017-03)
    South Africa is a water scarce country. The expansion of the industrial, mining, and agricultural sectors to meet the needs of South Africa’s growing population requires more water. There is therefore an urgent need to ...
  • Watson, BW (1995)
    Compiler writing techniques have undergone a number of major revisions over the past forty years. The introduction of object-oriented design and implementation techniques promises to improve the quality of compilers, while ...
  • Van der Merwe, Ronell; Van Biljon, Judy (IEEE Explore, 2018-03)
    The potential of cloud computing services (CCS) for supporting teaching and learning has been widely recognized, especially for mobile interactions. However, the multifaceted nature and rapid development of computing ...
  • Motalane, Malebogo John (2015-03)
    The Lyons group denoted by Ly is a Sporadic Simple Group of order 51765179004000000 = 28 37 56 7 11 31 37 67. It(Ly) has a trivial Schur Multiplier and a trivial Outer Automorphism Group. Its maximal subgroups are G2(5) ...
  • Lubinsky, D (1995)
    The ability to learn from observations and to modify our understanding of the world based on experience is an essential aspect of intelligent behavior. Machine learning has thus become an important sub-area of artificial ...
  • Moodley, Lohini (1999-01)
    For a graph G = (V (G), E (G)), a set S ~ V (G) dominates G if each vertex in V (G) \S is adjacent to a vertex in S. The domination number I (G) (independent domination number i (G)) of G is the minimum cardinality ...
  • Marsden, G; Jones, M (2001)
    Embedded interactive computer systems, such as those found in cellular handsets, can be hard to use. The combination of small form factor - limited input and output potential - and an increasing feature set, result in ...
  • Venter, IM; Blignaut, RJ (1995)
    The rapidly changing·end-user computing environment requires an informed recipient of information who can play an active role in the design of information systems to capture. retrieve and interpret data [6). We need our ...
  • Warren, P (South African Computer Society (SAICSIT), 1999)
    The paper proposes a framework for discussing methodologies for developing interactive computer systems. It uses this framework for a sample of systems and shows how certain insights about missing aspects of the methodologies ...
  • Sebatjane, Phuti (2016-06)
    The term aggregation refers to overdispersion and both are used interchangeably in this thesis. In addressing the problem of prevalence of infectious parasite species faced by most rural livestock farmers, we model the ...
  • Gundidza, Patricia Tapiwa (2021-10-01)
    The conventional approach in determining HIV risk factors fails to consider the influence behavioural and biological factors may have when modelled jointly. This study investigates the extent of influence behavioural and ...
  • Stevens, Charles Cater (1996-11)
    Redundancy in plaintext is a fertile source of attack in any encryption system. Compression before encryption reduces the redundancy in the plaintext, but this does not make a cipher more secure. The cipher text is still ...
  • Philips, M.J.; Berman, Sonia (South African Institute of Computer Scientists and Information Technologists, 1991)
    The universal relation is a way of overcoming users' prime database access difficulty, namely navigation through database structures. As a result there is reduced user involvement with the underlying logical database ...
  • Mlati, Malavi Clifford (2019-10)
    Real-Time Rollover prevention of Unmanned Ground Vehicle (UGV) is very paramount to its reliability and survivability mostly when operating on unknown and rough terrains like mines or other planets.Therefore this research ...
  • Shaw, V (South African Institute of Computer Scientists and Information Technologists, 1991)
    The UNINET Academic and Research Network is a collaborative project among Universities, Research Councils and the FRD for the development, implementation and promotion of an academic and research network of computers ...
  • Twinomurinzi, H; Msweli, N. T. (Unisa Press and NEMISA, 2021-01)
    The findings revealed the great extent to which multifaceted change and flexibility is needed at institutional and individual levels if MOOCs are to be adopted successfully and cross-accredited across higher education ...

Search UnisaIR


Browse

My Account