SAICSIT Digital Archive: Recent submissions

  • Kruger, JW (2000)
    The McGreggor database supplies the accounting information of companies listed on the Johannesburg stock exchange. These attributes are not significantly correlated to the Return. The Pearl's algorithm in Bayesian belief ...
  • Kruger, HA; Hattingh, JM (1997)
    The majority of large organisations operate and maintain significant portfolios of computerised systems. All Information Systems (IS) managers are increasingly faced with the task of doing more with less. To cope with ...
  • Hazelhurst, S (1997)
    Traditional methods of testing computer systems, although valuable, are inadequate for ensuring sufficiently high quality in systems in which a high degree of reliability must be placed. Formal methods for development of ...
  • Radovanovic, A; Venter, DM (1995)
    South African networking history started in the mid 1980's. Within less than ten years, the country became the 15-th fastest growing network within the lnternet community. Today, the South African network offers a variety ...
  • Ntlatlapa, N (1995)
    Symmetric positive definite matrices appear in most methods for Unconstrained Optimization. The method widely adopted for factoring these matrices is Cholesky Factorization. Furthermore, in Quassi-Newton methods for ...
  • Cloete, E (1995)
    A 1 D non-linear filter which is based on 'max-min' selectors is extended for use in 2 0 applications. The objective of this research is to remove impulsive noise without unduly changing original, valid data. Some examples ...
  • Hillebrand, G (1995)
    This paper presents an overview of the established concepts of David Harel' s higraphs, to increase their visibility. Higraphs are a union of extended graph and extended set theory which allows the understandable definition ...
  • Randiki, E (1998)
    The purpose of this paper is to identify and analyse error in selected medical devices: the Datex cardiocap and the capnomac Ultima II. These are both anaesthetic machines used to monitor patients in theatre. A secondary ...
  • Wong, B; Marsden, G (2001)
    With the continuing growth of the Internet, an increasing number of organisations are incorporating the Web into their business activities. The appeal of a site to users in terms of both attractiveness and usability ...
  • Van Zyl, J; Walker, AJ (2001)
    The notion of patterns has been used in many different disciplines, and the software industry is no exception. There are many books written, academic research done and practical examples available of where patterns have ...
  • Van der Poll, JA; Kotze, P (2001)
    A formal specification of a multi-level marketing (MLM} business is presented. Specifying a MLM business boils down to specifying properties of and operations on mathematical forests and trees. The usefulness of the ...
  • Thomas, TA; Brown, S (2001)
    Group activities are important for students in order to develop the skills they will need for working with other people when they get into industry. The Internet offers an exciting environment for students to practise these ...
  • Stander, A; Van Zee, P; Wang, Y-J (2001)
    Automatic teller machines (ATM) are an intermediate stage in the progression of banking technology. This intermediate stage is expected to remain until user perceptions of electronic banking have improved. ATM transaction ...
  • Von Solms, E; Eloff, JHP (2001)
    Information is a very valuable resource and must be protected against harmful attacks from inside as well as outside the organization. As a resource, information is the lifeline of many organizations and is therefore vital ...
  • Smith, DC; Becker, M; Burns-Howell, J; Kyriakides, J (2001)
    The use of teams within organisations is becoming more prevalent as teams have been identified as an efficient work unit of human capital. This research identified 17 team effectiveness characteristics and, using a sample ...
  • De Ridder, C; Pretorius, L; Barnard, A (2001)
    With the advent of the lnformation Age and global connectivity, the ethical use of Information and Communication Technologies (/CI) has become essential. As the drive towards the establishment of a so-called IT profession ...
  • Renaud, K; Smith, E (2001)
    This paper presents a novel approach to a familiar problem - that of helping users to choose better passwords, and to remember them. User identification and authentication is an essential aspect of our technologically ...
  • Hazelhurst, S (2001)
    The use of IP filtering to improve system security is well established, and although limited in what it can achieve has proved to be efficient and effective. In the design of a security policy there is always a trade-off ...
  • Hart, ML; Davies, K; Barker-Goldie, E-J; Theron, A (2001)
    This research describes a study into the adoption of data mining (DM) techniques and tools in industry. They are seen by most companies interviewed as strategically important, with key applications varying per sector, but ...
  • Harmse, R; Thomas, T (2001)
    The arrival of outcomes-based education (OBE) in South African means that we have to change the way in which we assess our learners. Coupled with this change comes a move to larger classes where individual assessment has ...

Search UnisaIR


Browse

My Account