Institutional Repository

Browsing SAICSIT Proceedings: 1979-2001 by Issue Date

Browsing SAICSIT Proceedings: 1979-2001 by Issue Date

Sort by: Order: Results:

  • Kruger, JW (1996)
    Big databases have been built up over time. The information in these databases can be converted by the Pearl algorithm [ Pearl 1988 ] from data to information. When a promotional drive is initiated, do we know who the ...
  • Le Roux, M (1996)
    Thoughts are exchanged on Project Management in practice, specifically regarding projects analysed and systems developed with the Composer by IEF CASE tool. The information engineering methodology (IEM) that is being ...
  • Leonard, AC (1996)
    An IT/end user relationship is described as intriguing and complex and is based on a physical and abstract dimension. These two dimensions enable one to fully describe the holistic nature of such a relationship and encapsulate ...
  • Kotze, P; De Villiers, R (1996)
    The research reported in this paper aims to integrate software engineering approaches with instructional factors in the requirements, analysis, design and production phases of instructional software development. The ...
  • Viktor, HL; Cloete, I (1996)
    Computational intelligent programs are capable of discovering interesting relationships contained in "raw" data. These programs, including artificial neural networks, set covering algorithms and decision trees, have been ...
  • Watzenboeck, M (1996)
    Automating network management is regarded as a prerequisite for further plant automation. Artificial intelligence techniques, such as case based reasoning, topological reasoning and automated learning enable automated ...
  • Dhevcharran, N; Steenkamp, AL; Ram, V (1996)
    The increasing complexity of large process control systems impedes efforts to construct, co-ordinate and monitor these systems effectively. The object oriented paradigm and associated mechanisms greatly assist in software ...
  • Roux, HN; De Villiers, PJA (1996)
    The implementation of protocols can be speed up by incorporating formally validated designs in documents that describe new protocols. Unfortunately, this seldom happens in practice. It is proposed that a formally validated ...
  • Pillay, N (1996)
    Development software is one of the courses that first year students studying towards a Diploma in Financial Studies enrol for. This course contains an appreciable amount of RMCOBOL programming. Past experience is indicative ...
  • Moodley, D; Ram, V (1996)
    This paper examines and provides an overview of feature extraction techniques that are currently used in neural networks for image recognition. These include moment invariants, Zemike moments, Fourier descriptor techniques, ...
  • Suleman, H; Hajek, M (1996)
    Mathematica has proven itself to be a suitable platform on which to develop prototype Genetic Programming applications. However, due to the sheer complexity of genetic programming calculations, non-trivial problems cannot ...
  • Renaud, K; Kotze, P (1996)
    In many applications today multiple pre-existing database systems are integrated into a single multiple database system called a multidatabase system. There are various characteristics of these systems which distinguish ...
  • Jankovic, B; Bajic, VB (1996)
    Parallel execution is the most powerful method of speeding up numerical analysis. However, numerical complexity increases much faster than the problem size. For this reason the computational effort required for the analysis ...
  • Geldenhuys, J (1996)
    The exploration of states is an important element of many problems. Many problems share properties which allow the formulation of general strategies for state exploration. This article examines these strategies with reference ...
  • Erwin, GJ; Blewett, CN (1996)
    Changes in South African society have brought about changes in the background of student audiences and these have stimulated a review of the areas of governance, syllabus, curriculum, teaching methods and research in ...
  • Hansen, AC; Lyne, PWL (1996)
    There is a rapidly growing awareness in the world of the need to modify the educational process at all levels of human development. In South Africa the situation is made worse by a substantial backlog in education. ...
  • Von Solms, R (1996)
    Information security has moved a long way from the early days when physical security, together with a set of backups, fonned the backbone of a company's security controls. Today, infonnation security is all about policies, ...
  • Blewett, CN; Cansfield, J; Gibson, L (1996)
    South African organisations are facing increasing demands stemming from growing competition, fast changing technologies and global trends and pressures. The methods and management structures enabled these organisations to ...
  • Diani, OA; Seipone, T (1996)
    A low-cost microcomputer-based online system has been developed for the basic In-patient Medical Records functions of a General Hospital. Its basic functions are: to access patient data, register and admit a patient, enter ...
  • Nienaber, RC (1996)
    In today's highly competitive global economy, well-structured information resources, representing enterprise-wide information, are essential to the survival of an organization. The user needs an integrated view of the ...

Search UnisaIR


Browse

My Account