College of Science, Engineering and Technology: Recent submissions

  • Rennhackkamp, MH (South African Institute of Computer Scientists and Information Technologists, 1990)
    A distributed database management system must facilitate integrated processing of data which is physically distributed over a network of node computers, while providing locality transparency. The NRDNIX prototype has ...
  • Oosthuizen, GD (South African Institute of Computer Scientists and Information Technologists, 1990)
    Pattern recognition involves the matching of a given pattern against a collection of patterns in store in order to identify the given pattern as belonging to a particular class already known to the system or not. Similarly, ...
  • Murrell, HC Carson, D (South African Institute of Computer Scientists and Information Technologists, 1990)
    The continuous and discrete Hartley transforms are real valued transforms that have similar properties to the continuous and discrete Fourier transforms. In addition, a fast algorithm exists for computing the discrete ...
  • Mueller, C.S.M. (South African Institute of Computer Scientists and Information Technologists, 1990)
    Induction has been used as a major tool in mathematics in proving theorems. This paper explores whether it has an equally important role in formulating programs. There are those who advocate that induction should be used ...
  • Mende, J. (South African Institute of Computer Scientists and Information Technologists, 1990)
    In order to design and operate a complex computer based information system, one needs to partition its transformation process into modules of manageable size. The same process can be partitioned in many different ways, ...
  • Mende, J. (South African Institute of Computer Scientists and Information Technologists, 1990)
    Both in the advancement of Information Systems theory and in practical development projects, significant errors of omission can occur unless one is aware of all aspects of the concept "information system success". At least ...
  • Kritzinger, PS van Dijk, J (South African Institute of Computer Scientists and Information Technologists, 1990)
    The development of communication protocol standards has been accompanied by the standardization of formal specification languages to describe these standards in a clear and unambiguous way. Simulta­neously, techniques for ...
  • Kambanis, J. (South African Institute of Computer Scientists and Information Technologists, 1990)
    This paper describes the functionality and architecture of a Semantic Data Modeling environment. It integrates User Interface techniques used in Computer Aided Software Engineering-and Expert Systems shells into a system ...
  • Nyamaka, Admore Botha, Adele Van Biljon, Judy Marais, Mario (IIMC International Information Management Corporation, 2018)
    Smart phone usage in Sub-Saharan Africa is expected to constitute more than half of all mobile connections by 2020. Therefore, it can be expected that mobile applications will change the way business is conducted and ...
  • Renaud, Karen Van Biljon, Judy (South African Institute of Computer Scientists and Information Technologists, 2017-12)
    Guidelines are recommended as a tool for informing user interface design. Despite a proliferation of guidelines in the research literature, there is little evidence of their use in industry, nor their influence in academic ...
  • Unknown author (SAICSIT, 1982-11-01)
  • Unknown author (SAICSIT, 1979-06-01)
  • Unknown author (SAICSIT, 1987-04-01)
  • Tegegne, Awoke S Ndlovu, Principal Zewotir, Temesgen (2018-04-27)
    Abstract Background HIV has the most serious effects in Sub-Saharan African countries as compared to countries in other parts of the world. As part of these countries, Ethiopia ...
  • SAICSIT (SAICSIT, 1988-05)
  • SAICSIT (1986-01)
  • Ramessur, Arvind (2017-12)
    The mildly active nuclear region in the galaxy M81 (henceforth, M81‹) is one of the nearest low-luminosity active galactic nuclei (LLAGN) whose structure is marginally resolved when probed with Very Long Baseline ...
  • SAICSIT (SAICSIT, 1985)
  • Mazorodze, Alfred Hove (2017-06)
    Knowledge Management aims to improve organisational performance and it marks the beginning of organisational transformation. The two types of knowledge managed are respectively categorised “tacit” and “explicit.” This ...
  • Buthelezi, Mokateko Portia (2017-06)
    nformation security (InfoSec) policies are widely used by institutions as a form of InfoSec control measure to protect their information assets. InfoSec policies are commonly documented in natural language, which is prone ...

Search UnisaIR


Browse

My Account